You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation has vanished (so that it looks something like itwasthebestoftimes...). You wish to reconstruct the document using a dictionary, which is available in the form of a Boolean function dict(): for any string w, dict(w) = true if w is a valid word false otherwise . (a) Give a dynamic programming algorithm that determines whether the string s[] can be reconstituted as a sequence of valid words. The running time should be at most O(n2), assuming calls to dict take unit time. (b) In the event that the string is valid, make your algorithm output the corresponding sequence of words.

Answers

Answer 1

Answer: provided in the explanation section

Explanation:

Given that:

Assume D(k) =║ true it is [1 : : : k] is valid sequence  words or false otherwise

To determine D(n)

now the sub problem s[1 : : : k] is a valid sequence of words IFF s[1 : : : 1] is a valid sequence of words and s[ 1 + 1 : : : k] is valid word.

So, from here we have that D(k) is given by the following recorance relation:

D(k) = ║ false maximum (d[l]∧DICT(s[1 + 1 : : : k]) otherwise

Algorithm:

Valid sentence (s,k)

D [1 : : : k]             ∦ array of boolean variable.

for a ← 1 to m

do ;

d(0) ← false

for b ← 0 to a - j

for b ← 0 to a - j

do;

if D[b] ∧ DICT s([b + 1 : : : a])

d (a) ← True

(b). Algorithm Output

      if D[k] = = True

stack = temp stack           ∦stack is used to print the strings in order

c = k

while C > 0

stack push (s [w(c)] : : : C] // w(p) is the position in s[1 : : : k] of the valid world at // position c

P = W (p) - 1

output stack

= 0 =

cheers i hope this helps !!!


Related Questions

What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External systems and technology architecture c. Programming language and operating system environment d. ​ Hardware configuration and DBMS’s

Answers

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

The two elements that describe the environment are external systems and technology architecture. Thus, the correct option for this question is B.

What is an Environment?

In computer and technology, the environment may be defined as anything which is present in the surrounding of computer and network connection. It significantly includes various protocols and their characteristics.

According to the environment of the computer, external systems are remarkably assisting in the proper communication, protocols, Security methods, Error detection, and recovery. It creates a supportive environment for the user. Apart from this, it also consists of technology architecture which confirms the process of existing technological perspectives.

Therefore, the two elements that describe the environment are external systems and technology architecture. Thus, the correct option for this question is B.

To learn more about Technology architecture, refer to the link:

https://brainly.com/question/15243421

#SPJ2

Social engineering attacks can be carried out:______.
a. only through physical proximity, such as shoulder surfing.
b. remotely by highly sophisticated means and subject matter experts (SMEs).
c. only for fun, they don't give any useful information to the attacker, except may be by entering a building without an ID or something such.
d. via password cracking software, such as Rainbow trees.

Answers

The answer most likely B NOT SURE )

A MAC Frame format has a Preamble of 7 octet pattern in the form of alternating 1s and 0s used by a receiver to establish synchronization. Use a Manchester Encoding technique to describe the first octet of the signal pattern produced within the Preamble.

Answers

Answer:

The Manchester encoding to describe the first octet pattern signal within the preamble is 10101010

Explanation:.

Solution

Given that:

The first octet value of Preamble is 10101010

The Manchester encoding to outline or describe the first octet of the signal pattern produced or created within the preamble is 10101010

Note: Kindly find an attached image of the first octet signal pattern produced below.

First, define an integer variable and assign it any value of your choice. Then you'll need to perform the following operations with it:
1. Add 9
2. Multiply by 2
3. Subtract 4
4. Divide by 2
5. Subtract by the variable's original value
6. Finally, display what the end result is.
7. Once your math / code is complete, double check your work by seeing what happens with the end result when you use different starting values. You should notice something "interesting".

Answers

Python code:

x=121
x += 9
x *= 2
x -= 4
x >>= 2
x -= 121

An exact solution to the bin packing optimization problem can be found using 0-1 integer programming (IP) see the format on the Wikipedia page.
Write an integer program for each of the following instances of bin packing and solve with the software of your choice. Submit a copy of the code and interpret the results.
a) Six items S = { 4, 4, 4, 6, 6, 6} and bin capacity of 10
b) Five items S = { 20, 10, 15, 10, 5} and bin capacity of 20

Answers

sflpawkfowakfpowja0ifjhnaw0i


What were the first microblogs known as?
OA. tumblelogs
O B. livecasts
OC. wordpower
O D. textcasts

Answers

Answer:

the right answer is A

.....

