Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, construct the heap data structure from the array A above. Represent your heap in the array A as well as using a binary tree. Clearly show all the steps c) Show how heap sort work in the heap you have constructed in part (b) above. Clearly show all the step in the heap sort

Answers

Answer 1

Answer:

Sorted Array A { } = { 1, 4, 23, 32, 34, 34, 67, 78, 89, 100 }

Explanation:

Binary tree is drawn given that the binary tree do not follow both minimum heap and maximum heap property, therefore, it is not a heap.

See attached picture.

Array A Is Not A Heap. Clearly Explain Why Does Above Tree Not A Heap? B) Using Build Heap Procedure
Array A Is Not A Heap. Clearly Explain Why Does Above Tree Not A Heap? B) Using Build Heap Procedure

Related Questions

Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to print two random integers between (and including) 0 and 9. End with a newline. Ex: 5 7 Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, after calling srand() once, do not call srand() again. (Notes)
GIVEN:
#include
#include // Enables use of rand()
#include // Enables use of time()
int main(void) {
int seedVal = 0;
/* Your solution goes here */
return 0;
}
2). Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline. Ex:
101
133
Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, srand() has already been called; do not call srand() again.
GIVEN:
#include
#include // Enables use of rand()
#include // Enables use of time()
int main(void) {
int seedVal = 0;
seedVal = 4;
srand(seedVal);
/* Your solution goes here */
return 0;
}

Answers

Answer:

1. The solution to question 1 is as follows;

srand(seedVal);

cout<<rand()%10<<endl;

cout<<rand()%10<<endl;

2. The solution to question 2 is as follows

cout<<100+rand()%50 <<endl;

cout<<100+rand()%50 <<endl;

Explanation:

The general syntax to generate random number between interval is

Random Number = Lower Limit + rand() % (Upper Limit - Lower Limit + 1)

In 1;

The solution starts by calling srand(seedVal);

The next two statements is explained as follows

To print two random integers between intervals of 0 and 9 using rand()"

Here, the lower limit = 0

the upper limit =  9

By substituting these values in the formula above; the random number will be generated as thus;

Random Number = 0 + rand() % (9 - 0 + 1)

Random Number = 0 + rand() % (10)

Random Number = rand() % (10)

So, the instruction to generate the two random variables is rand() % (10)

2.

Similar to 1 above

To print two random integers between intervals of 100 and 149 using rand()"

Here, the lower limit = 100

upper limit = 149

By substituting these values in the formula above; the random number will be generated as thus;

Random Number = 100 + rand() % (149 - 100 + 1)

Random Number = 100 + rand() % (50)

So, the instruction to generate the two random variables is 100 + rand() % (50)

Write a program that lets the Michigan Popcorn Company keep track of their sales for seven different types of popcorn they produce: plain, butter, caramel, cheese, chocolate, turtle and zebra. It should use two parallel seven-element arrays: an array of strings that holds the seven popcorn names and an array of integers that holds the number of bags of popcorn sold during the past month for each popcorn flavor. The names should be stored using an initialization list at the time the flavors array is created. The program should prompt the user to enter the number of bags sold for each flavor. Once the popcorn data has been entered, the program should produce a report for each popcorn type, total sales, and the names of the highest selling and lowest selling products. Be sure to include comments throughout your code where appropriate. Complete the C++ code using Visual Studio or Xcode, compress (zip) and upload the entire project folder to the Blackboard assignment area by clicking on the Browse My Computer button or by dragging the file inside the Attach Files box g

Answers

Answer:

#include <iostream>using namespace std;int main(){    // declare and initialize popcorn name array    string popcorn_name[7] = {"plain", "butter", "caramel", "cheese", "chocolate", "turtle", "zebra"};    // declare and initialize sales array with 7 elements    int sales[7];        // A loop to prompt user to enter sales for each popcorn    for(int i=0; i < 7; i++){        cout<<"Enter number of sales for " + popcorn_name[i] + " :";        cin>>sales[i];    }        // Find maximum sales    int max = sales[0];    int maxIndex = 0;    for(int j=1; j < 7; j++){        if(max < sales[j]){            max = sales[j];            maxIndex = j;        }    }        // Find minimum sales    int min = sales[0];    int minIndex = 0;    for(int k=1; k < 7; k++){        if(min > sales[k]){            min = sales[k];            minIndex = k;        }    }        // Print popcorn name and sales    for(int l=0; l < 7 ; l++){        cout<<popcorn_name[l]<<"\n";        cout<<"Sales: "<< sales[l]<<"\n\n";    }        // Print popcorn name with maximum and minimum sales    cout<<"Highest selling: "<< popcorn_name[maxIndex]<<"\n";    cout<<"Lowest selling: "<<popcorn_name[minIndex]<<"\n";    return 0;}

