Write a C++ program that usesInsertion Sort to sort an unsorted list of numbers.

Answers

Answer 1

C++ program - Insertion sort

#include <bits/stdc++.h>  

using namespace std;  

/* Defining function for sorting numbers*/

void insertionSort(int array[], int n)  

{  

   int i, k, a;  

  for(i=1;i<n;i++)

           {

              k=array[i];

               a=i-1;

            while(a>=0 && array[a] > k) // moving elements of array[0 to i-1] are greater than k, to one position //

                      {

                       array[a+1] = array[a];

                        a =a-1;

                      }

              array[a+1] =k;

             }  

}              

/* Driver function */

int main()  

{  

   int array[] = { 12,56,76,43,21};   //input integers

   int n = sizeof(array) / sizeof(array[0]);   //finding size of array

 

   insertionSort(array, n);   //Calling function

    for (int i = 0; i < n; i++)   //printing sorted array

        cout << array[i] << " ";  

    cout << endl;  

    return 0;  

}  


Related Questions

Write a pseudocode statement thatsubtracts the vaiable downPayment from the variable total andassigns the reult to the variable due.

Answers

Answer:

initialize the variables total and downPayment.

int due = total - downPayment;

Explanation:

In the programming, before use the variable in the code you have to declare the variable.

then, there are the mathematical operators in the programming to perform the mathematical calculation.

for perform addition, the operator is '+'.

for performing multiplication, the operator is '*'.

similarly, for performing subtraction, the operator is '-'.

and there is one more assignment operator in programming which is used to assign the value to the variables. The assignment operator is '='.

so,  int due = total - downPayment;

in the above, the program subtracts the downPayment value from the total value and assign to the variable due which is an integer type.

________splitting places a group of columns in onetable and the remaining columns in anothertable.1. Horizontal2. Vertical3. Both 1 and 2

Answers

Answer:

2. Vertical

Explanation:

Vertical splitting places a group of columns in one table and the remaining columns in another table.

Write a calculator program that keep reading operations and double numbers from user, and print the result based on the chosen operation using while loop. The loop must stop if the user enters Q letter.

NOTE: no need to write two classes.

Typical run of the program:

Enter an operation(+,-,*,/), Q to quit: +

Enter your first number: 6

Enter your second number: 5

Result= 11.0

Enter an operation(+,-,*,/), Q to quit: *

Enter your first number: 5

Enter your second number: 5

Result= 25.0

Enter an operation(+,-,*,/), Q to quit: q

You calculator has been ended!

Answers

Answer:

 #include <iostream>

using namespace std;

int main()

{

   char opt;

   double num1,num2;

   cout<<"Enter an operation(+,-,*,/), Q to quit: ";

   cin>>opt;

  while(opt != 'Q'){

      cout<<"\nEnter your first number: ";

      cin>>num1;

      cout<<"\nEnter your second number: ";

      cin>>num2;

      if(opt == '+'){

          cout<<"Result = "<<num1+num2<<endl;

      }else if(opt == '-'){

           cout<<"Result = "<<num1-num2<<endl;

      }else if(opt == '*'){

           cout<<"Result = "<<num1*num2<<endl;

      }else if(opt == '/'){

           cout<<"Result = "<<num1/num2<<endl;

      }

      cout<<"Enter an operation(+,-,*,/), Q to quit: ";

      cin>>opt;

  }

  return 0;

}

Explanation:

First, include the library iostream, it allows to use the input/output instruction.

Create the main function and declare the variables.

Then print the message on the screen using cout instruction.

cin instruction is used to store the value into the variable.

then, take a while and check the condition if the value enters by the user is 'Q' or not. if true then enter the while otherwise exit.

after that, store the number enter by the user in the variables and then take the if-else statement for matching the operation enter by the user if match true then do the match operation.

This process continues until the user enters the value 'Q'.

if the user enters the 'Q'  then condition false and exit the program.

TRUE/FALSE



The Interrupt Vectors stored in the Interrupt Vector table are really just the addresses of the interrupt service routines

Answers

Answer:

TRUE

Explanation:

Interrupt Vectors in the Interrupt Vector table represent the address of the Interrupt Service Routine.

