Create a Sub called "daisyDecisions" that runs when you click a button. In this sub, you will create a program that determines whether he/she loves you, or loves you not. The program should receive, as an input, the number of petals on the flower (i.e., have a variable for petals) and then use that number to determine the output of the program: if the number of petals is even, then the program should output that he/she loves you not, if odd, then he/she loves you.

Answers

Answer 1

Answer:

see explaination

Explanation:

Please find the screenprint and the VBA code. As shown in the screenprint, range B1 is used to enter the number of petals. If you want to use a different cell for petals input, then change the code accordingly.

Also, the VBA code is placed in the Sheet1 module. No new modules are inserted.

Screenprint: see attachment for screenshot

VBA Code:

Private Sub CommandButton1_Click()

Call daisyDecisions

End Sub

Private Sub daisyDecisions()

Dim remainder As Integer

Dim noOfPetals As Integer

noOfPetals = Sheet1.Range("B1").Value

remainder = noOfPetals Mod 2

If remainder <> 0 Then

MsgBox "He/She loves you!!!"

Else

MsgBox "He/She loves you not!!!"

End If

End Sub

Create A Sub Called "daisyDecisions" That Runs When You Click A Button. In This Sub, You Will Create

Related Questions

Write a code block to decode strings from secret encodings back to readable messages. To do so: Initialize a variable called decoded as an empty string Use a for loop to loop across all characters of a presumed string variable called encoded Inside the loop, convert the character to another character: Get the unicode code point for the character (using ord) Subtract the value of key to that code point (which should be an int) This undoes the secret encoding of the character, getting back to the original value Convert this new int back to a character (using chr). Also inside the loop, add this converted character to the string decoded

Answers

Answer:

The answer is provided in the attached document.

Explanation:

The explanation is provided in the attached document.

A company is deploying smartphones for its mobile salesforce. These devices are for personal and business use but are owned by the company. Sales personnel will save new customer data via a custom application developed for the company. This application will integrate with the contact information stored in the smartphones and will populate new customer records onto it. The customer application's data is encrypted at rest, and the application's connection to the back office system is considered secure. The Chief Information Security Officer (CISO) has concerns that customer contact information may be accidentally leaked due to the limited security capabilities of the devices and the planned controls. Which of the following will be the MOST efficient security control to implement to lower this risk?

A. Implement a mobile data loss agent on the devices to prevent any user manipulation with the contact information.
B. Restrict screen capture features on the devices when using the custom application and the contact information.
C. Restrict contact information storage dataflow so it is only shared with the customer application.
D. Require complex passwords for authentication when accessing the contact information.

Answers

Answer:

A. Implement a mobile data loss agent on the devices to prevent any user manipulation with the contact information

Explanation:

Given that, the task is to provide Security controls to lower the risk

Hence, one should undertand the various purpose of troubleshooting, which are:

1. Before the security breach, preventive measures are designed to stop or avoid security breach from occurrence.

2. During the security breach, detective actions are designed to establish and characterize a security breach.

3. After the event, corrective actions are purposely designed to stop the level of any damage caused by the security breach.

Hence, in this case, the MOST efficient security control to implement to lower this risk is to implement a mobile data loss agent on the devices to prevent any user manipulation with the contact information

This is because, Mobile Data Loss Prevention (DLP) is a security function that is provided through email or data security solutions. Thus, through its policies application, to the ActiveSync agent, sensitive information can be restricted from being sent to any ActiveSync-enabled mobile device

A computer supply company is located in a building with three wireless networks.
The system security team implemented a quarterly security scan and saw the following.
SSIDStateChannelLevel
Computer AreUs1connected170dbm
Computer AreUs2connected580dbm
Computer AreUs3connected375dbm
Computer AreUs4connected695dbm
Which of the following is this an example of?
A. Rogue access point
B. Near field communication
C. Jamming
D. Packet sniffing

Answers

Answer:

A. Rogue access point

Explanation:

A rogue access point is defined as a wireless access point installed on a secure network infrastructure without consent of the owner of the network or without due authorization. While this can sometimes be added by a malicious attacker, it is most commonly set up by employees with the desire to have wireless access even when there is any available.

In the question, there are three wireless networks, but on scanning, five wireless networks were found, hence they are rogue access point.

A binary tree is full if all of its vertices have either zero or two children. Let Bn denote the number of full binary trees with n vertices.


(a) By drawing out all full binary trees with 3, 5, or 7 vertices, determine the exact values of B3, B5, and B7. Why have we left out even numbers of vertices, like B4?


(b) For general n, derive a recurrence relation for Bn.

(c) Show by induction that Bn is (2n). 2.14. You are given an array of n elements, and

Answers

Full binary trees have odd vertex count. B3=1, B5=2, B7=5.

Recurrence: Bn = B((n-1)/2)^2 for n>1, B1=1. Bn = (2^(n-1))/n proven by induction.


(a) Determining B3, B5, and B7:

B3 = 1:

There's only one full binary tree with 3 vertices:

   *

  / \

 *   *

B5 = 2:

There are two full binary trees with 5 vertices:

   *       *

  / \     / \

 *   *   *   *

/ \        / \

*   *      *   *

B7 = 5:

There are five full binary trees with 7 vertices:

   *       *       *       *       *

  / \     / \     / \     / \     / \

 *   *   *   *   *   *   *   *   *   *

/ \        / \     / \     / \     / \

*   *      *   *   *   *   *   *   *   *

        / \        / \        / \

        *   *      *   *      *   *

Why even numbers of vertices are left out:

Full binary trees have a unique property: they always have an odd number of vertices. This is because each non-leaf node (a node with children) contributes 2 vertices (itself and its two children), while each leaf node (a node without children) contributes 1 vertex. The root node is always a non-leaf node, and the number of leaf nodes is always one more than the number of non-leaf nodes. Therefore, the total number of vertices is always odd.

(b) Recurrence relation for Bn:

To construct a full binary tree with n vertices (where n is odd), we can start with a root node and attach two full binary subtrees to it. The left subtree will have (n-1)/2 vertices, and the right subtree will also have (n-1)/2 vertices. Since we can choose any valid full binary tree with (n-1)/2 vertices for each subtree, the total number of full binary trees with n vertices is the product of the number of full binary trees with (n-1)/2 vertices on the left and (n-1)/2 vertices on the right.

This leads to the recurrence relation:

Bn = B((n-1)/2) * B((n-1)/2)   for n > 1, with B1 = 1

(c) Proof by induction that Bn = (2^(n-1))/n:

Base cases:

B1 = 1 = (2^0)/1, which holds.

B3 = 1 = (2^2)/3, which also holds.

Inductive step:

Assume the formula holds for Bk for all odd k less than or equal to n, where n is odd. We want to prove that it holds for Bn+2 as well.

Using the recurrence relation, we have:

Bn+2 = B((n+2-1)/2) * B((n+2-1)/2) = B((n+1)/2) * B((n+1)/2)

By the induction hypothesis, B((n+1)/2) = (2^((n+1)/2 - 1))/((n+1)/2). Substituting this into the equation above, we get:

Bn+2 = (2^((n+1)/2 - 1))/((n+1)/2) * (2^((n+1)/2 - 1))/((n+1)/2)

Simplifying the exponents and combining fractions, we obtain:

Bn+2 = (2^(n+1 - 2))/((n+1)/2 * (n+1)/2) = (2^(n-1))/(((n+1)^2)/4) = (4 * 2^(n-1))/(n+1)^2 = (2^(n+1))/(n+1)(n+1) = (2^(n+1))/(n+2)

Thus, the formula Bn = (2^(n-1))/n holds for Bn+2 as well, completing the induction



The probable question is in the image attached.

