divide the input array into thirds (rather than halves), recursively sort each third, and finally combine the results using a three-way Merge subroutine. What is the running time of this algorithm as a function of the length n of the input array, ignoring constant factors and lower-order terms

Answers

Answer 1

Answer:

The answer is "nlogn".

Explanation:

The time complexity can only shift to 3 with the last instance.  For the 2nd case, they need one parallel. However, 2 parallels are needed to sort with splitting into 3-way frames. It decreases the number of passes even after breaking the collection in 3 by increasing contrast. So, the time complexity remains the same but the log is divided into 3 bits.  The complexity of time is:   [tex]T(n)=3T(\frac{n}{3})+ O(n) = O(nlogn)_3.[/tex]

Related Questions

1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web applications, before using that data. 2. Why should Web site operators that allow users to add content, for example forums or blogs, carefully and consistently patch and configure their systems

Answers

Answer:

1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses.  Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.

Explanation:

2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address  issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.

7. Which of these statements is true? Agile is a programming language MySQL is a database HTML stands for "Hypertext Markup Link" Java is short for JavaScript

Answers

Answer:

None of them is correct, but it seems one of the option has missing words.

The exact definition is, MySQL is a database management system.

Explanation:

Agile is not a programming language, it is a software development methodology.

HTML stands for "Hypertext Markup Language"

Java and JavaScript are different languages.

Actually,  MySQL is a database management system. It is used to deal with the relational databases. It uses SQL (Structured Query Language).

Going to Grad School! In the College of Computing and Software Engineering, we have an option for students to "FastTrack" their way into their master’s degree directly from undergraduate. If you have a 3.5 GPA and graduate from one of our majors, you can continue on and get your masters without having to do a lot of the paperwork. For simplification, we have four undergraduate degrees: CS, SWE, IT, and CGDD – and three masters programs: MSCS, MSSWE and MSIT. For this assignment, you’re going to ask the user a few questions and determine if they qualify for the FastTrack option.
Sample Output:
Major: Frogmongering
GPA: 3.9
Great GPA, but apply using the regular application.
Sample Output #2:
Major: SWE
GPA: 3.3
Correct major, but GPA needs to be higher.
Sample Output #3:
Major: IT
GPA: 3.5
You can FastTrack.
Sample Output #4:
Major: Study Studies
GPA: 0.4
Talk to one of our advisors about whether grad school is for you.

Answers

Answer:

The programming language is not stated. However, I'll answer this question using Python programming language.

The program uses no comments; find explanation below

i = 0

while not (i == 4):

     print("Sample Run: #"+str(i+1))

     Major = input("Major: ")

     GPA = float(input("GPA: "))

     if not (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):

           if GPA >= 3.50:

                 print("Great GPA, but apply using the regular application")

           else:

                 print("Talk to one of our advisors about whether grad school is for you")

     if (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):

           if GPA >= 3.50:

                 print("You can FastTrack.")

           else:

                 print("Correct major, but GPA needs to be higher.")

     i = i + 1

Explanation:

Line 1 of the program initializes the sample run to 0

Line 2 checks if sample run is up to 4;

If yes, the program stops execution else, it's continues execution on the next line

Line 3 displays the current sample run

Line 4 and 5 prompts user for Major and GPA respectively

Line 6 to 10 checks is major is not one of CS, SWE, IT, and CGDD.

If major is not one of those 4 and GPA is at least 3.5, the system displays "Great GPA, but apply using the regular application"

If major is not one of those 4 and GPA is less than 3.5, the system displays "Talk to one of our advisors about whether grad school is for you"

Line 11 to 15 checks is major is one of CS, SWE, IT, and CGDD.

If major is one of those 4 and GPA is at least 3.5, the system displays "You can Fastrack"

If major is one of those 4 and GPA is less than 3.5, the system displays "Correct major, but GPA needs to be higher."

The last line of the program iterates to the next sample run

NAT ________. allows a firm to have more internal IP addresses provides some security both allows a firm to have more internal IP addresses and provides some security neither allows a firm to have more internal IP addresses nor provides some security

Answers

Answer:

NAT provides some security but allows a firm to have more internal IP addresses

Explanation:

NAT ( network address translation) this is a process where a  network system usually a firewall  assigns a public IP address to an internal computer used in a private network. it limits the number of public IP address a company operating a private network for its computer can have and this is very economical also limits the exposure of the company's private network of computers. the computers can access information within the private network using multiple IP addresses but it is safer to access external information using one public IP address

In order to place something into a container you must:_______.
a. double-click on the container and type a command.
b. drag the container onto the materials or instruments shelf.
c. double-click on the material or the instrument.
d. click on the material or instrument and drag it onto the container.

Answers

Answer:

Option (d) is the correct answer to this question.  

