Answer:
The various reasons that could be a major problem for the implementation are it involves a large number of parameters also, having a noisy data
Explanation:
Solution
The various reasons that could be causing the problem is given as follows :
1. A wide number of parameters :
In the ensemble tree method, the number of parameters which are needed to be trained is very large in numbers. When the training is performed in this tree, then the model files the data too well. When the model has tested against the new data point form the validation set, then this causes a large error because the model is trained completely according to the training data.2. Noisy Data:
The data used to train the model is taken from the real world . The real world's data set is often noisy i.e. contains the missing filed or the wrong values. When the tree is trained on this noisy data, then it sets its parameters according to the training data. As regards to testing the model by applying the validate set, the model gives a large error of high in accuracy y.
11.19 (Constructor Failure) Write a program that shows a constructor passing information about constructor failure to an exception handler. Define class SomeClass, which throws an Exception in the constructor. Your program should try to create an object of type SomeClass and catch the exception that’s thrown from the constructor
Answer:
You absolutely should throw an exception from a constructor if you're unable to create a valid object. This allows you to provide proper invariants in your class. ... Throw an exception if you're unable to initialize the object in the constructor, one example are illegal arguments.
Explanation:
Error codes cannot be used in constructors since they lack a return type. Therefore, throwing an exception is the most effective technique to indicate constructor failure. Here is a workaround if you don't have or are unwilling to use exceptions.
What constructor passing information, constructor failure?When an exception is thrown in a constructor, memory for the actual object has already been set aside before the constructor is even invoked. Therefore, after the exception is thrown, the compiler will immediately deallocate the memory the object was using.
There are two solutions to that: Simple and conventional approach: Use arrows. To make use of a two-stage construction, use a custom “construct” function after a default constructor that cannot throw exceptions.
Therefore, The constructor has the ability to “zombie” an object if it fails.
Learn more about Constructors here:
https://brainly.com/question/18914381
#SPJ5
Give an example of a function from N to N that is: Hint: try using absolute value, floor, or ceiling for part (b). (a) one-to-one but not onto (b) onto but not one-to-one (c) neither one-to-one nor onto
Answer:
Let f be a function
a) f(n) = n²
b) f(n) = n/2
c) f(n) = 0
Explanation:
a) f(n) = n²
This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.
Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:
f(a) = f(b) ⇒ a² = b² ⇒ a = b
The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number. For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.
b) f(n) = n/2
The above function example is an onto function because every natural number, let’s say n is a natural number that belongs to N, is the image of 2n. For example:
f(2n) = [2n/2] = n
The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:
When the value of n=1, then
n/2 = [1/2] = [0.5] = 1
When the value of n=2 then
n/2 = [2/2] = [1] = 1
c) f(n) = 0
The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image. The above function example is also not an onto function because every positive integer is not an image of any natural number.
A system developer needs to provide machine-to-machine interface between an application and a database server in the production enviroment. This interface will exchange data once per day. Which of the following access controll account practices would BESt be used in this situation?
a. Establish a privileged interface group and apply read -write permission.to the members of that group.
b. Submit a request for account privilege escalation when the data needs to be transferred
c. Install the application and database on the same server and add the interface to the local administrator group.
d. Use a service account and prohibit users from accessing this account for development work
Answer:
The correct option is (d) Use a service account and prohibit users from accessing this account for development work
Explanation:
Solution
As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:
By making use of a service account and forbids users from having this account for development work.
The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.
Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.
DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the network consists of 2 servers for internal business processes, 1 server that handles the call-in connections; 10 on-site wireless workstations/devices, and 2 printers. Respond to the following in a minimum of 175 words: Identify one network security strategy that would help this organization. Why did you choose this strategy over others
Answer:
What i would suggest for the organization is to use the Testing Infrastructure strategy. it is good for your consulting firm because it is less costly and provide security.
Explanation:
Solution
There are different network security strategy which is listed below:
Segment the network:
Segmentation in network is very useful for providing security.If any threat is occur only one segment is effected remaining are safe and it is less cost process. very useful for small organizations.
Test your infrastructure :
Testing infrastructure also very good technique.
Always we have to test our infrastructure whether threat is occur or not.