Explanation:

Create two arrays to hold the list of popcorn name and their sales (Line 5-8). Next prompt user to input the sales for each popcorn (Line 10-14). Get the maximum sales of the popcorn (Line 17-24) and minimum sales (Line 27-34). Print the popcorn name and sales (Line 37-40) and the popcorn name with highest and lowest selling (Line 43-44).

Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeople receive $200 per week plus 9% of their gross sales for that week. For example, a salesperson who grosses $5,000 in sales in a week receives $200 plus 9% of $5,000, or a total of $650. Write an app (using an array of counters) that determines how many of the salespeople earned salaries in each of the following ranges (assume that each salesperson's salary is an integer). a) $200–299
b) $300–399
c) $400–499
d) $500–599
e) $600–699
f) $700–799
g) $800–899
h) $900–999
i) $1000 and over
Summarize the results in tabular format.

Answers

Answer: Provided in the explanation section

Explanation:

import java.util.Scanner;

public class commission

{

   public static void main(String[] args) {

      Scanner input = new Scanner(System.in);

        int totals[]={0,0,0,0,0,0,0,0,0};          

      int n,sales,i,index;

       double salary;

        System.out.print("how many salesmen do you have? ");                          

      n=input.nextInt();

        for(i=1;i<=n;i++)

           {System.out.print("Salesman "+i+" enter sales: ");

            sales=input.nextInt();

            salary=200+(int)(.09*sales);

               System.out.printf("Salary=$%.2f\n",salary);

            index=(int)salary/100-2;

            if(index>8)

                index=8;

            totals[index]++;

            }

        System.out.println("SUMMARY\nSALES\t\tCOUNT");

        for(i=0;i<8;i++)

           System.out.println("$"+(i*100+200)+"-"+(i*100+299)+"\t"+totals[i]);

        System.out.println("$1000 and over\t"+totals[i]);

       }                                

   }

 

cheers i  hope this helped !!      

Charles Montesquieu believed that the
Legislative Branch should do what?
A. Make laws
B. Enforce laws
C. Interpret laws
elles sone. All Rights Resed.​

Answers

Answer:

A. Make Laws

Explanation:

Montesquieu believed the ways to go about limiting the power of a monarch would be to split up power among 3 groups, Judicial, Legislative and Executive. The American Presidential system and Constitution used Montesquieu's writings as a foundation for their principles.

Judicial Interprets lawsLegislative Makes lawsExecutive Enforces Law

A. make laws ........ sorry for all the dots have to make it longer :/

Write a program that reads a list of words. Then, the program outputs those words and their frequencies. Ex: If the input is: hey hi Mark hi mark the output is: hey 1 hi 2 Mark 1 hi 2 mark 1

Answers

Answer:

#Declare variable to get the input

#list from the user

input_list = input()

#split the list into words by space

list = input_list.split()

#Begin for-loop to iterate each word

#to get the word frequency

for word in list:

#get the frequency for each word

frequency=list.count(word)

#print word and frequency

print(word,frequency)

Explanation:

This program that we are told to write will be done by using python programming language/ High-level programming language.

The question wants us to write a program in which the output will be as below;

hey 1

hi 2

Mark 1

hi 2

mark 1

Just by imputing hey hi mark hi mark.

Just copy and run the code below.

#Declare variable to get the input

#list from the user

input_list = input()

#split the list into words by space

list = input_list.split()

#Begin for-loop to iterate each word

#to get the word frequency

for word in list:

#get the frequency for each word

frequency=list.count(word)

#print word and frequency

print(word,frequency)

In this exercise we have to use the knowledge in computational language in python to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is

input_list = input()

list = input_list.split()

for word in list:

frequency=list.count(word)

print(word,frequency)

See more about python at brainly.com/question/18502436

During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted. Chose the best course of action they should take to access the data on that drive.
a. Use image filtering techniques to see what's behing the encrypted files.
b. Try to convince the owner of the computer to give you to decryption key/password.
c. Identify the encryption algorithm and attempt a brute force attack to get access to the file.
d. Disconnect the hard drive from power so the encryption key can be exposed on the next power up.
e. Try to copy the drive bit by bit so you can see the files in each directory.

