.List employee number and their total sales using subtotal
Redo number 1 using ROLL UP
Redo Number 1 using CUBE
.List employee number, last name, total sales, their rank based on total sales in Desc order.
Redo number 4 using DENSE rank
List top 25% of employees (EMPLOYEE_NO) and their total sales (highest to lowest). Use NTILE function
Redo number 4 for only employees with rank higher than 4

Answers

Answer 1

Here are the SQL queries for each of the listed questions:

To address your requests, I assume you have a table named "Employees" with columns "Employee_Number," "Last_Name," and "Sales." Here are the queries to achieve each of the tasks:

1. List employee number and their total sales using subtotal:

SELECT Employee_Number, SUM(Sales) AS Total_Sales

FROM Employees

GROUP BY Employee_Number

2. Redo number 1 using ROLL UP:

SELECT Employee_Number, SUM(Sales) AS Total_Sales

FROM Employees

GROUP BY ROLLUP (Employee_Number)

3. Redo Number 1 using CUBE:

SELECT Employee_Number, SUM(Sales) AS Total_Sales

FROM Employees

GROUP BY CUBE (Employee_Number)

4. List employee number, last name, total sales, and their rank based on total sales in descending order:

SELECT Employee_Number, Last_Name, SUM(Sales) AS Total_Sales,

      RANK() OVER (ORDER BY SUM(Sales) DESC) AS Sales_Rank

FROM Employees

GROUP BY Employee_Number, Last_Name

ORDER BY Total_Sales DESC

5. Redo number 4 using DENSE RANK:

SELECT Employee_Number, Last_Name, SUM(Sales) AS Total_Sales,

      DENSE_RANK() OVER (ORDER BY SUM(Sales) DESC) AS Sales_Rank

FROM Employees

GROUP BY Employee_Number, Last_Name

ORDER BY Total_Sales DESC

6. List the top 25% of employees (EMPLOYEE_NO) and their total sales (highest to lowest) using NTILE function:

WITH RankedEmployees AS (

   SELECT Employee_Number, SUM(Sales) AS Total_Sales,

          NTILE(4) OVER (ORDER BY SUM(Sales) DESC) AS Quartile

   FROM Employees

   GROUP BY Employee_Number

)

SELECT Employee_Number, Total_Sales

FROM RankedEmployees

WHERE Quartile = 1

ORDER BY Total_Sales DESC

7. Redo number 4 for only employees with rank higher than 4:

WITH RankedEmployees AS (

   SELECT Employee_Number, Last_Name, SUM(Sales) AS Total_Sales,

          RANK() OVER (ORDER BY SUM(Sales) DESC) AS Sales_Rank

   FROM Employees

   GROUP BY Employee_Number, Last_Name

)

SELECT Employee_Number, Last_Name, Total_Sales

FROM RankedEmployees

WHERE Sales_Rank > 4

ORDER BY Total_Sales DESC

Please note that these queries assume you have a table named "Employees" with the specified columns. Adjust the table and column names accordingly to match your schema.

To know more about SQL, visit:

https://brainly.com/question/31663284

#SPJ11


Related Questions

Convert the following numbers from decimal to floating point, or vice versa. For the floating-point representation, consider a format as follows: 24 Points Total - 16 bits - One sign bit - k=5 exponent bits, so the bias is 01111 (15 in decimal) - n=10 mantissa bits If rounding is necessary, you should round toward +[infinity]. Enter "+infinity" or "-infinity" in the answer box if the answer is infinity.

Answers

To convert numbers between decimal and floating point in the given format, we can use the sign bit, exponent bits, and mantissa bits.

How to convert a decimal number to floating point representation?

To convert a decimal number to floating point representation in the given format, follow these steps:

1. Determine the sign: Assign the sign bit as 0 for positive numbers and 1 for negative numbers.

2. Convert the absolute value to binary: Convert the absolute value of the decimal number to binary representation.

3. Normalize the binary representation: Normalize the binary representation by shifting the radix point to the left or right until there is only one non-zero digit to the left of the radix point. Keep track of the number of shifts made.

4. Determine the exponent: The exponent is the number of shifts made during normalization, plus the bias value (01111 in this case).

5. Calculate the mantissa: The mantissa is obtained by taking the significant bits of the normalized binary representation and appending zeros to the right if needed.

6. Combine the sign, exponent, and mantissa: Concatenate the sign bit, exponent bits, and mantissa bits to form the floating point representation.

Learn more about floating point

brainly.com/question/32195623

Tag: #SPJ11

Expert Q&A
Find solutions to your homework
Question
(0)
Task 1: JavaScript for Interactivity (2 marks) Description We are going to create a ‘pop up modal window’ that displays a help list of the password rules to be displayed when the user clicks on a "Password Rule" ‘button’ located beside the password input field. Remember to always design the form and interaction carefully before you start coding. Design Design starts with discussion and paper drawings. Ensure this process is completed before implementation. Step 1: Form Design (HTML and CSS) 1.1 Using the form mock up presented below in Figure 1, determine where the "Password Rule" button will appear. This button is not an HTML form button. It is an element styled using CSS, not a HTML element. Registration Form --Account Information ----------------------------------------- User ID Password Re-type Password -- User Information --------------------------------------------- Name Gender o Male o Female Test Register Figure 1. Example Mock Up 1.2 When we draw a mock-up of the pop-up modal window that will show the password rule list. Figure 2 presents an example mock up. Password Rule COS10024 Web Development
TP1/2022 Page 2 Figure 2. Example Mock Up 1.3 When the modal window pops up, all input fields in the form window need to be disabled or made not selectable. What must be done to achieve this effect? Answer: Display a full ‘window layer’ over the form window to prevent the user from being able to click on any input fields in the form. This ‘window layer’ will be a
element styled to cover the entire page. See Figure 3. Figure 3. A Semi-Transparent Window Layer Covering the Entire Web Page Step 2: JavaScript 2.1 Identify which HTML element should trigger the interaction. Answer: For this task, we need to create a Password Rule "button", i.e., a styled

Answers

To create a pop-up modal window that displays a help list of password rules, the following design and implementation steps are necessary.

Design begins with discussions and paper sketches. Before coding begins, make sure this process is completed. Using the form mock-up given in Figure 1, decide where the "Password Rule" button will be placed. This button is not an HTML form button. Rather, it is an element styled using CSS that is not an HTML element.

Form Design (HTML and CSS)When we draw a mock-up of the pop-up modal window that will show the password rule list, all input fields in the form window must be disabled or made un selectable. A full ‘window layer’ over the form window should be displayed to prevent the user from being able to click on any input fields in the form. This ‘window layer’ will be an element styled to cover the entire page.  

To know more about window visit:

https://brainly.com/question/33635623

#SPJ11

Give the order of an algorithm that decrements every element in a three-dimensional table of N rows.

Answers

The order of an algorithm that decrements every element in a three-dimensional table of N rows is O(N³). The order of an algorithm, also known as time complexity,

This  is a measure of how long an algorithm takes to solve a problem based on the size of the input data.Let's discuss the problem in more detail to understand the answer better. We have a three-dimensional table of N rows. Every element in this table needs to be decremented. In other words, we need to subtract one from each element in the table.If we iterate through each element in the table and subtract one, it will take O(N³) time.

