Answer:
65
Explanation:
Answer:
65
Explanation:
Consider the following two data structures for storing several million words.
I. An array of words, not in any particular order
II. An array of words, sorted in alphabetical order
Which of the following statements most accurately describes the time needed for operations on these data structures?
A. Finding the first word in alphabetical order is faster in I than in II.
B. Inserting a word is faster in II than in I.
C. Finding a given word is faster in II than in I.
D. Finding the longest word is faster in II than in I.
Answer:
The correct answer is C.
Explanation:
Finding a given word requires the search operation. The search operation is faster in a sorted array compared to an unsorted array. In a sorted array the binary search method is used which runs on logarithmic time while in an unsorted array, there's no other way than linear search which takes O(n) time on the worst case where the required word is not in the array.
The statement which most accurately describes the time needed for operations on these data structures is: C. Finding a given word is faster in II than in I.
What is a binary search?Binary search can be defined as an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data, especially by using the run-time complexity of Ο(log n)
Note: n is the total number of elements.
In Computer science, Binary search typically applies the principles of divide and conquer. Thus, to perform a binary search on an array, the array must first be sorted in an alphabetical or ascending order.
In conclusion, the statement which most accurately describes the time needed for operations on these data structures is that, finding a given word is faster in data structure II than in I.
Read more on data structure here: https://brainly.com/question/24268720
Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a pair containing the minimum and maximum value. Require that the array elements implement the Measurable interface of Section 10.1.2.
Answer:
Explanation:
The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.
public static T minmax(ArrayList<T> mylist) {
T min = new T();
T max = new T();
for (int x = 0; x < mylist.size(); x++) {
if (mylist.get(x) > max) {
max = mylist.get(x);
} else if (mylist.get(x) < min) {
min = mylist.get(x);
}
}
return (min, max);
}
“What is an example of the vocabulary word foreshadow?” This question could be a
a.
Potential question
c.
Flashcards question
b.
Vocabulary definition
d.
Both A and C
Please select the best answer from the choices provided
A
B
C
D
Answer:
D) Both A and C
Explanation:
Answer:
D
Explanation:
explain the different type of shift register counter
Answer:
Shift registers are also used as counters. There are two types of counters based on the type of output from right most D flip-flop is connected to the serial input. Those are Ring counter and Johnson Ring counter.
There are two types of shift register counters. They are given below:
Ring counter.Johnson ring counter. What do you mean by Shift register counter?The shift register counter may be defined as a sequence of a specific number of core registers that are significantly interconnected to one another in order to provide a clock-driven data shift.
A shift register is a set of f FFs that can be connected within the series and the stored data can be moved in the registers sequentially as per the command or instruction is given.
They are also utilized as counters. The type of shift register counter is based on the output from the D flip-flop which is connected to the serial input from the rightmost side.
Therefore, the two types of shift register counters are well mentioned above.
To learn more about Shift register, refer to the link:
https://brainly.com/question/14096550
#SPJ6
What are
the rules for giving
variable name ?
Answer:
Rules for naming variables:
- Variable names in Visual C++ can range from 1 to 255 characters. To make variable names portable to other environments stay within a 1 to 31 character range.
- All variable names must begin with a letter of the alphabet or an underscore ( _ ). For beginning programmers, it may be easier to begin all variable names with a letter of the alphabet.
- After the first initial letter, variable names can also contain letters and numbers. No spaces or special characters, however, are allowed.
- Uppercase characters are distinct from lowercase characters. Using all uppercase letters is used primarily to identify constant variables.
- You cannot use a C++ keyword (reserved word) as a variable name.
While all pages use HTML code, not all pages are written in
Answer:
Code Form
Explanation:
what is a software house
Answer: a company whose primary products are various forms of software, software technology, distribution, and software product development. They make up the software industry.
this should be the answer
hoped this helped
Which of the following will display a string whose address is in the dx register: a.
mov ah, 9h
int 21h
b.
mov ah, 9h
int 22h
c.
mov ah, 0h
int 21h
d.
None of these
e.
mov ah, 2h
int 20h
Answer:
a)
Explanation:
Function 9 of interrupt 21h is display string.