Write a function flush that takes as input a list of five cards, tests whether it is a flush (Note: straight flush is not a flush!) and return a boolean value. If the entry is anything other than five distinct cards, it should return (not print!) the message "This is not a valid poker hand".

Answers

Answer:

Explanation:

ef poker(hands):

   scores = [(i, score(hand.split())) for i, hand in enumerate(hands)]

   winner = sorted(scores , key=lambda x:x[1])[-1][0]

   return hands[winner]

def score(hand):

   ranks = '23456789TJQKA'

   rcounts = {ranks.find(r): ''.join(hand).count(r) for r, _ in hand}.items()

   score, ranks = zip(*sorted((cnt, rank) for rank, cnt in rcounts)[::-1])

   if len(score) == 5:

       if ranks[0:2] == (12, 3): #adjust if 5 high straight

           ranks = (3, 2, 1, 0, -1)

       straight = ranks[0] - ranks[4] == 4

       flush = len({suit for _, suit in hand}) == 1

       '''no pair, straight, flush, or straight flush'''

       score = ([1, (3,1,1,1)], [(3,1,1,2), (5,)])[flush][straight]

   return score, ranks

>>> poker(['8C TS KC 9H 4S', '7D 2S 5D 3S AC', '8C AD 8D AC 9C', '7C 5H 8D TD KS'])

'8C AD 8D AC 9C'

Create a class named BaseballGame that contains data fields for two team names and scores for each team in each of nine innings. names should be an array of two strings and scores should be a two-dimensional array of type int; the first dimension indexes the team (0 or 1) and the second dimension indexes the inning. Create get and set methods for each field. The get and set methods for the scores should require a parameter that indicates which inning’s score is being assigned or retrieved. Do not allow an inning score to be set if all the previous innings have not already been set. If a user attempts to set an inning that is not yet available, issue an error message. Also include a method named display in DemoBaseballGame.java that determines the winner of the game after scores for the last inning have been entered. (For this exercise, assume that a game might end in a tie.) Create two subclasses from BaseballGame: HighSchoolBaseballGame and LittleLeagueBaseballGame. High school baseball games have seven innings, and Little League games have six innings. Ensure that scores for later innings cannot be accessed for objects of these subtypes.

Answers

Answer:

Check the explanation

Explanation:

BaseballGame:

public class BaseballGame {

  protected String[] names = new String[2];

  protected int[][] scores;

  protected int innings;

  public BaseballGame() {

      innings = 9;

      scores = new int[2][9];

      for(int i = 0; i < 9; i++)

          scores[1][i] = scores[0][i] = -1;

  }

 

  public String getName(int team) {

      return names[team];

  }

  public void setNames(int team, String name) {

      names[team] = name;

  }

 

  public int getScore(int team, int inning) throws Exception {

      if(team < 0 || team >= 2)

          throw new Exception("Team is ut of bounds.");

      if(inning < 0 || inning >= innings)

          throw new Exception("Inning is ut of bounds.");

     

      return scores[team][inning];

  }

  public void setScores(int team, int inning, int score) throws Exception {

      if(team < 0 || team >= 2)

          throw new Exception("Team is ut of bounds.");

      if(inning < 0 || inning >= innings)

          throw new Exception("Inning is ut of bounds.");

      if(score < 0)

          throw new Exception("Score is ut of bounds.");

      for(int i = 0; i < inning; i++)

          if(scores[team][i] == -1)

              throw new Exception("Previous scores are not set.");

     

      scores[team][inning] = score;

  }

 

}

HighSchoolBaseballGame:

public class HighSchoolBaseballGame extends BaseballGame {

  public HighSchoolBaseballGame() {

      innings = 7;

      scores = new int[2][7];

      for(int i = 0; i < 7; i++)

          scores[1][i] = scores[0][i] = -1;

  }

}

LittleLeagueBaseballGame:

public class LittleLeagueBaseballGame extends BaseballGame {

  public LittleLeagueBaseballGame() {

      innings = 6;

      scores = new int[2][6];

      for(int i = 0; i < 6; i++)

          scores[1][i] = scores[0][i] = -1;

  }

}

RXOR is described as a 1-bit left-shift rotation performed on the current hash value before each block (in sequence) is being XOR-ed with it. That is, process each successive n-bit block of data: a. Rotate the current hash value to the left by one bit. b. XOR the block into the hash value. Is it true that the following bit flips result in finding a message different than the original and that this new message "produces" the same hash

Answers

Answer:

For this given problem as RXOR is a 1 bit left shift rotation performed on a current tash,it is true that this bit flips flips result in finding a message different than the original and that this new message "produces" the same hash.

A developer is creating an enhancement to an application that will allow people to be related to their employer. Which data model should be used to track the data? A. Create a junction object to relate many people to many employers through master-detail relationships B. Create a lookup relationship to indicate that a person has an employer C. Create a junction object tolerate many people to many employers through lookup relationships D. Create a master-detail relationship to indicate that a person has an employer

Answers

Final answer:

The correct data model for tracking the relationship between people and their employers, allowing for many-to-many relationships, is to create a junction object with master-detail relationships.

Explanation:

The question is asking which data model should be used to track the relationship between people and their employers in an application enhancement. The appropriate data model to use in this scenario is A. Create a junction object to relate many people to many employers through master-detail relationships. This solution allows for the creation of a many-to-many relationship between people and employers, which is necessary if employees can work for multiple employers and employers can have multiple employees.

In Salesforce, a junction object is a custom object with two master-detail relationships, and it's the standard way to handle many-to-many relationships. A lookup relationship (B. Create a lookup relationship to indicate that a person has an employer) is used for one-to-many relationships, which does not fit the requirement if an employee can have multiple employers or vice versa. Option C mentions using lookup relationships in a junction object, which is inaccurate since a junction object by definition uses master-detail relationships. D. Create a master-detail relationship to indicate that a person has an employer also does not suffice as it represents a one-to-many model. Therefore, option A is the correct choice for this enhancement.

Write a method called justFirstAndLast that takes a single String name and returns a new String that is only the first and last name.


You may get a name with a middle name or multiple middle names but you should ignore those.


You can assume that there will be at least two names in the given String.

Java

public String justFirstAndLast(String name)

{

}

Answers

Answer:

Answer is in the attached screenshot.

Explanation:

Using regex to split a given input string via whitespace, then returns the first and last element of the array.

The cost of an international call from New York to New Delhi is calculated as follows: Connection fee, $1.99; $2.00 for the first three minutes; and $0.45 for each additional minute. Write a program that prompts the user to enter the number of minutes the call lasted and outputs the amount due. Format your output with 2 decimal places c++

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   double minutes, cost = 0;

   cout<<"Enter the number of minutes: ";

   cin >> minutes;

   

   if (minutes <= 3)

       cost = 1.99 + (minutes * 2);

   else

       cost = 1.99 + (2 * 3 + (minutes - 3) *0.45);

       

   cout <<"The cost is: " << cost <<endl;

   return 0;

}

Explanation:

Declare the variables

Ask the user for the minutes

Check the minutes:

If it is less than or equal to 3, calculate the cost by summing multiplication of  the minutes by 2 and 1.99

Otherwise, calculate the cost by summing the multiplication of the first 3 minutes by 2, multiplication of  the remaining minutes by 0.45 and 1.99

Print the the cost

Final answer:

The program calculates the cost of an international call based on the connection fee, the rate for the first three minutes, and the rate for each additional minute, given the total call duration input by the user. It then outputs the total amount due formatted with two decimal places.