Answer:

tumblelogs

Explanation:

Return 1 if ptr points to an element within the specified intArray, 0 otherwise.
* Pointing anywhere in the array is fair game, ptr does not have to
* point to the beginning of an element. Check the spec for examples if you are
* confused about what this method is determining.
* size is the size of intArray in number of ints. Can assume size != 0.
* Operators / and % and loops are NOT allowed.
** ALLOWED:
* Pointer operators: *, &
* Binary integer operators: -, +, *, <<, >>, ==, ^
* Unary integer operators: !, ~
* Shorthand operators based on the above: ex. <<=, *=, ++, --, etc.
** DISALLOWED:
* Pointer operators: [] (Array Indexing Operator)
* Binary integer operators: &, &&, |, ||, <, >, !=, /, %
* Unary integer operators: -
*/
int withinArray(int * intArray, int size, int * ptr) {

Answers

Answer:

int withinArray(int * intArray, int size, int * ptr) {

      if(ptr == NULL) // if ptr == NULL return 0

            return 0;

      // if end of intArr is reached

      if(size == 0)

          return 0; // element not found

  else  

          {

            if(*(intArray+size-1) == *(ptr)) // check if (size-1)th element is equal to ptr

                   return 1; // return 1

            return withinArray(intArray, size-1,ptr); // recursively call the function with size-1 elements

         }

}

Explanation:

Above is the completion of the program.

What are some ways technology has changed the way people live

Answers

Answer:

Multiple ways.

Explanation:

Here are some examples. Modern people relay on technology alot! It shapes our lives. Like now you can order something without moving from you place using your smartphone. When you need a spare part for a lego for example you can now just 3D print it without buying another one. See plenty of ways. Looks around you and find more examples.

The goal of this milestone is to identify the objects needed for the UNO card game and the actions that those objects perform, rather than how the objects are actually represented. For example, a standard UNO card must be able to report both its color and value, and, when given another card, tell whether or not it is a "match." When specifying operations, think simplicity. "It's better to have a few, simple operations that can be combined in powerful ways, rather than lots of complex operations." (MIT, n.d.) 1. Review the rubric for this assignment before beginning work. Be sure you are familiar with the criteria for successful completion. The rubric link can be found in LoudCloud under the assignment. 2. Activity Directions: Prepare a document that includes an ADT (abstract data type) for each object needed in your program. Create a LOOM video in which you explain your class design. Discuss your selection of properties and methods for each object.

Answers

Answer:

public class UNOCard {

  //class variables

  int value; //stores value of the card.

  String color; //stores color of the card

  //method returns value of the card

  public int getValue() {

      return value;

  }

 

  //method sets the value of the card to the passed argument

  public void setValue(int value) {

      this.value = value;

  }

 

  //method returns color of the card

  public String getColor() {

      return color;

  }

 

  //method sets the color of the card to the passed argument

  public void setColor(String color) {

      this.color = color;

  }

 

  //constructor

  UnoCard(int value, String color)

  {

      setValue(value);

      setColor(color);

  }

 

  //mrthod to compare if cards are equal or not

  public boolean isMatch(UnoCard card)

  {

      if(this.getColor() == card.getColor() || this.getValue() == card.getValue())

          return true;

     

      return false;

  }

}

public class UnoCardTest {

  public static void main(String[] args) {

     

      UnoCard card1 = new UnoCard(10, "Red");

      UnoCard card2 = new UnoCard(10, "Black");

      UnoCard card3 = new UnoCard(9, "Black");

     

      System.out.println("Card-1: Value: " + card1.getValue() +"\tColor: " + card1.getColor());

      System.out.println("Card-2: Value: " + card2.getValue() +"\tColor: " + card2.getColor());

      System.out.println("Card-3: Value: " + card3.getValue() +"\tColor: " + card3.getColor());

     

     

      System.out.println("\n\nMatching card-1 with card-2: " +card1.isMatch(card2));

      System.out.println("Matching card-1 with card-3: " +card1.isMatch(card3));

     

  }

}

Explanation:

the discussion of the selection of properties and methods can be seen along with code.

is co2+4h2--> ch4 + 2h2o a combustion​

Answers

Answer:

No its not a combustion its a formation.

Explanation:

Find the error in the following pseudocode.
Module main()
Declare Real mileage
Call getMileage()
Display "You've driven a total of ", mileage, " miles."
End Module
Module getMileage()
Display "Enter your vehicle’s mileage."
Input mileage
End Module

Answers

Answer:

Following are the error in the given program are explain in the explanation part .

Explanation:

The main() function call the function getMileage() function after that the control moves to the getMileage() definition of function. In this firstly declared the  "mileage" variable after that it taking the input and module is finished we see that the "mileage" variable is local variable i,e it is declared inside the  " Module getMileage() "  and we prints in the main module that are not possible to correct these we used two technique.

Technique 1: Declared the mileage variable as the global variable that is accessible anywhere in the program.

Technique 2: We print the value of  "mileage" inside the Module getMileage() in the program .

Given an integer n and an array a of length n, your task is to apply the following mutation to an: Array a mutates into a new array b of length n.

For each i from 0 to n - 1, b[i] = a[i - 1] + a[i] + a[i + 1].
If some element in the sum a[i - 1] + a[i] + a[i + 1] does not exist, it should be set to 0. For example, b[0] should be equal to 0 + a[0] + a[1].

