the levels of classification of organisms in order are: domain, kingdom, phylum, class, order, family, genus, and species. The broadest, least specific level is____________________

Answers

Answer 1

Answer:

Domain.

Explanation:

In Science, this biological classification of living organisms based on similarities or characteristics such as eyes, number of legs, etc., is generally referred to as taxonomy.

Taxonomy can be defined as the process of naming, classification and description of living organisms such as plants and animals.

Basically, the eight (8) biological classification (taxonomy) used for grouping and organizing organisms are; kingdom, domain, phylum, family, order, class, species and genus.

Hence, taxonomy helps scientist to have a good understanding and knowledge when studying various organisms.

Furthermore, the broadest, least specific level of the biological classification of living organisms is domain. The three (3) domain in which living organisms can be classified are: Bacteria, Eukaryote, and Archaea.

Answer 2

Answer:

doman

Explanation:


Related Questions

Write a script called fact.sh that is located in your workspace directory to calculate the factorial of a number n; where n is a non-negative integer between 1 and 20 that is passed as a parameter from the command line (e.g. ./fact.sh 5). The result should be echoed to the screen as a single integer (e.g. 120).
NOTE: Do not include any other output, just output the single integer result.
Submit your code to the auto-grader by pressing Check-It!
NOTE: You can submit as many times as you want up until the due date.

Answers

Answer:

hope this helps

Explanation:

Need help with 9.2 Lesson Practice edhesive asap please

Answers

Answer:

Can you add an attachment please

In this exercise we have to use the computer language knowledge in python, so the code is described as:

This code can be found in the attached image.

So the code can be described more simply below, as:

height = []

height.append([16,17,14])

height.append([17,18,17])

height.append([15,17,14])

print(height)

See more about python at brainly.com/question/26104476

Outlines help you visualize the slides and the points you will include on each slide.
False
True

Answers

I don’t know I think true

Answer:

True

Explanation:

because it was correct

Annapurno
Page
Date
corite
a programe to input length and the
breath of the rectangle and cliculate the
anecan perimeter .write a program to input length and breadth of the rectangle and calculate the area and perimeter ​

Answers

Answer:

The program in Python is as follows:

Length = float(input("Length: "))

Width = float(input("Width: "))

Area = Length * Width

print("Area: ",Area)

Explanation:

This gets input for length

Length = float(input("Length: "))

This gets input for width

Width = float(input("Width: "))

This calculates the area

Area = Length * Width

This prints the calculated area

print("Area: ",Area)

Define a class StatePair with two template types (T1 and T2), a constructor, mutators, accessors, and a PrintInfo() method. Three vectors have been pre-filled with StatePair data in main():vector> zipCodeState: ZIP code - state abbreviation pairsvector> abbrevState: state abbreviation - state name pairsvector> statePopulation: state name - population pairsComplete main() to use an input ZIP code to retrieve the correct state abbreviation from the vector zipCodeState. Then use the state abbreviation to retrieve the state name from the vector abbrevState. Lastly, use the state name to retrieve the correct state name/population pair from the vector statePopulation and output the pair.Ex: If the input is:21044the output is:Maryland: 6079602

Answers

Answer:

Here.Hope this helps and do read carefully ,you need to make 1 .cpp file and 1 .h file

Explanation:

#include<iostream>

#include <fstream>

#include <vector>

#include <string>

#include "StatePair.h"

using namespace std;

int main() {

  ifstream inFS; // File input stream

  int zip;

  int population;

  string abbrev;

  string state;

  unsigned int i;

  // ZIP code - state abbrev. pairs

  vector<StatePair <int, string>> zipCodeState;

  // state abbrev. - state name pairs

  vector<StatePair<string, string>> abbrevState;

  // state name - population pairs

  vector<StatePair<string, int>> statePopulation;

  // Fill the three ArrayLists

  // Try to open zip_code_state.txt file

  inFS.open("zip_code_state.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file zip_code_state.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <int, string> temp;

      inFS >> zip;

      if (!inFS.fail()) {

          temp.SetKey(zip);

      }

      inFS >> abbrev;

      if (!inFS.fail()) {

          temp.SetValue(abbrev);

      }

      zipCodeState.push_back(temp);

  }

  inFS.close();

 

// Try to open abbreviation_state.txt file

  inFS.open("abbreviation_state.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file abbreviation_state.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <string, string> temp;

      inFS >> abbrev;

      if (!inFS.fail()) {

          temp.SetKey(abbrev);

      }

      getline(inFS, state); //flushes endline

      getline(inFS, state);

      state = state.substr(0, state.size()-1);

      if (!inFS.fail()) {

          temp.SetValue(state);

      }

     

      abbrevState.push_back(temp);

  }

  inFS.close();

 