Explanation:

The question relates to creating a C++ program that calculates the total cost of an international call from New York to New Delhi. The cost includes a connection fee, a fixed cost for the first three minutes, and a variable cost for each additional minute. The C++ program must prompt the user for the duration of the call in minutes and calculate the total amount due based on the given rates. It should then display the final amount formatted to two decimal places.

Here is an outline of the program that performs this calculation:

#include
#include
using namespace std;
int main() {
   const double connectionFee = 1.99;
   const double firstThreeMinuteCost = 2.00;
   const double additionalMinuteCost = 0.45;
   int minutes;
   double amountDue;
   cout << "Enter the number of minutes the call lasted: ";
   cin >> minutes;
   if (minutes <= 3) {
       amountDue = connectionFee + firstThreeMinuteCost;
   } else {
       amountDue = connectionFee + firstThreeMinuteCost + (minutes - 3) * additionalMinuteCost;
   }
   cout << fixed << setprecision(2);
   cout << "The total amount due for the call is $" << amountDue << endl;
   return 0;
}
The user is prompted for the total minutes of the call. The program calculates the cost considering all the constraints and displays the result with two decimal places using fixed and setprecision manipulators.

Recall that to multiply an m×n matrix by an n×k matrix requires m×n×k multiplications. The Google PageRank algorithm uses a square matrix that’s filled with non-zero entries when pages link to one another. Suppose we have m web sites cataloged: this is then an m×m matrix. Denote this matrix by P. P is then run through an iterative algorithm that takes j loops to complete (for 5 < j < 100), and each step of this loop an m×m matrix is multiplied by P.

a. mj log m
b. m^2
c. m^3
d. m^4
e. m^2j^2
f. m^2log m

Answers

Answer:

option C i.e. m^3 is the correct option.

Explanation:

The Multiplication of one m x m matrix with a different m x m matrix will take time m x m x m = m3

And given that this multiplication occurred for j iterations, therefore, the total number of multiplication will be j * m3 = jm3

Consequently, the complexity order will be jm3

Since 5< j < 100, hence j can be substituted by constant and for this reason among all the options mentioned, option C i.e. m^3 is correct.

A custom window shade designer charges a base fee of $50 per shade. In addition, charges are added for certain styles, sizes, and colors as follows.

Styles:

Regular shades:Add $0

Folding shades: Add $10

Roman shades: Add $15



Sizes:

25 inches wide: Add $0

27 inches wide: Add $2

32 inches wide: Add $4

40 inches wide: Add $6



Colors:

Natural: Add $5

Blue: Add $0

Teal: Add $0

Red: Add $0

Green: Add $0



Create an application that allows the user to select the style, size, color, and number of shades from list boxes or combo boxes. if a combo box is used, set its drop-downstyle property in such a way the the new items cannot be added to the customer list by the user total charges should be displayed on a second form.

Answers

Answer:

Check the explanation

Explanation:

* Filename: ShadeDesigner.java

* Programmer: Jamin A. Bishop

* Date: 3/31/2012

* version 1.00 2012/4/2

*/

import java. awt.*;

import java. awt. event.*;

import java. text. DecimalFormat;

import javax. swing.*;

import javax. swing. event. ListSelectionEvent;

import javax. swing. event. ListSelectionListener;

public class ShadeDesigner extends JFrame

{

private String[] styles = {"Regular Shades", "Folding Shades", "Roman Shades"};

private String[] size = {"25 Inches Wide", "27 Inches Wide",

"32 Inches Wide", "40 Inches Wide"};

private String[] colors = {"Natural", "Blue", "Teal",

"Red", "Green"};

private JLabel banner;// To display a banner

private JPanel bannerPanel;// To hold the banner

private JPanel stylesPanel;//

private JPanel sizePanel;//

private JPanel colorPanel;

private JPanel buttonPanel;//

private JList stylesList;

private JList sizeList;

private JList colorList;

private JTextField Styles;

private JTextField Size;

private JTextField Color;

private JButton calcButton;

private JButton ExitButton;

private double totalCharges = 50.00;

//Constants

private final int ROWS = 5;

private final double regularCost = 0.00;//base price for the blinds

private final double foldingCost = 10.00;//extra cost for folding blinds

private final double romanCost = 15.00;//extra cost for roman blinds

private final double twentyfiveInCost = 0.00; //extra cost for 25" blinds

private final double twentySevenInCost = 2.00;//extra cost for 27" blinds

private final double thirtyTwoInCost = 4.00;//extra cost for 32" blinds

private final double fourtyInCost = 6.00;//extra cost for 40" blinds

private final double naturalColorCost = 5.00;//extra cost for color

public ShadeDesigner()

{

//display a title

setTitle("Shade Designer");

// Specify what happens when the close button is clicked.

setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);

// Create the banner on a panel and add it to the North region.

buildBannerPanel();

add(bannerPanel, BorderLayout. NORTH);

stylesPanel();

add(stylesPanel, BorderLayout. WEST);

sizePanel();

add(sizePanel, BorderLayout. CENTER);

colorPanel();

add(colorPanel, BorderLayout. EAST);

buttonPanel();

add(buttonPanel, BorderLayout. SOUTH);

pack();

setVisible(true);

}

//build the bannerpanel

private void buildBannerPanel()

{

bannerPanel = new JPanel();

bannerPanel.setLayout(new FlowLayout(FlowLayout.CENTER));

banner = new JLabel("Shade Designer");

banner.setFont(new Font("SanSerif", Font.BOLD, 24));

bannerPanel.add(banner);

}

//stylepanel

private void stylesPanel()

{

JLabel styleTitle = new JLabel("Select a Style.");

stylesPanel = new JPanel();

stylesPanel. setBorder(BorderFactory. createEmptyBorder(5,5,5,5));

stylesList = new JList (styles);

stylesList.setVisibleRowCount(ROWS);

JScrollPane stylesScrollPane = new JScrollPane(stylesList);

stylesList. setSelectionMode(ListSelectionModel.SINGLE_SELECTION);

stylesList. addListSelectionListener(new stylesListListener());

stylesPanel. setLayout(new BorderLayout());

stylesPanel. add(styleTitle, BorderLayout. NORTH);

stylesPanel. add(stylesScrollPane, BorderLayout. CENTER);

Styles = new JTextField (5);

Styles. setEditable(false);

//stylesPanel. add(StylesLabel, BorderLayout. CENTER);

stylesPanel. add(Styles, BorderLayout. SOUTH);

}

private class stylesListListener implements ListSelectionListener

{

public void valueChanged (ListSelectionEvent e)

{

String selection = (String) stylesList. getSelectedValue();

Styles. setText(selection);

}

}

//size panel

private void sizePanel()

{

JLabel sizeTitle = new JLabel("Select a Size.");

sizePanel = new JPanel();

sizePanel. setBorder(BorderFactory. createEmptyBorder(5,5,5,5));

sizeList = new JList (size);

sizeList.setVisibleRowCount(ROWS);

JScrollPane stylesScrollPane = new JScrollPane(sizeList);

sizeList.setSelectionMode(ListSelectionModel.SINGLE_SELECTION);

sizeList.addListSelectionListener(new sizeListListener());

sizePanel. setLayout(new BorderLayout());

sizePanel. add(sizeTitle, BorderLayout. NORTH);

sizePanel. add(stylesScrollPane, BorderLayout. CENTER);

//sizeLabel = new JLabel("Style Selected: ");

Size = new JTextField (5);

Size.setEditable(false);

//stylesPanel. add(StylesLabel, BorderLayout. CENTER);

sizePanel. add(Size, BorderLayout. SOUTH);

}

private class sizeListListener implements ListSelectionListener

{

public void valueChanged (ListSelectionEvent e)

{

String selection = (String) sizeList. getSelectedValue();

Size. setText(selection);

}

}

Write a loop to store the letters “f” through “w” in an array named letters. Then, print the contents of the array to the screen.