Answers

Answer: provided in the explanation section

Explanation:

import java.util.*;

class Mutation {

public static int[] mutateTheArray(int n , int[] a)

{

int []b = new int[n];

for(int i=0;i<n;i++)

{

b[i]=0;

if(((i-1)>=0)&&((i-1)<n))

b[i]+=a[i-1];

if(((i)>=0)&&((i)<n))

b[i]+=a[i];

if(((i+1)>=0)&&((i+1)<n))

b[i]+=a[i+1];

}

return b;

}

  public static void main (String[] args) {

      Scanner sc = new Scanner(System.in);

      int n= sc.nextInt();

      int []a = new int [n];

     

      for(int i=0;i<n;i++)

      a[i]=sc.nextInt();

     

      int []b = mutateTheArray(n,a);

for(int i=0;i<n;i++)

      System.out.print(b[i]+" ");

     

 

     

  }

}

cheers i hope this helped !!

The program is an illustration of loops and conditional statements.

Loops are used to perform repetitive operations, while conditional statements are statements whose execution depends on the truth value.

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

class Main {

   public static void main (String[] args) {

       //This creates a scanner object

       Scanner input = new Scanner(System.in);

       //This gets input for n

       int n= input.nextInt();

       //This declares array a

       int []a = new int [n];

       //The following loop gets input for array a

       for(int i=0;i<n;i++){

           a[i]=sc.nextInt();

       }

       //This declares array b

       int []b = new int [n];

       //The following loop mutates array a to b

       for(int i=0;i<n;i++){

           b[i]=0;

           if(((i-1)>=0)&&((i-1)<n)){

               b[i]+=a[i-1];

           }

           if(((i)>=0)&&((i)<n)){

               b[i]+=a[i];

           }

           if(((i+1)>=0)&&((i+1)<n)){

               b[i]+=a[i+1];

           }

       }

       //The following loop prints the mutated array b

       for(int i=0;i<n;i++){

       System.out.print(b[i]+" ");

       }

 }

}

At the end of the program, the elements of the mutated array b, are printed on the same line (separated by space).

Read more about similar programs at:

https://brainly.com/question/17478617

as a programmer,why do you think that skills and training are needed. give 5 reasons

Answers

Answer:

bc

1 without them you wouldn't be able to program

2 need for job interviews

3 important to be good and make the money

4 can be adaptable

5 easy to move from a business to another

Write a program that prompts the user to enter three cities and displays them in ascending order. Here is a sample run: Enter the first city: Chicago Enter the second city: Los Angeles Enter the third city: Atlanta The three cities in alphabetical order are Atlanta Chicago Los Angeles

Answers

Answer:

import java.util.Scanner;

public class SortStrings3 {

   public static void main(String args[]){

       Scanner scanner = new Scanner(System.in);

       String str1, str2, str3;

       System.out.print("Enter the first city: ");

       str1 = scanner.nextLine();

       System.out.print("Enter the second city: ");

       str2 = scanner.nextLine();

       System.out.print("Enter the third city: ");

       str3 = scanner.nextLine();

       System.out.print("The three cities in alphabetical order are ");

       if(str1.compareTo(str2) < 0 && str1.compareTo(str3) < 0){

           System.out.print(str1+" ");

           if(str2.compareTo(str3) < 0){

               System.out.print(str2+" ");

               System.out.println(str3);

           }

           else {

               System.out.print(str3+" ");

               System.out.println(str2);

           }

       }

       else if(str2.compareTo(str1) < 0 && str2.compareTo(str3) < 0){

           System.out.print(str2+" ");

           if(str1.compareTo(str3) < 0){

               System.out.print(str1+" ");

               System.out.println(str3);

           }

           else {

               System.out.print(str3+" ");

               System.out.println(str1);

           }

       }

       else{

           System.out.print(str3+" ");

           if(str1.compareTo(str2) < 0){

               System.out.print(str1+" ");

               System.out.println(str2);

           }

           else {

               System.out.print(str2+" ");

               System.out.println(str1);

           }

       }

   }

}

EXPLANATION:

Okay, we are given that a program should be written which will make user to enter three cities namely Atlanta, Chicago and Los Angeles (which should be done in ascending  alphabetical order).

So, we will be writting the code or program with a programming language known as JAVA(JUST ANOTHER VIRTUAL ACCELERATOR).

We will make use of java to write this program because Java can be used in Loading code, verifying codes and executing codes on a single or multiple servers.

The code or program can be seen in the attached file/document. Kindly check it.

Design and implement a programming (name it SimpleMath) that reads two floating-point numbers (say R and T) and prints out their values, sum, difference, and product on separate lines with proper labels. Comment your code properly and format the outputs following these sample runs.Sample run 1:R = 4.0T = 20.0R + T = 24.0R - T = -16.0R * T = 80.0Sample run 2:R = 20.0T = 10.0R + T = 30.0R - T = 10.0R * T = 200.0Sample run 3:R = -20.0T = -10.0R + T = -30.0R - T = -10.0R * T = 200.0

Answers

Answer:

import java.util.Scanner; public class Main {    public static void main(String[] args) {        // Create a Scanner object to get user input        Scanner input = new Scanner(System.in);                // Prompt user to input first number        System.out.print("Input first number: ");        double R = input.nextDouble();        // Prompt user to input first number        System.out.print("Input second number: ");        double T = input.nextDouble();                // Display R and T          System.out.println("R = " + R);        System.out.println("T = " + T);        // Display Sum of R and T        System.out.println("R + T = " + (R + T));        // Display Difference between R and T        System.out.println("R - T = " + (R - T));        // Display Product of R and T        System.out.println("R * T = " + (R * T));    } }

Explanation:

The solution code is written in Java.