The time complexity is cubic because we have to traverse every element in three dimensions, so the total number of operations will be N x N x N or N³.Note that the size of the input data is N³, so the time complexity is proportional to the input size. The Big O notation represents the worst-case scenario, meaning the algorithm will take O(N³) in the worst case. However, in the average case, it may be faster than O(N³) due to various factors like input distribution, hardware, etc.

To know more about algorithm visit:

https://brainly.com/question/31006849

#SPJ11

What is the binary representation, expressed in hexadecimal, for the bne instruction?
bne, a0, t1, next_p in the lumiptr code shown below.
The input parameters for lumiptr are as follows:(a0: screen address, a1: number of rows, a2: number of columns)
lumiptr:
mul t1, a1, a2 # t1 <- R*C
add t1, a0, t1 # t1 <- screen + R*C
add t2, zero, zero # luminosity <- 0
next_p:
lbu t3, 0(a0) # t3 <- pixel
add t2, t2, t3 # lum3ns <- lumens + pixel
addi a0, a0, 1 # p++
bne a0, t1, next_p
jalr zero, ra, 0

Answers

The binary representation of the "bne" instruction is 000101, expressed in hexadecimal as 0x05.

The bne instruction is a conditional branch instruction in MIPS assembly language that stands for "branch if not equal." It checks if the two operands are not equal and jumps to a specified label if the condition is true.

bne a0, t1, next_p

Explanation:

a0 and t1 are registers.

next_p is a label representing the memory address where the code will jump if the condition is true.

The instruction reads as follows: "If the value in register a0 is not equal to the value in register t1, then jump to the label next_p."

As for the binary representation of the bne instruction, it typically follows this format:

In the given code, the bne instruction is used as follows:

opcode   rs   rt      offset

6 bits   5 bits 5 bits   16 bits

However, the exact binary representation will depend on the specific MIPS assembler being used, and the actual values of a0 and t1 used in the instruction.

Regarding the conversion to hexadecimal, you'll first need to know the binary representation of the bne instruction as shown above, and then group the binary digits into sets of four to convert them into hexadecimal.

You can learn more about binary representation at

https://brainly.com/question/31145425

#SPJ11

Before you actually start constructing your compiler, you need to intensely explore Lex tool which will be mainly used in lexical analysis phase. This programming assignment is for using lexical analyzer tools to scan and analyze an input text file. Use Lex tool to scan and analyze the content of a text file. The output should show the following: 1. The longest word in the file. 2. Print all integer and double numbers that are greater than 500 . 3. All words that start with vowel. Print an appropriate message if there is no word start with a vowel. 4. The number of words that are ended with "ing". 5. The number of lines within the file. 6. The number of characters that is not a word character ( word character = alphanumeric \& underscore).

Answers

Using Lex tool, define rules in a .l file, tokenize input, track information, implement actions, print results, compile, and run to meet assignment requirements.

To accomplish the given tasks using Lex tool for lexical analysis, you can follow these steps:

Define Lex rules: Start by defining the lexical rules in a Lex file (usually with a .l extension). These rules specify patterns to match different tokens in the input text file.Tokenize the input: Use Lex to tokenize the input text file into individual tokens based on the defined rules. Tokens can represent words, numbers, punctuation, or any other meaningful units.Track the required information: As you process each token, keep track of the required information for each task. For example, maintain variables to store the longest word, count the number of words ending with "ing," count the number of lines, etc.Implement Lex actions: Associate actions with the defined rules in the Lex file. These actions are typically written in C or C++ code and executed when a matching pattern is found. In the actions, you can perform the necessary checks and update the information being tracked.Print the results: After scanning the entire input file, print the results according to the given tasks. You can output the longest word, the integers and doubles greater than 500, words starting with vowels, the count of words ending with "ing," the number of lines, and the count of non-word characters.Compile and run: Compile the Lex file using a Lex compiler (e.g., Flex) to generate the corresponding C/C++ code. Then, compile the generated code and run the resulting executable file with the input text file as the input.

The Lex tool will handle the tokenization and matching of patterns based on your defined rules, allowing you to focus on implementing the necessary logic for the given tasks. By combining the power of Lex and C/C++, you can efficiently scan and analyze the content of the input text file, producing the desired output as specified in the assignment.

learn more about Lexical analysis.

brainly.com/question/31613585

#SPJ11

To concatenate means to _________ items such as when you combine the text values of cells in Excel
A)Split
B)Link
C)Merge
D)Duplicate

Answers

To concatenate means to (c) merge items such as when you combine the text values of cells in Excel.

The concatenation in Excel is the process of joining two or more things into a single item. In the case of Excel, this means linking together various cells or strings of text into one cell. Concatenate is used to merge the contents of two or more cells into a single cell. It is used to combine text values or strings of text from multiple cells into one cell in Excel.In order to concatenate in Excel, use the CONCATENATE or the "&" operator. The CONCATENATE function is used to combine values from two or more cells. This formula can be used when we have data in multiple cells that we want to merge into a single cell. For example, if you have the first name in one cell and the last name in another cell, you can combine these two cells using the CONCATENATE function.

To know more about concatenate visit:

https://brainly.com/question/31094694

#SPJ11

It’s scary movie season! You decide to challenge your friends to a scary movie trivia game. You decide it
would be much cooler if you designed an automated system so all of your friends can compete.
Write a program that will ask the user a series of trivia questions about scary movies. Your program
should ask the user to guess the answers to the following questions:
1) At the beginning of Scream, what was Casey Becker cooking?
a. Pasta puttanesca
b. Popcorn
c. Ramen
2) What month does the Blair Witch Project take place during?
a. August
b. September
c. October
3) How many days do you have to live after watching the video in The Ring?
a. 7 days
b. 10 days
c. 14 days
The correct answers to the quiz questions are: B, C, and A.
Your program MUST meet the following criteria:
1. Ask the user for the answer to each question. You must make the user enter a choice – A, B, or
C. The program should accept uppercase and lowercase choices (i.e. do not count off if the user
enters an ‘a’ when the answer is ‘A’).
2. Your program should tell the user if they are incorrect and what the correct answer is.
3. Your program should calculate the user’s score on the quiz and display the result as a
percentage with 2 decimal places of precision.
4. Your program should tell your friend their letter grade on the quiz:
A: 90-100
B: 80 – 89
C: 70 – 79
D: 60 – 69
F: 0 – 59
5. Your program should account for the following:
a. It should be easy for another programmer to come into your code and add additional
questions without having to make major modifications to your code.