Answers

Answer:

#include<iostream>

#include<conio.h>

using namespace std;

main()

{

 

char a[18];

 

int k=102;

for (int j=0; j<18; j++)

{

a[j]=k;  

k=k+1;

 

}

 

cout<<"The Array of characters between f and W is Given below"<<endl;

for (int l=0;l<18;l++)

{

 cout<<a[l]<<endl;

}

getch();  

}

Explanation:

In this program, list of characters has been printed between f and w using for loop as per requirement. An array has been taken with name a and size 18, as there are 18 elements from f to w. As we know that ASCII code of Small f is 102 in decimal, we store that in another variable k. Start loop  and assign ASCII code of each alphabet using 'k' variable to array a. After that array of assigned alphabets has been printed.

Write a query to display the invoice number, line numbers, product SKUs, product descriptions, and brand ID for sales of sealer and top coat products of the same brand on the same invoice. Sort the results by invoice number in ascending order, first line number in ascending order, and then by second line number in descending order

Answers

Final answer:

To display the invoice number, line numbers, product SKUs, product descriptions, and brand ID for sales of sealer and top coat products of the same brand on the same invoice, you can use a SQL query with multiple joins and sorting conditions.

Explanation:

To display the invoice number, line numbers, product SKUs, product descriptions, and brand ID for sales of sealer and top coat products of the same brand on the same invoice, you can use SQL query with multiple joins and sorting conditions. Here's an example:

SELECT i.invoice_number, l1.line_number, l1.product_sku, l1.product_description, l1.brand_id
FROM invoices i
JOIN lines l1 ON i.invoice_number = l1.invoice_number
JOIN lines l2 ON i.invoice_number = l2.invoice_number AND l1.brand_id = l2.brand_id
WHERE l1.product_description LIKE '%sealer%' AND l2.product_description LIKE '%top coat%'
ORDER BY i.invoice_number ASC, l1.line_number ASC, l2.line_number DESC;

This query assumes that the tables for invoices are named 'invoices' and the tables for lines are named 'lines'. Modify the table names and column names according to your database schema.

Final answer:

The SQL query should select invoice numbers, line numbers, product SKUs, product descriptions, and brand IDs where product descriptions are 'sealer' or 'top coat' and group by invoice number and brand, ensuring there are at least two such products on the same invoice. The query should sort results as specified.

Explanation:

Writing a SQL query involves selecting specific columns from a table and applying the conditions that match the data retrieval requirements. For this scenario, we want to display invoice numbers, line numbers, product SKUs, product descriptions, and brand IDs for sales of 'sealer' and 'top coat' products of the same brand on the same invoice. Additionally, we are asked to ensure the results are sorted by invoice number in ascending order, first line number in ascending order, and then by second line number in descending order.

Here is an example of what the SQL query might look like:

SELECT InvoiceNumber, LineNumber1, LineNumber2, SKU, ProductDescription, BrandID FROM Sales WHERE (ProductDescription = 'sealer' OR ProductDescription = 'top coat') AND BrandID IS NOT NULL GROUP BY InvoiceNumber, BrandID HAVING COUNT(*) > 1 ORDER BY InvoiceNumber ASC, LineNumber1 ASC, LineNumber2 DESC;

Note that database structure is assumed, and actual table and column names may vary.

Suppose you need to organize a collection of telephone numbers for a company division. There are currently about 6,000 employees, and you know that the phone switch can handle at most 10,000 phone numbers. You expect several hundred lookups against the collection every day. Would you use an array list or a linked list to store the information

Answers

Answer:

Using an array list is preferable

Explanation:

A Linked List is an arranged collection of information of the same type in which each element is connected to the next using pointers.

An array list contains set of similar data objects stored in a well arranged memory locations under a common heading or a variable name.

Array elements can be accessed randomly using the array index and can be looked up anytime which makes it correct.Random accessing is not possible in linked list.

Answer:

I would use an array list over a linked list to store the given information from the question.

Explanation:

Let us define what an array list and linked list are

Array list: Array List and Linked List both maintains insertion order and  implements List interface. Array List basically uses a dynamic array to keep or store  the elements.

Linked list: Linked List internally uses a  list that is doubly linked to keep or store the elements

Now,

Using an array list will be of advantage  than a linked list as far as look ups are concerned. also we do have some idea about the size of information,

while a Linked list  will be useful when we don't know the size of data. also retrieving the information from the array list is much more simpler than linked list as  random access is possible with arrays against sequential traversal for lists.

Each time an item is added and requires reallocation, count X + 1 units of cost, where X is the number of items currently in the array. This cost will cover the X assignments which are necessary to copy the contents of the full array into a new (larger) array, and the additional assignment to put the item which did not fit originally To make this more concrete, if the array has 8 spaces and is holding 5 items, adding the sixth will cost 1. However, if the array has 8 spaces and is holding 8 items, adding the ninth will cost 9 (8 to move the existing items + 1 to assign the ninth item once space is available).

When we can bound an average cost of an operation in this fashion, but not bound the worst case execution time, we call it amortized constant execution time, or average execution time. Amortized constant execution time is often written as O(1+), the plus sign indicating it is not a guaranteed execution time bound.

In a file called amortizedAnalysis.txt, please provide answers to the following questions:


1. How many cost units are spent in the entire process of performing 16 consecutive push operations on an empty array which starts out at capacity 8, assuming that the array will double in capacity each time new item is added to an already full dynamic array? Now try it for 32 consecutive push operations. As N (ie. the number of pushes) grows large, under this strategy for resizing, what is the big-oh complexity for push?


2. How many cost units are spent in the entire process of performing 16 consecutive push operations on an empty array which starts out at capacity 8, assuming that the array will grow by a constant 2 spaces each time new item is added to an already full dynamic array? Now try it for 32 consecutive push operations. As N (ie. the number of pushes) grows large, under this strategy for resizing, what is the big-oh complexity for push?

Answers

Answer:

1. Average of total Cost = Total Cost/n = O(1)

2. Average of total Cost = Total Cost/n = O(n)

Explanation:

1) Array has Initial size of 8

For adding 16 elements

1. So Cost for first 8 element its 8.

2. On adding 9th element cost is (8+1) = 9 and array is resized to size of 16

3. Then for 10th,11th,12th,.......,16th element Cost is 7.

So total cost is 8 +9 + 7 = 24 ..So for adding 16 elements Cost is 24 units.

For adding 32 elements

1. So Cost for first 8 element its 8.

2. On adding 9th element cost is (8+1) = 9 and array is resized to size of 16

3. Then for 10th,11th,12th,.......,16th element total Cost is 7.

4. On adding 17th element cost is (16+1) = 17 and array is resized to size of 32.

5. Then for 18th,19th,20th,.......,32th element total Cost is 15.

So total cost is 8 +9 + 7 +17+15= 56 ..So for adding 32 elements Cost is 56 units.

We are Intrested in finding the Amortized Cost i.e Averga cost over large number of insertion:-

When the array size is doubled:-

N operation of N pushes will have cost of 1+2+4+8+16+.. + 2k where 2k < N, Summing upo the series we have

2k-1 - 2 . But 2k <=n <= 2k-1 So,

The total cost of the sequence of n insertions will be O(n) .