Firstly, create a Scanner object to get user input (Line 7). Next we use nextDouble method from Scanner object to get user first and second floating-point number (Line 9-15).

Next, display R and T and result of their summation, difference and product (Line 18-28).

The difrent between valid deductive argument and strong inductive argument? At least 2 example​

Answers

Answer:

If the arguer believes that the truth of the premises definitely establishes the truth of the conclusion, then the argument is deductive. If the arguer believes that the truth of the premises provides only good reasons to believe the conclusion is probably true, then the argument is inductive.

ALSO

Deductive arguments have unassailable conclusions assuming all the premises are true, but inductive arguments simply have some measure of probability that the argument is true—based on the strength of the argument and the evidence to support it.

Explanation:

Finish and test the following two functions append and merge in the skeleton file:
(1) function int* append(int*,int,int*,int); which accepts two dynamic arrays and return a new array by appending the second array to the first array.
(2) function int* merge(int*,int,int*,int); which accepts two sorted arrays and returns a new merged sorted array.
#include
using namespace std;
int* append(int*,int,int*,int);
int* merge(int*,int,int*,int);
void print(int*,int);
int main()
{ int a[] = {11,33,55,77,99};
int b[] = {22,44,66,88};
print(a,5);
print(b,4);
int* c = append(a,5,b,4); // c points to the appended array=
print(c,9);
int* d = merge(a,5,b,4);
print(d,9);
}
void print(int* a, int n)
{ cout << "{" << a[0];
for (int i=1; i cout << "," << a[i];
cout << "}\n"; }
int* append(int* a, int m, int* b, int n)
{
// wru=ite your codes in the text fields
}
int* merge(int* a, int m, int* b, int n)
{
// wru=ite your codes in the text fields
}

Answers

Answer:

Explanation:

#include <iostream>

using namespace std;

int* append(int*,int,int*,int);

int* merge(int*,int,int*,int);

void print(int*,int);

int main()

{ int a[] = {11,33,55,77,99};

int b[] = {22,44,66,88};

print(a,5);

print(b,4);

int* c = append(a,5,b,4); // c points to the appended array=

print(c,9);

int* d = merge(a,5,b,4);

print(d,9);

}

void print(int* a, int n)

{ cout << "{" << a[0];

for (int i=1; i<n; i++)

cout << "," << a[i];

cout << "}\n";

}

int* append(int* a, int m, int* b, int n)

{

int * p= (int *)malloc(sizeof(int)*(m+n));

int i,index=0;

for(i=0;i<m;i++)

p[index++]=a[i];

for(i=0;i<n;i++)

p[index++]=b[i];

return p;

}

int* merge(int* a, int m, int* b, int n)

{

int i, j, k;

j = k = 0;

int *mergeRes = (int *)malloc(sizeof(int)*(m+n));

for (i = 0; i < m + n;) {

if (j < m && k < n) {

if (a[j] < b[k]) {

mergeRes[i] = a[j];

j++;

}

else {

mergeRes[i] = b[k];

k++;

}

i++;

}

// copying remaining elements from the b

else if (j == m) {

for (; i < m + n;) {

mergeRes[i] = b[k];

k++;

i++;

}

}

// copying remaining elements from the a

else {

for (; i < m + n;) {

mergeRes[i] = a[j];

j++;

i++;

}

}

}

return mergeRes;

}

Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states in the same way and are continuously blocked. This condition is called

Answers

Answer:

livelock.

Explanation:

"Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states in the same way and are continuously blocked. This condition is called" LIVELOCK.

The term ''livelock" in is a very good and a very important in aspect that is related to computing. LIVELOCK simply means a lock in which the process in denied multiple times. A perfect example is;

When a person A and a person meet on a very narrow path. Both person A and Person B will want to shift to a position which will allow each of them to pass(This are the processes Person A and B wants to take), so if the two now move to the same exact position instead of moving in an opposite direction then, we will say that we have a LIVELOCK.

when searching fora an image on your computer, you should look for a file with what extensions

Answers

Answer:png, jpeg, jpg, hevc, raw, bmp, png, webp

Explanation:

Just look for all the Image file formats

Given a set, weights, and an integer desired_weight, remove the element of the set that is closest to desired_weight (the closest element can be less than, equal to OR GREATER THAN desired_weight), and associate it with the variable actual_weight. For example, if weights is (12, 19, 6, 14, 22, 7) and desired_weight is 18, then the resulting set would be (12, 6, 14, 22, 7) and actual_weight would be 19. If there is a tie, the element LESS THANdesired_weight is to be chosen. Thus if the set is (2, 4, 6, 8, 10) and desired_weight is 7, the value chosen would be 6, not 8. Assume there is at least one value in the set.

