Explain why it is not necessary to create an inbound rule on the internal 192.168.12.10 Windows server so that it can receive the response (ICMP echo reply) from the internal 192.168.12.11 Windows server.

Answers

Answer 1

Answer:

The file and printer sharing (Echo Request - ICMPv4-In) rule option should be listed for all profile.

Explanation:

The main reason why it is not compulsory or obligatory to design an inbound rule on the internal 192.168.12.10 Windows server in other to be able to accept the response (ICMP echo reply) generated from the internal 192.168.12.11 Windows server is that the file and printer sharing (Echo Request - ICMPv4-In) rule option or alternative needed to be listed for all profile.

Inbound rules filter or sieve traffic advancing from the network to the local computer based on the filtering conditions set out in the rule.


Related Questions

Write a program that reads ten integers, and then display the number of even numbers and odd numbers. Assume that the input ends with 0. Here is the sample run of the program

Answers

Answer:

I am writing  a JAVA program. Let me know if you want this program in some other programming language.

import java.util.Scanner;  // class to take input from user

class EvenOddNum{  //class name

   static void EvenOdd(int array[]) {  //function that takes an array as input and displays number of even numbers and odd numbers

       int even = 0;  // counts even numbers      

       int odd = 0;   //counts odd numbers

       for(int i = 0 ; i < array.length-1 ; i++){  //loop through the array elements till the second last array element

           if ((array[i] % 2) == 1) {  // if the element of array is not completely divisible by 2 then this means its an odd  number

               System.out.println(array[i]+" = odd");  //display that element to be odd

               odd++ ; }  //adds 1 to the count of odd every time the program reads an odd number

           else{  // if above IF condition evaluates to false then the number is an even number

                System.out.println(array[i]+" = even"); //display that element to be odd

                even++ ; } }  //adds 1 to the count of odd every time the program reads an odd number

       System.out.println( "Number of even numbers = " + even);  //counts the total number of even integers in the array

       System.out.println( "Number of odd numbers = " + odd);    }   //counts the total number of odd integers in the array      

   public static void main (String[] args){  //start of main function body

       Scanner scan= new Scanner(System.in); //creates Scanner class object

       int [] integers = new int[10];  //declares an array named integers that stores 10 integers

       System.out.print("Enter numbers: ");  //prompts user to enter the integers

       for(int i = 0;i<integers.length;i++){  //loops to read the input integers

           integers[i] = scan.nextInt(); }  //scans and reads each integer value

       EvenOdd(integers);    } }  //calls function EvenOdd to display number of even and odd numbers

Explanation:

The program has a method EvenOdd that takes an array of integers as its parameter. It has two counter variables even and odd. even counts the number of even input integers and odd counts the number of odd input integers. The for loop iterates through each element (integer) of the array except for the last one. The reason is that it is assumed that the input ends with 0 so the last element i.e. 0 is not counted. So the loop iterates to length-1 of the array. The number is odd or even is determined by this if condition: if ((array[i] % 2) == 1) A number is even if it is divisible by 2 otherwise its odd. If the element of array is not completely divisible by 2 i.e. the remainder of the division is not 0 then the number is odd. The modulo operator is used which returns the remainder of the division of number by 2. Each time when an odd or even number is determined, the array[i]+" = even" or  array[i]+" = odd" is displayed on the output screen for each integer in the array. Here array[i] is the element of the array and even or odd depicts if that element is even or odd. The last two print statement display the total number of even and odd numbers in the array.

A continuous-time periodic signal x(t) is real valued and has a fundamental period T = 8. The nonzero Fourier series coefficients for x(t) are specified as
a_1 = a*_-1 = j, a_5 = a_-5 = 2.
Express x(t) in the form
x(t) = sigma^infinity_k=0 A_k cos(W_k t + phi_k).

Answers

Answer:

x(t) = −2 cos ( [tex]\frac{\pi }{4}t[/tex]  − [tex]\frac{\pi }{2}[/tex] ) + 4 cos ( [tex]\frac{5\pi }{4}t[/tex] )

Explanation:

Given:

Fundamental period of real valued continuous-time periodic signal x(t) = T = 8

Non-zero Fourier series coefficients for x(t) :

a₁ = [tex]a^{*}_{-1}[/tex] = j

a₅ = [tex]a_{-5}[/tex] = 2  

To find:

Express x(t) in the form

               ∞

x(t) =        ∑    A[tex]_{k}[/tex] cos ( w[tex]_{k}[/tex] t + φ[tex]_{k}[/tex] )

              [tex]_{k=0}[/tex]  

Solution:

Compute fundamental frequency of the signal:

w₀ = 2 π / T

     = 2 π / 8               Since T = 8

w₀  = π / 4

                   ∞

                    ∑ [tex]a_{k}e^{jw_{0}t }[/tex]

x(t) =          k=⁻∞

   

     =  [tex]a_{1}e^{jw_{0} t} + a_{-1}e^{-jw_{0} t} + a_{5}e^{5jw_{0} t}+a_{-5}e^{-5jw_{0} t}[/tex]  

     =  [tex]je^{j(\pi/4)t} - je^{-j(\pi/4)t} +2e^{(5\pi/4)t}+2e^{-(5\pi/4) t}[/tex]

     = −2 sin ( [tex]\frac{\pi }{4}t[/tex] ) + 4 cos ( [tex]\frac{5\pi }{4}t[/tex] )

     = −2 cos ( [tex]\frac{\pi }{4}t[/tex]  − [tex]\frac{\pi }{2}[/tex] ) + 4 cos ( [tex]\frac{5\pi }{4}t[/tex] )

A file concordance tracks the unique words in a file and their frequencies. Write a program that displays a concordance for a file. The program should output the unique words and their frequencies in alphabetical order. Variations are to track sequences of two words and their frequencies, or n words and their frequencies.
Below is an example file along with the program input and output:
example.txt
I AM SAM I AM SAM SAM I AM
Enter the input file name: example.txt
AM 3
I 3
SAM 3

Answers

Answer:

I am writing a Python program.

def concordance(filename):  # function that takes a file name as parameter and returns the concordance for that file

   file = open(filename,"r")  #opens file in read mode

   unique={}  #creates and empty list

   for word in file.read().split():  #loops through every word in the file

       if word in unique:  # if words is already present in the list

           unique[word] += 1  #add 1 to the count of the existing word

       else:    #if word is not present in the list

           unique[word] = 1 #add the word to the list and add 1 to the count of word

           file.close();  # close the file

   for x in sorted(unique):  #sort the list and displays words with frequencies

       print(x, unique[x]);  #prints the unique words and their frequencies in alphabetical order

#prompts user to enter the name of the file

file_name=input('Enter the input file name: ')

concordance(file_name)  #calls concordance method by passing file name to it

Explanation:

The program has a function concordance that takes a text file name as parameter and returns a list of unique words and their frequencies.

The program first uses open() method to open the file in read mode. Here "r" represents the mode. Then creates an empty list named unique. Then the for loop iterates through each word in the file. Here the method read() is used to read the contents of file and split() is used to return these contents as a list of strings. The if condition inside the loop body checks each word if it is already present in the list unique. If the word is present then it adds 1 to the count of that word and if the word is not already present then it adds that unique word to the list and assign 1 as a count to that word. close() method then closes the file. The second for loop for x in sorted(unique):  is used to display the list of unique words with their frequencies. sorted() method is used to sort the list and then the loop iterates through each word in the list, through x, which acts like an index variable, and the loop displays each word along with its frequency.

A brand of shame .. from infancy " is a brand on Jocasta​

Answers

Answer: DIDN'T UNDERSTAND

The machine has to be returned to the vendor for proper recycling. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

Decommission/Recycle

Explanation:

This specific scenario that is being described belongs to the final stage of the hardware lifecycle known as Decommission/Recycle. This is when the asset in question has completed its function for an extended period of time and is no longer functioning at maximum efficiency and/or newer hardware has hit the market. Once in this stage, the hardware in question is either repaired or scrapped for resources that can be used to create newer products.

You want to change your cell phone plan and call the company to discuss options. This is a typical example of CRM that focuses on_______loyalty programs for current customerscustomer service and supportprofitability for the companyacquisition of new customers.

Answers

Answer:

customer service and support

Explanation:

-Loyalty programs for current customers refer to incentives companies provide to existing customers to encourage them to keep buying their products or services.

-Customer service and support refers to the assistance companies provide to their existing customers to help them solve issues or provide information about their current products or services and other options.

-Profitability for the company refers to actions that will increase the financial gains of the company.

-Acquisition of new customers refers to actions implemented to attract clients.

According to this, the answer is that this is a typical example of CRM that focuses on customer service and support because you call the company to get assistance with options to change your current products.

The other options are not right because the situation is not about incentives for the customer or actions the company implements to increase its revenue. Also, you are not a new customer.

A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of _____ with respect to security systems.

Answers

The answer is control

What can you do using the start menu in windows 10

Answers

Answer:

The start menu in windows 10 has similarities.