Answers

Sure, I can help you with that! Here's a Python program that meets all the criteria you mentioned:

```python
# Define the list of questions and their corresponding correct answers
questions = [
   {
       "question": "At the beginning of Scream, what was Casey Becker cooking?",
       "choices": {
           "a": "Pasta puttanesca",
           "b": "Popcorn",
           "c": "Ramen"
       },
       "correct_answer": "b"
   },
   {
       "question": "What month does the Blair Witch Project take place during?",
       "choices": {
           "a": "August",
           "b": "September",
           "c": "October"
       },
       "correct_answer": "c"
   },
   {
       "question": "How many days do you have to live after watching the video in The Ring?",
       "choices": {
           "a": "7 days",
           "b": "10 days",
           "c": "14 days"
       },
       "correct_answer": "a"
   }
]

# Initialize score and question count variables
score = 0
total_questions = len(questions)

# Iterate through each question
for question in questions:
   # Display the question
   print(question["question"])
   
   # Display the choices
   for choice, answer in question["choices"].items():
       print(choice.upper() + ") " + answer)
   
   # Ask the user for their answer
   user_answer = input("Enter your choice (A, B, or C): ").lower()
   
   # Check if the user's answer is correct
   if user_answer == question["correct_answer"]:
       print("Correct!\n")
       score += 1
   else:
       print("Incorrect. The correct answer is", question["correct_answer"].upper(), "\n")

# Calculate the percentage score
percentage_score = (score / total_questions) * 100

# Display the score and letter grade
print("Your score:", format(percentage_score, ".2f") + "%")
if percentage_score >= 90:
   print("Letter grade: A")
elif percentage_score >= 80:
   print("Letter grade: B")
elif percentage_score >= 70:
   print("Letter grade: C")
elif percentage_score >= 60:
   print("Letter grade: D")
else:
   print("Letter grade: F")
```

This program uses a list of dictionaries to store the questions, choices, and correct answers. You can easily add additional questions by adding more dictionaries to the `questions` list. The program then iterates through each question, displays it along with the choices, asks the user for their answer, checks if it's correct, and updates the score accordingly. Finally, it calculates the percentage score, displays it, and assigns a letter grade based on the score.

Learn more about Python: https://brainly.com/question/26497128

#SPJ11

the statement end procedure is used to signify the end of a function declaration a) true b) false

Answers

The statement "end procedure" is used to signify the end of a function declaration is a false statement. The answer to the question "The statement end procedure is used to signify the end of a function declaration a) true b) false" is false.

The statement "end procedure" is not used to signify the end of a function declaration. It is used to signify the end of a procedure, i.e., the end of a section of code that performs a specific task. A procedure can contain various instructions, including function calls. In contrast, a function is a type of procedure that returns a value after performing a specific task. The "end function" statement is used to signify the end of a function declaration.

It is a required statement that signals the end of the function and is used to return the function's value to the caller. The "end procedure" statement is not used to signify the end of a function declaration; instead, the "end function" statement is used to signify the end of a function declaration.

To know more about function declaration visit:

brainly.com/question/33366338

#SPJ11

what document is an excellent reference for security managers involved in the routine management of information security?

Answers

The "Information Security Management System" (ISMS) is an excellent reference for security managers involved in the routine management of information security. This is a standard that details the necessary requirements for an information security management system (ISMS) that complies with global information security best practices.

The ISMS is a framework for managing and protecting the confidentiality, integrity, and availability of sensitive information. It is based on the risk management framework, which involves assessing risks, implementing controls, and monitoring and reviewing the effectiveness of the controls. In the ISMS, security managers have access to a set of policies, procedures, and guidelines that provide a comprehensive approach to information security management.

Hence, Information Security Management System (ISMS) is an excellent reference for security managers involved in the routine management of information security. The ISMS provides a comprehensive approach to information security management, including policies, procedures, and guidelines. It details the necessary requirements for an information security management system that complies with global information security best practices and is based on the risk management framework. The ISMS is a framework for managing and protecting the confidentiality, integrity, and availability of sensitive information.

To know more about risk management visit:

brainly.com/question/28521655

#SPJ11

Modify the existing code (below) to create an outer loop to ask the user for the number of students in the class that
need their scores entered.
a. Using the existing loop, (inner loop) allow the user to enter an unknown
number of scores for each student.
b. Test the entered score so that it is in the range of 0 to 100.
c. Within the loop, count and total the scores that are entered.
d. Calculate the average using the total of the scores and divide by the counter.
e. Using the existing code to determine the letter grade based on the average
f. Print the average and letter grade.
1. Continue with the outer loop for the next student.
//CODE
#include
using namespace std;
int main(){
// variable dictionary
double score = 0, sum = 0, average = 0;
int count = 0;
//Running while loop up to unknown # scores
while(true){
// enter student's scores or 0
cout<<"\n enter a score(or 0 to end): ";
cin>> score;
//check to see if the number is between 0 and 100
while(score< 0 || score > 100){
cout<< "\n Not in a range. Re enter the score: ";
cin>> score;
}
// if score is 0 exit
if(score == 0){
break;
}
// Incrementing the counter
count++;
//Changing the sum
sum += score;
}
// calculate average
average = sum / count;
// using a nested if statement determine the student's letter grade based on the average score
// average >= 90 = A, >= 80 and < 90 = B, >= 70 and < 80 = C, >= 60 and 70 = D,< 60 = F
// Print the Average and the Letter Grade
char letter = 'Z';
if ( average >= 90){
letter = 'A';
}
else if (average >= 80){
letter = 'B';
}
else if (average >= 70){
letter = 'C';
}
else if (average >= 60){
letter = 'D';
}
else {
letter = 'F';
}
//Printing the results
cout <<"\n\n average score = "<< average<< " grade = "< cout << "\n\n lab 5" << endl;
return 0;
}

Answers

The code has been modified to include an external circle for multiple scholars. It allows the stoner to enter an unknown number of scores, calculates the average, determines the letter grade, and prints the results for each pupil. .

// Modified code to include outer loop for multiple students

#include <iostream>

using namespace std;

int main(){

/ variable wordbook

double score = 0, sum = 0, normal = 0;

int count = 0, numStudents = 0;

/ Ask for the number of scholars

cout> numStudents;

/ external circle for multiple scholars

for( int i = 0; i< numStudents; i){

/ Reset variables for each pupil

count = 0;

sum = 0;

/ handling while circle up to unknown number of scores

while( true){

/ enter pupil's scores or 0

cout> score;

/ check to see if the number is between 0 and 100

while( score< 0|| score> 100){

cout> score;

/ proliferation the counter

count;

/ Update the sum

sum = score;

 // Update the sum

 sum += score;

}

/ Calculate average

normal = sum/ count;

/ Determine the pupil's letter grade grounded on the average score

housekeeper letter = ' Z';

if( normal> = 90){

letter = ' A';

differently if( normal> = 80){

letter = ' B';

differently if( normal> = 70){

letter = ' C';

differently if( normal> = 60){

letter = 'D';

differently{

letter = ' F';

// Print the average and the letter grade for each student

cout << "\n\nAverage score = " << average << " Grade = " << letter << endl;

}

/ publish the average and the letter grade for each pupil

cout

Learn more about code : brainly.com/question/28338824

#SPJ11

which java statement allows you to use classes in other packages

Answers

The Java statement that allows you to use classes in other packages is import.

Java classes can be utilized in other classes with the aid of Java import statement. When we require a class defined in another package, we should import it. The Java import statement is used to provide access to another package or another class from the same package. Import statement classes could be static or non-static, depending on the package or class we want to access.Import statements make code simpler to write and easier to understand. The import statement instructs the Java compiler to load and make the classes available for use in your program.