Explanation:

The container is a class, data structure, or abstract data type, the instances of which are compilations of many other particles. In several other words, they store objects in an ordered manner that meets strict rules about access. The reviewing information depends on the number of objects (elements) contained therein. To put any material or instrument in the container, it would be easy to select the material or instrument by clicking them and then dragging them onto the container. The other option won't be able to perform the required task.

Other options are incorrect because they are not related to the given scenario.

2.3 Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Use 35 hours and a rate of 2.75 per hour to test the program (the pay should be 96.25). You should use input to read a string and float() to convert the string to a number. Do not worry about error checking or bad user data.

Answers

Answer:

The programming language is not stated; However this program will be written using Python programming language

Comments are not used; See Explanation Section for line by line explanation of the code

hours = float(input("Hours: "))

rate = float(input("Rate per hour: "))

pay = hours * rate

print(pay)

Explanation:

The first line of the code prompts the user for hour.

The input is converted from string to float

hours = float(input("Hours: "))

The next line prompts the user for hour.

It also converts input from string to float

rate = float(input("Rate per hour: "))

Pay is calculated by multiplying hours by rate; This is implemented using the next line

pay = hours * rate

The calculated value of pay is displayed using the next line

print(pay)

When the program is tested by the given parameters in the question

hours = 35

rate = 2.75

The printed value of pay is 96.25

Write a method that finds the cheapest name of apples, and returns back a String stating what the apple name is and how much it costs. The method should take two arrays as two parameters (you do not need to make a two dimensional array out of these arrays).

Answers

The question is incomplete! Complete question along with answer and step by step explanation is provided below.

Question:

Two arrays are given:  

String apples[] = {"HoneyCrisp", "DeliciousRed", "Gala", "McIntosh",  "GrannySmith"};

double prices[] = {4.50, 3.10, 2.45, 1.50, 1.20};

Write a method that finds the cheapest name of apples, and returns back a String stating what the apple name is and how much it costs. The method should take two arrays as two parameters (you do not need to make a two dimensional array out of these arrays).

Answer:

The complete java code along with the output is prrovided below.

Java Code:

public class ApplesCheap

{

   public static String Cheapest(String apples[], double prices[])

 {

       int temp = 0;

       for (int i = 0; i < apples.length; i++)

    {

         if (prices[i] < prices[temp])

          {

               temp = i;

           }

       }

       return apples[temp];

   }

public static void main(String[] args)

{

// define the array of apple names and their prices

  String apples[] = {"HoneyCrisp", "DeliciousRed", "Gala", "McIntosh", "GrannySmith"};

  double prices[] = {4.50, 3.10, 2.45, 1.50, 1.20};

// print the cheapest apple by calling the function Cheapest

  System.out.println("The cheapest apple is: " + Cheapest(apples, prices));

   }

}

Output:

The cheapest apple is: GrannySmith

Assume a system uses 2-level paging and has a TLB hit ratio of 90%. It requires 15 nanoseconds to access the TLB, and 85 nanoseconds to access main memory. What is the effective memory access time in nanoseconds for this system?

Answers

Answer:

The effective memory access time  = 293.5 nanoseconds.

Explanation:

Given that:

TLB hit ratio = 90%

= 90/100

= 0.9

Require time to access TLB = 15 nanoseconds &

Time to access main Memory = 85 nanoseconds

The objective is to estimate the effective memory access time in nanoseconds for this system .

The effective memory access time  = [TLB Hit ratio (  main memory  access time + required time to access TLB) + ( 2 × main memory  access time) + required time to access TLB) × (2 - TLB hit ratio)]

The effective memory access time = [0.9 ( 85 + 15 ) + ( 2 × (85 ) + 15) × ( 2 - 0.90)

The effective memory access time  = 293.5 nanoseconds.

Match the following terms and definitions.
1. Programming code used to connect stand-alone systems____________
2. Transforming business processes to improve efficiency __________
3. Corresponds to the purchasing cycle________
4. Corresponds to the sales cycle ____________
5. Consists of front-end client computers and the user interface___________
6. Software programs on a router that monitor network traffic___________
7. Comprised of a centralized relational database and an RDBMS__________
8. Consists of servers and application software_____________
9. When an enterprise system uses layers of IT components: enterprise database, application, and client computers__________.

Answers

Answer:

1. Spaghetti code.

2. Business process management.

3. Procure-to-pay

4. Order-to-cash

5. User tier

6. Firewall

7. Database tier

8.Application tier

9. Three-tier architecture

Explanation:

1.Programming code used to connect stand-alone systems is spaghetti code.