Explanation:The windows 10 is start menu and start screen. Installed windows 10 on a PC, the start button after windows appear start menu.Windows app you can access windows apps right the menu. click the left display all apps installed your personal computer. click right to open a window app NEWS,MAIL, or CALENDAR. POWER button at the bottom of the left side, and display the to shut down and restart.

Right click your account name at the top the menu.You add files explorer to taskbar.Simply click the option you needed

What will be displayed if code corresponding to the following pseudocode is executed? Set Number = 4 Repeat Write 2 * Number Set Number = Number + 2 Until Number = 8

Answers

Answer:

8

12

Explanation:

I made the code a bit easier to understand then worked out how it would go. Here's what I did.

number = 4

repeat until number = 8:

   write 2 * number

   number = number + 2

Following this itenary, we have, the system first writes "8" as it multipled 4 by 2. Number is now equal to 6.

Next repetition, the system writes "12" as it multipled 6 by 2. Now, number = 8. The proccess now stops as number is now equal to 8.

what is the difference between ram and rom​

Answers

Answer:

RAM is used to store programs and data the CPU needs. ROM has prerecorded data and is used to boot the computer

Explanation:

Complete this truth Table. Write a program that you can enter from the keyboard, a 1 or 0 into three Boolean variables, A,B,C. Write an if statement that tests the condition ( (A or B ) and C ). Run the program 8 separate times, testing each of the following 8 combinations. Write the results below in the following truth table.
Module 9-Alternative Sequences and Complex logical Criteria v17 (1).pdf. Adobe Acrobat Reader DC
File Edit View Window Help
Home Tools Module 9 - Altema...X
A B C (A or B ) (A or B ) and C
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1

Answers

Answer:

Following are the code to this question:

#include<stdio.h>//defining header file

int AND(int x,int y) //defining a method AND that hold two variable in its parameter

{

if(x==1 && y==1)//defining if block to check x and y value is equal to 1

{

return 1;//return value 1

}

else //defining else block

{

   return 0;//return value 0

}

}

int OR(int x,int y)//defining method OR that hold two variable in its parameter

{

if(x==0&&y==0)//defining if block to check x and y value is equal to 1

{

return 0;//return value 0

}

else //defining else block

{

   return 1;//return value 1

}

}

int main()//defining main method

{

int a,b,c;//defining integer variable  

int k=1;//defining integer variable k that holds a value 1

while(k<=8)//defining while loop for 8 time input

{

printf("Please insert 3 numbers in (0 0r 1):\n ");//print message

scanf("%d%d%d", &a, &b, &c);//input value

k++;//increment the value of k by 1

printf("value: %d\n",AND(OR(a,b),c));

}

return 0;

}

Output:

please find the attachment.

Explanation:

In the above-given C language code two methods "AND and OR" is declared, holds two integer variable "x and y" in its parameters, inside the method a conditional it used that can be defined as follows:

In the AND method, inside a conditional statement, if block check x and y both value is same that is 1 it will return 1 or it will goto else block in this it will return value 0.      In the OR method, inside a conditional statement, if block check x and y both value is the same, that is 0 it will return 0 or it will goto else block in this it will return value 1.In the main method, four integers "a,b,c, and k" is declared in which variable "a, b, c" is used in the loop for 8 times input values from the user and print method is used to call the method and prints its return values.

Write a program that takes as command-line arguments an integer N and a double value p (between 0 and 1), plots N equally spaced dots of size .05 on the circumference of a circle, and then, with probability p for each pair of points, draws a gray line connecting them.

Answers

Answer:

Please see below

Explanation:

Suppose N = 10. And you have these dots equidistant from each other, and probability = 0.3. According to the data provided in the question statement, we will then have forty-five pairs of points. The task is to draw lines amongst these pairs, all 45 of them, with a 30% probability. Keep in mind that every one of the 45 lines are independent.

A few lines of simple code (just some for loops) needed to run this is attached in the image herewith, .

 

Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation once for every millisecond of CPU computing and that each I/O operation takes 10 milliseconds to complete. Also assume that the context switching overhead is 0.1 millisecond and that all processes are long-running tasks. What is the CPU utilization for a round-robin scheduler when:

Answers

Answer:

10 minutes

Explanation:

Assemble a Server computer based on your budget (state the amount in Ghana Cedis), discussing the type of components (giving their exact names, model numbers, types, cost, architecture, etc.) you would need and give reasons why you need them. ​

Answers

Answer:

Following are the answer to this question:

Explanation:

The server would be generally a powerful processor instead of a desktop pc. It must choose the Dell server browser to choose a server for industrial applications.