Which option would allow you to watch an HD video, without delays in playback, on a computer with a Mac OS and a connection that has a lower bit rate? MPG QuickTime H.264 Flash Player
Answer:
H.264
Explanation:
A file type can be defined as the standard used to store digital data such as pictures, texts, videos, and audios. They all have unique file extension which determines the type of software program (application) to be used for opening a particular file and accessing its data e.g pictures (jpeg, png), texts (txt, docx, rtf), audios (mp3, acc), and videos (mp4, 3gp, avi, h.264, mkv).
Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.
H.265 is a high efficiency video codec (HEVC) and it's a standard video compression codec designed and developed to offer a better data compression, as an upgrade to the advanced video coding (AVC) standard.
Hence, the option or file extension (format) which would allow you to watch a high definition (HD) video, without delays in playback, on a computer with a Mac operating system (OS) and a connection that has a lower bit rate is the H.264 format.
Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply.
David has the physical strength to lift products on high shelves.
Alessandra analyzes and interprets information she gathered from surveys.
Eve is good at presenting and explaining information to others.
Franklin is a strong leader who is able to motivate others.
Gene is very organized and tracks information accurately and carefully.
Claire is confident and persuasive, which makes her good at selling products.
Answer:
2,3,5
Explanation:
Answer: the answer is 2 3 and 5
Explanation:
Software as a Service (SaaS) allows users to
remotely access which of the following? Check all
of the boxes that apply.
software
data
applications
Answer:
Data software provides the best and most powerful software that allows you in the class
Answer:
software
data
applications
(all)
Explanation:
Which of the following is necessary to appreciate features provided by software applications?
a package
O a basic understanding
O a basis of comparison
O coding concepts
Answer: a basic understanding
Explanation:
In other to appreciate the features that an application has, one must have a basic understanding of what the software is meant to do. That way, when the software does this duty, the person will recognize it and appreciate the software.
For instance, a person who does not understand the basic premise of Quickbooks will not be able to appreciate the various features provided by Quickbooks to make accounting easier for small to medium businesses.
A _______ is one typed character.
-gigabyte
-byte
-megabyte
-kilobyte
-terabyte
What yields 2.5? Type casting
Answer:
5.0/2
Explanation:
I don't do Java, but I do Python. I'm pretty sure the answer to this question is 5.0/2. I'm sorry if I'm wrong.
I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though, we padded the plaintext so that (M ** e) is just barely larger than N. Let's decrypt this: ciphertext. The ciphertext is this. I tried using stack flow and the rsatool on GitHub but nothing seems to work. Do you guys have any idea of what I can do. I need to solve this problem asap
Explanation:
Explanation:
RSA encryption is performed by calculating C=M^e(mod n).
However, if n is much larger than e (as is the case here), and if the message is not too long (i.e. small M), then M^e(mod n) == M^e and therefore M can be found by calculating the e-th root of C.
NEED HELP ASAP! You are looking for information in the online catalog for your local library. Which field would you not expect to see in a library's catalog or database?
A. Author
B. Title
C. Year
D. Phone number
Answer:
The answer is D
Explanation:
What should a valid website have?
Select one:
a. Cited sources, copyright, and a clear purpose
b. Cited sources, copyright, and a poor design
c. Cited sources, copyright, and colorful images
d. Cited sources, no copyright, and a broad purpose
Answer:
A. cites sources,copyright,and a clear purpose
Write a program that lets the user enter the loan amount and loan period in number of years and displays the monthly and total payments for each interest rate starting from 5% to 8%, with an increment of 1/8.