  // Try to open state_population.txt file

  inFS.open("state_population.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file state_population.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <string, int> temp;

      getline(inFS, state);

      state = state.substr(0, state.size()-1);

      if (!inFS.fail()) {

          temp.SetKey(state);

      }

      inFS >> population;

      if (!inFS.fail()) {

          temp.SetValue(population);

      }

      getline(inFS, state); //flushes endline

      statePopulation.push_back(temp);

  }

  inFS.close();

 

  cin >> zip;

for (i = 0; i < zipCodeState.size(); ++i) {

      // TODO: Using ZIP code, find state abbreviation

  }

  for (i = 0; i < abbrevState.size(); ++i) {

      // TODO: Using state abbreviation, find state name

  }

  for (i = 0; i < statePopulation.size(); ++i) {

      // TODO: Using state name, find population. Print pair info.

  }

}

Statepair.h

#ifndef STATEPAIR

#define STATEPAIR

#include <iostream>

using namespace std;

template<typename T1, typename T2>

class StatePair {

private:

T1 key;

T2 value;

public:

// Define a constructor, mutators, and accessors

// for StatePair

StatePair() //default constructor

{}

// set the key

void SetKey(T1 key)

{

this->key = key;

}

// set the value

void SetValue(T2 value)

{

this->value = value;

}

// return key

T1 GetKey() { return key;}

 

// return value

T2 GetValue() { return value;}

// Define PrintInfo() method

// display key and value in the format key : value

void PrintInfo()

{

cout<<key<<" : "<<value<<endl;

}

};

#endif

In this exercise we have to use the knowledge in computational language in C++  to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is

#include<iostream>

#include <fstream>

#include <vector>

#include <string>

#include "StatePair.h"

using namespace std;

int main() {

 ifstream inFS;

 int zip;

 int population;

 string abbrev;

 string state;

 unsigned int i;

 vector<StatePair <int, string>> zipCodeState;

 vector<StatePair<string, string>> abbrevState;

 vector<StatePair<string, int>> statePopulation;

 inFS.open("zip_code_state.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file zip_code_state.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <int, string> temp;

     inFS >> zip;

     if (!inFS.fail()) {

         temp.SetKey(zip);

     }

     inFS >> abbrev;

     if (!inFS.fail()) {

         temp.SetValue(abbrev);

     }

     zipCodeState.push_back(temp);

 }

 inFS.close();

 inFS.open("abbreviation_state.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file abbreviation_state.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <string, string> temp;

     inFS >> abbrev;

     if (!inFS.fail()) {

         temp.SetKey(abbrev);

     }

     getline(inFS, state);

     getline(inFS, state);

     state = state.substr(0, state.size()-1);

     if (!inFS.fail()) {

         temp.SetValue(state);

     }

     abbrevState.push_back(temp);

 }

 inFS.close();

 inFS.open("state_population.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file state_population.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <string, int> temp;

     getline(inFS, state);

     state = state.substr(0, state.size()-1);

     if (!inFS.fail()) {

         temp.SetKey(state);

     }

     inFS >> population;

     if (!inFS.fail()) {

         temp.SetValue(population);

     }

     getline(inFS, state);

     statePopulation.push_back(temp);

 }

 inFS.close();

 cin >> zip;

for (i = 0; i < zipCodeState.size(); ++i) {

  }

 for (i = 0; i < abbrevState.size(); ++i) {

  }

 for (i = 0; i < statePopulation.size(); ++i) {

 }

}

Statepair.h

#ifndef STATEPAIR

#define STATEPAIR

#include <iostream>

using namespace std;

template<typename T1, typename T2>

class StatePair {

private:

T1 key;

T2 value;

public:

StatePair()

{}

void SetKey(T1 key)

{

this->key = key;

}

void SetValue(T2 value)

{

this->value = value;

}

T1 GetKey() { return key;}

T2 GetValue() { return value;}

void PrintInfo()

{

cout<<key<<" : "<<value<<endl;

}

};

See more about C code at brainly.com/question/19705654

CHALLENGE ACTIVITY
1.6.1: Type casting: Computing average owls per zoo.
Assign avg_owls with the average owls per zoo. Print avg_owls as an integer.

Sample output for inputs: 1 2 4
Average owls per zoo: 2

-------------------------------------------------------------------
Someone please explain what I am doing wrong?

Answers

Answer:

avg_owls=0.0

num_owls_zooA = int(input())

num_owls_zooB = int(input())

num_owls_zooC = int(input())

num_zoos = 3

avg_owls = (num_owls_zooA + num_owls_zooB + num_owls_zooC) / num_zoos

print('Average owls per zoo:', int(avg_owls))

Explanation:

There is a problem while you are trying the calculate the average owls per zoo.