Lets consider an example. When we press a key on the keyboard, a hardware interrupt is raised corresponding to keypress event. The control passes to the corresponding Interrupt Vector in the Interrupt Vector table which in turn directs the execution flow to the keyboard interrupt handler.

. Which of thefollowing is not a characteristic of marketing plan?

a. It shouldprovide a strategy to accomplish the company mission

b. It shouldprovide for the use of existing resources

c. It should besimple and short

d. It should berigid

Answers

Answer: d)It should be rigid

Explanation: Marketing plan is the basic report that gives the outline about the strategy of marketing in the coming time. The marketing strategy usually include the facts such as simple plan, using resources accordingly and in sufficient way, some future goals, metrics with high level,etc .But the plan should not be rigid, it will make the marketing plan restricted to certain limit which is not included in good marketing strategy.

what is daemontools pakage in qmail?

Answers

Answer: Daemon-tools package is a group of tools which are present for the observation of the UNIX  service in qmail. The services and saving of the error messages to logs are monitored by these tools. It helps in simplification of the management and makes the process easy.It has data or information of the errors which occur when setting up or execution of daemon-tools on a particular system.

Special variables that hold copies of function arguments are called _________.

Answers

Answer:

Special variables that hold copies of function arguments are called parameters.

Describe the general process of creating a DataFlow Diagram (DFD)

Answers

 Answer:

General process of creating a data flow diagram:

  Data flow diagram are used to represents the flow of data graphically and it is divided into physical and logical parameters. For creating the data flow diagram the steps involved are:

Select the data and name the DFD. In DFD add the entity for start the process and add that process in data flow diagram. Add a data store and continuous adding that data into DFD.Now, adding the data flow in DFD and name the data.

 

Which of the following is NOT foundwithin the content pane?labelstitlebartextareasbuttons

Answers

Answer: Title bar

Explanation: Content pane is like a content box with certain features containing the object and knowledge about it. It is usually referred with several factors like labels , text, buttons etc to load the data in the dynamic way. These features are  present within the content pane. The only feature outside the content pane is title bar and thus is not found in content pane.

What is the output of the following code? (Please indent thestatement correctly first.)

int x = 9;
int y = 8;
int z = 7;

if (x > 9)
if (y > 8)
System.out.println("x > 9 and y > 8");
else if (z > = 7)
System.out.println("x < = 9 and z > = 7");
else
System.out.println("x < = 9 and z < 7");

Answers

Answer:

no output, it does not print any thing

Explanation:

if-else statement is used to execute the statement after checking the condition if the condition is true, it allows the program to execute the statement otherwise not.

in the code, define the variable with values x = 9, y = 8 and z = 7.

Then, if the statement checks the condition 9 > 9, the condition is false.

So, the program terminates the if statement and executes the next statement but there is no next statement.

the other if-else statement is within the if condition which already terminates.

Therefore, there is no output.

Among all the scientists of the 1930s, ________ was sosuited to carry out the Manhattan project as J.RobertOppenheimer.
no scientists
not who was a scientist
none
a scientist never he

Answers

Answer:

none

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

The above phrase does not have any correct entry. The correct way of stating the sentence would be the following.

"Among all the scientists of the 1930's, none were as suited to carry out the Manhattan Project as J. Robert Oppenheimer."

none is an available answer but since the next part of the sentence says was so it would not make sense or be grammatically correct. Therefore you can either change the available answers or change the next two words in order for the sentence to make sense as well as be grammatically correct.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Among all the scientists of the 1930s, none was so suited to carry out the Manhattan Project as J. Robert Oppenheimer.

J. Robert Oppenheimer was an influential theoretical physicist who was tasked by President Franklin Roosevelt to lead the United States' nuclear program during World War II.

His leadership and expertise were crucial to the success of the Manhattan Project, which was carried out in Los Alamos, New Mexico, and resulted in the development of the first nuclear bomb.