Answers

Answer:

b. Try to convince the owner of the computer to give you to decryption key/password.

Explanation:

Encrypted hard drives have maximum security and high data protection. to access them you need to enter a password to unlock them.

The image filtering technique is a method that serves to selectively highlight information contained in an image, for which it does not work.

The encryption algorithm is a component used for the security of electronic data transport, not to access data on an encrypted hard drive.

The encryption key is used in encryption algorithms to transform a message and cannot be exposed by disconnecting the hard drive from its power source.

When implementing a physical database from a logical data model, you must consider database performance by allowing data in the database to be accessed more rapidly. In order to increase data availability, the DBA may break up data that are accessed together to be stored together. Which method will improve the performance of this structure when running queries? What are advantages and disadvantages of this method?

Answers

Answer:

A method  used to improve the performance of structure when running queries is known as Partitioning indexes.

The advantages of partitioning indexes are, It enables data management operations for example,  index creation and rebuilding, It increases query performance.

The disadvantages are, one cannot define the primary index of partitioned table to be unique unless the whole partitioning column set is part of the primary index definition.

Explanation:

Solution

Partitioning indexes are known as b -tress indexes that shows hon how to break up the index into separate or different partitions.

Partitioning is usually done to enhance the performance and increased availability. when data are spread over  multiple partitions, one can be able to operate on one partition  without affecting others. i.e to run utilities, or to take data offline.

Almost all DBMS products support partitioning, but in various ways. we must be sure to know the nuances of an individual a particular DBMS execution before partitioning.

The advantages of Partitioned indexes are as follows:

It enables data management operations for example,  index creation and rebuilding

It increases  performance of query

It can significantly the impact of schedule downtime for maintenance operations

Disadvantages:

The primary index of partitioned table cannot be described to be unique except if  the whole partitioning column set is part of the primary index definition.

The university computer lab’s director keeps track of lab usage, as measured by the number of students using the lab. This function is important for budgeting purposes. The computer lab director assigns you the task of developing a data warehouse to keep track of the lab usage statistics. The main requirements for this database are to:

Answers

Answer:

to keep count of how many users there are in total.

Explanation:

all i had to do was read the question twice to understand the answer is pretty

much in the question.

The director of the computer lab tasks with creating a data warehouse to manage lab utilization data. The major needs for this database are to keep count of how many users there are in total.

What is the budgeting process?

The tactical measures used by a corporation to create a financial plan are the budgeting processes. Budgeting for a future time entails more than simply allocating spending; it also entails figuring out how much income is required to achieve organizational objectives.

These procedures are used by accounting departments to regulate corporate activities, particularly expenditure. A person may use budgeting process to record how much money a business makes and spends over a specific time period.

Therefore, With the aid of budgeting, it may establish financial objectives for the team and the entire organization.

Learn more about the budgeting process, refer to:

https://brainly.com/question/21411418

#SPJ2

1. Implement the function dict_intersect, which takes two dictionaries as parameters d1 and d2, and returns a new dictionary which contains only those keys which appear in both d1 and d2, whose values are a tuple of the corresponding values from d1 and d2.

E.g., dict_intersect({'a': 'apple', 'b': 'banana'}, {'b': 'bee', 'c': 'cat'}) should return {'b': ('banana', 'bee')}

2. Implement the function consolidate, which accepts zero or more sequences in the star parameter seqs, and returns a dictionary whose keys consist of values found in those sequences, which in turn map to numbers indicating how many times each value appears across all the sequences.

E.g., consolidate([1,2,3], [1,1,1], [2,4], [1]) should return the dictionary {1: 5, 2: 2, 3: 1, 4: 1}.