As you may know, in order to calculate the average, you need to get the total number of owls in all the zoos, then divide it to the number of zoos. That is why you need to sum num_owls_zooA + num_owls_zooB + num_owls_zooC and divide the result by num_zoos

Be aware that the average is printed as integer value. That is why you need to cast the avg_owls to an int as int(avg_owls)

Two character strings may have many common substrings. Substrings are required to be contiguous in the original string. For example, photograph and tomography have several common substrings of length one (i.e., single letters), and common substrings ph, to, and ograph as well as all the substrings of ograph. The maximum common substring length is 6. Let X = X122 . Im and Y = yıy2 - - • Yn be two character strings. Using dynamic programming, design an algorithm to find the maximum common substring length for X and Y using dynamic programming. Please follow the general steps for designing a dynamic programming solution as in Q1 (other than the actual programming part).

Answers

Answer:

Explanation:

The following function is written in Java. It takes two strings as parameters and calculates the longest substring between both of them and returns that substring length.

import java.util.*;

class Test

{

   public static void main(String[] args)

   {

       String X = "photograph";

       String Y = "tomography";

       System.out.println(X + '\n' + Y);

       System.out.println("Longest common substring length: " + longestSub(X, Y));

   }

   static int longestSub(String X, String Y)

   {

       char[] word1 = X.toCharArray();

       char[] word2 = Y.toCharArray();

       

       int length1 = X.length();

       int length2 = Y.length();

       int substringArray[][] = new int[length1 + 1][length2 + 1];

       int longestSubstringLength = 0;

       

       for (int i = 0; i <= length1; i++)

       {

           for (int j = 0; j <= length2; j++)

           {

               if (i == 0 || j == 0)

                   substringArray[i][j] = 0;

               else if (word1[i - 1] == word2[j - 1])

               {

                   substringArray[i][j]

                           = substringArray[i - 1][j - 1] + 1;

                   longestSubstringLength = Integer.max(longestSubstringLength,

                           substringArray[i][j]);

               }

               else

                   substringArray[i][j] = 0;

           }

       }

       return longestSubstringLength;

   }

}

describe how sodium ammonium chloride can be separated from a solid mixture of ammonium chloride and anhydrous calcium chloride​

Answers

Answer:

There are way in separating mixtures of chlorides salts such as that of sodium chloride and ammonium chloride. It can be done by crystallization, filtration or sublimation. If we want to separate the mixture, we have to heat up to 330-350 degrees Celsius and collect the gas that will be produced.

What does getfenv() do?

Answers

Answer: getfenv() is a type of function. Particually a envirotment function. for a lua coding.

Explanation: What this does it goes thourgh  line of code in a particular order.

This means. getfenv is used to get the current environment of a function. It returns a table of all the things that function has access to. You can also set the environment of a function to another environment.

Forgot to include examples of where this could be used. Although not very common uses, there are some. In the past Script Builders used getfenv to get the environment of a script, and setfenv to set the environment of a created script’s environment to a fake environment, so they couldn’t affect the real one. They could also inject custom global functions.

Not entirely sure if this uses getfenv or setfenv, but the use in Crazyman32’s AeroGameFramework is making the environment of each module have access to other modules without having to require them, and having access to remotes without having to directly reference them.

Answer: ummm, who knows

Explanation:

14. Video game legend Shigeru Miyamoto designed all EXCEPT which of the following games?
a) Donkey Kong
b) Mario Bros
c) The Legend of Zelda
d) Pac-Man

Answers

D pac man hope im right

Taran is concerned with the security of his macros in a database. Which security option could he use to provide protection?

digital signatures
hide database objects
start-up options
secure VBA code

Answers

Answer:security VBA code

Explanation:

Let's implement a classic algorithm: binary search on an array. Implement a class named BinarySearcher that provides one static method named search. search takes a SearchList as its first parameter and a Comparable as its second. If either parameter is null, or if the SearchList is empty, you should throw an IllegalArgumentException. SearchList is a provided class. It provides a get(int) method that returns the Comparable at that index, and a size method that returns the size of the SearchList. Those are the only two methods you should need! search returns a boolean indicating whether the passed value is located in the sorted SearchList. To search the sorted SearchList efficiently, implement the following algorithm: Examine the value in the middle of the current array (index (start + end) / 2) If the midpoint value is the value that we are looking for, return true If the value that we are looking for is greater than the midpoint value, adjust the current array to start at the midpoint if the value that we are looking for is less than the midpoint value, adjust the current array to end at the midpoint Continue until you find the value, or until the start reaches the end, at which point you can give up and return false This is a fun problem! Good luck! Keep in mind that every time you call SearchList.get that counts as one access, so you'll need to reduce unnecessary accesses to pass the test suite.

Answers

Answer:

Hope this helped you, and if it did , do consider giving brainliest.