If any threat is happen we can detect that easily by testing our infrastructure.
Regularly update anti-virus software :
This is very useful for small organizations and it is less cost.with less cost we can provide security for all devices like computer,server,modems etc.
Frequently backup your critical data :
This is very good technique for crucial data.If we backup important data any time that will be useful if any attack is happen.
This is less costs and simple.
Change router default security settings :
Changing router password and settings also helpful for providing security.If we maintain same password and same settings for a long time that may lead to data hacking.It is cost less process very useful for small organizations.
if you want to exclude a portion of an image which option should be chosen?? A. Arrange B. Position C. Crop D. Delete
What is
relation degree.
Answer:
Explanation:
The degree of relationship can be defined as the number of occurrences in one entity that is associated with the number of occurrences in another entity. There is the three degree of relationship: One-to-one (1:1) One-to-many (1:M)
Many treadmills output the speed of the treadmill in miles per hour (mph) on the console, but most runners think of speed in terms of a pace. A common pace is the number of minutes and seconds per mile instead of mph. Write a program that starts with a quantity in mph and converts the quantity into minutes and seconds per mile. As an example, the proper output for an input of 6.5 mph should be 9 minutes and 13.8 seconds per mile. If you need to convert a double to an int, which will discard any value after the decimal point, then you may use intValue
Answer:
This question is answered using C++ programming language.
This program does not make use of comments; However, see explanation section for detailed line by line explanation.
The program starts here
#include <iostream>
using namespace std;
int main()
{
double quantity,seconds;
int minutes;
cout<<"Quantity (mph): ";
cin>>quantity;
minutes = int(60/quantity);
cout<<minutes<<" minutes and ";
seconds = (60/quantity - int(60/quantity))*60;
printf("%.1f", seconds);
cout<<" seconds per mile";
return 0;
}
Explanation:
The following line declares quantity, seconds as double datatype
double quantity,seconds;
The following line declares minutes as integer datatype
int minutes;
The following line prompts user for input in miles per hour
cout<<"Quantity (mph): ";
User input is obtained using the next line
cin>>quantity;
The next line gets the minute equivalent of user input by getting the integer division of 60 by quantity
minutes = int(60/quantity);
The next statement prints the calculated minute equivalent followed by the string " minuted and " without the quotes
cout<<minutes<<" minutes and ";
After the minutes has been calculated; the following statement gets the remainder part; which is the seconds
seconds = (60/quantity - int(60/quantity))*60;
The following statements rounds up seconds to 1 decimal place and prints its rounded value
printf("%.1f", seconds);
The following statement prints "seconds per mile" without the quotes
cout<<" seconds per mile";
Following are the program to the given question:
Program Explanation:
Defining the header file.Defining the main method.Inside the method, three double variables "mph, sec, and min_per_mile", and one integer variable "min" is defined. After defining a variable "mph" is defined that inputs value by user-end.After input value, "sec, min_per_mile, and min" is defined that calculates the value and prints its calculated value.Program:
#include<iostream>//header file
using namespace std;
int main()//defining main method
{
double mph,sec,min_per_mile;//defining a double variable
int min;//defining integer variable
cout<<"Enter the speed of the treadmill in mph:";//print message
cin>>mph;//input double value
min_per_mile=(1/mph)*60;//defining a double variable that calculates minutes per mile
min=static_cast<int>(min_per_mile);//defining int variable that converts min_per_mile value into integer
sec=(min_per_mile-min)*60;//defining double variable that calculates seconds per mile value
cout<<"A common pace is the "<<min<<" minutes and "<<sec<<" seconds per mile"<<endl;//print calculated value with message
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/21278031
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capyure all of the network traffic. Which of the following should be used for the IDS implementation?
a. Network tap
b. Honeypot
c. Aggregation
d. Port mirror
Answer:
d. Port mirror
Explanation:
Port mirroring is a method to monitor network traffic and it is used in the Intrusion Detection Systems. It is also called Switched Port Analyzer and is used to analyse the network errors. This technique basically copies the network packets and sends or transmits these copied packed from one port to another in a network device such as a switch. This means that this technique is used to copy the network packets from one switch port and send the copy of these packets to another port where these packets are monitored. This is how it analyses the network errors and incoming traffic for irregular behavior and also this can be done without affecting the normal operation of the switch and other network processes. It is simple, inexpensive and easy to establish and use. The most important advantage of using mirrored ports is that it catches the traffic on several ports at once or can capture all of the network traffic.