Thanks to his exceptional talent, Oppenheimer is often referred to as the 'father of the bomb.'

In which of the following is “y” not equal to 5 after execution? X is equal to 4.

a) y = ++x; b) y = x = 5; c) y = 5; d) y = x++;

Answers

Answer:

d) y=x++

Explanation:

In all 3 statements:

y= ++x;

y=x=5;

y=5;

The value of y is equal to 5.

However in the statement y=x++, the value of 5 is equal to value of x prior to the increment operation. The original value of x was 4. So the value of y will be 4. Note that after the statement execution, the value of x will be updated to 5. In effect y=x++ can be visualized as a sequence of following steps:

x=4;

y=x;

x=x+1;

What process makes one group a member of another group? nesting cloning copying grouping

Answers

Answer: Nesting

Explanation: The process of making one group the part of another group is defines as nesting. it is mostly done in the programming . This process helps in reduction of the program by nesting the functions. Nesting is done in computer field in applications as well to make one document the part of other  document .Therefore, nesting is the correct option .

T F The exit function can only be called from main .

Answers

Answer:

FALSE

Explanation:

The exit function is used to terminate or halt the process.

Syntax-

            void exit(int status)  

Exit function (exit()) can be used in any function not only main() and it will terminate your whole process.

Example- C Program

#include<stdio.h>

#include <stdlib.h>  

//  function declaration

float exitexample ( float x );                                

// Driver program

int main( )                

{

 float a, b ;

 printf ( "\nEnter some number for finding square \n");

  scanf ( "%f", &a ) ;

 // function call

 b = exitexample ( a ) ;                      

 printf ( "\nSquare of the given number %f is %f",a,b );  

/*This will not printed as exit function is in exitexample() function*/

}

float exitexample ( float x )   // function definition  

{

 exit(0);    //exit function

   float p ;

  p = x * x ;

return ( p ) ;

}

What is the printout of the call nPrint("a", 4)?

static void nPrint(String message, int n) {
while (n > 0) {
System.out.print(message);
n--;
}
}
Please explain so that I can learn from you.

Answers

Answer:

aaaa

Explanation:

We have a function nPrint which return type is void, it means it returns nothing.

we declare the two parameters, one parameter is string type and the second parameter is an integer type.

Then, it has a while loop that executes the statement again and again until the condition not FALSE.

Let dry run the code:

First, call the function nPrint("a", 4) bypassing the value in the argument.

then, the value receives by the parameters, the message contains "a" and n contain 4. After that, while loop checks the condition 4 > 0, which is TRUE and the program starts executing the statement.

The program prints the message on the screen "a" and then decreases the value of n by 1. So, the value of n becomes 3.

The above process repeats for the value of n = 3, 2, 1

and print the message "aaaa".

then, the condition becomes false and the program terminates the loop.

Therefore, the answer is aaaa

From the binary search algorithm, it follows that every iteration of the while loop cuts the size of the search list by half.

True

False

Answers

Answer:

True: In binary search algorithm, we follow the below steps sequentially:

Input: A sorted array  B[1,2,...n] of n items and one item x to be searched.

Output: The index of x in B if exists in B, 0 otherwise.

low=1high=n while( low < high )  {      mid=low + (high-low)/2         if( B[mid]==x)          {             return(mid)  //returns mid as the index of x           }          else          {              if( B[mid] < x)      //takes only right half of the array               {                 low=mid+1               }              else               // takes only the left half of the array               {                high=mid-1               }           }  }return( 0 )

Explanation:

For each iteration the line number 11 or line number 15 will be executed.

Both lines, cut the array size to half of it and takes as the input for next iteration.

The good example of pivoting is changing thedimensions along the axis.? True? False

Answers

Answer:

False

Explanation:

The good example of pivoting is NOT changing the dimensions along the axis.

Write a complete C program that obtains two integers from the user, saves them in the memory, and calls the function void swap (int *a, int *b) to swap the content of the two integers. The main function of your program should display the two integers before and after swapping.