Answers

Answer:

In the question stated a we declared a set named as weights also an integer variable was the desired_weight

In python A set is regarded as  {12, 19, 6, 14, 22, 7}

Explanation:

Solution

The python program code is executed below:

# Declare a tuple

weights = (12, 19, 6, 14, 22, 7)

# Declare an integer variable to store desired weight.

desired_weight = 18

# Declare an integer variable to store actual_weight weight

actual_weight = weights[0]

# Create a for-loop to read each value in the tuple.

for each_weight in weights:

   # Create an if-statement to find the that is

   # closest weight but not greater than desired weight.

   if(each_weight > actual_weight and each_weight < desired_weight):

       actual_weight = each_weight

weights=list(weights)

# Delete the actual weight

weights.remove(actual_weight)

weights=tuple(weights)

# Display the actual weight

print("Actual Weight:",actual_weight)

# Display the resulted tuple.

print("Resulted set:",weights)

This program here is to declare a set which is as follows:

# Declare a set

weights = {12, 19, 6, 14, 22, 7}

# Declare an integer variable to store desired weight.

desired_weight = 18

# Declare an integer variable to store actual weight

# Assign first index element using list.

actual_weight = list(weights)[0]

# Create a for-loop to read each value in the tuple.

for each_weight in weights:

   # Create an if-statement to find the that is

   # closest weight but not greater than desired weight.

   if(each_weight > actual_weight and each_weight < desired_weight):

       actual_weight = each_weight

# Delete the actual weight using discard() method.

weights.discard(actual_weight)

# Display the actual weight

print("Actual Weight:",actual_weight)

# Display the resulted tuple.

print("Resulted set:",weights)

Write in Java please
Description
There is a cricket that lives by our timeshare in Myrtle Beach, South Carolina. Most every night I hear it patiently chirping away. Some nights it chirps faster than others, and it seems like the warmer it is, the faster it chirps. There are many crickets, and each of them seems to behave the same. On several different nights, armed with a stopwatch and a thermometer, I recorded the frequency of the chirps and compared it to that night's air temperature.
Experimental Results
The chirping follows a simple linear formula: take the number of chirps, add 40 and divide that sum by four to get the temperature in degrees Fahrenheit.
Assignment
Create a simulation to model the crickets chirping at various randomly generated frequencies, create an Environmentclass that knows and can return the current temperature. Create a Cricket class that chirps, or for simplicity, returns how many chirps per minute the cricket would make at that temperature. Repeat the simulation for at least three trials.
Extension: There is a cricket variety in some parts of South Carolina that is a little slower than most normal Carolina crickets. Add a ClemsonCricket class that extends Cricket but chirps slower by 20%.
Bonus: Implement polymorphism in the driver class.
Rubrics
Cricket class should include the following items:
A variable that stores the frequency of chirps.
A default constructor that initializes the frequency to a random value
An overloaded constructor that initializes the frequency to a value of your choice that gets passed on as a parameter.
A method for changing the frequency to a random value.
A getter method that returns the frequency.
clemsonCricket class should include the following items:
A default constructor that initializes the frequency to a random value that is 20% lower than what the parent class constructor would initialize it to.
A overloaded constructor that calls to the parent constructor.
A polymorphic method that changes the frequency value to a value that is 20% lower than what the parent method would change it to.
Environment class should include the following items:
A variable that stores the temperature.
A default constructor that initializes the temperature to a value of your choosing.
An overloaded constructor that initializes the temperature based on the formula in the assignment.
A method that takes in a frequency as a parameter and calculates the temperature based on the formula in the assignment.
testCrickets program should do the following items:
Creates an Environment object in the test program or in the Cricket or clemsonCricket classes and displays temperature Creates a cricket object and displays temperature before and after changing frequency
Creates a Clemson cricket object and displays temperature before and after changing frequency
Creates a polymorphic Clemson cricket object and displays temperature before and after changing frequency.

Answers

Answer: Provided in the section below

Explanation:

Using C# Code:

using System;

class Environment{

//temperature

private double temp;

//sets initial value of temp to 100 Fahrenheits

public Environment(){

temp=100;

}

//sets initial value to given temp

public Environment(double t) {

this.temp = t;

}

//returns temp

public double getTemp(){

return temp;

}

//calculates temp at given frequency

public void calcTemperature(double frequency){

temp=(frequency+40)/4.0;

}

}

class Cricket{

private Random r=new Random();

//frequency of birds

protected double frequency;

//sets frequency to a random value between 0-100

public Cricket(){

 

frequency=r.NextDouble()*100;

}

//sets frequency to a given frequency

public Cricket(double f) {

frequency = f;

}

//returns the frequency

public double getFrequency() {

return frequency;

}

//randomize the frequency

public virtual void randomFrequency() {

frequency = r.NextDouble()*100;