2. Transforming business processes to improve efficiency business process management.

3. Corresponds to the purchasing cycle is called procure to pay.

4. Corresponds to the sales cycle is order-to-cash

5. Consists of front-end client computers and the user interface is user tier.

6. Software programs on a router that monitor network traffic is firewall

7. Comprised of a centralized relational database and an RDBMS is database tier.

8. Consists of servers and application software is application tier.

9. When an enterprise system uses layers of IT components: enterprise database, application, and client computers is three tier architecture.

A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error. The analyst runs a netstat -an command to discover if the webserver is up and listening. The analyst receives the following output:
TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
Which of the following types of attack is the analyst seeing?
A. Buffer overflow
B. Domain hijacking
C. Denial of service
D. Arp poisoning

Answers

Answer:

C. Denial of Service

Explanation:

Denial of service error occurs when the legitimate users are unable to access the system. They are then unable to access the information contained in the system. This can also be a cyber attack on the system in which user are stopped from accessing their personal and important information and then ransom is claimed to retrieve the attack. In such case system resources and information are temporarily unavailable to the users which disrupts the services.

When Designing Application Components, which characteristics of use cases are helpful to define component boundaries? (choose all that apply)​ a. ​ Must be installed concurrently b. ​ Sharing common data c. ​ Similarities in actors d. ​ Require the same security level e. ​ Triggered by same events f. ​ Have the same pre-conditions

Answers

Answer:

b. ​ Sharing common data

c. ​ Similarities in actors

e. ​ Triggered by same events

Explanation:

When Designing Application Components the characteristics of use cases that are helpful to define component boundaries are sharing common data between the users. The second one is similarities in actors. Actors are the users which interact with the application. There should be similarities in the actors that are to be used the application. Last one is triggered by same events. Triggers are basically the events which cause the use case to begin.

Design and implement a program (name it GradeReport) that uses a switch statement to print out a message that reflect the student grade on a test. The messages are as follows:

For a grade of 100 or higher, the message is ("That grade is a perfect score. Well done.")
For a grade 90 to 99, the message is ("That grade is well above average. Excellent work.")
For a grade 80 to 89, the message is ("That grade is above average. Nice job.")
For a grade 70 to 79, the message is ("That grade is average work.")
For a grade 60 to 69, the message is ("That grade is not good, you should seek help!")
For a grade below 60, the message is ("That grade is not passing.")

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   int grade;

   

   cout << "Enter student's grade: ";

   cin >> grade;

   

   switch (grade)  

       {

       case 100 ... 1000:

           cout << "That grade is a perfect score. Well done.";

           break;

       case 90 ... 99:

           cout << "That grade is well above average. Excellent work.";  

           break;

       case 80 ... 89:

           cout << "That grade is above average. Nice job.";  

           break;

       case 70 ... 79:

           cout << "That grade is average work.";  

           break;

       case 60 ... 69:

           cout << "That grade is not good, you should seek help!";  

           break;

       default:

           cout << "That grade is not passing.";

           break;

       }

   return 0;

}

Explanation:

*The code is in C++

First, ask the user to enter a grade

Then, check the grade to print the correct message. Since you need to check the ranges using switch statement, you need to write the minimum value, maximum value and three dots between them. For example, 70 ... 79 corresponds the range between 70 and 79 both inclusive.

Finally, print the appropriate message for each range.

Note: I assumed the maximum grade is 1000, which should more than enough for a maximum grade value, for the first case.

Which feature should a system administrator use to meet this requirement?
Sales management at universal Containers needs to display the information listed below on each account record- Amount of all closed won opportunities- Amount of all open opportunities.
A. Roll-up summary fields
B. Calculated columns in the related list
C. Workflow rules with fields updates
D. Cross-object formula fields

Answers

Answer:

The correct answer is option (A) Roll-up summary fields

Explanation:

Solution

The feature the administrator needs to use to meet this requirement is by applying Roll-up summary fields.

A roll-up summary field :A roll-up summary field computes or determine values from associated records, for example those in a linked list. one can develop a roll-up summary field to d a value in a master record  by building the values of fields in a detail record.

Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is either heads or tails. Assume the input is a value greater than 0.
Ex: If the input is 3, the output is:
tails
heads
heads
For reproducibility needed for auto-grading, seed the program with a value of 2. In a real program, you would seed with the current time. In that case, every program's output would be different, which is what is desired but can't be auto-graded.
Note: A common student mistake is to create an instance of Random before each call to rand.nextInt(). But seeding should only be done once, at the start of the program, after which rand.nextInt() can be called any number of times.
Your program must define and call the following method that returns "heads" or "tails".
public static String HeadsOrTails(Random rand)

Answers

Answer:

Here is the JAVA program:

import java.util.Scanner;  // to get input from user

import java.util.Random;   // to generate random numbers

public class CoinFlip {  

// function for flipping a coin to make decisions

  public static String HeadsOrTails(Random rand) {

//function to return head or tail

     String flip;   // string type variable flip to return one of the heads or tails

     if ((rand.nextInt() % 2) == 0)  

// if next random generated value's mod with 2 is equal to 0

        {flip = "heads";}  // sets the value of flip to heads

     else   // when the IF condition is false

       { flip = "tails";}   // sets value of flip to tails

  return flip;    }    //return the value of flip which is one of either heads or tails

  public static void main(String[] args) {  //start of main function body

     Scanner rand= new Scanner(System.in);  // creates Scanner instance

// creates random object and seeds the program with value of 2

     Random no_gen = new Random(2);  

     int decision = rand.nextInt();   //calls nextInt() to take number of decisions

     for (int i = 0; i < decision; i++) {

// produces heads or tails output for the number of decisions needed

        System.out.println(HeadsOrTails(no_gen));       }    }    }

//prints heads or tails

Explanation:

The above program has method HeadsOrTails(Random rand) to return the heads or tails based on the condition if ((rand.nextInt() % 2) == 0) . Here nextInt() is obtains next random number from the sequence of random number generator and take the modulus of that integer value with 2. If the result of modulus is 0 then the value of flip is set to heads otherwise tails.

In the main() function, a random object is created and unique seed 2 is set. The decision variable gets the number of decisions. In the for loop the loop variable i is initialized to 0. The loop body continues to execute until the value of i exceeds the number of decisions needed. The loop body calls the HeadsOrTails(Random rand) method in order to output either heads or tails.

The program and output is attached in a screenshot.

Given input of a number, display that number of spaces followed by an asterisk. (1 point) Write your solution within the existing supplied function called problem2() and run the Zybooks test for it before continuing on to the next problem. Hint: Use the setw() command to set the field width. Alternatively, you could again use a loop.

Answers

Answer:

Following is the program in C++ language

#include <iostream> // header file

#include <iomanip> // header file  

using namespace std; // namespace std;

void problem2() // function definition  

{

int num ; // variable declaration  

cout << "Enter the Number: ";

cin >> num; // Read the input by user

cout << "Resulatant is:";

for(int k = 0; k <num; k++) // iterarting the loop

{

std::cout << std::setw(num); // set width

std::cout <<"*"; // print *

}

}

int main() // main function

{

problem2();// function calling

return 0;

}

Output:

Enter the Number:  3

Resulatant is:    *   *   *

Explanation:

Following is the description of program

Create a function problem2().Declared a variable "num" of "int" type .Read the input in "num" by the user .Iterating the for loop and set the width by using setw() and print the asterisk.In the main function  calling the problem2().

State all the generations of computers.

Answers

Answer:

1 1st generation =vacuum tube based

2 nd generation =transistor based

3 rd generation intergrated circuit based

4rd generation =vlsi microprocessor based

5th generation =ulsi microprocessor based

Answer:

   1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...

   1956 – 1963: Second Generation – Transistors. ...

   1964 – 1971: Third Generation – Integrated Circuits. ...

   1972 – 2010: Fourth Generation – Microprocessors.

Explanation:

1. Write a program that asks the user to enter a string. The program should then print the following: (a) The total number of characters in the string (b) The string repeated 10 times (c) The first character of the string (remember that string indices start at 0) (d) The first three characters of the string (e) The last three characters of the string (f) The string backwards (g) The seventh character of the string if the string is long enough and a message otherwise (h) The string with its first and last characters removed (i) The string in all caps (j) The string with every a replaced with an e

Answers

Answer:

s = input("Enter a string: ")

print(len(s))

print(s*10)

print(s[0])

print(s[:3])

print(s[len(s)-3:])

print(s[::-1])

if len(s) >= 7:

   print(s[6])

else:

   print("The string is not long enough")

print(s[1:len(s)-1])

print(s.upper())

print(s.replace("a", "e"))

Explanation:

*The code is in Python.

Ask the user to enter a string

Use len method to get the total number of characters

Use "*" to repeat 10 times

Use index, 0,  to get first character

Use slicing to get first three characters

Use slicing to get last three characters

Use slicing to get it in backwards

Check if the length is greater than or equal to 7. If it is, use index, 6. Otherwise, print a message.

Use slicing to remove first and last characters

Use upper method to get it in all caps

Use replace method to replace the "a" with the "e"

The program that ask the user to enter a string and print the  (a) The total number of characters in the string (b) The string repeated 10 times (c) The first character of the string (remember that string indices start at 0) (d) The first three characters of the string (e) The last three characters of the string (f) The string backwards (g) The seventh character of the string if the string is long enough and a message otherwise (h) The string with its first and last characters removed (i) The string in all caps (j) The string with every a replaced with an e

is as follows:

x = str(input("please enter a string: "))

print(len(x))

print(x*10)

print(x[0])

print(x[0:3])

print(x[-3:])

print(x[::-1])

if len(x) >= 7:

  print(x[6])

else:

  print("The string is not up to length 7")

print(x[1:-1])

print(x.upper())

print(x.replace('a', 'e'))

The first line ask the user for a string input.