More on java: https://brainly.com/question/25458754

#SPJ11

Project User Interface Design (UID). Briefly explained, and supported with a figure(s) Project's Inputs, Processing %, and Outputs

Answers

User Interface Design (UID) is the process of designing the interface through which a user interacts with a computer system or application. It focuses on the design of the layout, look, and feel of the interface to ensure it is intuitive, efficient, and user-friendly.

The inputs to the project user interface design process include the requirements of the system or application being designed. This includes things like the purpose of the system, the target audience, and any specific features that need to be included in the interface.The processing steps in the UID process include the development of wireframes, mockups, and prototypes to help visualize and refine the interface.

This involves testing the interface with users to gather feedback and make any necessary changes to improve usability and functionality.The output of the UID process is a fully-designed interface that is ready to be implemented in the system or application. This includes all of the visual elements, such as icons, typography, and colors, as well as the interactive elements, such as buttons, forms, and menus. The output should be a visually-pleasing, easy-to-use interface that meets the needs of the system's users.  An example of the UI design for an e-commerce website is given below:   Figure: Example of UI Design for E-commerce Website

To know more about User Interface Design visit:

https://brainly.com/question/30811612

#SPJ11

irst Subroutine will perform the following tasks: 1. Searching for files greater than 500MB in your home directory. 2. Display the following message on the screen. Sample output "Searching for Files with reported errors /home/StudentHomeDir Please Standby for the Search Results..." 3. Redirect the output to a file called HOLDFILE.txt. Test the size of the HOLDFILE.txt to find out if any files were found. - If the file is empty, display the following info on the screen "No files were found with reported errors or failed services! Exiting..." - If the file is not empty, then: a) Add the content of HOLDFILE.txt to OUTFILE.txt b) Count the number of lines found in the HOLDFILE.txt and redirect them to OUTFILE.txt. Second Subroutine will perform the following tasks: 1. Display the content of OUTFILE.txt on screen. 2. Display the following message on screen. These search results are stored in /home/HomeDir/OUTFILE.txt Search complete... Exiting...

Answers

The provided solution outlines a subroutine that aims to search for files larger than 500MB in the home directory and store the results in an output file. If no files are found, a message is displayed indicating the absence of files. If files are found, the content of the output file is added to another file called OUTFILE.txt, and the number of lines found in HOLDFILE.txt is counted and also added to OUTFILE.txt. The second subroutine displays the content of OUTFILE.txt on the screen and provides a message indicating the location of the search results file.

Overall, the solution provides a systematic approach to searching for specific files and consolidating the results. By redirecting the output to files, it allows for easy storage and retrieval of the search findings. The use of multiple subroutines helps in organizing the tasks and simplifying the code structure.

In 150 words, the provided solution presents an effective method for searching and managing files. It demonstrates the use of file redirection, concatenation, and counting to gather relevant information. The subroutine's output messages provide informative feedback to the user regarding the search process and the existence of files with reported errors. The second subroutine's display of the search results on the screen helps users quickly access the findings. By storing the results in a designated file, users can also refer to the data at a later time. The solution's modular structure enhances code readability and maintainability. Overall, this solution offers a comprehensive approach to file searching and organization, promoting efficient file management and ease of use.

readability https://brainly.com/question/14605447

#SPJ11

Task Instructions 1. Download the task file 2. Start on the first tab, "employee details", and note that you have information about the jobs and salaries of fifteen employees. You will be coaching their manager on whether any of these employees requires a major pay increase this salary planning cycle. 3. Move over to the second tab – "all employees with pay ranges". This document shows pay range information for every single employee in the company, including the fifteen on the team you are advising. 4. Move back to the "employee details tab". If you scroll over the right, you’ll see two blank columns, I and J. Your goal is to find or calculate the information that goes in these columns. 5. For column 1, pay reference midpoint, you will need to use information from the "all employees with pay ranges" tab to find the pay reference midpoint associated with each of your fifteen employees. 1. Be sure to use employee ID rather than name to look up this information. 2. If you are experienced with Excel/spreadsheet software or would like to learn something new, you can use a "VLOOKUP" to do this very quickly. If you’d like to learn about VLOOKUP, go here. 6. After you have filled in the pay reference midpoint for each employee, find the comparative ratio (compa-ratio) for each. 1. The formula for this can be found in both documents in section 2. 2. Again, you can calculate each by hand, or you can use a formula to move more quickly or challenge yourself. 7. Now we must determine the manager who requires a raise. To do this, segment the comparative ratio values into three segments (less than 80%, between 80%-100% and greater than 100%). Highlight those who are below 80% and those who are between 80-100% using two different colors. 1. You can highlight by hand, or use conditional formatting to do it automatically. To learn more about conditional formatting, go here. Write a sentence explaining who requires a substantial pay increase and what the manager might want to consider when determining if such an increase is required.

Answers

The main answer for the given task is to determine which employee requires a substantial pay increase and what the manager should consider while deciding whether to give them one or not.

In order to find the answer, the following steps can be taken The given task file needs to be downloaded.Step 2: Start working on the first tab, "employee details". The information about the jobs and salaries of fifteen employees will be given, and the coach will be advised whether any of these employees require a significant pay raise this salary planning cycle. Go to the second tab, "all employees with pay ranges". This tab shows pay range information for every employee in the company, including the fifteen on the team you are advising. Move back to the "employee details tab." Two blank columns, I and J, can be seen if you scroll over to the right.

The information that goes in these columns needs to be calculated or found. Step 5: The first column is pay reference midpoint. Information from the "all employees with pay ranges" tab must be used to find the pay reference midpoint associated with each of your fifteen employees. The employee ID should be used to look up this information rather than their name. A "VLOOKUP" can be used to do this quickly if you have experience with Excel/spreadsheet software or want to learn something new. If you'd like to learn about VLOOKUP, go here. Step 6: After filling in the pay reference midpoint for each employee, find the comparative ratio (compa-ratio) for each. The formula for this can be found in both documents in section 2. You can calculate each one by hand or use a formula to move more quickly or challenge yourself. Step 7: It is now necessary to determine the manager who requires a raise. Segment the comparative ratio values into three sections: less than 80%, between 80%-100%, and greater than 100%. Use two different colors to highlight those who are below 80% and those who are between 80-100%. You can highlight by hand or use conditional formatting to do it automatically. To learn more about conditional formatting, go here.

To know more about employee visit:

https://brainly.com/question/33336737

#SPJ11

Write a C++ program to initialize two float variables by using new operator, print the smaller number and then delete all variables using delete operator. Use pointers and references.

Answers

Here is the C++ program to initialize two float variables by using the new operator and then delete all variables using the delete operator by using pointers and references.

In this program, we initialize two float variables named a and b using new operator. We then use references to compare them to determine which one is smaller. After that, we delete the memory allocated to the variables using delete operator.

The program is given below :Code:#include using namespace std;int main(){  float *a = new float(5.5);  float *b = new float(3.3);  float &ref_a = *a;  float &ref_b = *b;  if (ref_a < ref_b)    cout << "The smaller number is: " << ref_a << endl;  else    cout << "The smaller number is: " << ref_b << endl;  delete a;  delete b;  return 0;}Output:The smaller number is: 3.3

To know more about c++ visit:

https://brainly.com/question/33635638

#SPJ11

The following is a valid LOCAL declaration?
LOCAL index:DWORD

TRUE/FALSE

Local variables are stored on the runtime stack, at a higher address than the stack pointer.