Explanation:

import java.util.ArrayList;

import java.util.List;

//classs named BinarySearcher

public class BinarySearcher {

 

//   main method

  public static void main(String[] args) {

     

//   create a list of Comparable type

     

      List<Comparable> list = new ArrayList<>();

     

//       add elements

     

      list.add(1);

      list.add(2);

      list.add(3);

      list.add(4);

      list.add(5);

      list.add(6);

      list.add(7);

     

//       print list

     

      System.out.println("\nList : "+list);

     

//       test search method

     

      Comparable a = 7;

      System.out.println("\nSearch for 7 : "+search(list,a));

     

      Comparable b = 3;

      System.out.println("\nSearch for 3 : "+search(list,b));

     

      Comparable c = 9;

      System.out.println("\nSearch for 9 : "+search(list,c));

     

      Comparable d = 1;

      System.out.println("\nSearch for 1 : "+search(list,d));

     

      Comparable e = 12;

      System.out.println("\nSearch for 12 : "+search(list,e));

     

      Comparable f = 0;

      System.out.println("\nSearch for 0 : "+search(list,f));

     

  }

 

 

 

//   static method named search takes arguments Comparable list and Comparable parameter

  public static boolean search(List<Comparable> list, Comparable par) {

     

//       if list is empty or parameter is null the throw IllegalArgumentException

     

      if(list.isEmpty() || par == null ) {

         

          throw new IllegalArgumentException();

         

      }

     

//       binary search

     

//       declare variables

     

      int start=0;

     

      int end =list.size()-1;

     

//       using while loop

     

      while(start<=end) {

         

//           mid element

         

          int mid =(start+end)/2;

         

//           if par equal to mid element then return

         

          if(list.get(mid).equals(par) )

          {

              return true ;

             

          }  

         

//           if mid is less than parameter

         

          else if (list.get(mid).compareTo(par) < 0 ) {

                 

              start=mid+1;

          }

         

//           if mid is greater than parameter

         

          else {

              end=mid-1;

          }

      }

     

//       if not found then retuen false

     

      return false;

     

  }

 

 

}import java.util.ArrayList;

import java.util.List;

//classs named BinarySearcher

public class BinarySearcher {

 

//   main method

  public static void main(String[] args) {

     

//   create a list of Comparable type

     

      List<Comparable> list = new ArrayList<>();

     

//       add elements

     

      list.add(1);

      list.add(2);

      list.add(3);

      list.add(4);

      list.add(5);

      list.add(6);

      list.add(7);

     

//       print list

     

      System.out.println("\nList : "+list);

     

//       test search method

     

      Comparable a = 7;

      System.out.println("\nSearch for 7 : "+search(list,a));

     

      Comparable b = 3;

      System.out.println("\nSearch for 3 : "+search(list,b));

     

      Comparable c = 9;

      System.out.println("\nSearch for 9 : "+search(list,c));

     

      Comparable d = 1;

      System.out.println("\nSearch for 1 : "+search(list,d));

     

      Comparable e = 12;

      System.out.println("\nSearch for 12 : "+search(list,e));

     

      Comparable f = 0;

      System.out.println("\nSearch for 0 : "+search(list,f));

     

  }

 

 

 

//   static method named search takes arguments Comparable list and Comparable parameter

  public static boolean search(List<Comparable> list, Comparable par) {

     

//       if list is empty or parameter is null the throw IllegalArgumentException

     

      if(list.isEmpty() || par == null ) {

         

          throw new IllegalArgumentException();

         

      }

     

//       binary search

     

//       declare variables

     

      int start=0;

     

      int end =list.size()-1;

     

//       using while loop

     

      while(start<=end) {

         

//           mid element

         

          int mid =(start+end)/2;

         

//           if par equal to mid element then return

         

          if(list.get(mid).equals(par) )

          {

              return true ;

             

          }  

         

//           if mid is less than parameter

         

          else if (list.get(mid).compareTo(par) < 0 ) {

                 

              start=mid+1;

          }

         

//           if mid is greater than parameter

         

          else {

              end=mid-1;

          }

      }

     

//       if not found then retuen false

     

      return false;

     

  }

 

 

}

Mohammed needs to ensure that users can execute a query against a table but provide different values to the query each time it is run. Which option will achieve this goal?

parameter queries
dynamic queries
query joins
static queries

Answers

Answer:

the answer is B

Explanation:

Write a piece of code that constructs a jagged two-dimensional array of integers named jagged with five rows and an increasing number of columns in each row, such that the first row has one column, the second row has two, the third has three, and so on. The array elements should have increasing values in top-to-bottom, left-to-right order (also called row-major order). In other words, the array's contents should be the following: 1 2, 3 4, 5, 6 7, 8, 9, 10 11, 12, 13, 14, 15
PROPER OUTPUT: jagged = [[1], [2, 3], [4, 5, 6], [7, 8, 9, 10], [11, 12, 13, 14, 15]]
INCORRECT CODE:
int jagged[][] = new int[5][];
for(int i=0; i<5; i++){
jagged[i] = new int[i+1]; // creating number of columns based on current value
for(int j=0, k=i+1; j jagged[i][j] = k;
}
}
System.out.println("Jagged Array elements are: ");
for(int i=0; i for(int j=0; j System.out.print(jagged[i][j]+" ");
}
System.out.println();
}
expected output:jagged = [[1], [2, 3], [4, 5, 6], [7, 8, 9, 10], [11, 12, 13, 14, 15]]
current output:
Jagged Array elements are:
1
2 3
3 4 5
....