Answer:
Following are the code to this question:
import java.util.*;//import package
public class Main //defining a class
{
public static void main(String[] axc)//main method
{
double Loan_Amount,years,Annual_Interest_Rate=5.0,Monthly_Interest_Rate,Total_Amount,Monthly_Payment;//defining variables
Scanner ax = new Scanner(System.in);//creating Scanner class object
System.out.print("Enter loan amount:");//print message
Loan_Amount = ax.nextDouble();//input Loan_Amount value
System.out.print("Enter number of years: ");//print message
years= ax.nextInt();//input number of years value
System.out.printf(" %-20s%-20s%-20s\n", "Interest Rate", "Monthly Payment","Total Payment");//print message
while (Annual_Interest_Rate <= 8.0) //use while loop to calculate Interest rate table
{
Monthly_Interest_Rate = Annual_Interest_Rate / 1200;//calculating the interest Rate
Monthly_Payment = Loan_Amount * Monthly_Interest_Rate/(1 - 1 / Math.pow(1 + Monthly_Interest_Rate,years * 12));//calculating monthly payment
Total_Amount = Monthly_Payment * years * 12;//calculating yearly Amount
System.out.printf("\t %-19.3f%-19.2f%-19.2f\n", Annual_Interest_Rate,Monthly_Payment,Total_Amount);//use print meethod to print table
Annual_Interest_Rate = Annual_Interest_Rate + 1.0 / 8;//use Annual_Interest_Rate to increating the yearly Rate
}
}
}
Output:
Please find the attached file.
Explanation:
In this code inside the class, several double variables are declared in which the "Loan_Amount and years" is used for input value from the user-end, and another variable is used for calculating the value.
In this code a while loop is declared that checks the "Annual_Interest_Rate" value and creates the interest rate table which is defined in the image file please find it.
State the causes of the increase in carbondioxide
concerntration
Answer:
The right response is "fossil fuels".
Explanation:
Fossil fuels such as coal as well as oil conduct electricity that has already been photosynthesized by vegetation or plant species from the ecosystem for thousands of generations.Within only several hundred years we've returned fuel to that same ecosystem or environment, the sources of CO₂ rise are fossil fuels.However, the above solution is the right one.
Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
Answer:open source
Explanation: what is's called
Linux is the operating systems would allow a user to add functionality and sell or give away their versions.
What is Linux Operating system?Linux has been defined as known to be a kind of an an Operating system which is known to be an open-source. It is one that is compared to Unix-like form of operating system but it is one that is often based on the the use of Linux kernel.
It has been said that to be an operating system kernel that was said to be released in 1991, by Linus Torvalds. Linux is said to be one that is often packaged as a service of a Linux distribution.
Linux has been used in a lot of ways such as the Server OS that is made for web servers, database servers, as well as file servers. They are known to be set up to aid high-volume as well as multithreading applications and also used for a lot of server types.
Therefore, Linux is the operating systems would allow a user to add functionality and sell or give away their versions. Hence, option A is correct.
Learn more about Linux on:
brainly.com/question/12853667
#SPJ2
Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
-Linux
-macOS
-Windows
-UNIX
Me Completan Pliiiis
Answer:
its in Spanish most people cant read Spanish
Explanation:
Bro how the hell do u do full screen on windows
(LAPTOP. NOT PC.)
f11 does not work, does anyone have a solution?
Answer:
You'll need to hold down/click f11 and fn at the same time.
If not that, try ctrl + shift + f5.
I can guarantee the first works; not too sure about the second.
Explanation:
Well, it's hotkeys, so...
EDIT: The f5 command does nothing related to full screen, my bad.
Answer:
f11 should work just hold it down or restart your computer and try it again
Explanation:
my code get an input of 1900 and it should output not a leap year but it fails first line of code. It should output not a Leap any number with 1500 not divisble by 4 with/out a remainder should output (not a leap year. )
input_year = int(input())
if input_year % 4 == 0: #fails on this step, 1900 should be false
print(input_year, "- is Leap Year")
elif input_year % 100 == 0:
print(input_year, "- leap year")
elif input_year % 400 ==0:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
Answer:
Explanation:
The code does not fail on the first step since 1900 divided by 4 is actually 475 and has no remainder, meaning that it should return True. The code won't work because the if statements need to be nested in a different format. The correct algorithm would be the following, which can also be seen in the picture attached below that if we input 1900 it would output is not a leap year as it fails on the division by 400 which gives a remainder of 0.75
input_year = int(input())
if input_year % 4 == 0:
if input_year % 100 == 0:
if input_year % 400 == 0:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
else:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
Which are the 2 main elements that’s make up computer architecture?