Answers

Answer:

1  

def dict_intersect(d1,d2): #create dictionary

  d3={} #dictionaries

  for key1,value1 in d1.items():       #iterate through the loop  

      if key1 in d2:   #checking condition

          d3[key1]=(d1[key1],d2[key1])   #add the items into the dictionary  

  return d 3

print(dict_intersect({'a': 'apple', 'b': 'banana'}, {'b': 'bee', 'c': 'cat'})) #display

2

def consolidate(*l1):  #create consolidate

  d3={} # create dictionary

  for k in l1:       #iterate through the loop

      for number in k:   #iterate through  the loop                               d3[number]=d3.get(number,0)+1   #increment the value

             return d 3 #return

print(consolidate([1,2,3], [1,1,1], [2,4], [1])) #display

Explanation:

1

Following are  the description of program

Create a dictionary i.e"dict_intersect(d1,d2) "   in this dictionary created a dictionary d3 .After that iterated the loop and check the condition .If the condition is true then add the items into the dictionary and return the dictionary d3 .Finally print them that are specified in the given question .

2

Following are  the description of program

Create a dictionary  consolidate inside that created a dictionary "d3" .After that iterated the loop outer as well as inner loop and increment the value of items .Return the d3 dictionary and print the dictionary as specified in the given question .

A laptop computer has two internal signals: An unplugged signal, which is '1' if the laptop's power supply is connected, and '0' otherwise. A low battery signal, which is '0' if the laptop's battery has reached an almost empty state, and '1' otherwise. Suppose the laptop's power control system accepts a single hibernate signal which determines if the laptop should change its current operating state and shut down. If the laptop should shut down when the battery is low and its charger is unplugged, which gate could be used to produce the hibernate signal?

Answers

Answer:

The correct usage is a NOR gate which is indicated in the explanation.

Explanation:

The truth table for the given two signals, namely

p=unplugged signal

q=low battery signal

can  form a truth table of following form

Here p has 2 states

1 if the power supply is connected

0 otherwise

Similarly q has 2 states

0 if the battery has reached almost zero state

1 otherwise

As the condition for the Hibernate Signal is given as to only activate when the battery is low and the power supply is not connected. This indicate that the value of Hibernate signal should be 1 when both p and q are 0.

Using this condition, the truth table is formed as

unplugged signal | low battery signal |  Hibernate Signal

            0               |                 0             |             1

            0               |                 1              |             0

            1                |                 0             |             0

            1                |                 1              |             0

Now the truth table of NOR is given as

a    |     b    |  a or b   |   ~(a or b)

0    |     0    |      0      |        1

0    |     1     |      1       |        0

1     |     0    |      1       |        0

1     |     1     |      1       |        0

This indicates that the both truth tables are same thus the NOR gate is to be used for this purpose.

What is a manifold on a vehicle

Answers

Answer:

the part of an engine that supplies the fuel/air mixture to the cylinders

Explanation:

There is also an exhaust manifold that collects the exhaust gases from multiple cylinders into a smaller number of pipes

Remember to save _____ and be certain that you have your files saved before closing out.

Answers

It could be ‘save as’ or ‘your work’, not completely sure

The following if statement uses an overloaded > operator to determine whether the price of a Car object is more than $5000. Car is a struct and myCar is an object of Car. Each Cor object has two variables: id (int) and price (float). As you can see in the following code, the ID of myCar is 12345 and the price is $6,000. Car myCar - [12345, 6000.); float price - 5000; if (myCar > price) cout << "My car price is more than $5,000/n": Which one of the following function prototypes is correct syntax to overload the > operator based on the if statement above. void operator> float price: O bool operator>(Car & car, float price): bool operator (float amt): bool operator> Car & your Car): None of the above

Answers

Answer:

The correct syntax to overload is bool operator (float amt): so, the third statement is right.

Explanation:

Solution

From the given question we have to find which statements is correct for the following function prototype.

Now,

Since the price of a Car object is above  $5000, the car here is considered a struct and myCar is an object of Car

Both Car object consists of  two variables which are  id (int) and price (float)

Thus, from the given example the corresponding code says that the ID of myCar is represented as follows:

myCar - [12345, 6000);

The float price = 5000

Then,

cout << "My car price is more than $5,000/n"

Therefore the following statement bool operator (float amt): is the right syntax to overload.