Answers

Answer:

Explanation:

The following code is written in Java and it uses nested for loops to create the array elements and then the same for loops in order to print out the elements in a pyramid-like format as shown in the question. The output of the code can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       int jagged[][] = new int[5][];

       int element = 1;

       for(int i=0; i<5; i++){

           jagged[i] = new int[i+1]; // creating number of columns based on current value

           for(int x = 0; x < jagged[i].length; x++) {

               jagged[i][x] = element;

               element += 1;

           }

       }

       System.out.println("Jagged Array elements are: ");

       for ( int[] x : jagged) {

           for (int y : x) {

               System.out.print(y + " ");

           }

           System.out.println(' ');

       }

       }

   }

Suppose the program counter is currently equal to 1700 and instr represents the instruction memory. What will be the access of the next instruction if:

instr[PC] = add $t0, $t1, $t2

Answers

Answer:

C

Explanation:

omputer chip

sorry btw

how many nibbles make one kilobyte​

Answers

2000 nibbles I think correct me if I’m wrong

Answer:

2000 nibbles

Explanation:

2000 nibbles is needed for 1 kilobyte

Sergio needs to tell his team about some negative feedback from a client. The team has been
working hard on this project, so the feedback may upset them. Which of the following explains
the best way for Sergio to communicate this information?

A) Hold an in person meeting so that he can gauge the team's body language to assess their
reaction

B) Send a memorandum so everyone will have the feedback in writing

C) Hold a video conference so everyone can see and hear about the client's concern without the group witnessing each other's reactions

D) Send an email so everyone will have time to think about the feedback before the next team meeting

Answers

Answer:

A

Explanation:

I feel that if everyone is with eachother, there may be a better hope to improve the next time

Identify the following terms being described. Write your answers on the space provided.

1. Worldwide Web
______________________
2.E-mail
________________________
3.Powerline networking
_______________________
5.Cable
_______________________

Answers

Answer:

Find answers below.

Explanation:

1. Worldwide Web: In computing, WWW simply means World Wide Web. The world wide web was invented by Sir Tim Berners-Lee in 1990 while working with the European Council for Nuclear Research (CERN); Web 2.0 evolved in 1999. Basically, WWW refers to a collection of web pages that are located on a huge network of interconnected computers (the Internet). Also, users from all over the world can access the world wide web by using an internet connection and a web browser such as Chrome, Firefox, Safari, Opera, etc.

In a nutshell, the World Wide Web is an information system that is generally made up of users and resources (documents) that are connected via hypertext links.

2.E-mail: An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

It is considered to be one of the most widely used communication channel or medium is an e-mail (electronic mail).

3. Powerline networking: this is a wired networking technology that typically involves the use of existing electrical cables in a building to connect and transmit data on network devices through powerline network adapters.

4. Cable: this include network cables such as CAT-5, CAT-6 and fiber optic cables used for connecting and transmitting signals between two or more network devices.

what is the output of this line of code?
print("hello"+"goodbye")
-"hello"+"goodbye"
-hello + goodbye
-hello goodbye
-hellogoodbye

Answers

The first one
“hello” + “goodbye”

Answer:

“hello” + “goodbye”

Explanation:

I need help
I am thinking about coming out to my mom because we are going to the store today and I will be in the car, I dont know if I should or not

Answers

Answer:

do it! you will have to one day so why not now? hopefully she will understand and say nice things as well and be like mom ive

been thinking a lot and i really want to tell you something. Explanation:

Answer:most likely she is your parent that you live with so she might already know but has not said anything it also depends her personality but if your ready and know or think she would not hate you forever go for it

Explanation:

Selection Sort List the resulting array after each iteration of the outer loop of the selection sort algorithm. Indicate the number of character-to-character comparisons made for each iteration (line 07 of the Selection Sort algorithm at the end of the assignment). Sort the following array of characters (sort into alphabetical order): CQS A XBT Selection Sort 01 public static void selectionSort (int[] a) { 02 03 int n = a.length; for (int i = 0 ; i 0; j--) { if ( a[j-1] > a[j] ) { exchange(a, j-1, j); } else break; 10 } 12 private static void exchange (int[] a, int i, int j) { 13 // exchange the value at index i with the value at index j int temp = a[i]; a[i] = a[j]; a[j] = temp; 17 }