Since the Amortized Cost is the Average of total Cost = Total Cost/n = O(1)

2) resize by increasing the size by 2 elements

For adding 16 elements

1. So Cost for first 8 element its 8.

2. On adding 9th element cost is (8+1) = 9 and array is resized to size of 10

3. Then for 10th element Cost is 1

4. Then for 11th element Cost is 11

5.Then for 12th element Cost is 1

6.Then for 13th element Cost is 13

6.Then for 14th element Cost is 1

6.Then for 15th element Cost is 15

6.Then for 16th element Cost is 1

So total cost is 60 ..So for adding 16 elements Cost is 60 units.

For adding 32 elements

1. So Cost for first 8 element its 8.

2. On adding 9th element cost is (8+1) = 9 and array is resized to size of 10

3. Then for 10th element Cost is 1

4. Then for 11th element Cost is 11

5.Then for 12th element Cost is 1

7.Then for 13th element Cost is 13

8.Then for 14th element Cost is 1

9.Then for 15th element Cost is 15

10.Then for 16th element Cost is 1

11. Then for 17th element Cost is 17

12. Then for 18th element Cost is 1

13.Then for 19th element Cost is 19

14.Then for 20th element Cost is 1

15.Then for 21th element Cost is 21

16.Then for 22th element Cost is 1

17.Then for 23th element Cost is 23 .. . . .. .. Then for 31th element Cost is 31 .. . . . . . . . . .. Then for 32th element Cost is 1 .

So total cost is 260 ..So for adding 32 elements Cost is 260 units.

N operation of N pushes will have cost of 1+2+3+4+5+.. + N-1 = N(N-1)/2

The total cost of the sequence of n insertions will be O(n2) .

Since the Amortized Cost is the Average of total Cost = Total Cost/n = O(n)

Which of the following is true of e-learning and computer-based training (CBT)?

a. Simulations and games are social media tools that can be used for training.
b. It is not advisable to integrate instruction text with games in e-learning and CBT.
c. Trainees can collaborate with other learners in standalone CBT.
d. E-learning includes the delivery of instruction only through a firm’s intranet, never the Internet.
e. Trainees can answer questions and choose responses in standalone CBT.

Answers

Answer:

The answer is "Option c".

Explanation:

This teaching is normally taken at the origin of machines in software-based research. It can also be installing a computer system into their computer or take the electronic training module generally sponsored by the firm's academic Online media, and the wrong option can be described as follows:

In option a, It is wrong because this tool is not used in training. In option b, It is integrated with game and e-learning, that's why it is incorrect. Option d and Options e both were wrong because it can't include delivery and standalone CBT.

The true statement regarding e-learning and computer-based training (CBT) is trainees can answer questions and choose responses in standalone CBT.

Option E is the correct answer.

We have,

In standalone CBT, trainees can interact with the training program by answering questions, choosing responses, and engaging in various activities without the need for internet connectivity or external collaboration.

Standalone CBT typically includes interactive elements that allow trainees to actively participate and respond to the training materials.

Thus,

The true statement regarding e-learning and computer-based training (CBT) is trainees can answer questions and choose responses in standalone CBT.

Learn more about e-learning and CPT here:

https://brainly.com/question/30038878

#SPJ6

JAVA
Write a function that calculates a total amount of money a worker has made when given the initial salary (per month) and months worked. Every year the worker is at the job, their salary increases by $100 per month.

public static int totalPay(int initial_salary, int months){
}

Answers

Answer:

Answer provided in screenshot, not really too happy with my implementation but it works.

Explanation:

Iterate through months, handling logic for every 12 months to get the raise.

Java is a high-level, class-based, object-oriented programming language that aims to have as few implementation dependencies as feasible.

What is the coding ?

public class FooCorporation {

   static final double minimumWage = 8.0; // static means that can be accessed without creating an object of the class and instantiating it

   static final int maxHours = 60; // final means constant = cannot be changed after declared

static double basePay=0; // initialize them to zero, at least you know your program won't throw null pointer exception if forgot to set their

                            //values before invoking the method

static int hoursWorked=0;

public static void main(String[] args) {

Scanner in = new Scanner(System.in);

for (int i=1; i<=3; i++, System.out.println()){

System.out.println("For Employee Number: " + i);

System.out.println("Enter Base Pay:");

basePay = in.nextDouble();

System.out.println("Enter Hours Worked:");

hoursWorked = in.nextInt();

salaryCalculation();

}

}

public static void salaryCalculation(){

double totalSalary = 0;

 if ((basePay < minimumWage) || (hoursWorked > maxHours)){

  System.out.println("Error!");

  }

else {  

if (hoursWorked > totalSalary = basePay * 40 + 1.5*basePay*(hoursWorked - 40);

 }

 else {

 totalSalary = basePay * hoursWorked;

  }

  System.out.println("Your total salary is " + totalSalary);

  }

Java is a high-level, class-based, object-oriented programming language that aims to have as few implementation dependencies as feasible.

To learn more about Java refer to:

https://brainly.com/question/26642771

#SPJ2

Chose the number from following, and using Quadratic Selection Sort, the size of the auxiliary file is_____ . The first value in the auxiliary file is _______and the fourth value is______ , if you start counting with one, not zero. The largest value in the auxiliary file will be replaced with _______. The largest remaining value will be replaced with_______

40 73 43 64 25 82 37 49 58 76 67 85 28 46 88 61 19 52 70 31 79 55 22 34 16

Answers

Answer:

25, 40, 64, 16, 34

Explanation:

the size of the auxiliary file is 25

The first value in the auxiliary file is 40

the fourth value is 64

Largest value will be replaced with 16

The largest remaining value will be replaced with 34

Hot sites ________. are a.more expensive than CDP b.Lose less data during a disaster than CDP c.Both are more expensive than CDP and Lose less data during a disaster than CDP d.Neither are more expensive than CDP nor Lose less data during a disaster than CDP

Answers

Answer:

d. Neither are more expensive than CDP nor Lose less data during a disaster than CDP

Explanation:

A hot site is considered a site that remain very much functional and permits immediate recovery when a disaster occurs. One great advantage of hot sites is that they can be used for operation before the occurrence of a disaster. Hot sites are usually cost effective and hence are less expensive than CDP. With hot sites, users are only faced with minimal downtime in the course of a disaster that affects one of the data centers, hence it is not that they lose less data during a disaster than CDP.

Problem 1 (Authentication): Consider the following authentication protocol, which uses a classical cryptosystem. Alice generates a random message r, enciphers it with the key k she shares with Bob, and sends the enciphered message {r}k to Bob. Bob deciphers it, adds 1 to r, and sends {r + 1}k back to Alice. Alice deciphers the message and compares it with r. If the difference is 1, she knows that her correspondent shares the same key k and is therefore Bob. If not, she assumes that her correspondent does not share the key k and so is not Bob. Does this protocol authenticate Bob to Alice? If so, Why? Otherwise, explain why not.

Answers

Answer:

Check the explanation

Explanation:

Yes, going by the question above, the protocol validates Bob to Alice for the reason that the key is only shared between Bob and Alice as well as the number which is being sent randomly. Therefore the invader won’t be able to predict and response to that number. Because of the authentication protocol, that makes use of a classical cryptosystem thereby resulting into the possibility of an argument such that key finding is attainable via invader.

Final answer:

While the described protocol aims to authenticate Bob to Alice using a shared symmetric key, it doesn't guard against a man-in-the-middle attack wherein the attacker could intercept and relay the encrypted messages without either party knowing, thereby failing to provide foolproof authentication.

Explanation:

The proposed authentication protocol attempts to authenticate Bob to Alice by having Alice generate a random message r, encrypt it using a shared symmetric key k, and send it to Bob. Bob then decrypts the message, increments r by 1, and sends it back to Alice in encrypted form using the same key. Alice will determine the authenticity of Bob if the decrypted message equals r + 1.