Dell Poweredge R730 has been its pattern.  There should be the reason whether these servers are efficient, available, flexible, and support the concept of even a virtual environment.  Its same servers are easy to use, as well as the memory will be connected to this server is 8 TB.

#Write a function called string_finder. string_finder should #take two parameters: a target string and a search string. #The function will look for the search string within the #target string. # #The function should return a string representing where in #the target string the search string was found: # # - If search string is at the very beginning of target # string, then return "Beginning". For example: # string_finder("Georgia Tech", "Georgia") -> "Beginning" # # - If search string is at the very end of target string, # then return "End". For example: # string_finder("Georgia Tech", "Tech") -> "End" # # - If search string is in target string but not at the # very beginning or very end, then return "Middle. For # example: # string_finder("Georgia Tech", "gia") -> "Middle" # # - If search string is not in target string at all, then # return "Not found". For example: # string_finder("Georgia Tech", "Idaho") -> "Not found" # #Assume that we're only interested in the first instance #of the search string if it appears multiple times in the #target string, and that search string is definitely #shorter than target string. # #Hint: Don't be surprised if you find that the "End" case #is the toughest! You'll need to look at the lengths of #both the target string and the search string. #Write your function here!

Answers

Answer:

I am writing a Python program:

def string_finder(target,search): #function that takes two parameters i.e. target string and a search string

   position=(target.find(search))# returns lowest index of search if it is found in target string

   if position==0: # if value of position is 0 means lowers index

       return "Beginning" #the search string in the beginning of target string

   elif position== len(target) - len(search): #if position is equal to the difference between lengths of the target and search strings

       return "End" # returns end

   elif position > 0 and position < len(target) -1: #if value of position is greater than 0 and it is less than length of target -1

       return "Middle" #returns middle        

   else: #if none of above conditions is true return not found

       return "not found"

#you can add an elif condition instead of else for not found condition as:

#elif position==-1    

#returns "not found"

#tests the data for the following cases      

print(string_finder("Georgia Tech", "Georgia"))

print(string_finder("Georgia Tech", "gia"))

print(string_finder("Georgia Tech", "Tech"))

print(string_finder("Georgia Tech", "Idaho"))

Explanation:

The program can also be written in by using string methods.

def string_finder(target,search):  #method definition that takes target string and string to be searched

       if target.startswith(search):  #startswith() method scans the target string and checks if the (substring) search is present at the start of target string

           return "Beginning"  #if above condition it true return Beginning

       elif target.endswith(search):  #endswith() method scans the target string and checks if the (substring) search is present at the end of target string

           return "End" #if above elif condition it true return End

       elif target.find(search) != -1:  #find method returns -1 if the search string is not in target string so if find method does not return -1 then it means that the search string is within the target string and two above conditions evaluated to false so search string must be in the middle of target string

           return "Middle"  #if above elif condition it true return End

       else:  #if none of the above conditions is true then returns Not Found

           return "Not Found"

Which is a software configuration management concept that helps us to control change without seriously impeding justifiable change?

Answers

Answer:

Baselines

Explanation:

The idea of software configuration management is that of monitoring and controlling changes in the software. The baseline is the standard and formally accepted form of a software item that is meant to be configured. It is like a generally accepted reference point, which could be applied in effecting incremental changes in the software.

There are three types of baselines which are the functional, developmental, and product baselines. Functional baselines provide an overview of the functionality and specifications of a system. The product baseline encompasses both the functional and physical details of the system.

if the bandwidth-delay product of a channel is 500 Mbps and 1 bit takes 25 milliseconds to make the roundtrip, what is the bandwidth-delay product

Answers

Answer:

2500 kb

Explanation:

Here, we are to calculate the bandwidth delay product

From the question, we are given that

band width = 500 Mbps

The bandwidth-delay product is = 500 x 10^6 x 25 x 10^-3

= 2500 Kbits

What is displayed in the alert dialog box after the following code is executed? var scores = [70, 20, 35, 15]; scores[scores.length] = 40; alert("The scores array: " + scores);

Answers

Answer:

The scores array: 70,20,35,15,40

Explanation:

I will explain the code line by line:

var scores = [70, 20, 35, 15];  

The above statement declares and assigns values to an array named scores

scores[scores.length] = 40;  

The above statement uses length to set the length of the scores array. It sets the last element of the scores array to 40. So this means 40 is set as the last element of scores.

scores.length returns the length of the scores array i.e. 4 as there are 4 elements in scores array 70,20,35,15

So the statement becomes:

scores[4] = 40;