TRUE/FALSE

Answers

The given local declaration, "LOCAL index:DWORD," is valid. However, the statement "Local variables are stored on the runtime stack, at a higher address than the stack pointer" is false.

The declaration "LOCAL index:DWORD" is valid because it follows the syntax for declaring a local variable in certain programming languages, such as assembly or certain dialects of BASIC. "LOCAL" is a keyword indicating that the variable is local to the current scope, and "index:DWORD" specifies the variable name "index" and its data type as a double-word (32 bits) integer. This declaration allows the programmer to allocate memory on the stack for the local variable "index" with a size of four bytes.

Regarding the statement about local variable storage, it is false. Local variables are stored on the runtime stack, but their addresses are typically lower than the stack pointer. The stack grows downward, meaning that as new local variables are allocated, the stack pointer is decremented to create space for them. This arrangement ensures that the most recently declared local variable has the highest memory address on the stack, with the stack pointer pointing to the top of the stack. Therefore, local variables are stored at addresses lower than the stack pointer, not higher.

Learn more about stack here:

https://brainly.com/question/32295222

#SPJ11

a 16-bit ripple carry adder is realized using 16 identical full adders. the carry propagation delay of each full adder is 12 ns and the sum propagation delay of each full adder is 15 ns. what is the worst case delay of this 16 bit ripple adder?

Answers

The worst-case delay of the 16-bit ripple carry adder is 283 ns.

How is the worst-case delay calculated for the 16-bit ripple carry adder?

The worst-case delay of the ripple carry adder is determined by considering the longest propagation path. In this case, the longest path occurs when the carry bit has to propagate through all 16 full adders.

Each full adder has a carry propagation delay of 12 ns and a sum propagation delay of 15 ns. When the carry has to propagate through all 16 full adders, the total carry propagation delay becomes \(16 \times 12 \, \text{ns} = 192 \, \text{ns}\). The sum propagation delay remains constant for all bits, so it is \(15 \, \text{ns}\).

The worst-case delay of the ripple carry adder is the sum of the carry propagation delay and the sum propagation delay: \(192 \, \text{ns} + 15 \, \text{ns} = 207 \, \text{ns}\).

However, we also need to consider the carry propagation from the last full adder to the output, which adds an additional \(12 \, \text{ns}\) delay. Therefore, the worst-case delay is \(207 \, \text{ns} + 12 \, \text{ns} = 283 \, \text{ns}\).

Learn more about: worst-case delay

brainly.com/question/32943887

#SPJ11

Write a python program for a shopping cart. The program should allow shopper to enter the product name and price. Use loop so that shopper can enter as many inputs as necessary and validate the inputs as product name should be string and price should be more than $0. At the end, the output should • display the total the shopper needs to pay. Use f-string to format the total value for two decimal points and comma. • print the name and price for all the entries with appropriate headings. Do not use break or try functions.

Answers

Python Program for Shopping Cart Here is the Python program for Shopping Cart. Please take a look.

In the above program, the user is asked to enter the product name and price. The while loop is used to input multiple entries. It takes the product name and price as input and stores them in a dictionary variable called cart. The product name is validated to check whether it is a string or not.

The price is validated to check whether it is more than $0. If the inputs are valid, the total amount is calculated and displayed using f-string. The name and price for all the entries are printed using a for loop. The program also includes appropriate headings for each column.

To know more about program visit:

https://brainly.com/question/33626969

#SPJ11

Request a template in c++: Use a properly-structured loop (as we discussed in class) to read the input file until EOF. Use the read function to read each record into a character array large enough to hold the entire record. For each record, dynamically allocate and populate an Instructor object. Use a pointer array to manage all the created Instructor objects. Note that to populate some of the Instructor fields, you’ll need to perform a conversion of some type. Assume that there will not be more than 99 input records, so the size of the pointer array will be 100. Initialize each element in the array of pointers to nullptr. As you read input records and create new Instructor objects, point the next element in the pointer array at the new object. Later, when you loop through the pointer array to process the objects, you’ll know that there are no more when you come across a pointer with a null value. This way, the pointer array is self-contained and you don’t need a counter.

Answers

Here's the requested template in C++ that you can use to read an input file until EOF using a properly-structured loop and pointer array to manage all the created Instructor objects:

#include
#include
using namespace std;
struct Instructor
{
  // Define structure for Instructor object
};
int main()
{
  Instructor* InstructorPtrArray[100] = {nullptr}; // Initialize array of pointers to nullptr
  char record[256];
  int i = 0;
  ifstream inputFile("input.txt"); // Open input file
  if (inputFile)
  {
     while (!inputFile.eof())
     {
        inputFile.getline(record, 256); // Read each record into character array
        InstructorPtrArray[i] = new Instructor; // Dynamically allocate new Instructor object
        // Populate Instructor object fields from record array (perform conversion if needed)
        // ...
        i++; // Increment pointer array index
     }
     inputFile.close(); // Close input file
  }
  // Loop through pointer array to process objects
  for (int j = 0; InstructorPtrArray[j] != nullptr; j++)
  {
     // Process each Instructor object
     // ...
  }
  // Deallocate dynamically-allocated Instructor objects
  for (int k = 0; InstructorPtrArray[k] != nullptr; k++)
  {
     delete InstructorPtrArray[k];
     InstructorPtrArray[k] = nullptr;
  }
  return 0;
}

Note that you'll need to define the structure for the Instructor object and populate its fields from the record array, performing a conversion if needed. Also, you'll need to add the necessary code to process each Instructor object. Finally, don't forget to deallocate the dynamically-allocated Instructor objects to prevent memory leaks.

Learn more about Instructor Objects in C++:

brainly.com/question/14375939

#SPJ11

Write a C++ program that focuses on CPU SCHEDULING.

Answers

CPU scheduling is an operating system process that lets the system decide which process to run on the CPU. The task of CPU scheduling is to allocate the CPU to a process and handle resource sharing.

Scheduling of the CPU has a significant effect on system performance. The scheduling algorithm determines which process will be allocated to the CPU at a specific moment. A variety of CPU scheduling algorithms are available to choose from depending on the requirements. The  objective of CPU scheduling is to enhance system efficiency in terms of response time, throughput, and turnaround time.

The most well-known scheduling algorithms are FCFS (First-Come-First-Serve), SJF (Shortest Job First), SRT (Shortest Remaining Time), Priority, and Round Robin. To write a C++ program that focuses on CPU scheduling, we can use the following , Begin by importing the required header files .Step 2: Create a class called Process. Within the class, you can include the following parameters ,Create a Process object in the main function.