This protocol assumes that only Alice and Bob share the symmetric key k and that any interception or alteration of the messages would lead to an incorrect response from a non-authentic party. However, this method does not fully protect against a man-in-the-middle attack, where an attacker could intercept the initial message from Alice, decrypt it, increment, re-encrypt using a key known to the attacker, and forward it to Bob, then doing the reverse of this process when Bob replies. This would give Alice the impression that she is communicating with Bob when in fact the attacker is relaying the messages.

Additionally, without a way to ensure that the key hasn't been compromised or a method to spot interception, such as with cryptographic hashes, the protocol does not provide a robust authentication mechanism against all potential attacks. Public key cryptography and cryptographic hash functions are examples of technologies that can improve the authentication process by enabling secure key exchanges and providing a way to verify the integrity and authenticity of a communication.

1) Write expressions of relational algebra for the following queries draw the query trees for each and write the SQL statement: a. What PC models have a speed of at least 3.00 b. What the model numbers of all color printers c. Which manufacturer make laptops with at least 100 GB d. Find the model and price of all products (of any type) made by manufacturer "B" e. Find the manufacturers that sell laptops but not PC.

Answers

Answer:

Explanation:

Find attach the solution

The expressions of relational algebra for the given queries and the query trees for each with the SQL statement are explained.

Given are expressions for the given queries in relational algebra, draw the query trees, and provide the corresponding SQL statements:

Let's assume we have the following tables:

PC (model, speed, ram, hd, price)

Printer (model, color, type, price)

Laptop (model, speed, ram, hd, screen, price)

Product (model, type, price)

Manufacturer (name, country)

a. Relational algebra expression: π model (σ speed ≥ 3.00 (PC))

Query tree:

    π model

      |

     σ speed >= 3.00

      |

    PC

SQL statement:

SELECT model

FROM PC

WHERE speed >= 3.00;

b. Relational algebra expression: π model (σ color = 'color' (Printer))

Query tree:

    π model

      |

     σ color = 'color'

      |

   Printer

SQL statement:

SELECT model

FROM Printer

WHERE color = 'color';

(Note: Replace 'color' with the actual value representing color printers.)

c. Relational algebra expression: π name (σ hd ≥ 100 (Laptop ⋈ Manufacturer))

Query tree:

     π name

       |

      σ hd >= 100

       |

  Laptop ⋈ Manufacturer

SQL statement:

SELECT DISTINCT m.name

FROM Laptop l

INNER JOIN Manufacturer m ON l.model = m.model

WHERE l.hd >= 100;

d. Relational algebra expression: π model, price (σ name = 'B' (Product ⋈ Manufacturer))

Query tree:

     π model, price

        |

       σ name = 'B'

        |

  Product ⋈ Manufacturer

SQL statement:

SELECT p.model, p.price

FROM Product p

INNER JOIN Manufacturer m ON p.model = m.model

WHERE m.name = 'B';

e. Relational algebra expression: π name (Manufacturer) - π name (σ type = 'PC' (Product ⋈ Manufacturer)) ⋈ π name (σ type = 'Laptop' (Product ⋈ Manufacturer))

Query tree:

      π name (Manufacturer)

          |

          -

         / \

        /   \

  π name    π name (σ type = 'Laptop' (Product ⋈ Manufacturer))

              |

             σ type = 'PC'

              |

        Product ⋈ Manufacturer

SQL statement:

SELECT DISTINCT m.name

FROM Manufacturer m

WHERE m.name NOT IN (

   SELECT DISTINCT m2.name

   FROM Product p

   INNER JOIN Manufacturer m2 ON p.model = m2.model

   WHERE p.type = 'PC'

)

AND m.name IN (

   SELECT DISTINCT m3.name

   FROM Product p

   INNER JOIN Manufacturer m3 ON p.model = m3.model

   WHERE p.type = 'Laptop'

);

Please note that the SQL statements assume the actual column names in the tables may vary, and you need to adjust them accordingly.

Learn more about SQL statements click;

https://brainly.com/question/34389274

#SPJ3

1. Write program, WriteData.java, that writes the following data to file books.txt. Include the semicolons. Fiction;Abraham Lincoln Vampire Hunter;Grahame-Smith;Wiley;NY;13.99;222 Fiction;Frankenstein;Shelley;Prescott;GA;7.99;321 NonFiction;Life of Kennedy;Jones;Pearson;MT;12.90;biography Fiction;Dracula;Stoker;Addison;CA;5.99;145 Fiction;Curse of the Wolfman;Hageman;Wesley;MA;10.59;876 NonFiction;How to Pass Java;Willis;Wiley;NY;1.99;technology Fiction;The Mummy;Rice;Addision;CA;7.99;954 NonFiction;History of Texas;Smith;Prescott;CA;9.75;history 2. Write class Publisher with attributes name and state. 3. Rewrite the Book class to include a type Publisher attribute. 4. Write two children of the Book class: FictionBook and NonFictionBook. FictionBook has an additional attribute, fictionCode. NonFictionBook has an additional attribute, catagoryCode. 5. Rewrite the BookTest program. Method buildInstances will read the data from the file, create instances of FictionBook and NonfictionBook from the data, assign these instances to the Book array and return the bookArray as before. Since it is reading data from the file, it does not have any method parameters. 6. Method createCharges should work the same.

Answers

Answer:

Check the explanation

Explanation:

WriteData.java:

import java.io.FileWriter;

import java.io.PrintWriter;

class WriteData {

  String[][] data;

 

  public WriteData() {

      // Data to write to the file

      data = new String[][]{{ "Fiction", "Abraham Lincoln Vampire Hunter", "Grahame-Smith", "Wiley", "NY", "13.99", "222"},

          {"Fiction", "Frankenstein", "Shelley", "Prescott", "GA", "7.99", "321"},

          {"NonFiction", "Life of Kennedy", "Jones", "Pearson", "MT", "12.90", "biography"},

          {"Fiction", "Dracula", "Stoker", "Addison", "CA", "5.99", "145"},

          {"Fiction", "Curse of the Wolfman", "Hageman", "Wesley", "MA", "10.59", "876"},

          {"NonFiction", "How to Pass Java", "Willis", "Wiley", "NY", "1.99", "technology"},

          {"Fiction", "The Mummy", "Rice", "Addision", "CA", "7.99", "954"},

          {"NonFiction", "History of Texas", "Smith", "Prescott", "CA", "9.75", "history"}};

      }

 

  public void writeToFile() {

      try {

          PrintWriter pw = new PrintWriter(new FileWriter("books.txt"));   // Creating an output stream to write to file

         

          // Writing data to the file line by line

          for (int i = 0; i < 8; i++) {

              pw.println(data[i][0] + ";" + data[i][1] + ";" + data[i][2] + ";" + data[i][3] + ";" + data[i][4] + ";" + data[i][5] + ";" + data[i][6]);

          }

         

          pw.close();       // Closing the created output stream

      }

      catch(Exception e) {

          System.err.println(e);

      }

  }

}

Publisher.java:

class Publisher {

  private String name, state;

 

  public Publisher(String name, String state) {

      this.name = name;

      this.state = state;

  }

 

  // Getters and Setters

  public String getName() {

      return name;

  }

  public void setName(String name) {

      this.name = name;

  }

  public String getState() {

      return state;

  }

  public void setState(String state) {

      this.state = state;

  }

 

  public String toString() {

      return name + ";" + state;

  }

}

Book.java:

class Book {

  private String title, author;

  private double price;

  private Publisher publisher;

  public Book(String title, String author, Publisher publisher, double price) {

      this.title = title;

      this.author = author;

      this.publisher = publisher;

      this.price = price;