Describe any five GSM PLMN basic services?
Answer:
Your answer can be found in the explanation below.
Explanation:
GSM is the abbreviation for Global System for Mobile communication. Its purpose is to transmit voice and data services over a range. It is a digital cellular technology.
PLMN is the abbreviation for Public Land Mobile network. It is defined as the wireless communication service or combination of services rendered by a telecommunication operator.
The plmn consists of technologies that range from Egde to 3G to 4G/LTE.
PLMN consists of different services to its mobile subscribers or users but for the purpose of this question, i will be pointing out just 5 of them alongside its definitions.
1. Emergency calls services to fire or police: Plmn provides us with the option to make emergency calls in the event of any accident or fire incident, etc.It is available on devices either when locked or unlocked.
2. Voice calls to/from other PLMN: This entails the putting of calls across to persons we cannot reach very quickly. PLMN helps to connect persons through its network of from other networks thus making communication easier.
3. Internet connectivity: PLMN provieds us with internet services through wifi or bundles that enable us have access to the internet as well as help us communicate with people and loved ones over a distance. Internet service are possble either on GPRS or 3G or 4G networks.
4. SMS service: SMS means short messaging service. This is also know as text messages. PLMN allows us to be able to send short messages to people as oppposed to mails. It is mostly instant and can be sent or recieved from the same PLMN or others.
5. MMS service: Multimedia messaging service whose short form is MMS ccan be descibed as the exchange of heavier messages such as a picture or music or document but not from an email. It is availabel for use from one PLMN to another.
Cheers.
Given positive integer numInsects, write a while loop that prints that number doubled without reaching 100. Follow each number with a space. After the loop, print a newline. Ex: If numInsects = 8, print:
8 16 32 64
#include
using namespace std;
int main() {
int numInsects = 0;
numInsects = 8; // Must be >= 1
while (numInsects < 100) {
numInsects = numInsects * 2;
cout << numInsects << " ";
}
cout << endl;
return 0;
}
So my question is what am I doing wrong?
Answer:
The cout<<numInsects<<""; statement should be placed before numInsects = numInsects * 2; in the while loop.
Explanation:
Your program gives the following output:
16 32 64 128
However it should give the following output:
8 16 32 64
Lets see while loop to check what you did wrong in your program:
The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100.
So the body of while loop executes. numInsects = numInsects * 2; statement in the body multiplies the value of numInsects i.e 8 with 2 and then cout << numInsects << " "; prints the value of numInsects AFTER the multiplication with 2 is performed. So 8 is not printed in output but instead 16 (the result of 8*2=16) is printed as the result of first iteration.
So lets change the while loop as follows:
while (numInsects < 100) {
cout << numInsects << " ";
numInsects = numInsects * 2;
Now lets see how it works.
The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100
So the body of while loop executes. cout << numInsects << " "; first prints the value of numInsects i.e. 8. Next numInsects = numInsects * 2; multiplies the value of numInsects i.e 8 with 2. So first 8 is printed on the output screen. Then the multiplication i.e. 8*2=16 is performed as the result of first iteration. So now value of numInsects becomes 16.
Next the while loop condition numInsects < 100 is again checked. It is true again as 16<100. Now cout << numInsects << " "; is executed which prints 16. After this, the multiplication is again performed and new value of numInsects becomes 32 at second iteration. This is how while loops continues to execute.
So this while loop stops when the value of numInsects exceeds 100.
All of the following are true about hacksaws except: a. A hacksaw only cuts on the forward stroke. b. A coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. c. A fine hacksaw blade (one with many teeth) is better for cutting sheet metal. d. A hacksaw blade is hardened in the center, so it is best to saw only with the center portion of the blade.
All of the following are true about hacksaws, except a coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. The correct option is b.
What is a hacksaw?A hacksaw is a saw with fine teeth that were originally and primarily used to cut metal. Typically, a bow saw is used to cut wood and is the corresponding saw.