To know more about operating system visit:

https://brainly.com/question/33626924

#SPJ11

The μ-law is a. A protocol for data communication. b. A regulation from FCC for equal access. c. An audio codec scheme used in US d. An encryption algorithm for data communication. The function of codec is to a. Carry the digital signal on an analog signal b. Encrypt the digital signal for security protection c. Filter out noise in the signal d. Convert analog audio signal to digital signal and vice versa. What is the typical voice frquency range (speech communication)? a. 20−200 Hz b. 300−3,400 Hz c. 500−20,000 Hz d. 1,000−100,000 Hz

Answers

The correct options are c. An audio codec scheme used in US and d. Convert analog audio signal to digital signal and vice versa. The typical voice frequency range (speech communication) is b. 300−3,400 Hz.

μ-law is an audio codec scheme used in the US for digitizing analog signals. It is similar to the A-law algorithm that is used in Europe, Japan, and other countries. The "μ" in μ-law stands for mu, which is a Greek letter.The purpose of CodecThe function of codec is to convert analog audio signals to digital signals and vice versa. Codecs compress the digital signal in order to reduce the file size while maintaining audio quality.

They also decompress the digital signal in order to reproduce the original analog audio signal with the highest possible quality. Voice Frequency RangeThe typical voice frequency range, also known as speech communication, is between 300 Hz and 3,400 Hz. This range is important for human speech, which is why most telephony systems are designed to transmit signals in this frequency range. Outside of this range, other sounds, such as music or noise, can be heard.

Know more about Audio codec scheme here,

https://brainly.com/question/32820652

#SPJ11

answer the following questions relating to free-space management. what is the advantage of managing the free-space list as a bit-vector as opposed to a linked list? suppose a disk has 16 k blocks, each block of 1 kbytes, how many blocks are needed for managing a bit-vector?

Answers

Managing the free-space list as a bit-vector, as opposed to a linked list, offers the advantage of efficient storage and faster operations.

Why is managing the free-space list as a bit-vector advantageous compared to a linked list?

A bit-vector representation uses a compact array of bits, where each bit corresponds to a block on the disk. If a bit is set to 1, it indicates that the corresponding block is free, whereas a 0 indicates that the block is occupied. This representation requires much less space compared to a linked list, which typically needs additional memory for storing pointers.

Managing the free-space list as a bit-vector reduces the storage overhead significantly. In the given example, the disk has 16k blocks, each of size 1kbyte. To manage a bit-vector, we need 16k bits, as each block is represented by one bit. Since 8 bits make up a byte, we divide the number of bits (16k) by 8 to convert them into bytes. Therefore, we need (16k / 8) = 2k bytes for managing the bit-vector.

Learn more about advantage

brainly.com/question/7780461

#SPJ11

1.1 Which OSI model layer provides the user interface in the form of an entry point for programs to access the network infrastructure? a. Application layer b. Transport layer c. Network layer d. Physical layer 1.2 Which OSI model layer is responsible for code and character-set conversions and recognizing data formats? a. Application layer b. Presentation layer c. Session layer d. Network layer 1.3 Which layers of the OSI model do bridges, hubs, and routers primarily operate respectively? (1) a. Physical layer, Physical layer, Data Link layer b. Data Link layer, Data Link layer, Network layer c. Data Link layer, Physical layer, Network layer d. Physical layer, Data Link layer, Network layer 1.4 Which OSI model layer is responsible for converting data into signals appropriate for the transmission medium? a. Application layer b. Network layer c. Data Link layer d. Physical layer 1.5 At which layer of the OSI model do segmentation of a data stream happens? a. Physical layer b. Data Link layer c. Network layer d. Transport layer 1.6 Which one is the correct order when data is encapsulated? a. Data, frame, packet, segment, bits b. Segment, data, packet, frame, bits c. Data, segment, packet, frame, bits d. Data, segment, frame, packet, bits

Answers

 The Application layer provides the user interface in the form of an entry point for programs to access the network infrastructure.  

The Application layer provides the user interface in the form of an entry point for programs to access the network infrastructure. It helps to recognize the user’s communication requirements, such as how they want to retrieve data and what formats they require. This layer also provides authentication and authorization services, which allow users to access data or use network resources.

 The Presentation layer is responsible for code and character-set conversions and recognizing data formats. The main answer is b. Presentation layer. :The Presentation layer is responsible for code and character-set conversions and recognizing data formats. It is the third layer of the OSI model and is responsible for taking data and formatting it in a way that can be used by applications.  

To know more about network visit:

https://brainly.com/question/33632011

#SPJ11

Principal Components are computed as:
a.
Eigenvectors of the covariance matrix
b.
Eigenvalues of the covariance matrix
c.
Covariance matrix of the features
d.
Projection matrix (W) of top eigenvectors
e.
None of the listed options

Answers

Eigenvectors of the covariance matrix is the principal components. Therefore option (A) is the correct answer. The covariance matrix is a square matrix that represents the covariance between different features or variables in a dataset.

When we compute the eigenvectors of the covariance matrix, we are essentially finding the directions or axes along which the data varies the most. These eigenvectors, also known as principal components, capture the maximum amount of variance in the dataset.

The projection matrix (W) is formed by concatenating these top eigenvectors, allowing us to transform the original high-dimensional data into a lower-dimensional space defined by the principal components. Therefore, option a. Eigenvectors of the covariance matrix is the correct answer.

Learn more about projection matrix https://brainly.com/question/33050478

#SPJ11

Software Engineering Process
Topic- Availability:
Consider an ATM system.
Identify a set of concrete availability scenarios using each of the possible responses in the general scenario.
Create a fault tree including all possible failures, errors, and attacks. (Refer to the Fault tree analysis on pages 82 through 85 of the textbook.)
Determine the fault detection, recovery, and prevention tactics. What are the performance implications of using these tactics?
Redundancy is often cited as a key strategy for achieving high availability. Look at the tactics you determined and decide which of them exploit some form of redundancy and which do not.

Answers

Redundancy is a key strategy for achieving high availability in the ATM system.

Redundancy plays a crucial role in achieving high availability in the ATM system. By implementing redundant components and backup mechanisms, the system can continue to operate even in the presence of failures, errors, or attacks. Several tactics can be employed to ensure fault detection, recovery, and prevention, which contribute to overall system availability.

One availability scenario in the ATM system is hardware failure, where a critical component such as the card reader malfunctions. To address this, fault detection tactics like continuous monitoring and built-in self-tests can be employed to identify hardware failures in real-time. Recovery tactics may include redundant hardware components, such as backup card readers, which can seamlessly take over in case of failure. Additionally, prevention tactics like regular maintenance and component redundancy planning can minimize the occurrence of hardware failures, thereby improving availability.

Another scenario is a network connectivity issue, which can impact the communication between the ATM and the banking system. Fault detection can be achieved through network monitoring tools that detect connection failures. Recovery tactics may involve redundant network connections, allowing the system to switch to an alternative network path if the primary one fails. Prevention tactics such as implementing secure protocols and firewalls can mitigate the risk of network attacks and ensure uninterrupted connectivity.

Exploiting redundancy has performance implications. While redundancy enhances availability, it comes at a cost. Redundant components require additional resources and maintenance efforts, which can impact the system's performance. For example, redundant hardware increases the overall complexity and cost of the system, and redundant network connections may introduce additional latency. However, the performance impact can be minimized by carefully designing the redundancy mechanisms and optimizing resource allocation.