}

}

class ClemsonCricket: Cricket{

//sets the frequency to 80% of the parent's

public ClemsonCricket(): base(){

frequency=frequency*0.8;

}

//sets frequency to a given frequency

public ClemsonCricket(double f): base(f){}

//randomize frequency and sets it to 80% of the parent's

public override void randomFrequency(){

base.randomFrequency();

frequency=frequency*0.8;

}

}

public class testCrickets {

static void Main(){

Environment env=new Environment();

Console.WriteLine("Initial Temp: "+env.getTemp());

Cricket cricket=new Cricket();

env.calcTemperature(cricket.getFrequency());

Console.WriteLine(String.Format("Temp before changing Frequency: {0:0.00}",env.getTemp()));

cricket.randomFrequency();

env.calcTemperature(cricket.getFrequency());

Console.WriteLine(String.Format("\nTemp after changing Freqency: {0:0.00}",env.getTemp()));

Console.WriteLine("\nClemson Cricket: ");

ClemsonCricket clemsonCricket=new ClemsonCricket();

env.calcTemperature(clemsonCricket.getFrequency());

Console.WriteLine(String.Format("Temp before changing Frequency: {0:0.00}",env.getTemp()));

clemsonCricket.randomFrequency();

env.calcTemperature(clemsonCricket.getFrequency());

Console.WriteLine(String.Format("\nTemp after changing Freqency: {0:0.00}" ,env.getTemp()));

Console.WriteLine("\nPolymorphism Clemson Cricket: ");

Cricket Ccricket=new ClemsonCricket();

env.calcTemperature(Ccricket.getFrequency());

Console.WriteLine(String.Format("Temp before changing Frequency: {0:0.00}",env.getTemp()));

Ccricket.randomFrequency();

env.calcTemperature(Ccricket.getFrequency());

Console.WriteLine(String.Format("\nTemp after changing Freqency: {0:0.00}",env.getTemp()));

}

}

cheers i hope this helped !!

(TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If the message sent to the server is REJECT, this means _____.

Answers

Answer:

The correct answer to the following question will be "The user is prompted to retry".

Explanation:

NAS seems to be a category of server system a broader open internet as well as web through in-house and perhaps remotely associated user groups.

It handles as well as provides linked consumers the opportunity to provide a collection of network-enabled applications collectively, thereby integrated into a single base station but rather portal to infrastructure.Unless the text or response sent to the server seems to be REJECT, this implies that the authentication process continued to fail and therefore should be retried.

Canadian Tire is one of Canada’s largest companies. They operate four large distribution centers service over 470 tire retail outlets. They recently installed a Yard Management System (YMS), which they have integrated with their Warehouse Management Systems (WMS) and Transport Management System (TMS) systems. Their expectation was improved performance in over-the-road transportation equipment utilization, driver productivity, and warehouse dock/door utilization. As a relatively new logistics employee, you have been asked to develop an evaluation system to measure operational productivity improvement. While management does not want a financial impact evaluation, they are interested in developing benchmarks to measure initial and sustainable productivity improvement. You have the job-how would you proceed?

Answers

Answer: Provided in the explanation section

Explanation:

A YMS acts an interface between a WMS and TMS.The evaluation system with the key performance indicators are mentioned in the table below.

NOTE: The analysis follows in this order given below

MetricDescriptionComments

Metric 1

Trailer utilization

Description :This captures the status of the trailer whether it is in the yard or is in transit

Comments : Helps in measuring the trailer productivity on a daily ,weekly or monthly basis

Metric 2

Driver utilization

Description : This captures the status of the driver whether the driver is in the yard or is in transit

Comments : Helps in measuring the driver productivity on a periodic basis

Metric 3

Trailer sequence

Description : This captures the order of movement of trailers in the yard on a given day, week or month

Comments : Helps in measuring the order fulfilment efficiency i.e. whether the priority orders have been serviced first or not

Metric 4

Total time in yard

Description : This captures the time spent by the trailer in the yard from the time it enters and leaves the yard

Comments : This helps in measuring the time taken to fulfill a particular request

⇒ Capturing these metrics need inputs from both WMS and TMS, and also the trailers need to have RFID tags attached to them.Then compare these performance metrics with the ones prior to the deployment of YMS to identify the percent gains in the overall operational productivity.

cheers i hope this helped !!

Given the macro definition and global declarations shown in the image below, provide answers to the following questions:
A. After the statement "quiz4 x,4" executes, x contains
B. The statement "quiz4 6,4" will produce an error when the macro is invoked. (Enter true or false)
C. Suppose that the following code executes:
mov ebx, 3
mov ecx, 12
mov edx, ecx
quiz4 ecx, ebx
Upon completion, edx will contain_______
Hint: Think carefully, part C may be more difficult than it seems.
quiz4 MACRO p,q
LOCAL here
push eax
push ecx
mov eax, p
mov ecx, q
here: mul P
loop here
mov p, eax
pop ecx
pop eax
ENDM .
data
x DWORD 3
y DWORD 3

Answers

Answer:

A. 243

B. True

C. 0

Explanation:

Macro instruction is a line of coding used in computer programming. The line coding results in one or more coding in computer program and sets variable for using other statements. Macros allows to reuse code. Macro has two parts beginning and end. After the execution of statement of quiz4 x, 4 the macro x will contain 243. When the macro is invoked the statement will result in an error. When the macro codes are executed the edx will contain 0. Edx serve as a macro assembler.