Answer:
Explanation:
Computer architecture is made up of two main components the Instruction Set Architecture (ISA) and the RTL model for the CPU.
You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable - age.
Answer:
666
Explanation:
You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable
how to be safe through internet? and what is e safety definition and what are the the rules of e safety pls pls I will give u 74 points lessgooo
Here are the Top 10 Internet safety rules to follow to help you avoid getting into trouble online (and offline).
1. Keep Personal Information Professional and Limited
Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online.
2. Keep Your Privacy Settings On
Marketers love to know all about you, and so do hackers. Both catsometimes(detsometimes hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.
3. Practice Safe Browsing
You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don't even give the hackers a chance.
4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection
When you go online in a public place, .Careful What You Download
A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust
6. Choose Strong Passwords
Passwords are one of the biggest weak spots in the whole Internet security structure, but there's currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as "password" and "123456"), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don't forget etc... .....
follow me entrust
Answer:
안녕
from my opinion don't tell anyone anything about you like be anonymous
and if anyone ask you where u live say earth he /she will think u became angry or for example you said to person 1 ( you stay in England )
but to person 2 ( say to stay in Japan )
but it's good to say nothing about you not even your name or age
I HOPE YOU UNDERSTAND ENGLISH IF NOT I CAN REWRITE IT IN KOREAN
What is the proper order for the fetch-execute cycle?
Control Unit – controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle as follows:
Fetch – gets the next program command from the computer’s memory
Decode – deciphers what the program is telling the computer to do
Execute – carries out the requested action
Store – saves the results to a Register or Memory
Arithmetic Logic Unit (ALU) – performs arithmetic and logical operations
Register – saves the most frequently used instructions and data
QUESTION 1
Which of the following is an example of firewall?
O a. Notepad
b. Bit Defender internet Security
O c. Open Office
O d. Adobe Reader
Write a program that will ask the user for a set of ten numbers. After all ten numbers have been entered, the program will display the largest and smallest numbers of the data set. The program will then prompt the user whether he/she would like to enter another set of data. When the user indicates he/she is finished entering data sets, the program will finally display the average largest number and the average smallest number for all sets entered.
Answer:
In Python:
nums = []
larg= []
small = []
while True:
for i in range(10):
num = int(input(": "))
nums.append(num)
print("Smallest: "+str(min(nums))); print("Largest: "+str(max(nums)))
larg.append(max(nums))
small.append(min(nums))
another = int(input("Press 1 to for another sets: "))
nums.clear()
if not another == 1:
break
print("Average Large: "+str(sum(larg)/len(larg)))
print("Average Small: "+str(sum(small)/len(small)))
Explanation:
This initializes the list of input numbers
nums = []
This initializes the list of largest number of each input set
larg= []
This initializes the list of smallest number of each input set
small = []
This loop is repeated until, it is exited by the user
while True:
The following iteration is repeated 10 times
for i in range(10):
Prompt the user for input
num = int(input(": "))
Add input to list
nums.append(num)
Check and print the smallest using min; Check and print the largest using max;
print("Smallest: "+str(min(nums))); print("Largest: "+str(max(nums)))
Append the largest to larg list
larg.append(max(nums))
Append the smallest to small list
small.append(min(nums))
Prompt the user to enter another set of inputs
another = int(input("Press 1 to for another sets: "))
Clear the input list
nums.clear()
If user inputs anything other than 1, the loop is exited
if not another == 1:
break
Calculate and print the average of the set of large numbers using sum and len
print("Average Large: "+str(sum(larg)/len(larg)))
Calculate and print the average of the set of smallest numbers using sum and len
print("Average Small: "+str(sum(small)/len(small)))
Basic python coding, What is the output of this program? Assume the user enters 2, 5, and 10.
numA = 0
for count in range(3):
answer = input ("Enter a number: ")
fltAnswer = float(answer)
numA = numA + fltAnswer
print (numA)
Thanks in advance!
:L
Answer:
17.0
Explanation:
I ran it for you. You could also try that (go to replit).