This assigns value 40 to the 4th index of the scores array. Do not confuse 4th index with 4th element of the array because array element location starts from 0. So scores[4] does not mean 4th element but scores[4] means 4th index position of scores array. This makes 5th element of scores. So set the element 40 as 5th element at 4th index of scores.

alert("The scores array: " + scores);

This displays an alert box with the following message:

The scores array: 70,20,35,15,40

Draw the BST where the data value at each node is an integer and the values are entered in the following order 36,22,10,44,42,16,25,3,23,24 solution

Answers

Answer and Explanation:

A BST is the short form for Binary Search Tree. It is a special type of binary tree data structure in which nodes are arranged in a particular order such that;

i. the left subtree of a particular node should always contain nodes whose key values are less than that of the key value of the node itself.

ii. the right subtree of a particular node should always contain nodes whose key values are greater than that of the key value of the node itself.

iii. the right and left subtrees should also be a binary search tree.

For the given set of data:

36,22,10,44,42,16,25,3,23,24;

The equivalent binary search tree is attached to this response.

As shown in the attachment:

i. the first data value (36) is the root node value.

ii. the second value (22) is less than the root node value (36), therefore, 22 goes to the left of the root node.

iii. the third value is 10. This is less than 36 and then also less than 22, so 10 goes to the left of 22.

iv. the fourth value is 44. This is greater than the root node value (36), therefore, 44 goes to the right of the root node.

v. the fifth value is 42. This is greater than the root value (36) so it is going to be positioned somewhere at the right of the root node. But it is less than the value (44) of the direct right node of the root node. Therefore, 42 goes to the left of the direct right (44) of the root node.

vi. the sixth value is 16. This is less than the root node value (36). So it is going to be positioned somewhere at the left of the root node. It is also less than the value (22) of the direct left node of the root node. So it is going to be positioned somewhere at the left of the node with 22. But it is greater than the node with 10. Therefore, 16 is going to be to the right of the node with 10.

This trend continues until all data values have been rightly positioned.

PS: A binary tree is a data structure in which each node cannot have more than two nodes directly attached to it.

____ enable users to create and edit collaborative Web pages quickly and easily; they are intended to be modified by others and are especially appropriate for collaboration.

Answers

Answer:

Wikis

Explanation:

Wikis can be defined as a database that was designed by users which gives users the opportunity to add, edit and delete collaborative web pages easily.

It lets users to manage contents easily and they are used to create static websites.

some wikis can be accessed by the public. A great example is Wikipedia.

Wikis allows publishing and sharing of documents to be done easily.

The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.

Answers

Answer:

Op code table.

Explanation:

In Computer programming, an Op code is the short term for operational code and it is the single instruction which can be executed by the central processing unit (CPU) of a computer.

The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the Op code table. The Op code can be defined as a visual representation of the entire operational codes contained in a set of executable instructions.

An Op code table is arranged in rows and columns which basically represents an upper or lower nibble and when combined depicts the full byte of the operational code. Each cells in the Op code table are labeled from 0-F for the rows and columns; when combined it forms values ranging from 00-FF which contains information about CPU cycle counts and instruction code parameters.

Hence, if the operational code table is created and sorted alphabetically, the binary search algorithm can be used to find an operational code to be executed by the central processing unit (CPU).

Summary
In this graded assignment, you will write Python programs that use loops to implement various algorithms.
Learning Outcomes
In completing this assignment, you will:
• Gain more experience converting an algorithm expressed using flowchart to one implemented in a Python program.
• Write a Python program using loops
Description
In a previous assignment in this course, you were asked to draw a flowchart for an algorithm that finds the two smallest items in a list, and then another assignment asked you to convert that flowchart to pseudocode.
Here is a pseudocode implementation of that algorithm:
1. min1- list
2. min2 - list,
3. for each item in list
4. if item 5. then if min1 6. then min2
7. else mint
8. else if item 9. then min2
10. output: min1, min2 item item item
Now, implement the algorithm in Python so that it correctly sets the values of min1 and min2 which should hold the two smallest values in the list, though not necessarily in that order.
In the code below, we have provided a list called "list" and initialized min 1 and min2 to hold the first two elements. Write your code starting at line 5 (you can remove the comments starting at line 6, and may need more space than what is provided), and be sure that the values of min1 and min2 are correctly set before the code reaches the "return (min1, min2)" statement on line 11.
As in the previous assignment, we will be using the Coursera automatic grading utility to test your code once you submit this quiz for grading, and this requires it to be within a function. So be sure that all of the code after line 1 is indented, and that you do not have any code after the "return (min 1, min2)" statement.
Keep in mind that the goal here is to write a program that would find the two smallest values of any list, not just the one provided on line 2. That is, don't simply set min 1 and min2 to-2 and -5, which are the two smallest values, but rather write a program that implements the algorithm from the flowchart and correctly sets min1 and min2 before reaching the return (min1, min2)" statement.
As before, you can test your program by clicking the "Run" button to the right of the code to see the results of any "print" statements, such as the one on line 10 which prints min1 and min2 before ending the function. However, please be sure that you do not modify the last two lines of the code block
1. def test(): # do not change this line!
2. list = [4, 5, 1, 9, -2, 0, 3, -5] # do not change this line!
3. min1 = list[0]
4. min2 = list[1]
5.
6. #write your code here so that it sets
7. #min1 and min2 to the two smallest numbers
8. # be sure to indent your code!
9.
10. print(min1, min2)
11. return (min1, min2) # do not change this line!
12. # do not write any code below here
13.
14. test() # do not change this line!
15. # do not remove this line!
Hints: The Python code for this algorithm is very similar to the pseudocode! Just be sure you are using the correct syntax. As in previous activities, don't forget that you can use the "print" function to print out intermediate values as your code is performing operations so that you can see what is happening