Print length of the user input

Print the user input ten times.

Print the first value of the user input

print the first three string

Print the last three string

Print the reverse of the string

if the length of the user input is greater than or equals to zero, then print the 7th term of the user input.

else it will print that the string length is not up to seven.

Remove the first and the last term of the user input and print the remaining user input.

print the uppercase of the user input.

Replace a with e in the user input.

learn more on python here: https://brainly.com/question/20202506?referrer=searchResults

The fill command try’s to fill or generate content for cells based on a ________.

Answers

Answer: Ctrl + R

Explanation:

Ctrl+ R is the shortcut for filling right, you will first highlight cells.

C++ Proagram
Write a loop that sets each array element to the sum of itself and the
next element, except for the last element which stays the same.
Be careful not to index beyond the last element. Ex:
Initial scores: 10, 20, 30, 40
Scores after the loop: 30, 50, 70, 40
The first element is 30 or 10 + 20, the second element is 50
or 20 + 30, and the third element is 70 or 30 + 40. The last element
remains the same.
Follow this code
#include
using namespace std;
int main() {
const int SCORES_SIZE = 4;
int bonusScores[SCORES_SIZE];
int i = 0;
bonusScores[0] = 10;
bonusScores[1] = 20;
bonusScores[2] = 30;
bonusScores[3] = 40;
/* Your solution goes here */
for (i = 0; i < SCORES_SIZE; ++i) {
cout << bonusScores[i] << " ";
}
cout << endl;
return 0;
}

Answers

Answer:

Replace /* Your solution goes here */

with

for (i = 0; i < SCORES_SIZE-1; ++i) {

bonusScores[i] += bonusScores[i+1];

}

Explanation:

In C++, the index of an array starts from 0 and ends at 1 less than the size of the array;

Using the analysis in the question, the above code (in the answer section) iterates from the index element (element at 0) to the second to the last element (element at size - 2)';

This is to ensure that the element of the array only adds itself and the next element;except for the last index which remains unchanged

The following operation is done in each iteration.

When i = 0,

bonusScores[0] = bonusScores[0] + bonusScores[0+1];

bonusScores[0] = bonusScores[0] + bonusScores[1];

bonusScores[0] = 10 + 20

bonusScores[0] = 30

When i = 1,

bonusScores[1] = bonusScores[1] + bonusScores[1+1];

bonusScores[1] = bonusScores[1] + bonusScores[2];

bonusScores[1] = 20 + 30

bonusScores[1] = 50

When i = 2,

bonusScores[2] = bonusScores[2] + bonusScores[2+1];

bonusScores[2] = bonusScores[2] + bonusScores[3];

bonusScores[2] = 30 + 40

bonusScores[2] = 70

This is where the iteration stops

what are the point achieved on brainly used for i wants answers​

Answers

They are use to ask questions so you can get awnsers to the problem you ask

Answer:

They basiclly are used like a level up in other words they cause you to level up.

Explanation:

Want free points mark as brainiest

A list based on a simple array (standard array implementation) is preferable to a dynamically allocated list for the following reasons.
A. Insertions and deletions require less work.
B. You are guaranteed a space to insert because it is already allocated.
C. You can take advantage of random-access typically.
D You can mix and match the types of the items on the list. E. (b) and (c).
F. All of the above.

Answers

Answer:

A. Insertions and deletions require less work.

C. You can take advantage of random access typically

D. You can mix and match the types of the items on the list.

Explanation:

Standard array implementation is a process in which number of items are of same type and index is restricted at a certain range. This is preferable to dynamic allocated list because it requires less work in insertion and deletions. A dynamically allocated array does not use the fixed array size declaration.

Give an example of a function from N to N that is:______.
a) one-to-one but not onto
b) onto but not one-to-one
c) neither one-to-one nor onto

Answers

Answer:

Let f be a function

a) f(n) = n²

b) f(n) = n/2

c) f(n) = 0

Explanation:

a) f(n) = n²

This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.

Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:

                                f(a) = f(b) ⇒ a² = b² ⇒ a = b

The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number.  For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.

b) f(n) = n/2

The above function example is an onto function because every natural number, lets say n is a natural number that belongs to N, is the image of 2n. For example:

                                f(2n) = [2n/2] = n

The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:

When the value of n=1, then    

                                   n/2 = [1/2] = [0.5] = 1

When the value of n=2 then

                                    n/2 = [2/2] = [1] = 1

c) f(n) = 0

The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image.  The above function example is also not an onto function because every positive integer is not an image of any natural number.