The following numbers are inserted into a linked list in this order:
10, 20, 30, 40, 50, 60
What would the following statements display?
pCur = head->next;
cout << pCur->data << " ";
cout << pCur->next->data << endl;
a) 20 30
b) 40 50
c) 10 20
d) 30 40

Answers

Answer:

A. 20 30

Explanation:

Given

Linked list: 10, 20, 30, 40, 50, 60

Required

The output of the following code segment

pCur = head->next;

cout << pCur->data << " ";

cout << pCur->next->data << endl;

A linked list operates by the use of nodes which begins from the head to the next node, to the next, till it reaches the last;

The first line of the code segment; "pCur = head->next; " shifts the node from the head to the next node

The head node is the node at index 0 and that is 10;

This means that the focus has been shifted to the next at index 1 and that is 20;

So, pCur = 20

The next line of the code segment; cout << pCur->data << " "; prints pCur and a blank space

i.e. "20 " [Take note of the blank space after 20]

The last line "cout << pCur->next->data << endl; " contains two instructions which are

1. pCur = next->data;

2. cout<<pCur->data;

(1) shifts focus to the next node after 20 ; This gives pCur = 30

(2) prints the value of pCur

Hence, the output of the code segment is 20 30

random integer between 3 and 13 (inclusive)

Answers

Answer:

6

Explanation:

Answer:

4

Explanation:

It is between 3 and 13. Please answer some of my questions too! :)

Consider the following concurrent tasks, in which each assignment statement executes atomically. Within a task, the statements occur in order. Initially, the shared variables x and y are set to 0.
Task 1 Task 2
x = 1 y = 1
a = y b = x
At the end of the concurrent tasks, the values ofa andb are examined. Which of the following must be true?
I. ( a == 0 ) ( b == 1 )
II. ( b == 0 ) ( a == 1 )
III. ( a == 1 ) ( b == 1 )
(A) I only
(B) II only
(C) III only
(D) I and II only
(E) I, II, and III

Answers

Answer:

(D) I and II only

Explanation:

Concurrent tasks is when there is more than one task to be performed but the order of the task is not determined. The tasks occur asynchronously which means multiple processors occur execute input instruction simultaneously. When x =1 and y = 1, the concurrent task will be performed and the a will be zero or either 1.  

web pages with personal or biograpic information are called ​

Answers

Answer:

Web pages with personal or biographic information are called. a. Social Networking sites. c.

Explanation:

A new operating system uses passwords that consist of three characters. Each character must be a digit between 0 and 9. For example, three distinct possible passwords are 123, 416, and 999. The system uses 32-bit salt values. The system also allows one login attempt every second and never locks out users regardless of how many failed attempts occur. If an adversary has obtained a copy of the password file and conducts an offline brute-force attack by trying every password combination until the adversary obtains username and password combination. The use of a 32-bit salt value

Answers

Answer:

Brute force is  technique that is used for cracking password

In this case the system uses only three characters(0-9). By applying Brute force attack in "hit and try" manner we easily crack the password.

Explanation:

Solution

There are a wide variety of password cracking mechanisms.Brute force is one of the popular password cracking technique.Brute force attack is generally used to crack small passwords.

In the given example the system uses only three characters(0-9).By using Brute force attack in "hit and try" manner we easily crack the password.There are only 10 possible passwords for this type of system.Because we can arrange 0-9 only in 10 ways.But for Systems with long passwords it is difficult to find it in hit and try manner.But instead of having plain password each password have a random salt value.

In a system of 32 bit salt value there are 2^32 different key values.

By increasing the salt value from 32 bits to 64 bits there are 2^64 different key values.It increases the time taken to crack a password for an attacker.so by changing salt value from 32 to 64 bits will make it more harder for the adversary's attack to be successful.

Which of the following is true about operating system.

a. acts as an intermediary between the computer user and the computer hardware.
b. program that manages the computer hardware.
c. provides a basis for application progra

Answers

Answer:

google kis kam ka hai us se puch lo

import java.util.Scanner; public class ArraySum { public static void main(String[] args) { Scanner scnr = new Scanner(System.in); final int NUM_ELEMENTS = 8; // Number of elements int[] userVals = new int[NUM_ELEMENTS]; // User numbers int i = 0; // Loop index int sumVal = 0; // For computing sum // Prompt user to populate array System.out.println("Enter " + NUM_ELEMENTS + " integer values..."); for (i = 0; i < NUM_ELEMENTS; ++i) { System.out.print("Value: "); userVals[i] = scnr.nextInt(); } // Determine sum sumVal = 0; for (i = 0; i < NUM_ELEMENTS; ++i) { sumVal = sumVal + userVals[i]; } System.out.println("Sum: " + sumVal); return; } }

Answers

Answer:

There's nothing wrong with the question you posted except that it's not well presented or arranged.