Answers

Solution :

Initial array = [tex]$\text{C,Q,S,A,X,B,T}$[/tex]

[tex]$n= 7$[/tex](length of the array)

[tex]$\text{1st}$[/tex] Iteration:

i = 1

  j = 1

  [tex]$\text{a[j-1]}$[/tex] = C

  a[j] = Q

  since [tex]$\text{a[j-1]}$[/tex] < a[j] , break from inner loop

 

Number of comparisons in 1st Iteration = 1

After 1st Iteration:

Array : C,Q,S,A,X,B,T

2nd Iteration:

i = 2

  j = 2

  a[j-1] = Q

  a[j] = S

  since a[j-1] < a[j], break from inner loop

 

Number of comparisons in 2nd Iteration = 1

After 2nd Iteration:

Array : C,Q,S,A,X,B,T

3rd Iteration:

i = 3

  j = 3

  a[j-1] = S

  a[j] = A

  since a[j-1] > a[j], exchange a[2] with a[3]

  Array : C,Q,A,S,X,B,T

 

  j = 2

  a[j-1] = Q

  a[j] = A

  since a[j-1] > a[j], exchange a[1] with a[2]

  Array : C,A,Q,S,X,B,T

 

  j = 1

  a[j-1] = C

  a[j] = A

  since a[j-1] > a[j], exchange a[0] with a[1]

  Array : A,C,Q,S,X,B,T

 

  j = 0, break from inner loop

Number of comparisons in 3rd Iteration = 3

After 3rd Iteration:

Array : A,C,Q,S,X,B,T

4th Iteration:

i = 4

  j = 4

  a[j-1] = S

  a[j] = X

  since a[j-1] < a[j], break from inner loop

 

Number of comparisons in 4th Iteration = 1

After 4th Iteration:

Array : A,C,Q,S,X,B,T

5th Iteration:

i = 5

  j = 5

  a[j-1] = X

  a[j] = B

  since a[j-1] > a[j], exchange a[4] with a[5]

  Array : A,C,Q,S,B,X,T

 

  j = 4

  a[j-1] = S

  a[j] = B

  since a[j-1] > a[j], exchange a[3] with a[4]

  Array : A,C,Q,B,S,X,T

 

  j = 3

  a[j-1] = Q

  a[j] = B

  since a[j-1] > a[j], exchange a[2] with a[3]

  Array : A,C,B,Q,S,X,T

 

  j = 2

  a[j-1] = C

  a[j] = B

  since a[j-1] > a[j], exchange a[1] with a[2]

  Array : A,B,C,Q,S,X,T

 

  j = 1

  a[j-1] = A

  a[j] = B

  since a[j-1] < a[j], break from inner loop

 

Number of comparisons in 5th Iteration = 5

After 5th Iteration:

Array : A,B,C,Q,S,X,T

6th Iteration:

i = 6

  j = 6

  a[j-1] = X

  a[j] = T

  since a[j-1] > a[j], exchange a[5] with a[6]

  Array : A,B,C,Q,S,T,X

 

  j = 5

  a[j-1] = S

  a[j] = T

  since a[j-1] < a[j], break from inner loop

 

Number of comparisons in 6th Iteration = 2

After 6th Iteration:

Array : A,B,C,Q,S,T,X

Sorted Array : A B C Q S T X  

The Basic premise of____is that objects can be tagged, tracked, and monitored through a local network, or across the Internet.
The basic premise of
a. artificial intelligence
b. intelligent workspaces
c. the Internet of Things
d. the digital divide

Answers

Answer:

C.

Explanation:

Internet of things

The Basic premise of the Internet of Things is that objects can be tagged, tracked, and monitored through a local network, or across the Internet option (c) is correct.

What is IoT?

The term "Internet of things" refers to actual physical items that have sensors, computing power, software, and other innovations and can link to those other systems and gadgets via the Internet or other communication networks and share files with them.

As we know,

Using a local network or the Internet, things may be identified, tracked, and monitored is the fundamental tenet of the Internet of Things.

Thus, the Basic premise of the Internet of Things is that objects can be tagged, tracked, and monitored through a local network, or across the Internet option (c) is correct.

Learn more about the IoT here:

https://brainly.com/question/25703804

#SPJ2

The variable strFirst's scope is _____.

Answers

pretty sure it’s d, hope this helps

Answer:

- the usernameMaker function

Explanation:

When you look at the code, you can see it's located alongside the usernameMaker. It it only utilized then, therefore being it's scope. For reassurance, it's also correct on Edge.

I hope this helped!

Good luck <3

The following table describes the required fields for two classes and typical values stored in those fields.