Answers

C program for swapping numbers

#include <stdio.h>

void swap(int *num1, int *num2)/*Defining function  for swapping the numbers*/

{

   int temp; /*using third variable to store data of numbers*/

  temp = *num1;    

  *num1 = *num2;  

  *num2 = temp;      

}

int main ()//driver function

{

  int a,b;

  printf("Enter the numbers for swapping\n");//taking input

  scanf("%d %d",&a,&b);

  printf("The numbers before swapping is a =%d and b=%d \n",a,b);  

  swap(&a, &b);//calling function for swaping  

  printf("The numbers after swapping is a=%d and b=%d",a,b);  

  return 0;      

}

Output

Enter the numbers for swapping  3,4

The numbers before swapping is a =3 and b=4  

The numbers after swapping is a=4 and b=3

Which of the following will cause asyntax error?(0 < num)&& (num <12)0 < num <120 < num&& num < 12num > 0&& num <12

Answers

Answer:

The answer to this question is that none of the following will give syntax error.All of them will get executed.

(0 < num)&& (num <12)

0 < num <12

0 < num&& num < 12

num > 0&& num <12

There is no syntax error i have checked on the compiler also.But logically we take variable on the left side of the comparison operator and the value to the right of the operator.

x, y,w and z are Booleanvariables. Make the truth table for the expressiongiven below. (Marks8)

z =NOT(x XORy )AND w

Answers

Answer:

Refer the image for the truth table.

Explanation:

First 3 columns of the truth table are for the values of x,y,and w. The fourth columns is for the expression x XOR y .XOR gives output 1 when the inputs are not same if they are same the output is 0.Fifth column is for the NOT of X XOR y.Then the last columns is for the expression z that is and operation of w and the expression in fifth column.

When the amount of storage data is big, and we need the searching and insertion must be very fast, which kind of data structure we should consider? a. Hash table b. Binary tree c. Array d. Linked Lists

Answers

Answer:

b. Binary tree

Explanation:

The time complexity of a binary tree is O(log n). As it scales up in size (n), the time taken is only log n. This is because it makes use of divide and conquer to split up the data which makes searching and inserting very simple. However, this only holds if the data is already sorted.

When displaying fonts, what%u2019s the difference between pixels, points and ems?

Answers

Answer:

All 3 are CSS unit sizes which we can use for margins, fonts, borders etc.

Explanation:

CSS has four different unit sizes. These are:

Pixels (px)

Points (pt)

Ems (em)

Percentages(%)

These units are divided into two different groups. They are fixed and relative.

Pixels and points are fixed , whereas em and percentages are relative unit sizes. Relative unit sizes are good when creating scalable layouts.

Ems (em):

An em is a CSS unit that measures the size of a font. Originally, the em was equal to the width of the capital letter M, which is where its name originated.

It stands for "emphemeral unit" which is relative to the current font size.

The "em" is a scalable unit that  is used in web document media. Ems have mobile-device-friendly nature.

Pixels (px):

Pixels are fixed-size units that are used in screen media. One pixel is equal to one dot in computer. The problem with pixel unit is that it is not relative .

Points (pt):

Point values are only for print. A point is a unit of measurement use for real-life ink on paper. Generally, 72pts= 1 inch which is one real-life inch like on  a ruler. Point  is not recommended to use in web pages.

Generally, 1em=16px=12pt=100% if the body size is 100%.

Relative unit sized fonts change and fixed unit sized fonts remain the same.

For example,

body { font-size: 100%}

p{font-size: 16px}

Which is it?...coloring,flagging,filing, or reading your email is an easy way to catergorize it?

Answers

Answer:

Flagging is an easy way to categorize an email.

Explanation:

We can flag our emails to find it easily at a later time. Flagged email messages are easy to spot because of their icon. We can also flag email messages for following up on a particular email.

Thus flagging is an easy way to categorize an email.

The _________ function causes a program to terminate.

Answers

Answer:  exit

Explanation:

exit function terminates the calling process without executing the rest of the code.exit function do some cleaning before termination like buffer flushes etc.

exit(0) exits the program without any error message.

syntax:- void exit(int return code)

You have to include stdlib.h header file in c if you want to use exit function.