Hacksaw is used by hand, it is a small tool for cutting pipes rods wood etc that is very common and homes and in shops. The different types of hacksaws. The main three types of hacksaws are course-grade hacksaws, medium-grade hacksaws, and fine-grade hacks. The difference is just for the quality, and the design of the blade.
Therefore, the correct option is b. Cutting thick steel is easier with a coarse hacksaw blade (one with fewer teeth) than a fine one.
To learn more about hacksaw, refer to the below link:
https://brainly.com/question/15611752
#SPJ2
(Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds using the following header: def convertMillis(millis): The function returns a string as hours:minutes:seconds. For example, convertMillis(5500) returns the string 0:0:5, convertMillis(100000) returns the string 0:1:40, and convertMillis(555550000) returns the string 154:19:10. Write a test program that prompts the user to enter a value for milliseconds and displays a string in the format of hours:minutes:seconds. Sample Run Enter time in milliseconds: 555550000 154:19:10
Answer:
I am writing the Python program. Let me know if you want the program in some other programming language.
def convertMillis(millis): #function to convert milliseconds to hrs,mins,secs
remaining = millis # stores the value of millis to convert
hrs = 3600000 # milliseconds in hour
mins = 60000 # milliseconds in a minute
secs = 1000 #milliseconds in a second
hours =remaining / hrs #value of millis input by user divided by 360000
remaining %= hrs #mod of remaining by 3600000
minutes = remaining / mins # the value of remaining divided by 60000
remaining %= mins #mod of remaining by 60000
seconds = remaining / secs
#the value left in remaining variable is divided by 1000
remaining %= secs #mod of remaining by 1000
print ("%d:%d:%d" % (hours, minutes, seconds))
#displays hours mins and seconds with colons in between
def main(): #main function to get input from user and call convertMillis() to #convert the input to hours minutes and seconds
millis=input("Enter time in milliseconds ") #prompts user to enter time
millis = int(millis) #converts user input value to integer
convertMillis(millis) #calls function to convert input to hrs mins secs
main() #calls main() function
Explanation:
The program is well explained in the comments mentioned with each line of code. The program has two functions convertMillis(millis) which converts an input value in milliseconds to hours, minutes and seconds using the formula given in the program, and main() function that takes input value from user and calls convertMillis(millis) for the conversion of that input. The program along with its output is attached in screenshot.
Write a program that prompts the user to enter integers in the range 1 to 50 and counts the occurrences of each integer. The program should also prompt the user for the number of integers that will be entered. As an example, if the user enters 10 integers (10, 20, 10, 30, 40, 49, 20, 10, 25, 10), the program output would be:
Answer:
import java.util.Scanner; public class Main { public static void main(String[] args) { int num[] = new int[51]; Scanner input = new Scanner(System.in); System.out.print("Number of input: "); int limit = input.nextInt(); for(int i=0; i < limit; i++){ System.out.print("Input a number (1-50): "); int k = input.nextInt(); num[k]++; } for(int j=1; j < 51; j++){ if(num[j] > 0){ System.out.println("Number of occurrence of " + j + ": " + num[j]); } } } }Explanation:
The solution is written in Java.
Firstly, create an integer array with size 51. The array will have 51 items with initial value 0 each (Line 5).
Create a Scanner object and get user entry the number of input (Line 6-7).
Use the input number as the limit to control the number of the for loop iteration to repeatedly get integer input from user (Line 9-13). Whenever user input an integer, use that integer, k, as the index to address the corresponding items in the array and increment it by one (LINE 11-12).
At last, create another for loop to iterate through each item in the array and check if there is any item with value above zero (this means with occurrence at least one). If so, print the item value as number of occurrence (Line 14-17).
Complete a prewritten C++ program for a carpenter who creates personalized house signs. The program is supposed to compute the price of any sign a customer orders, based on the following facts:
The charge for all signs is a minimum of $35.00.
The first five letters or numbers are included in the minimum charge; there is a $4 charge for each additional character.
If the sign is made of oak, add $20.00. No charge is added for pine.
Black or white characters are included in the minimum charge; there is an additional $15 charge for gold-leaf lettering.