You are required to create a base class Printer and its child class PrinterCumScanner. Each of these classes should have user defined constructor and overridden Display() method so that the following test driver can work properly.

Answers

Answer:

hope this helps,if it did pls mark my ans as brainliest

Explanation:

using System;

class Printer{ string companyName; int pagesOutput;

double price;

public Printer(string companyName,int pagesOutput,double price){

this.companyName=companyName; this.pagesOutput=pagesOutput; this.price=price;

}

public virtual void Display(){ Console.WriteLine("companyName: "+companyName+" pagesOutput: "+pagesOutput+" price: "+price);

}

}

class PrinterCumScanner:Printer{ int imageDpi;

public PrinterCumScanner(string companyName,int pagesOutput,double price,int imageDpi):base(companyName,pagesOutput,price){ this.imageDpi=imageDpi; }

public override void Display(){ base.Display(); Console.WriteLine("imageDpi: "+imageDpi);

}

}

public class Program { static void Main(string[] args) { const int NUM_PRINTERS=3;

Printer []stock=new Printer[NUM_PRINTERS];

stock[0]=new Printer("HP",40,89.50);

stock[1]=new PrinterCumScanner("HP",40,215.0,320); stock[2]=new PrinterCumScanner("Cannon",30,175.0,240);

foreach(Printer aPrinter in stock){ aPrinter.Display();

}

}

}

Which tab can be used to change the theme and background style of a presentation?
O Design
O Home
O Insert
O View

Answers

Answer:

Design

Explanation:

seems the most correct one..

I would say design as well.

(main.c File)
Counting the character occurrences in a file
For this task you are asked to write a program that will open a file called “story.txt”
and count the number of occurrences of each letter from the alphabet in this file.
At the end your program will output the following report:
Number of occurrences for the alphabets:
a was used – times.
b was used – times.
c was used – times…. …and so, on
Assume the file contains only lower-case letters and for simplicity just a single
paragraph. Your program should keep a counter associated with each letter of the
alphabet (26 counters) [Hint: Use array]
Your program should also print a histogram of characters count by adding
a new function print Histogram (int counters []). This function receives the
counters from the previous task and instead of printing the number of times each
character was used, prints a histogram of the counters. An example histogram for
three letters is shown below) [Hint: Use the extended asci character 254]

Answers

Answer:

C code

Explanation:

#include <stdio.h>

void histrogram(int counters[])

{

   int i,j;

   int count;

   for(i=0;i<26;i++)

   {

       count=counters[i];

       printf("%c ",i+97);

       for(j=0;j<count;j++)

       {

           printf("="); //= is used

       }

       printf("\n");

      

   }

      

}

int main()

{

   FILE* fp;

   int i;

   int arr[26];

   char c;

   int val;

   // Open the file

fp = fopen("story.txt", "r");

  

if (fp == NULL) {

printf("Could not open file ");

return 0;

}

else

{

   for(i=0;i<26;i++)

   arr[i]=0;

  

   for (c = getc(fp); c != EOF; c = getc(fp))

   {

       if(c>='a' && c<='z')

       {

           val = c-97;

           //printf("%d ",val);

           arr[val]++;

          

           }

       }

       histrogram(arr);

      

  

      

  

   }

}

11. Its collection of toys which could be used in the game via an implanted RFID chip made Activision’s game _______ one of the most important in gaming history.
a) 102 Dalmations
b) Skylanders
c) Lego Star Wars
d) Super Monkey Ball

Answers

Answer:

I think it's B correct me if I'm wrong

Explanation:

Answer:

B

Explanation:

I say it is the right one although in this 2021 there is no other game but it is its 10th anniversary

Explain the five generations of computer

Answers

Answer:

1 First Generation

The period of first generation: 1946-1959. Vacuum tube based.

2 Second Generation

The period of second generation: 1959-1965. Transistor based.

3 Third Generation

The period of third generation: 1965-1971. Integrated Circuit based.

4 Fourth Generation

The period of fourth generation: 1971-1980. VLSI microprocessor based.

5 Fifth Generation

The period of fifth generation: 1980-onwards. ULSI microprocessor based.

The phrase "generation" refers to a shift in the technology that a computer is/was using. The term "generation" was initially used to describe different hardware advancements. These days, a computer system's generation involves both hardware and software.

Who invented the 5th generation of computers?

The Japan Ministry of International Trade and Industry (MITI) launched the Fifth Generation Computer Systems (FGCS) initiative in 1982 with the goal of developing computers that use massively parallel computing and logic programming.

The generation of computers is determined by when significant technological advancements, such as the use of vacuum tubes, transistors, and microprocessors, take place inside the computer. There will be five computer generations between now and 2020, with the first one starting around 1940.