The purpose of a report is to

A. organize and summarize data.
B. filter data.
C. search for specific data points.
D. sort data chronologically.

Answers

Answer:

c

Explanation:

Reports communicate information which has been compiled as a result of research and analysis of data and of issues

Glven an array named Scores with 25 elements, what is the correct way to assign the 25th element to myScore? A. myScores + 25 B. myScore Scores[24] C. myScore Scores[25) D. myScore== Score[last]

Answers

Answer:

myScore Scores[24]

Explanation:

The array is used to store the data in continuous memory location.

The index of array start from zero, it means first element store in the index zero and second element store in the index 1. So, the index at which the element store is less than 1 from the number of element.

so, the last element is 25 - 1=24.

Option A: myScores + 25

It is not the correct way to store the element.

Option B: myScore Scores[24]

it is the correct form and also the index location is correct.

Option C: myScore Scores[25)

index number is wrong and also the bracket is wrong, it must be [ ].

Option D: myScore== Score[last]

It is not the correct way to store the element.

There, the correct option is B.

Is recursion ever required to solve a problem? What other approach can you use to solve a problem that is repetitive in nature?

Answers

Answer:

No you can not tell that recursion is ever required to solve a problem.

Recursion is required when in the problem, the solution of the input depends on the solution of the subsets of the input.

Iteration is also another form of repetitive approach we follow to solve that kind of problems.

But the difference between recursion and iteration is :

In recursion we call the function repeatedly to return the result to next level.In iteration certain bunch of instructions in a loop are executed until certain conditions met.

Explanation:

For example in the Fibonacci sequence problem, to find [tex]f_{n}[/tex], we need to compute [tex]f_{n-1}[/tex] and [tex]f_{n-2}[/tex] before that.

In case of recursion we just call the method Fibonacci(n) repeatedly only changing the parameter Fibonacci(n-1), that calculates the value and return it.

                           Fibonacci(n)

                           1. if(n==0 or n==1)

                           2.       return 1.

                           3.else

                           4.      return( Fibonacci(n-1)+Fibonacci(n-1) )

But in case of iteration we run a loop for i=2 to n, within which we add the value of current [tex]f_{i-1}[/tex] and [tex]f_{i-2}[/tex] to find the value of [tex]f_{i}[/tex]

                           Fibonacci(n)

                           1. if(n<=2)

                           2.    result = 1

                           3.     else

                           4. result1 =1 and result2=1.

                           5.      {  result = result1 +result2.

                           6.         result1= result2.

                           7.         result2 = result.

                           8.      }

                           9.  output result.

Write the 8-bit signed-magnitude, two's complement, and ones' complement representations for each decimal number: +25, + 120, + 82, -42, -111.

Answers

Answer:

Let's convert the decimals into signed 8-bit binary numbers.

As we need to find the 8-bit magnitude, so write the powers at each bit.

      Sign -bit 64 32 16 8 4 2 1

+25 - 0 0 0 1 1 0 0 1

+120- 0 1 1 1 1 0 0 0

+82 - 0 1 0 1 0 0 1       0

-42 - 1 0 1 0 1 0 1 0

-111 - 1 1 1 0 1 1 1 1

One’s Complements:  

+25 (00011001) – 11100110

+120(01111000) - 10000111

+82(01010010) - 10101101

-42(10101010) - 01010101

-111(11101111)- 00010000

Two’s Complements:  

+25 (00011001) – 11100110+1 = 11100111

+120(01111000) – 10000111+1 = 10001000

+82(01010010) – 10101101+1= 10101110

-42(10101010) – 01010101+1= 01010110

-111(11101111)- 00010000+1= 00010001

Explanation:

To find the 8-bit signed magnitude follow this process:

For +120

put 0 at Sign-bit as there is plus sign before 120. Put 1 at the largest power of 2 near to 120 and less than 120, so put 1 at 64. Subtract 64 from 120, i.e. 120-64 = 56. Then put 1 at 32, as it is the nearest power of 2 of 56. Then 56-32=24. Then put 1 at 16 and 24-16 = 8. Now put 1 at 8. 8-8 = 0, so put 0 at all rest places.