When properly formatted, the program will be error free and it'll run properly.

The programming language used in the question is Java programming lamguage.

in java, the sign ";" signifies the end of each line and lines that begins with // represent comments. Using this understanding of end of lines and comments, the formatted code goes thus

import java.util.Scanner;  

public class Arraysum {  

public static void main(String[] args) {  

Scanner scnr = new Scanner(System.in);  

final int NUM_ELEMENTS = 8;

// Number of elements  

int[] userVals = new int[NUM_ELEMENTS];  

// User numbers  

int i = 0;  

// Loop index  

int sumVal = 0;  

// For computing sum  

// Prompt user to populate array  

System.out.println("Enter " + NUM_ELEMENTS + " integer values...");  

for (i = 0; i < NUM_ELEMENTS; ++i) {  

System.out.print("Value: ");  

userVals[i] = scnr.nextInt();  

}  

// Determine sum  

sumVal = 0;

for (i = 0; i < NUM_ELEMENTS; ++i)

{

sumVal = sumVal + userVals[i];

}

System.out.println("Sum: " + sumVal); return;

}

}

Also, see attachment for source file

Which of the following statements about CASE is not true?CASE tools provide automated graphics facilities for producing charts.CASE tools reduce the need for end user participation in systems development.CASE tools have capabilities for validating design diagrams and specifications.CASE tools support collaboration among team members.CASE tools facilitate the creation of clear documentation

Answers

Answer:

CASE tools reduce the need for end user participation in systems development.

Explanation:

CASE is an acronym for Computer-aided Software Engineering and it comprises of software application tools that provide users with automated assistance for Software Development Life Cycle (planning, analysing, designing, testing, implementation and maintenance). The CASE tools helps software developers in reducing or cutting down of the cost and time of software development, as well as the enhancement of the software quality.

Some other benefits of using the CASE tools are;

- CASE tools provide automated graphics facilities for producing charts.

- CASE tools have capabilities for validating design diagrams and specifications.

- CASE tools support collaboration among team members.

- CASE tools facilitate the creation of clear documentation.

- CASE tools checks for consistency, syntax errors and completeness.

The CASE tools can be grouped as, requirement and structure analysis, software design, test-case and code generation, reverse engineering, and document production tools.

Examples of CASE tools are flowchart maker, visible analyst (VA), dreamweaver, net-beans, microsoft visio, adobe illustrator and photoshop etc.

Three examples of parameter-parsing implementation models are: (1)________, (2)________, and (3)________.

Answers

Answer:1) Parse-by-value

2) Parse-by-reference

3) Parse-by-name

Explanation: Parameter parsing refers to a communication among procedures or functions.

The values of a variable procedure are transferred to the called procedure by some mechanisms. Different techniques of parameter-parsing include; parse-by-value, parse-by-reference, parse-by-copy restore, parse-by-name.

Convert each of the following for loops into an equivalent while loop. (You might need to rename some variables for the code to compile, since all four parts a-d are in the same scope.)

// a.

System.out.println("a.");
int max = 5;
for (int n = 1; n <= max; n++) {

System.out.println(n);

}

System.out.println();

// b.

System.out.println("b.");

int total = 25;

for (int number = 1; number <= (total / 2); number++) {

total = total - number;

System.out.println(total + " " + number);

}

System.out.println();

// c.

System.out.println("c.");

for (int i = 1; i <= 2; i++) {

for (int j = 1; j <= 3; j++) {

for (int k = 1; k <= 4; k++) {

System.out.print("*");

}

System.out.print("!");

}

System.out.println();

}

System.out.println();

// d.

System.out.println("d.");

int number = 4;

for (int count = 1; count <= number; count++) {

System.out.println(number);

number = number / 2;

}

Answers

Answer:

~CaptnCoderYankee

Don't forget to award brainlyest if I got it right!

public class Student {
private String getFood() {
return "Pizza";
}
public String getInfo() {
return this.getFood();
}
}
public class GradStudent extends Student {
private String getFood() {
return "Taco";
}
public void teach(){
System.out.println("Education!");
getInfo();
}
}
What is the output from this:

Student s1 = new GradStudent();
s1.teach();
Education! would be printed, followed by a run-time error when getInfo is called.