In conclusion, redundancy is a vital strategy for achieving high availability in the ATM system. By employing fault detection, recovery, and prevention tactics, the system can mitigate failures, errors, and attacks, thereby ensuring continuous operation. However, the introduction of redundancy should be balanced with careful consideration of the associated performance implications.

Learn more about Redundancy

brainly.com/question/13266841

#SPJ11

A set-associative cache consists of 64 lines, or slots, divided into four-line sets. Main memory contains 4 K blocks of 128 words each. Show the format of main memory addresses. 3. A two-way set-associative cache has lines of 16 bytes and a total size of 8kB. The 64−MB main memory is byte addressable. Show the format of main memory addresses.

Answers

The format of main memory addresses in a set-associative cache and a two-way set-associative cache depends on the cache organization and memory system specifications, including block/line size and memory size.

Format of main memory addresses in a set-associative cache with 64 lines and four-line sets:

The main memory consists of 4 K blocks, each containing 128 words.

The format of the main memory address would typically be: <Block Index> <Word Index>, where both indices are represented in binary.The block index requires 12 bits ([tex]2^{12}[/tex] = 4 K blocks) to address the blocks.The word index requires 7 bits ([tex]2^7[/tex] = 128 words) to address the words within a block.

Format of main memory addresses in a two-way set-associative cache with 16-byte lines and a total size of 8 kB:

The main memory has a size of 64 MB ([tex]64 \times 2^{20}[/tex] bytes).The cache lines are 16 bytes each.The format of the main memory address would typically be: <Byte Index>, represented in binary.The byte index requires 26 bits ([tex]2^{26}[/tex] = 64 MB) to address the individual bytes in the main memory.

The format of main memory addresses can vary depending on the specific cache organization and memory system implementation. The provided formats are general representations based on the given cache specifications.

Learn more about memory addresses: brainly.com/question/29044480

#SPJ11

____ are used by programs on the internet (remote) and on a user’s computer (local) to confirm the user’s identity and provide integrity assurance to any third party concerned.

Answers

Digital certificates are used by programs on the internet (remote) and on a user’s computer (local) to confirm the user’s identity and provide integrity assurance to any third party concerned.

These certificates are electronic documents that contain the certificate holder's public key. Digital certificates are issued by a Certificate Authority (CA) that ensures that the information contained in the certificate is correct.A digital certificate can be used for several purposes, including email security, encryption of network traffic, software authentication, and user authentication.

A digital certificate serves as a form of , similar to a passport or driver's license, in that it verifies the certificate holder's identity and provides assurance of their trustworthiness. Digital certificates are essential for secure online communication and e-commerce transactions. They assist in ensuring that information transmitted over the internet is secure and confidential. Digital certificates are used to establish secure communication between two parties by encrypting data transmissions. In this way, they help to prevent hackers from accessing sensitive information.

To know more about  Digital certificates visit:

https://brainly.com/question/33630781

#SPJ11

true or false? a process in the running state may be forced to give up the cpu in order to wait for resources.

Answers

True. A process in the running state may be forced to give up the CPU and enter a waiting state to wait for resources.

In a multitasking operating system, processes transition between different states, such as running, waiting, and ready. The running state indicates that a process is currently executing on the CPU. However, there are situations where a process may need to wait for certain resources to become available before it can proceed with its execution. This can happen, for example, when a process needs to access a file from disk or wait for user input.

When a process encounters such a situation, it can voluntarily relinquish the CPU by entering a waiting state. This allows other processes in the ready state to utilize the CPU resources in the meantime. The process will remain in the waiting state until the required resources become available. Once the resources are ready, the process will transition back to the ready state and eventually resume execution in the running state.

Therefore, it is true that a process in the running state may be forced to give up the CPU and enter a waiting state in order to wait for resources. This mechanism allows for efficient resource utilization and enables concurrent execution of multiple processes in a multitasking environment.

Learn more about waiting state here:

https://brainly.com/question/30897238

#SPJ11

Please type in the following assembly instructions into dragon Board and run it; then, tell the content in $1003. Org $1000 array db $25,$EF,$AE org $1500 Idaa array anda array +1 eora array+1 oraa array +1 anda array+2 staa array +3 swi end

Answers

The assembly instructions are as follows:$ ORG $1000Array DB $25,$EF,$AE$ ORG $1500IDAA ArrayANDA Array +1EORA Array+1ORAA Array +1ANDA Array+2STAA Array +3SWIEND The content of $1003 is $AE.

What are these assembly instructions for? These assembly instructions are for performing some operations on an array and then printing the results. The array has been defined and initialized in the instructions.The various operations performed are AND, EOR, OR, AND and STAA. The first ANDA instruction performs a logical AND operation between the values of Array and Array+1, which are $25 and $EF respectively. The result is stored in the accumulator.

Similarly, EORA instruction performs an exclusive-OR operation between the values of Array+1 and Array+2 and stores the result in the accumulator.The ORAA instruction performs a logical OR operation between the value of Array+1 and Array+2 and stores the result in the accumulator. The second ANDA instruction performs a logical AND operation between the value of Array and Array+2 and stores the result in the accumulator.Finally, the STAA instruction stores the contents of the accumulator into the memory location specified by Array+3, which is $AE. Thus, the content of $1003 is $AE.

Learn more about assembly instructions:

brainly.com/question/13171889

#SPJ11

a __________ is a collection of data records in a centralized database or a synchronized distributed database, defined to be authoritative within the organization.

Answers

A data warehouse is a collection of data records in a centralized database or a synchronized distributed database, defined to be authoritative within the organization.

This repository is a large and well-organized store of data that is used to guide the decision-making process within the company. Data warehousing is a process that involves the consolidation of data from multiple sources into a central location, which is then used to guide decision-making activities. A data warehouse is a collection of data records in a centralized database or a synchronized distributed database, defined to be authoritative within the organization.

A data warehouse is an essential tool for organizations that need to manage large volumes of data. These tools help organizations to efficiently consolidate data from various sources into a central location. The purpose of this is to provide a single source of truth for the organization. This means that all users within the organization can access and utilize the same data for their decision-making activities. The data within a data warehouse is well organized and structured. The information contained within a data warehouse is optimized for use by business analysts and decision-makers. This means that users can easily and quickly access the information they need to make informed decisions. A data warehouse is a crucial tool for organizations that need to manage large volumes of data. The tool helps organizations to efficiently consolidate data from various sources into a central location, which is then used to guide decision-making activities within the organization.