Answers

ima snatch them points from you cuz honestly i dont think any1 gna do it

Which is the first step in the process of reading materials critically

Answers

Answer:

SQRRR or SQ3R is a reading comprehension method named for its five steps: survey, question, read, recite, and review. The method was introduced by Francis P. Robinson, an American education philosopher in his 1946 book Effective Study. The method offers a more efficient and active approach to reading textbook material

Open up your database administraton GUI, and use the appropriate SQL Query Tool to write the SQL CREATE statement for your BOOK_TAGS table. You can either write the script manually and execute it through pgAdmin or you can create the table by using pgAdmin's wizard.
Afterwards, insert one row of dummy data that adds a tag to the sample book in the BOOKS table.

Answers

Answer:

nxlskshwhhwwlqlqoejebx znznxjslaa

Write a method isSorted that accepts a stack of integers as a parameter and returns true if the elements in the stack occur in ascending (non-decreasing) order from top to bottom, and false otherwise.

Answers

Explanation:

bottom [20, 20, 17, 11, 8, 8, 3, 21 top the following stack is not sorted (the 15 is out of place), so passing it to your method should return a result of false: bottom [18, 12, 15, 6, 11 top an empty or one-element stack is considered to be sorted. when your method returns, the stack should be in the same state as when it was passed in. in other words, if your method modifies the stack, you must restore it before returning.

#The Fibonacci sequence is a number sequence where each #number is the sum of the previous two numbers. The first #two numbers are defined as 0 and 1, so the third number is #1 (0 + 1 = 1), the fourth number is 2 (1 + 1 = 2), the #fifth number is 3 (1 + 2 = 3), the sixth number is 5 #(2 + 3 = 5), and so on.
#
#Below we've started a class called FibSeq. At any time, #FibSeq holds two values from the Fibonacci sequence: #back1 and back2.
#
#Create a new method inside FibSeq called next_number. The #next_number method should:
#
# - Calculate and return the next number in the sequence, # based on the previous 2. # - Update back2 with the former value of back1, and update # back1 with the new next item in the sequence.
#
#This means that consecutive calls to next_number should #yield each consecutive number from the Fibonacci sequence. #Calling next_number 5 times would print 1, 2, 3, 5, and 8.
class FibSeq:
def __init__(self):
self.back1 = 1
self.back2 = 0
def next_number(self):
self.back1=self.back1+self.back2 # updated the back1 value to the next number in the series first
self.back2=self.back1-self.back2 #updated the back2 value with previous back1 value
yield (self.back1) # yielded the next number in the series since it is updated as back1 so yielded back1
f = FibSeq()
for i in range(5): # here i have iterated the series only 5 times u can change it as you like
s=f.next_number()
print(next(s))# here next is an iterator function for the yield generator.
#The code below will test your method. It's not used for
#grading, so feel free to change it. As written, it should
#print 1, 2, 3, 5, and 8.
newFib = FibSeq()
print(newFib.next_number())
print(newFib.next_number())
print(newFib.next_number())
print(newFib.next_number())
print(newFib.next_number())

Answers

Answer:

Here is the next_number method:

def next_number(self): #method to return next number in the sequence

    temporary = self.back1 + self.back2 # adds previous number to next number and stores the result in a temporary variable

    self.back2 = self.back1 #Updates back2 with the former value of back1,

    self.back1 = temporary #update back1 with the new next item in the sequence.