  }

  public Double calculateCharge(int Qty){

      return getPrice()*Qty;

  }

  public String getTitle() {

      return title;

  }

  public void setTitle(String title) {

      this.title = title;

  }

  public String getAuthor() {

      return author;

  }

  public void setAuthor(String author) {

      this.author = author;

  }

  public String getPublisher() {

      return publisher.toString();

  }

  public void setPublisher(Publisher publisher) {

      this.publisher = publisher;

  }

  public double getPrice() {

      return price;

  }

  public void setPrice(double price) {

      this.price = price;

  }

}

FictionBook.java:

class FictionBook extends Book {

  String fictionCode;

 

  public FictionBook(String title, String author, Publisher publisher, double price, String fictionCode) {

      super(title, author, publisher, price);       // Calling the parent constructor to initialize values

      this.fictionCode = fictionCode;

  }

 

  // Getter and Setter

  public String getFictionCode() {

      return fictionCode;

  }

  public void setFictionCode(String fictionCode) {

      this.fictionCode = fictionCode;

  }

}

NonFictionBook.java:

class NonFictionBook extends Book {

  String categoryCode;

 

  public NonFictionBook(String title, String author, Publisher publisher, double price, String categoryCode) {

      super(title, author, publisher, price);       // Calling the parent constructor to initialize values

      this.categoryCode = categoryCode;

  }

 

  // Getter and Setter

  public String getCategoryCode() {

      return categoryCode;

  }

  public void setCategoryCode(String categoryCode) {

      this.categoryCode = categoryCode;

  }

}

BookTest.java:

import java.util.Scanner;

import java.util.*;

import java.io.File;

import java.io.FileNotFoundException;

public class BookTest {

  public static void main(String[] args) {

      // TODO code application logic here

     

      // Writing data to the file using WriteData.java program

      WriteData writeData = new WriteData();

      writeData.writeToFile();

     

      int[] BookQauntity = {12, 8, 3, 53, 7, 23, 14, 5, 6};

      Book[] book = new BookTest().buildInstances();

      Double GrandTotal= new BookTest().createCharges(BookQauntity, book);

      System.out.println("GrandTotal : "+ GrandTotal);

 

 

  }

      catch(FileNotFoundException e) {

          System.err.println("File not found");

      }

     

      return bk;

  };

 

  // ISBN info is removed

  Double createCharges(int[] BookQuantity, Book[] book){

      Double Gtotal =0.0, total=0.0;

      for(int i=0; i<8; i++){

          total = book[i].calculateCharge(BookQuantity[i]);

          System.out.println("Title : "+ book[i].getTitle() + ", Total Charge : "+ total);

          Gtotal +=total;

      }

     

      return Gtotal;

  };

}

Functional side effects: 15) Given the following Java/C++ like code. Assuming function calls (operands) are evaluated from left-to-right, one at a time. a) What outputs are printed to the screen? int a = 4; // global variable int fun1() { a = 2; return 3; } int fun2() { return a; } void main() { int x = fun1() + fun2(); System.out.println("x = " + x); } Answer: x = b) What outputs are printed to the screen? int a = 4; // global variable int fun1() { a = 2; return 3; } int fun2() { return a; } void main() { int x = fun2() + fun1(); System.out.println("x = " + x); } Answer: x =

Answers

Answer:

a. x = 5

b. x = 7

Explanation:

a)

OUTPUT: x = 5

In the main() function, fun1() is evaluated first and it updates the value of the global variable to 2 and returns 3.

The second function returns the value of the global variable 'a' and this variable has value 2.

So,

x = 3 + 2

x = 5

b)

OUTPUT: x = 7

In the main() function, fun2() is evaluated first and it returns 4 because global variable 'a' is initialized with value 4.

The second function fun()1 will returns the value 3.

So,

x = 4 + 3

x = 7

Suppose you are given a sequence or array of n real numbers (a1, a2, . . . , an), all distinct. We are interested in sorting this list, and ideally sorting it as efficiently as possible / with minimal effort. All information relevant to sorting a list can be thought of as contained in the order permutation. If a list (a1, a2, a3) has an ordering permutation of (3, 1, 2), that would mean a3 ≤ a1 ≤ a2, hence, the sorted form of the list would be (a3, a1, a2). This permutation encodes how all the elements compare to one another.
1) How many possible ways could a list of n values be ordered, i.e., how many ordering permutations are there?
2) Argue that if you know a list’s order permutation, sorting is easy (linear time), and conversely, if you know the steps to sort the list, you can easily generate the order permutation.
3) Given this, argue that sorting can’t be easier than finding the order permutation.
4) If every element comparison (testing where ai ≤ aj ) provides at most one bit of information, argue that in order to be able to sort any list, you need to perform at least approximately log2 (n!) many comparisons.
5) Based on the prior result, argue that merge sort is, asymptotically, as or more efficient than any other sorting algorithm.

Answers

Answer:

1. n

2. we can slect that permutation without any comparison and the array wil be sorted in to one time.

3. we cannot sort the list without any comparision test.

Explanation:

1. The total number of permutations available are n! because there are ' n ' distinct elements in an array.

2. Here we are given the total ordering permutations, among those available permutations there will be one permutation in which all the elements of the array are sorted. so, we can slect that permutation without any comparison and the array wil be sorted in to one time.

3. If there is no total ordering permutation then we cannot sort the list without any comparision test. In this case we should know the the number of inversion required to see the array. Based on the permutations we can select the permutation which requires minimum inversions. Here inversion sort works well.

See attachment for the details of 4 and 5.

Design an application in which the number of days for each month in the year is stored in an array. (For example, January has 31 days, February has 28, and so on. Assume that the year is not a leap year.) Display 12 sentences in the same format for each month; for example, the sentence displayed for January is Month 1 has 31 days.

Answers

Final answer:

To design an application in which the number of days for each month in the year is stored in an array, create an array of integers representing the number of days in each month. Use a loop to display 12 sentences, each containing the month number and the corresponding number of days.

Explanation:

To design an application in which the number of days for each month in the year is stored in an array, you can create an array of integers representing the number of days in each month. Here's an example:

int[] daysInMonth = new int[]{31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31};

Then, you can use a loop to display 12 sentences, each containing the month number and the corresponding number of days. Here's an example:

for (int i = 0; i < 12; i++) {
  System.out.println("Month " + (i + 1) + " has " + daysInMonth[i] + " days.");
}

Final answer:

To design the application, create an array with the number of days corresponding to each month and iterate through the array to display sentences for each month using the provided mnemonic or the knuckle mnemonic to remember the days.

Explanation:

To design an application that stores the number of days for each month in an array, we'll assume a non-leap year. We have the mnemonics "Thirty days hath September, April, June, and November. All the rest have thirty-one, save the second one alone, Which has four and twenty-four, till leap year gives it one day more". So, we'll create an array with the following values: 31 (January), 28 (February), 31 (March), 30 (April), 31 (May), 30 (June), 31 (July), 31 (August), 30 (September), 31 (October), 30 (November), 31 (December). Then, we can iterate through this array and display the sentences accordingly.

For example, the following pseudo-code can be used to display the sentences:Initialize an array daysInMonths = [31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31]For each index in the array representing a month (starting from 0 for January):

Print "Month (index + 1) has (value at current index) days"

The knuckle mnemonic is a physical way to remember the number of days in each month, where months with 31 days are represented by the protruding knuckles and shorter months fall in the spots between the knuckles.