A security professional wants to test a piece of malware that was isolated on a user's computer to document its effect on a system. Which of the following is the FIRST step the security professional should take?
A. Create a sandbox on the machine.
B. Open the file and run it.
C. Create a secure baseline of the system state.
D. Hardon the machine

Answers

Answer:

The correct answer is option (A) Create a sandbox on the machine

Explanation:

Solution

From the example given, the first step the security professional should take is to create a sandbox on the machine.

Sandbox: It  refers to as a remote testing environment that allows users to run programs or implement files without distorting the application, system or platform on which they run.

In areas of computer security a sandbox is a security technique used for separating running programs, normally in an effort to reduce system failures or software vulnerabilities from moving further.

2 x + y for x = 1 and y = 1​

Answers

Answer:

3

Explanation:

2*1+1

2+1

hope this helps

In this scenario, two friends are eating dinner at a restaurant. The bill comes in the amount of 47.28 dollars. The friends decide to split the bill evenly between them, after adding 15% tip for the service. Calculate the tip, the total amount to pay, and each friend's share, then output a message saying "Each person needs to pay: " followed by the resulting number.

Answers

Answer:

The java program for the given scenario is as follows.

import java.util.*;

import java.lang.*;

public class Main

{

   //variables for bill and tip declared and initialized

   static double bill=47.28, tip=0.15;

   //variables for total bill and share declared

   static double total, share1;

public static void main(String[] args) {

    double total_tip= (bill*tip);

    //total bill computed

    total = bill + total_tip;

    //share of each friend computed

    share1 = total/2;

    System.out.printf("Each person needs to pay: $%.2f", share1);  

}

}

Explanation:

1. The variables to hold the bill and tip percent are declared as double and initialized with the given values.

static double bill=47.28, tip=0.15;

2. The variables to hold the values of total bill amount and total tip are declared as double.

3. All the variables are declared outside main() and at class level, hence declared as static.

4. Inside main(), the values of total tip, total bill and share of each person are computed as shown.

double total_tip= (bill*tip);

total = bill + total_tip;

share1 = total/2;

5. The share of each person is displayed to the user. The value is displayed with only two decimal places which is assured by %.2f format modifier. The number of decimal places required can be changed by changing the number, i.e. 2. This format is used with printf() and not with println() method.

System.out.printf("Each person needs to pay: $%.2f", share1);  

6. The program is not designed to take any user input.

7. The program can be tested for any value of bill and tip percent.

8. The whole code is put inside a class since java is a purely object-oriented language.

9. Only variables can be declared outside method, the logic is put inside a method in a purely object-oriented language.

10. As shown, the logic is put inside the main() method and only variables are declared outside the method.

11. Due to simplicity, the program consists of only one class.

12. The output is attached.

Answer:

bill =  47.28

tip = bill *.15

total = bill + tip

share = total

print( "Each person needs to pay: "+str(share) )

Explanation:

Given parameters b and h which stand for the base and the height of an isosceles triangle (i.e., a triangle that has two equal sides), write a C program that calculates: The area of the triangle; The perimeter of the triangle; And The volume of the cone formed by spinning the triangle around the line h The program must prompt the user to enter b and h (both of type double) The program must define and use the following three functions: Calc Area (base, height) //calculates and returns the area of the triangle Calc Perimeter (base, height) //calculates and returns the perimeter Calc Volume(base, height) //calculates and returns the volume

Answers

Answer:

The area of the triangle is calculated as thus:

[tex]Area = 0.5 * b * h[/tex]

To calculate the perimeter of the triangle, the measurement of the slant height has to be derived;

Let s represent the slant height;

Dividing the triangle into 2 gives a right angled triangle;

The slant height, s is calculated using Pythagoras theorem as thus

[tex]s = \sqrt{b^2 + h^2}[/tex]

The perimeter of the triangle is then calculated as thus;

[tex]Perimeter = s + s + b[/tex]

[tex]Perimeter = \sqrt{b^2 + h^2} + \sqrt{b^2 + h^2} +b[/tex]

[tex]Perimeter = 2\sqrt{b^2 + h^2} + b[/tex]

For the volume of the cone,

when the triangle is spin, the base of the triangle forms the diameter of the cone;

[tex]Volume = \frac{1}{3} \pi * r^2 * h[/tex]

Where [tex]r = \frac{1}{2} * diameter[/tex]

So, [tex]r = \frac{1}{2}b[/tex]

So, [tex]Volume = \frac{1}{3} \pi * (\frac{b}{2})^2 * h[/tex]

Base on the above illustrations, the program is as follows;

#include<iostream>

#include<cmath>

using namespace std;

void CalcArea(double b, double h)