    return temporary #

Explanation:

I will explain the working of the above method.

back1 = 1

back2 = 0

At first call to next_number()  method:

temporary = back1 + back2

                 = 1 + 0

temporary = 1

self.back2 = self.back1

self.back2 = 1

self.back1 = temporary

self.back1 = 1

return temporary

This return statement returns the value stored in temporary variable i.e. 1

Output: 1

back1 = 1

back2 = 1

At second call to next_number()  method:

temporary = back1 + back2

                 = 1 + 1

temporary = 2

self.back2 = self.back1

self.back2 = 1

self.back1 = temporary

self.back1 = 2

return temporary

This return statement returns the value stored in temporary variable i.e. 2

output: 2

back1 = 2

back2 = 1

At second call to next_number()  method:

temporary = back1 + back2

                 = 2 + 1

temporary = 3

self.back2 = self.back1

self.back2 = 2

self.back1 = temporary

self.back1 = 3

return temporary

This return statement returns the value stored in temporary variable i.e. 3

Output: 3

back1 = 3

back2 = 2

At second call to next_number()  method:

temporary = back1 + back2

                 = 3 + 2

temporary = 5

self.back2 = self.back1

self.back2 = 3

self.back1 = temporary

self.back1 = 5

return temporary

This return statement returns the value stored in temporary variable i.e. 5

Output: 5

back1 = 5

back2 = 3

At second call to next_number()  method:

temporary = back1 + back2

                 = 5 + 3

temporary = 8

self.back2 = self.back1

self.back2 = 5

self.back1 = temporary

self.back1 = 8

return temporary

This return statement returns the value stored in temporary variable i.e. 8

Output: 8

Calling next_number 5 times would print 1, 2, 3, 5, and 8.

The complete program along with its output is attached.

Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write your code so that it works no matter how many items are in the list

Answers

Answer:

sports = ["football", "basketball", "volleyball", "baseball", "swimming"]

last = sports[-3:]

print(last)

Explanation:

*The code is in Python.

Create a list called sports

Create a variable called last and set it to the last three elements of the sports list using slicing

Print the last

Some systems analysts maintain that source documents are unnecessary. They say that an input can be entered directly into the system, without wasting time in an intermediate step.
Do you agree? Can you think of any situations where source documents are essential?

Answers

Answer:

The summary including its given subject is mentioned in the portion here below explanatory.

Explanation:

No, I disagree with the argument made by 'system analyst' whether it is needless to preserve source records, rather, therefore, the details provided input would be fed immediately into the machine. Different source document possibilities can be considered may play a significant role in accessing data.Assumed a person experiences a problem when collecting and analyzing data that has no complete access or that individual is not happy with the system or that may want comprehensive data search. However, a need arises to keep data both sequentially and fed further into the desktop system that would help us through tracking purposes.Even with all the documentation that has been held is essentially for the user to do anything efficiently and conveniently without even any issues and 'device analyst' would guarantee that it has been applied in a very well-defined way.

Normally you depend on the JVM to perform garbage collection automatically. However, you can explicitly use ________ to request garbage collection.

Answers

Answer:

System.gc()

Explanation:

System.gc() can be defined as the method which can be used to effectively request for garbage collection because they runs the garbage collector, which in turn enables JMV which is fully known as JAVA VIRTUAL MACHINE to claim back the already unused memory space of the objects that was discarded for quick reuse of the memory space , although Java virtual machine often perform garbage collection automatically.

Class or Variable "____________" serve as a model for a family of classes or variables in functions` definitions

Answers

Answer:

Parameter.

Explanation:

A parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.

Class or Variable parameter serve as a model for a family of classes or variables in functions' definitions.

For instance, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

Hence, when you create classes or variables in a function, you can can set the values for their parameters.

For instance, to pass a class to a family of classes use the code;

\\parameter Name as Type (Keywords) = value;

\\procedure XorSwap (var a,b :integer) = "myvalue";