Education! Pizza

This code won't run because it won't compile.

Education! Taco

This code causes a run-time error because getInfo is not declared in the GradStudent class.

Answers

Answer:

getInfo(); ==

getSy.Info()

Explanation:

Get System Info

For the PSoC chip what is the minimum voltage level in volts that can be considered to logic one?​

Answers

Answer:

Asian man the man is one 1⃣ in a and the perimeters are not only

In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and notification of appropriate individuals?
a. Full-interruption
b. Desk check
c. Simulation
d. Structured walk-through

Answers

Answer:Full-interruption--A

Explanation:  The Full-interruption is one of the major steps for  a Disaster Recovery Plan, DRP which ensures businesses are not disrupted by saving valuable resources during a disaster like a data breach from fire or flood.

Although expensive and very risky especially in its simulation of a disruption, this thorough  plan ensures that when a disaster occurs, the  operations are shut down at the primary site and are transferred to the recovery site allowing Individuals follow every procedure, ranging from the interruption of service to the restoration of data from backups, also with the notification of appropriate individuals.

TCPDump is used by Wireshark to capture packets while Wireshark own function is:

a. to provide a graphical user interface (GUI) and several capture filters.
b. to act as an intrusion prevention system (IPS) by stopping packets from a black-listed website or packets with payloads of viruses.
c. to defend the network against TCP SYN Flooding attacks by filtering out unnecessary TCP packets.
d. yet to be defined.

Answers

Answer:

a. to provide a graphical user interface (GUI) and several capture filters

Explanation:

TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text

Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.

Convert 2910 to binary, hexadecimal and octal. Convert 5810 to binary, hexadecimal and octal. Convert E316 to binary, decimal and octal. Convert 5916 to binary, decimal and octal. Convert 010010102 to decimal, octal and hexadecimal. Convert 001010102 to decimal, octal and hexadecimal. Convert 438 to binary, decimal and hexadecimal. Convert 618 to binary, decimal and hexadecimal.

Answers

Answer:

2910 to binary = 101101011110

2910 to hexadecimal = B5E

2910 to octal = 5536

E316 to binary = 1110001100010110

E316 to octal = 161426

E316 to decimal = 58134

5916 to binary = 101100100010110

5916 to decimal = 22806

5916 to octal = 54426

010010102 to decimal = 149

010010102 to octal = 225

010010102 to hexadecimal = 95

FOR 438 and 618, 8 is not a valid digit for octal..

Describe and list advantages and disadvantages of each of the following backup types:

full, differential, incremental, selective, CPD, and cloud. ​

Answers

Answer:

Full back up

It creates complete copy of the source of data. This feature made it to the best  back  up with good speed of recovery of the data and  simplicity.However, because it  is needed for backing up  of  a lot of data, it is time consuming process,Besides it also  disturbs the routine application of  the technologist infrastructure. In addition large capacity storage is needed  for the  storage of  the large volume of back up with each new creation.

Incremental back up: back up work at high speed thus saves time, Little storage capacity is needed. This type of back up can be run as  many time as wished.

However, the restoration of data takes time, due to the time spent for restoration of initial back up and the incremental.

Differential Back up has very fast back up operation, because it only requires two pieces of back up.This is however slower compare to the Incremental.

The selective back up enable selection of certain type of file or folders for back up.

it can only be used to back up folders only when important data  are needed only.Thus the  storage capacity is low.

CPD eliminates back up window and reduces the recovery point objective.However, it has issue of compatibility with the resources to back up.,it is also expensive because its solutions are disk based.

Cloud based is affordable and save cost,It is easier to access. it is efficient,it can be access remotely for convenience.

However, Internet sources and some bandwidth must be available for access., always depends on third party providers,There is also problems encountered when switching providers.

Explanation:

C++ Problem: In the bin packing problem, items of different weights (or sizes) must be packed into a finite number of bins each with the capacity C in a way that minimizes the number of bins used. The decision version of the bin packing problem (deciding if objects will fit into <= k bins) is NPcomplete. There is no known polynomial time algorithm to solve the optimization version of the bin packing problem. In this homework you will be examining three greedy approximation algorithms to solve the bin packing problem.