The weekly pay for an employee is determined based on the following parameters:
Standard work hours by week is 40 hours.
Hourly pay rate is $10.00 per hour
Overtime hours are paid at time and a half the rate (that is $15.00 per hour).
Design and implement a program (name it WeeklyPay) that read number of hours worked per week (as integer value), prints out the entered hours, and then prints out the gross earning. Organized your output following these sample runs.
Sample run 1:
You entered 20 hours.
Gross earning is $200.0
Sample run 2:
You entered 40 hours.
Gross earning is $400.0
Sample run 3:
You entered 50 hours.
Gross earning is $550.0

Answers

394484845848585858484

What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the suspect files)? What was the IP address of the alleged offender workstation?

Answers

I will assume this is a windows computer

Answer:

Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exeYou can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

C - Language Write three statements to print the first three elements of array runTimes. Follow each statement with a newline. Ex: If runTimes[5] = {800, 775, 790, 805, 808}, print: 800 775 790#include int main(void) {const int NUM_ELEMENTS = 5;int runTimes[NUM_ELEMENTS];int i;for (i = 0; i < NUM_ELEMENTS; ++i) {scanf("%d", &(runTimes[i])); }/* Your solution goes here */
return 0;}

Answers

Answer:

Replace

/* Your solution goes here */

with

printf("%d",runTimes[0]);

printf("%d",runTimes[1]);

printf("%d",runTimes[2]);

Explanation:

The question requires that the first three elements of array runTimes be printed;

The first three elements are the elements at the first, second and third positions.

It should be noted the index of an array starts at 0;

So, the first element has 0 as its indexThe second has 1 as its indexThe third has 2 as its index

So, to make reference to the first three elements, we make use of

runTimes[0], runTimes[1] and runTimes[2] respectively

Having mention the above;

It should also be noted that array is of type integers;

So, to display integers in C, we make use of "%d";

Hence, the print statement for the first three elements is

printf("%d",runTimes[0]);

printf("%d",runTimes[1]);

printf("%d",runTimes[2]);

What are the characteristics of SAAS? (Choose all that apply)​ a. ​ Services are usually available during specified time periods b. ​ Software is installed remotely with no local involvement c. ​ Little, if any, software is installed on the user’s computer d. ​ Costs are calculated on a "use" basis e. ​ User data is stored and isolated on central computers f. ​ SAAS company often deploys an on sight employee to assist the client

Answers

Answer:

The correct options are, option D (Costs are calculated on a "use" basis), option C (Little, if any, software is installed on the user’s computer), option E (User data is stored and isolated on central computers).

Explanation:

SAAS which is also known as cloud-based software, stands for "Software as a service". SAAS is Use free client software available to clients over the Internet that can be accessed from anywhere, where clients only pay for what they used. SAAS which embraced the concept of cloud computing allows data to be accessed from any device with an internet connection and a web browser allowing software to be delivered by cloud.

Some characteristics of SAAS are: Cloud-based apps that are used over the Internet are managed from a central location, Costs are calculated as "pay for what you used" method.

The characteristics of SAAS that apply are;

C) Little, if any, software is installed on the user's computer

D) Costs are calculated on a "use" basis

E) User data is stored and isolated on central computers

SAAS is an acronym which means Software as a service. This is a software distribution model whereby a cloud provider will host applications and also make them to be very much available to end users over the internet.

Now, this SAAS model is also known as "on demand software" because it is licensed on a subscription basis and is also centrally hosted.

Further more, In SAAS model, an independent software vendor could contract hosting of the application to a third-party cloud provider.

Looking at the options, the only ones that apply to SAAS are options C, D and E.

Read more on SAAS at; https://brainly.com/question/25226343

Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates when "xxxxx" (five x characters) is read in. Other strings are ignored. After the loop, your code should print out 3 lines: the first consisting of the string "land:" followed by the number of "land" strings read in, the second consisting of the string "air:" followed by the number of "air" strings read in, and the third consisting of the string "water:" followed by the number of "water" strings read in. Each of these should be printed on a separate line. Use the up or down arrow keys to change the height.