Instructions:
Ensure the file named HouseSign.cppis open in the code editor. You need to declare variables for the following, and initialize them where specified:
A variable for the cost of the sign initialized to 0.00 (charge).
A variable for the number of characters initialized to 8 (numChars).
A variable for the color of the characters initialized to "gold" (color).
A variable for the wood type initialized to "oak" (woodType).
Write the rest of the program using assignment statements and ifstatements as appropriate. The output statements are written for you.
Answer:
#include <iostream>
#include <string>
using namespace std;
int main()
{
double charge = 0.00;
int numChars = 8;
string color = "gold";
string woodType = "oak";
if(numChars > 5){
charge += (numChars - 5) * 4;
}
if(woodType == "oak"){
charge += 20;
}
if(color == "gold"){
charge += 15;
}
charge += 35;
cout << "The charge is: $" << charge << endl;
return 0;
}
Explanation:
Include the string library
Initialize the variables as specified
Check if the number of characters is greater than 5 or not. If it is, add 4 to the charge for each character that is greater than 5
Check if the sign is made of oak or not. If it is, add 20 to the charge
Check if the color is gold or not. If it is, add 35 to the charge
Add the minimum cost to the charge
Print the charge
In this exercise we have to use the knowledge of the C++ language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
#include <iostream>
#include <string>
using namespace std;
int main()
{
double charge = 0.00;
int numChars = 8;
string color = "gold";
string woodType = "oak";
if(numChars > 5){
charge += (numChars - 5) * 4;
}
if(woodType == "oak"){
charge += 20;
}
if(color == "gold"){
charge += 15;
}
charge += 35;
cout << "The charge is: $" << charge << endl;
return 0;
}
See more about C++ at brainly.com/question/26104476
If i wanted to change my phones simcard, does anything need transferring, or is it an easy swap?
In this lab, you declare and initialize constants in a C++ program. The program, which is saved in a file named NewAge2.cpp, calculates your age in the year 2050.
Answer:
#include <iostream>
using namespace std;
int main()
{
const int YEAR = 2050;
int currentYear = 2020;
int currentAge = 38;
cout<<"You will be " << currentAge + (YEAR - currentYear) << " years old in " << YEAR;
return 0;
}
Explanation:
Initialize the YEAR as a constant and set it to 2050
Initialize the currentYear as 2020, and currentAge as 38
Calculate and print the age in 2050 (Subtract the currentYear from the YEAR and add it to the currentAge)
The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the network (how many bits/sec it can transport) and the latency (how many seconds it takes for the first bit to get from the client to the server). Give an example of a network that exhibits high bandwidth but also high latency. Also give an example of one that has both low bandwidth and low latency. Justify/explain your answers. (
Answer:
A bandwidth is the maximum rate of transfer of data across a given path
Latency refers to the delay of data to travel or move between a source and destination
An example of a high bandwidth and high latency network is the Satellite Internet connectivity.
An example of a low bandwidth and latency network is the telephone system connection.
Explanation:
Solution
Bandwidth: Bandwidth determines how fast data can be transferred for example, how many bits/sec it can transport.
Latency: It refers to the delay or how long it takes for data to travel between it's source and destination.
An example of a high bandwidth and high latency network is the Satellite internet connection.
Satellite internet connection: This is responsible for the connectivity of several systems, it has a high bandwidth, since satellite are in space, due to distance it has a high latency.
So, satellite internet connection is compensated with high latency and high bandwidth.
An example of a low bandwidth and low latency network is the Telephony network.
Telephone/telephony internet connection: This connection does not have much data for transfer. it has low size audio files of which a low bandwidth range. also for both end or end users to understand and talk to each other, it has low latency.
An example of a network that exhibits high bandwidth but also high latency is Satellite internet connection.
An example of one that has both low bandwidth and low latency is telephony internet connection.
Based on the provided information, we can say that Satellite internet connection posses high bandwidth but also high latency because, the fastness of data transfer is based on the bandwidth and how the data to travel between it's source and destination is based on its latency.
We can conclude that telephony internet connection has low bandwidth and low latency because of low data transfer is required.
Learn more about bandwidth at;
https://brainly.com/question/11408596