- First-Fit: Put each item as you come to it into the first (earliest opened) bin into which it fits. If there is no available bin then open a new bin.

- First-Fit-Decreasing: First sort the items in decreasing order by size, then use First-Fit on the resulting list.

- Best Fit: Place the items in the order in which they arrive. Place the next item into the bin which will leave the least room left over after the item is placed in the bin. If it does not fit in any bin, start a new bin.

Implement the algorithms in C++. Your program named bins.cpp should read in a text file named bin.txt with multiple test cases as explained below and output to the terminal the number of bins each algorithm calculated for each test case. Example bin.txt: The first line is the number of test cases, followed by the capacity of bins for that test case, the number of items and then the weight of each item. You can assume that the weight of an item does not exceed the capacity of a bin for that problem.

3

10

6

5 10 2 5 4 4

10

20

4 4 4 4 4 4 4 4 4 4 6 6 6 6 6 6 6 6 6 6

10

4

3 8 2 7

Sample output: Test Case 1 First Fit: 4, First Fit Decreasing: 3, Best Fit: 4

Test Case 2 First Fit: 15, First Fit Decreasing: 10, Best Fit: 15

Test Case 3 First Fit: 3, First Fit Decreasing: 2, Best Fit: 2

Answers

xekksksksksgBcjqixjdaj

Other Questions
The last time Larissa checked her credit score, it was 760, and her only credit event since then has been applying for a store credit card. Which of these is most likely to be her credit score now? A. 770 B. 780 C. 750 D. 760 Compare Prime Ministers David Lloyd George and Georges Clemenceau's views on how Germany should be treated. A) George wanted Germany to lose territory while Clemenceau desired large-scale reparations from Germany.B) Both men wanted Germany to pay reparations but Clemenceau desired large-scale reparations from Germany.C) George desired large-scale reparations from Germany while Clemenceau wanted to avoid harsh treatment of Germany.D) Both George and Clemenceau wanted to avoid harsh treatment to Germany. Fully explain the solution set to the equation below.1x = -1 Ryan rides his bicycle 5 miles in 34 hour. How many miles can he ride at the same rate in 1 hour? I need the answer as a fraction. Which expression is equivalent to (2g^3+4)^2 a) (7x10^5)x(3x10^2) in standard form b) (2x10^5)/(4x10^2) in standard form Can someone plz help me solved this problem! I really need help ASAP! Will mark you as brainiest! Select the correct answer.What effect does an increase in products have on the reaction rate of a mixture at equilibrium?A.The forward reaction rate increases.B.Both the forward and the reverse reaction rates decrease.Both the forward and the reverse reaction rates increase.D.The reverse reaction rate increases.ResetNext help will mark brainliest why was the freedmen's bureau established A compact disk, which has a diameter of 12.0 cm, speeds up uniformly from zero to 4.30 rev/s in 3.05 s . Part A What is the tangential acceleration of a point on the outer rim of the disk at the moment when its angular speed is 2.00 rev/s HELP! WILL GIVE BRAINLIEST! Given: AB || DE , AD bisects BE.Prove: ABC = DEC using the ASA postulate. Water is traveling through a horizontal pipe with a speed of 1.7 m/s and at a pressure of 205 kPa. This pipe is reduced to a new pipe which has a diameter half that of the first section of pipe. Determine the speed and pressure of the water in the new, reduced in size pipe. in the monkeys paw whats the third event to take place in the story A circle centered at the origin contains the point (0, 9). Does (8, StartRoot 17 EndRoot) also lie on the circle? Explain.No, the distance from the center to the point (8, StartRoot 17 EndRoot) is not the same as the radius. No, the radius of 10 units is different from the distance from the center to the point (8, StartRoot 17 EndRoot). Yes, the distance from the origin to the point (8, StartRoot 17 EndRoot) is 9 units. Yes, the distance from the point (0, 9) to the point (8, StartRoot 17 EndRoot) is 9 units. Explain how scientific knowledge is developed when people make observations about the natural world. What is the force experienced when a 5.0 kg mass is accelerated at 7.5 m/s?? how do i calculate the first quartile and the third quartile??? !!!please help!!! If the domain of f(x)=2x+1 is {-2