Answers

Answer:

count_land = count_air = count_water = 0

while True:

   s = input("Enter a string: ")

   if s == "xxxxx":

       break

   else:

       if s == "land":

           count_land += 1

       elif s == "air":

           count_air += 1

       elif s == "water":

           count_water += 1

print("land: " + str(count_land))

print("air: " + str(count_air))

print("water: " + str(count_water))

Explanation:

*The code is in Python

Initialize the variables

Create a while loop that iterates until a specific condition is met. Inside the loop, ask the user to enter the string. If it is "xxxxx", stop the loop. Otherwise, check if it is "land", "air", or "water". If it is one of the given strings, increment its counter by 1

When the loop is done, print the number of strings entered in the required format

3.26 LAB: Leap Year A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are: 1) The year must be divisible by 4 2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400 Some example leap years are 1600, 1712, and 2016. Write a program that takes in a year and determines whether that year is a leap year. Ex: If the input is: 1712 the output is: 1712 - leap year

Answers

Answer:

year = int(input("Enter a year: "))

if (year % 4) == 0:

  if (year % 100) == 0:

      if (year % 400) == 0:

          print(str(year) + " - leap year")

      else:

          print(str(year) +" - not a leap year")

  else:

      print(str(year) + " - leap year")

else:

  print(str(year) + "- not a leap year")

Explanation:

*The code is in Python.

Ask the user to enter a year

Check if the year mod 4 is 0 or not. If it is not 0, then the year is not a leap year. If it is 0 and if the year mod 100 is not 0, then the year is a leap year. If the year mod 100 is 0, also check if the year mod 400 is 0 or not. If it is 0, then the year is a leap year. Otherwise, the year is not a leap year.

Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then convert the temperature to Fahrenheit and display it to the screen. Finally, it should convert the Fahrenheit temperature to Kelvin and display that to the screen.

Answers

Answer:

c = float(input("Enter the temperature in Celsius: "))

f = c * 1.8 + 32

print("The temperature in Fahrenheit: " + str(f))

k = (f - 32) / 1.8 + 273.15

print("The temperature in Kelvin: " + str(k))

Explanation:

*The code is in Python.

Ask the user to enter the temperature in Celsius

Convert the Celsius to Fahrenheit using the conversion formula and print it

Convert the Fahrenheit to Kelvin using the conversion formula and print it

Define the following terms, as they pertain to website planning: goals, objectives, target audience, and purpose statement. Explain the influence on society of inexpensive Internet access and access to the web.

Answers

Answer:

Please see explanations below

Explanation:

Goals; These are the outcomes that a website planning intends to achieve within a stipulated time, i.e weeks, months or years.

Objectives; These are the methods taken, through which the website planning goals will be achieved.

Target audience; These are the specific group of people that are intended to be reached for the website planning. The targeted audience could be identified based on age range, academic background or qualification, gender or marital status.

Purpose statement; This refers to an explanation of the website's planning goals, which is formally written and also shows the main objectives identified with the goals.

The Influence on society of inexpensive internet access and access to the web are numerous; yet it provide information that are not readily accessible by individuals before using the internet. For information to be accessed through internet access by all and sundry, it must come at little or no cost, which is what is currently obtainable in most part of the world.

Moreover, inexpensive access to the internet and web also improve quality of knowledge in addition to the existing ones through research, which is mostly done through the internet.

However, there are also downside of inexpensive access to the internet and web which now depends on whichever individuals want. For instance not every information on the website are true or correct. The right thing to be done is to further search and compare several ones until the right one is found.