Earlier models of computers (1940-1956)Computers of the Second Generation (1956-1963)Computers of the Third Generation (1964-1971)Computers of the fourth generation (1971-Present)Computers of the fifth generation

Learn more about generations of computers here:

https://brainly.com/question/9354047

#SPJ2

Write an algorithm (pseudo-code) that takes an unsorted list of n integers and outputs a sorted list of all duplicate integers. There must be no duplicates in the output list, also the output list should be a sorted list. The algorithm must run in O(n) time. Show your analysis of the running time. Note: Assume that inputs are integer values from 0 to 255. (Hint: use the concept that being used in the separate chaining)

Answers

Answer:

brainliest if it did help you

Explanation:

Given array : A[0...n-1]Now, create a count array Cnt[0...n-1]then, initialize Cnt to zero

for(i=0...n-1)

Cnt[i]=0 ---------O(n) time

Linearly traverse the list and increment the count of respected number in count array.

for(i=0...n-1)

Cnt[A[i]]++; ---------O(n) time

Check in the count array if duplicates exist.

for(i=0...n-1){

if(C[i]>1)

output (i); -----------O(n) time

}

analysis of the above algorithm:

Algorithm takes = O(1 + n + n + n)

                           = O(n)          

//java code

public class SortIntegers {

  public static void sort(int[] arr) {

    int min = arr[0];

    int max = arr[0];

    for (int i = 0; i < arr.length; ++i) {

      if (arr[i] > max) {

        max = arr[i];

      }

      if (arr[i] < min) {

        min = arr[i];

      }

    }

    int counts[] = new int[max - min + 1];

    for (int i = 0; i < arr.length; ++i) {

      counts[arr[i] - min]++;

    }

    for (int i = 0; i < counts.length; ++i) {

      if (counts[i] > 1) {

        System.out.print((i + min) + " ");

      }

    }

    

    System.out.println();

  }

  public static void main(String[] args) {

    sort(new int[] { 5, 4, 10, 2, 4, 10, 5, 3, 1 });

  }

}

A major advantage of direct mapped cache is its simplicity and ease of implementation. The main disadvantage of direct mapped cache is: a. it is more expensive than fully associative and set associative mapping. b. it has a greater access time than any other method. c. its performance is degraded if two or more blocks that map to the same location are used alternately. d. it does not allow the cache to store the tag that corresponds to the block currently residing in that cache location.

Answers

brainlest   pl     jk  mmmmmmmmmmmmm

Other Questions
i will give someone brainliest98 points will be reworded 9)Find the average rate of change for f(x)= x to the second power+ 7x+10 from x= 0 to x= 2. Which statement about light energy is incorrect?A. Light energy travels as electromagnetic wavesB. We can only see light if the wavelengths are in acertain part of the electromagnetic spectrumC. Refraction is when light bends as it passes throughanother mediumD. Light is absorbed at a higher rate if the color of theobject it hits is brighter GIVING 50 POINTS AWAY!! ANSWER ALL 4!! NO LINKS For the last two months, Samantha and Mary have been planning their trip. Their plane for Mexico leaves in the morning. _______ and Mary are excited about the trip. What quantity of 75 per cent acid solution must be mixed with a 30 per cent solution to produce 1080 mL of a 50 per cent solution? write the quadratic formula y=x^2-6x+7 in vertex form. If i have 22 more questions to go out of 42 what question am i on? WILL GIVE BRAINLEST NEED HELP ASAP LINKS WILL GET REPORTED For which of the following inequalities is x > 4 a solution? How long will the other side be ? What is one similarity between Hammurabi and the Maya? a.They both were monotheistic.b.They lived in the same hemisphere.c.They both had stone steles.d.They ruled on the same continent. Round to the nearest hundredth (2 decimal places) when necessary why are some properties of water different than those of the reactants gases Menciona las reformas que se hicieron a la Constitucin Nacional Argentina y explica las que se incluyeron en 1994. 100 points Choose the different ways that a graph can be misleading.The y-axis starts at zero and uses consistent intervals.Different bar heights are used on the same graph.The y-axis doesn't start at zero.The intervals on the y-axis are too large.Different bar widths are used on the same graph.The y-axis starts at zero but has different intervals. WILL GIVE BRAINLIEST ANSWER!!!How many moles of hydrogen are required to produce 6 moles of water? Identify each example as a pull or push factor of migration.Afghan refugees living inIran to escape terrorismBangladeshi migrationto India due to floodsadmission to a universityin Englandmigration to Canadafor a better lifestylemigration to America to escape religious persecutionentrepreneur moving toSingapore for a betterbusiness opportunity wrongsubject Which conditions are needed for a hurricane to form? A. warm, dry air rising over warm areas on the land B. warm, dry air rising over warm areas in the ocean C. warm, moist air rising over warm areas on the land D. warm, moist air rising over warm areas in the ocean Which table represents an exponential function of the form y= b^x when 0 < b < 1?