To know more about repository visit:

brainly.com/question/30710909

#SPJ11

Other Questions
You are considering acquiring shares of common stock in the Madison Beer Corporation. Your rate of return expectations are as follows:MADISON BEER CORP.Possible Rate of ReturnProbability-0.200.400.100.100.400.200.550.30Compute the expected return [E(Ri)] on your investment in Madison Beer. Round your answer to one decimal place. Write a single python file to perform the following tasks: (a) Get dataset "from sklearn. datasets import load iris". This datasethas 4 features. Split the dataset into two sets: 20% of sarples for training, and 80% of samples for testing. NOTE 1: Please use "from sklearn.model_selection import train_test_split" with "random statem Nm and "test_size-0. 8 ". NOTE 2: The offset/bias colamen is not needed here for augmenting the input features. (b) Generate the target output using one-hot eacoding for both the training set and the test set. (c) Using the same training and testsets generated above, perfom a polynomial regression futilizing "Erom sklearn.preprocessing import. PolynomialFeatures") from ordors 1 to 10 (adopting the weight-decay 12 regularization with regulariation factor k=0.0001 ) for classification (based on the onc-hot encoding) and compute the number of training and test samples that are classified correctly. NOTE 1: The offset/bias augmentation will be automatically generated by PolynomialFeatures. NOTE 2. If the number of rows in the training polynomial matrix is less than or equal to the number of columes, then use the dual form of ridge regression (Lecture 6). If not, use the primal form (Lecture 6). Instructions: please submit a single python file with filename contain a function A2 that takes in an integer "'s " random state as input and retums the following outputs in the following order: number_of training_sampeles. (1%) - X_test: testnumpy feature matrix with dimensions (number_of_test_samples x 4). (1\%) - Y_test: test target numpy amay (containing values 0,1 and 2 ) of length number_of test_samples. (1\%) - Ytr: one-hot encoded training target numpy matrix (containing only values 0 and 1) with dimension (number_of_training_samples 3). (1%) - Yts: one-hot encoded test target numpy matrix (containing only values 0 and 1) with dimension (number_of_test_samples 3)(1%) - Ptrain_1ist: list of training polynomial matrices for orders I to 10. Ptrain_list[0] should be polynomial matrices for order 1 (sixe number_of_training_samples x 5), Ptrain_list[1] should be polynomial matrices for order 2 (six number_of training_samples 15 ), ete. (1.5%) - Ptest_1ist: list of test polynomial matrices for orders 1 to 10. Ptest list[0] should be polynomial matrices for order 1, Prest_list[1] should be polynonial matrices for order 2, ete. (1.5\%) - w 1ist: list of estimated regression coefficients for arders 1 to 10. w. list[0] should be estimated regressiea coefficients for order 1, w_list[1] should be estimated regression coefficients for ofder 2, etc. (2\%) - error_train_array: numpy anay of training emor counts (emor count=number of samples classified incomectly) for orders 1 to 10 . error_train_array[0] is error count for polynomial order 1 , emor_train_anay[1] is error count for polynomial order 2 , ete. (2\%) error_test_array: numpy array of test emor counts (error eount = number of samples elassified incomectly) for orders 1 to 10 . error_test_array[0] is error count for polynonial order 1 , error_test_anray[1] is error count for polynomial order 2 , etc._(2\%) error count for polynomial order 2 , etc. (2%) Please use the python template provided to you. Do not conment out any lines. Remember to rename both and using your student matriculation numbet. For example, if your matriculation ID is A 123456?R, then you should submit "A2_A 1234567R py" that contains the function "A2_A1234567R". Please do NOT zip/compress your file. Please test your code at least once. Because of the large class size, points will be deducted if instructions are not followed. The way we would run your code night be something like this: > import A2 A1234567R as grading >>N=5 >) X_train, Y_train, X_test, Y_test, Ytr, Yts, Ptrain_1ist, Ptest_1ist, when adjusting comparable properties for the purposes of a valuation estimate, all of the following are common adjustments which are made for comparables except: Which of the following statements are True? Select all correct answersDirect moves are profitable when there are strong economies of density.In many to many cases, the focus is on aggregating high volume lanes.Consolidated moves always need to go through a hub for sorting.Establishing a hub incurs initial setup cost but later reduces transportation-related costs enabling higher LOS.Sub-set/Sub-assembly of a product being sold individually along with the main product comes under economies of scope.None of the above unanswered Find the equation of the line passing through the points (-(1)/(2),3) and (-4,(2)/(3)). Write the equation in standard form. An infant (5 days old) has lab results revealing an elevated level of unconjugated bilirubin, due to hemolysis of RBCs. Because of this, which assessment findings would correlate with this abnormal lab result? 2On January 1, 2024, Splash City issues $360,000 of 7% bonds, due in 10 years, with interest payable semiannually on June 30 and December 31 each year. Assuming the market interest rate on the issue date is 6%, the bonds will issue at $386,781. Required: 1. Complete the first three rows of an amortization schedule. (Round your final answers to the nearest whole dollar.) we are a consulting agency. in our business model, we receive projects, identified by a project id and having a date started and date completed. we have employees identified by an employee id and having a name. some of our employees are team leaders. the others are ordinary employees. a project team always has one and only one team leader, and must have at least one ordinary employee. the team leader writes at least one report on every employee assigned to the project. the team lead can write multiple reports for each employee. each report is given its own unique report number. the report contents are free text. The base of a triangle exceeds the height by 4 feet. If the area is 142.5 square feet, find the length of the base and the height of the triangle." a circular arc has measure and is intercepted by a central angle of radians. find the radius of the circle. Why does Shakespeare use allusions in Hamlet? Find the equation at the tangent line for the following function at the given point: g(x) = 9/x at x = 3. Use the accompanying Venn diagram, which shows the number of elements in region II to answer the following problem. If n(A)=29,n(B)=31, and n(U)=66, find the number of elements in each of regions I, I which of the following is not a consequence if less than 10% of the property under contract is damaged by fire prior to closing? You are making a graphic for automotive technicians that illustrates the procedure for performing a computerized vehicle inspection. Which of the following is the best graphic for displaying this information? MP.3 Construct Arguments Rounded to the nearest dime, what is the greatest amount of money that rounds to $105.40 ? What is the least amount of money that rounds to $105.40 ? Explain your answers. / This program has the user input a number n and then finds the 1/ mean of the first n positive integers 1/ Modify the code so that it computes the mean of the consecutive I/ positive integers n,n+1,n+2,,m, where the user chooses n and m. 1/ For example, if the user picks 3 and 9 , then the program should find the 1/ mean of 3,4,5,6,7,8, and 9 , which is 6 . 1/ EXAMPLE: 1/ Please enter a positive integer ' n ': 3 1/ Please enter a positive integer ' m ': 9 1/ The mean average from 3 to 9 is 6 1/ PLACE YOUR NAME HERE #include iostream using namespace std; Int main() \{ int value; 1/ value is some positive number n int total =0;// total holds the sum of the first n positive numbers float mean; // the average of the first n positive numbers cout "Please enter a Dositive integer: ": int main() \{ int value; If value is some positive number n int total =0; If total holds the sum of the first n positive numbers float mean; If the average of the first n positive numbers cout "Please enter a positive integer: "; cin value; if (value >) for ( int 1=1;i= value; i+t) {total=total+1; \}. I/ curly braces are optional since there is only one statement mean = float(total) / value; II note the use of the typecast cout "The mean average of the first " < value "positive integers is " k mean \& endl; 4 else cout "Invalid input - integer must be positive" Q.1.4 Recommend suitable organisation structures to promote knowledge management in (10) the business, as one of the key aspects of the knowledge management infrastructure. Justify your suggestions. The market for factors of production are Land, Labour, Capital, Enterprise True False Let R be a Regular Expression, be the empty string, and be the empty set. Choose the correct statement from below.Group of answer choices1)R = R = 2)R = R = R3)R = R = R