Other Questions
Is (1,2), (2,3) (3,4), (4,5) a function? Three points are graphed on the coordinate plane. Dave must find a fourth point so that the four points will form a parallelogram. Find all 3 possibilities for the fourth point. Drag and drop the numbers into the ordered pairs. I'm so so confused. Can somebody please please help? I put the drag and drop numbers as the second picture. As you know, a common example of a harmonic oscillator is a mass attached to a spring. In this problem, we will consider a horizontally moving block attached to a spring. Note that, since the gravitational potential energy is not changing in this case, it can be excluded from the calculations. For such a system, the potential energy is stored in the spring and is given by U = 12k x 2where k is the force constant of the spring and x is the distance from the equilibrium position. The kinetic energy of the system is, as always, K = 12mv2where m is the mass of the block and v is the speed of the block.A) Find the total energy of the object at any point in its motion. B) Find the amplitude of the motion. C) Find the maximum speed attained by the object during its motion. Water molecules are made of slightly positively charged hydrogen atoms and slightly negatively charged oxygen atoms. Which force keeps water molecules stuck to one another? strong nuclear gravitational weak nuclear electromagnetic A line passes through the points (1, 10) and (3, 2). Which shows the graph of this line? SOLVE APPLICATION USING ALGEBRA. TYPE THE EQUATION OR INEQUALITY AND PLEASE SHOW WORK. a) A rectangle with perimeter 18 cm has length that is 3 cm more than twice its width. Find the dimensions of the rectangle. Las esferas metlicas que se muestran en la figura se cargan con 1C cada una. La balanza se equilibra al situar el contrapeso a una distancia x del eje Se pone una tercera esfera a una distancia 2d por debajo de a esfera A y cargada con -2C. Para equilibrar la balanza se debe mover el contrapeso a la derecha, porque? Reagan scored 1140 on the SAT. The distribution of SAT scores in a reference population is normally distributed with mean 1000 and standard deviation 100. Jessie scored 30 on the ACT. The distribution of ACT scores in a reference population is normally distributed with mean 17 and standard deviation 5. Who performed better on the standardized exams and why? Reagan scored higher than Jessie. Reagan's score was 1140, which is greater than Jessie's score of 30. Reagan scored higher than Jessie. Reagan's standardized score was 1.4, which is 1.4 standard deviations above the mean, but closer to the mean than Jessie's standardized score of 2.6 standard deviations above the mean. Reagan scored higher than Jessie. Reagan's score was 140 points above the mean of 1000, and Jessie's was 13 points above the mean of 17. Jessie scored higher than Reagan. Jessie's standardized score was 2.6, which is 2.6 standard deviations above the mean and Reagan's standardized score was 1.4, which is 1.4 standard deviations above the mean. Jessie scored higher than Reagan. Jessie is only 6 points from the top score of 36 on the ACT, and Reagan is 460 points from the top score of 1600 on the SAT. The January 1, Year 1 trial balance for the Tyrell Company is found on the trial balance tab. The beginning balances are assumed. Tyrell Co. entered into the following transactions involving short-term liabilities in Year 1 and Year 2.Year 1 Apr. 20 Purchased $40,250 of merchandise on credit from Locust, terms n/30. May 19 Replaced the April 20 account payable to Locust with a 90-day, 10%, $35,000 note payable along with paying $5,250 in cash. July 8 Borrowed $80,000 cash from NBR Bank by signing a 120-day, 9%, $80,000 note payable. Aug. 17 Paid the amount due on the note to Locust at the maturity date. Nov. 5 Paid the amount due on the note to NBR Bank at the maturity date. Nov. 28 Borrowed $42,000 cash from Fargo Bank by signing a 60-day, 8%, $42,000 note payable. Dec. 31 Recorded an adjusting entry for accrued interest on the note to Fargo Bank. Year 2 Jan. 27 Paid the amount due on the note to Fargo Bank at the maturity date.Requirement General General Trial Schedule of Calculation of Year 2 Journal Ledger Balance Payables Interest Payment1. General Journal tab- Prepare the 2016 journal entries related to the notes and accounts payable of Tyrell Co 2. Calculation of interest tab - Use the interest formula (P x Rx T) to verify the amount of interest recorded in your entries. Verify that total interest expense agrees with the trial balance.3. Year 2 payment tab - Prepare the January 27, 2017 entry to record the re-payment of the note at maturity Which of these ideas from the Declaration of Independence explains the proper purpose of government?O "We hold these truths to be self-evident."O "All men are created equal.""To secure these rights, governments are instituted among men."O "It becomes necessary for one people to dissolve the political bands." Preferred stock valuation TXS Manufacturing has an outstanding preferred stock issue with a par value of $68 per share. The preferred shares pay dividends annually at a rate of 9%. a. What is the annual dividend on TXS preferred stock? b. If investors require a return of 4% on this stock and the next dividend is payable one year from now, what is the price of TXS preferred stock? c. Suppose that TXS has not paid dividends on its preferred shares in the past two years, but investors believe that it will start paying dividends again in one year. What is the value of TXS preferred stock if it is cumulative and if investors require a(n) 4% rate of return? You meet a famous person by winning a competition local maximum of y=2x3+x27x6. A steel wire with mass 25.3 g and length 1.62 m is strung on a bass so that the distance from the nut to the bridge is 1.10 m. (a) Compute the linear density of the string. kg/m (b) What velocity wave on the string will produce the desired fundamental frequency of the E1 string, 41.2 Hz The storage method used for radioactive wastes generated from fission nuclear reactors must be designed to last for how long? A.months B.years C.centuries D.weeks Compare- 6 broken bulbs out of 20 or 7 broken bulbs out of 30 Ronny carried his guitar one kilometer from his office to his recording studio.To get home from his studio, Ronny must walk twice the distance from hisoffice to his studio. If the variable d stands for the distance Ronny can walk,which of the following units could apply to that variable?A. gallonsB. poundsOC. kilometersD. inchesHelp ASAP plz Read the excerpt from The Diary of a Young Girl.I don't fit in with them, and I've felt that clearly in the last few weeks. They're so sentimental together, but I'd rather be sentimental on my own. They're always saying how nice it is with the four of us, and that we get along so well, without giving a moment's thought to the fact that I don't feel that way.What is Annes perspective toward her family in this excerpt? find the value of xif xfit2(x+3)=2 What is the difference of the complex numbers below?(3+9i)-(7-5i)