Other Questions
Sally who weighs 450 N, stands on a skate board while roger pushes it forward 13.0 m at constant velocity on a level straight street. He applies a constant 100 N force.Work done on the skateboarda. Rodger Work= 0Jb. Rodger work= 1300Jc. sally work= 1300Jd. sally work= 5850Je. rodger work= 5850J Solve 3* +5-220t = 0 Steve Madison needs $353,100 in 10 years.How much must he invest at the end of each year, at 9% interest, to meet his needs? Given the functions h(x) = 9x +1 and f(x)=(x/5)^2 , on a standard coordinate graph of y = h(f(x)), which of the following is a possible value for x when y = 37?a. 15b. 12c. 10d. 7e. 5 Several controls are used to safeguard inventory except a.keeping high-priced inventory behind lock and key. b.hiring security guards. c.allowing all employees access to the materials warehouse. d.installing sensors at all exits. The Coffee Counter charges $8 per pound for Kenyan French Roast coffee and $7 per pound for Sumatran coffee.How much of each type should be used to make a 20 pound blend that sells for $7.30 per pound? "African cultural values are but wishful thinking". Discuss this statement in the context of modernity and the call to return to our roots At a computer-consulting firm, the number of new clients that they have obtained each month has ranged from 0 to 6. the number of new clients has the probability distribution that is shown below. determine the expected number of new clients per month. # of clients probability 0 0.05 1 0.10 2 0.15 3 0.35 4 0.20 5 0.10 6 0.05 4.116 The lid of a roof scuttle weighs 75 lb. It is hinged at corners A and B and maintained in the desired position by a rod CD pivoted at C. A pin at end D of the rod fits into one of several holes drilled in the edge of the lid. For 5 50, determine (a) the magnitude of the force exerted by rod CD, (b) the reactions at the hinges. Assume that the hinge at B does not exert any axial thrust. Beer, Ferdinand. Vector Mechanics for Engineers: Statics (p. 219). McGraw-Hill Higher Education. Kindle Edition. What issue or event produced the first political parties in the United States? Identify compounds that are required for the electron transport chain and compounds that are produced by the electron transport chain. a. ATPb. NADHc. O2d.NAD+e. H2Of. ADPg. FADh. FADH2 What is the output of the function f(x) = x + 21 if the input is 4?When the input is 4, the output of f(x) = x + 21. Identifying the median voter Sam, Andrew, and Darnell are roommates who are trying to decide how much money to spend on heat in their apartment each month. A. Andrew would ideally contribute $15. However, he would prefer contributing $55 to contributing $0 because he does not want to freeze. B. Sam hates being cold. Therefore, he would ideally like each to contribute $55 to heat, and his utility declines at a constant rate as the roommates decrease the amount of money they spend. C. Darnell does not care about heat and is on a tight budget. Therefore, he prefers to contribute no money to heat, and his utility declines at a constant rate as the roommates increase the amount of money they spend. Suppose the three roommates vote on spending either so, $15, or $55 on heat using the Borda count system of voting. That is, each roommate awards three points to his first choice, two points to his second choice, and one point to his third choice Which is true? Root cause analysis is an important step in the incident management process. Until the root cause of incidents is identified and eliminated, it is likely that the customer will continue to experience incidents. Typically, root causes are technology related. ITIL best practices state that root cause analysis should be performed for all incidents. Using ABC in a service company Blanchette Plant Service completed a special landscaping job for Kerry Company. Blanchette uses ABC and has the following predetermined overhead allocation rates: The Kerry job included $750 in plants; $1,300 in direct labor; one design; and 30 plants. Requirements What is the total cost of the Kerry job? If Kerry paid $3,540 for the job, what is the operating income or loss? If Blanchette desires an operating income of 30% of cost, how much should the company charge for the Kerry job? Imprudential, inc., has an unfunded pension liability of $582 million that mustb be paid in 20 years. To assess the value of the firms stock, financialal analysts to discount the liability back to the presentIf the relevant discount rate is 7.5 percent, what is the present value of this liability? (Enter your answer in dollars not in millions, e.g., 1,234,567. Do not round intermediate calculations and round your answer to 2 decimal places, e.g., 32.16.) Please help me to solve this . Thank you so much . And if possible , could you explain the answer too ? Base on the diagram , statea) The point which is 2 cm from R and 4 cm from P b) The point which is more than 2 cm from R and 4 cm from T c) The location of a moving point X in the diagram such that it is less than 4 cm from P and more than 2cm from R d) The location of a moving point Y in the diagram such that YR < 2 cm and YP < 4 cm e)The location of a moving point Z in the diagram such that ZT > 4 cm , ZP > 4 cm and ZR > 2 cm which is bigger 4 or [tex] \frac{12}{7} [/tex] Which of the following for-loop headers results in equivalent numbers of iterations: A. for (int q = 1; q = 0; q--) C. for (int q = 99; q > 0; q -= 9) D. for (int q = 990; q > 0; q -= 90) a. A and B. b. C and D. c. A and B have equivalent iterations and C and D have equivalent iterations. d. None of the loops have equivalent iterations. PLEASE HELP Draw the reflection of the figure over the line shown.