{

//Calculate Area

double Area = 0.5 * b * h;

//Print Area

cout<<"Area = "<<Area<<endl;

}

void CalcPerimeter(double b, double h)

{

//Calculate Perimeter

double Perimeter = 2 * sqrt(pow(h,2)+pow((0.5 * b),2)) + b;

//Print Perimeter

cout<<"Perimeter = "<<Perimeter<<endl;

}

void CalcVolume(double b, double h)

{

//Calculate Volume

double Volume = (1.0/3.0) * (22.0/7.0) * pow((0.5 * b),2) * h;

//Print Volume

cout<<"Volume = "<<Volume<<endl;

}

int main()

{

double b, h;

//Prompt User for input

cout<<"Base: ";

cin>>b;

cout<<"Height: ";

cin>>h;

//Call CalcVolume function

CalcVolume(b,h);

//Call CalcArea function

CalcArea(b,h);

//Call CalcPerimeter function

CalcPerimeter(b,h);

 

return 0;

}

building relationship during your carrer exploration is called

Answers

Answer:

Building relationships during your career exploration is called networking.

1. What are the first tasks the Team Leader (TL) must perform after arriving at the staging area?
O A. Assign volunteers to specific positions and prioritize response activities.
OB. Gather and document information about the incident.
O C. Take the team to the most pressing need.
O D. Communicate with emergency responders to let them know the CERT is in place.

Answers

A. Assign volunteers to specific positions and prioritize response activities.
Other Questions
-3.Posttest 13:Economic Challenges- What is the difference between seasonal unemployment and structural unemployment?Seasonal unemployment is generally among low-paid workers, while structural unemployment is among the highly paid.Seasonal unemployment is rare in a modern society, while structural unemployment is not.Seasonal unemployment occurs only in the summer, while structural unemployment can occur all year round.Seasonal unemployment is due to changes in production schedules; structural unemployment is because people lack skills. x+3.8=5.73 what does x equal The length of one leg of a right triangle is 7 cm more than that of the other leg. The length of the hypotenuse is 3 cm more than double that of the shorter leg. Find the lengthzs of each of the three sides. How did Portugal location contribute to its exploration in the 15 century six times the sum of nine and a number .Write a story about someone who lost every thing while he was helping other people. A popular cellular telephone provider offers its customers the following data plan: the first 4 gigabytes of data cost $10 each, and each additional gigabyte of data costs $20. Suppose the typical consumer has $100 to spend on gigabytes of data (D) or chocolate bars (C) which cost $1 each. Required:a. How many gigs of data is the typical customer likely to use?b. Does your answer depend critically on the steepness or flatness of the typical customers indifference curves? Explain. Explain how to find the other leg if the hypotenuse is 25cm and one leg measures 7 cm. Work must be shown for this problem! The figure shown below is a rectangle. Give the angle value (numerical, not the letters). 20% of the people in a community use the emergency room at in one year,find the probability that at most three used the emergency room for a sample of 10 people What is 75/2\3 for my math homework (a) What does "The more that flame is covered up, the hotter it burns" mean? ANALYZE (b) What effect does the author create by comparing love to a fire? [Pyramus and Thisbe by Ovid, retold by Edith Hamilton] A direct result of the Battle of Fort Sumter was thatD. Lincoln only asked Northern states to supply troops.C. Confederate states refused to send troops to the US Army.B. Six additional states seceded from the Union.A. Lincoln called for volunteers for the US Navy plzzzzzz The first free elections in Argentina were held in 1980 1983 1986 1989 pls help :) What each thing led to it What role each played in the 1920s Its long term impact over the decade and in the years that followed 1.Prohibition 2.Beginnings of advertising industry 3.Radio programs in the 1920s 4.Jazz 5.Harlem Renaissance Read each phrase about the Catholic Church and decide if it most describes the church before or after the Councilof TrentCatholic teachings questionedBefore the Council of TrentAfter the Council of TrentNew religious orders createdCompromises made with ProtestantsCorruption present in the churchSpread of Catholicism encouragedCompromises rejectedCatholic beliefs renewed Read each sentence and decide what type if figurative language it contains. S for Simile. M for Metaphor. H for Hyperbole. P for Personification.1. Silence hung in the air like a thick fog.2. I'm so hungry, I could eat a horse!3. Ian's tiny hands were like miniature starfish on his mama's arms.4. The raindrops ran cheerfully down the window.5. The school was a complete zoo on the last day of class before vacation.6. This headache has been a bear all morning.7. The welcoming arms of Rodney's sleeping bag reached out to him as he sleepily crawled inside.8. My computer has been cranky and uncooperative all morning, so I haven't accomplished much.9. Hail bounced against the roof like thousands of tiny footsteps.10. Grandpa Harry worked his fingers to the bone for years. What is the greatest common factor of 8m, 36m3, and 12? A.4 B.8 C.4m D.8m Solve the equation using square roots.[tex]4x^{2} +9=0[/tex] hi please help this question is based on what you thinkDoes luck play a roll in evolution ? EXPLAIN WELL.