Write a static method named countLastDigits that accepts an array of integers as a parameter and examines its elements to determine how many end in 0, how many end in 1, how many end in 2 and so on. Your method will return an array of counters. The count of how many elements end in 0 should be stored in its element at index 0, how many of the values end in 1 should be stored in its element at index 1, and so on.

Answers

Answer:

See explaination for the program code

Explanation:

code:

public static int[] countLastDigits(int[] list) {

int[] count = new int[10];

for (int i = 0; i < list.length; i++) {

int digit = list[i] % 10;

count[digit]++;

}

return count;

}

The program which counts the number of elements with ends with a certain digit is given below with, elements ending with 0 as index, 1 and so on.

public static int[] countLastDigits(int[] list) {

#initializes a function named countLastDigits

int[] count = new int[10];

for (int i = 0; i < list.length; i++) {

#a for loop to iterate over the array created

int digit = list[i] % 10;

count[digit]++;

#appends to counts variable

}

return count;

}

Learn more : https://brainly.com/question/18478903

Suppose a program is running on a distributed-memory multiprocessor. There are 1,000 instructions in the program and 80% of instruction references hit in the local memory and 20% of instruction references involve the remote communication in the remote memory. 10 ns time is required for the remote communication for each instruction reference. If the CPU clock rate is 4 GHZ and CPI is 0.5, what is the running time of this program?

Answers

Answer:

2125 ns.

Explanation:

First of all Execution Time = Number of Instructions * CPI * Clock Cycle

Number of Instructions = 1000

CPI = 0.5

Clock Cycle = 1/clock rate = 1/4GHz = 0.25 * 10-9 s

So Execution Time = 1000 * 0.5 * 0.25 * 10-9

Execution Time = 125 * 10-9 s

Execution Time = 125 ns

Now 20% of the instructions take 10 ns extra time for remote communication.

1 instruction takes 10ns

so 20% of 1000 = 200 instructions will take 200*10 = 2000ns

So Total Execution Time = 125+2000 = 2125 ns.

Which of the following are ways a vote thief could cast multiple votes in an online election? (check all that apply)
a. Using a DoS attack to make a legitimate vote server unavailable and direct voters to fake vote servers
b. Purchasing pass codes from people willing to sell their right to vote
c. Setting up fake vote servers to collect pass codes of voters
d. Using social engineering techniques to get pass codes from targeted voters

Answers

Answer:

All of the given options apply and are correct.          

Explanation:

a) The first option is correct because the intruder can use denial-of-service attack and by flooding the site with traffic to get the voter server unavailable. Then he can direct the voters to a fraud vote server.

b) The second options correctly applies too because the thief also buys the pass codes from the people who want to sell their right to vote and this way the thief can purchase multiple pass code and cast multiple votes.

c) The hackers can set up fake vote servers and then direct the voters to these servers or websites in order to collect pass codes of voters. These pass codes can then be misused by the thief to cast multiple votes in an online election.

d) Social engineering techniques can also be used to get pass codes from certain voters. By manipulating the targeted voters psychologically they can get their pass codes to cast multiple votes illegally.

Which of the following is specified by the detailed procedures in a test plan?​ Question 12 options: The result of the final test of all programs How a separate operational and test environment is prepared The test data to be used Who will work with the new system and ensure that all necessary features have been included

Answers

Final answer:

A test plan typically details 'the test data to be used,' which includes sets of inputs designed to test software functionality and validate outcomes.

Explanation:

The question asks which component is specified by the detailed procedures in a test plan. Of the options provided, the one that is typically detailed in a test plan is the test data to be used. A test plan contains comprehensive information about the testing strategy, test objectives, resources needed for testing, test environment, test limitations, and the schedule of testing activities. Importantly, it specifies the test data which are sets of inputs given to a software program during testing to ascertain an expected outcome and validate the software's functionality.

Other Questions
ratio questionI will mark brainliest Melatonin is secreted byA.the hypothalamus during the dayB.the pineal gland during the nightC.the autonomic nervous system during the winterD.the thyroid gland during cold seasons A companys manager estimates that in the upcoming year, increasing advertising costs by $25,000 will cause sales revenue to increase by $60,000. If the companys contribution margin ratio is 35%, what will be overall effect on net income? Group of answer choices Michael drove 36 000 s at 65 km/hr. How far did Michael drive in meters? Show each step of the process and use correct significant digits and units in your final answer. You must write this out as one long calculation in order to get full marks. * what is the most significant imitation in this document for a reader trying to decide if the war in vietnam was justifiedA it does not include many facts or details about the conflict in Vietnam.B it does not provide background or history about communism in Vietnam.C it was created to tell about deploying troops in general, but not in Vietnam specifically.D it was created to persuade people, not to provide an object point of view. The box below to the left represents ions in a certain volume of 0.10MHCl(aq) . In the box below to the right, draw a representation of ions in the same volume of 0.20MHCl(aq) Why was North Americas human landscape closely mirrors that of its physical environment: varied, rich, and constantly changing . and how did it contribute to the growth of the United States? ( national geographic) An effective decision maker should: A. Rely on primary sources of information and avoid secondary sources when making decisions. B. Promote groupthink to evaluate potential solutions. C. Make decisions based solely on financial and environmental factors. D. Have a clear view of values and keep them in mind at each step of the process. Which man was a Union general known for attacking his opponent's resources Cmo afecta el tipo de vivienda al estilo de vida de las personas en tu comunidad? Compara tus observacionesacerca de las comunidades en las que has vivido con tus observaciones de una regin del mundo hispanohablante quete sea familiar. (vivo en los estados unidos) The establishment of the polis or "city-state" was the greatest political achievement of this society. The polis was a single city around which all political units in the area were centered. All of the city-states controlled their own land and were independent from one another. Sparta was the largest of the city-states. At one time, it controlled more than 3,000 square miles of surrounding territory.Which of these societies is described by the passage above? A. Indus River Valley B. Greece C. Ancient Egypt D. Mesopotamia Write a recursive function, len, that accepts a parameter that holds a string value, and returns the number of characters in the string. The length of the string is: 0 if the string is empy ("") 1 more than the length of the string beyond the first character The Civil War was fought between the North and South primarily over the issues of - Noah has $10 to spend at the produce market. Can he buy 7 apples and 2 oranges? there are 2 piles of paper on a desk. each pile has the same number of papers. there are 12 people in all on the desk. how many papers are in each pile? 3. When does Rome fall? Many variants of poker are played with both cards in players hands and shared community cards. Players hand are some combination of the two sets of cards. For parts (a) and (b), consider playing such that Anna, Brad, Charlie, and Dre each have 2 cards for themselves, and build a 5 card hand out of those 2 cards and 3 shared cards. Assume a standard 52-card deck is being used.What is the probability that Anna has a flush, where her 2 cards and the 3 community cards share a suit? What Makes Water So Special? Why? When you hear that NASA's space probes are looking for "evidence of life" on other planets, do you know what that means? They are looking for evidence of liquid water. Water is fundamental for all life; without it every living thing would die. Water covers about 70% of Earth's surface and it makes up 65-75% of our bodies (82% of our blood is water). Even if water might seem boring to you-no color, taste, or smell-it has amazing properties that make it necessary for supporting life. 1) How many hydrogen atoms are in a molecule of water? 2) How many oxygen atoms are in a molecule of water? 3) What holds the hydrogen atoms to the oxygen atom? 4)The shading around the molecule represents the relative density of electrons shared by the atoms. What does this indicate about the density of electrons around the oxygen atom as compared to the density of electrons around the hydrogen atoms? 5) Where is the majority of negative charge on the water molecule? Describe how you would find 24+ 36 using mental math what role did the roman system of bureaucracy play in the pax romana