To find one’s complement of a number 00011001, find 11111111 – 00011001 or put 0 in place each 1 and 1 in place of each 0., i.e., 11100110.

Now to find Two’s complement of a number, just do binary addition of the number with 1.

Final answer:

The question involves converting decimal numbers to 8-bit signed-magnitude, two's complement, and ones' complement binary representations. Positive numbers are the same in all three representations, whereas negative numbers differ. The most significant bit represents the sign in signed-magnitude, while two's and ones' complements involve bit inversion for negative numbers.

Explanation:

The question involves converting decimal numbers into three different binary number representations: 8-bit signed-magnitude, two's complement, and ones' complement. These representations are used in computing to express positive and negative integer values. For an 8-bit system, the most significant bit (MSB) indicates the sign of the number, where '0' usually represents positive and '1' represents negative.

For +25, the 8-bit signed-magnitude is 00011001, the two's complement and ones' complement are also 00011001 since it is a positive number.

For +120, the 8-bit signed-magnitude is 01111000, the two's complement and ones' complement are also 01111000.

For +82, the 8-bit signed-magnitude is 01010010, the two's complement and ones' complement are also 01010010.

For -42, the 8-bit signed-magnitude is 10101010, the two's complement is 11010110, and the ones' complement is 11010101.

For -111, the 8-bit signed-magnitude is 10101111, the two's complement is 10010001, and the ones' complement is 10010000.

Note that the two's complement is found by inverting all the bits of the absolute value of the number and then adding 1 to the least significant bit (LSB). The ones' complement is found simply by inverting all bits of the absolute value of the number.

Give a pseudo-code description of the O(n)-time algorithm for computing the power function p(x,n).Also draw the trace of computing p(3,3)using this algorithm?

Answers

Answer:

p(x,n)

1. if(n==0)    [if power is 0]

2.    then result =1.

3.else

4. {    result=1.

5.      for i=1 to n.

6.          {  result = result * x. }  [each time we multiply x once]

7.       return result.

8.  }

Let's count p(3,3)

3[tex]\neq[/tex]0, so come to else part.

i=1: result = result *3 = 3

i=2: result = result *3 = 9

i=2: result = result *3 = 27

Explanation:

here the for loop at step 4 takes O(n) time and other steps take constant time. So overall time complexity = O(n)

Servlet session and JSP session have different abilities.TrueFalse

Answers

Answer:

The answer to this question is False.

Explanation:

According to life cycle of a JSP it has to becomes a servlet in the end.So there is no difference between their session handling capacities because in the end they are same.So we conclude that answer to this question is False.

Other Questions
Give the largest interval I over which the general solution is defined. PLEASE EXPLAIN HOW!!!(x^2-1)dy/dx+2y=(x+1)^2 How to work out 161 as a percentage of 3500 Anna wants to take fitness classes. She compares two gyms to determine which would be the best deal for her. Fit Fast charges a set fee per class. Stepping Up charges a monthly fee, plus an additional fee per class. The system of equations models the total costs for each.y = 7.5xy = 5.5x + 101. Substitute: 7.5x = 5.5x + 10How many classes could Anna take so that the total cost for the month would be the same? How many times taller is the Eiffel Tower than an average Human? which function has a vertex at the origin Geothermal energy is used extensively in Iceland and New Zealand due to the fact that both of these countries host multiple ________. a. rivers b. coastlines c. mountains d. volcanoes Vito is angry when the school bus driver blames Vito for misbehaving when it actually was the child behind him who had been acting up. As he gets off the bus, he kicks the bus tire. Freud would say that Vito is unconsciously using the defense mechanism of:A) projection. B) displacement. C) repression. D) denial. The ratio of boys to girls in a school is 5:8. If the numberof girls exceeds the number of boys by 144, calculate thetotal number of students in the school. What similarities, if any, do you think exist between a humans reproductive cycle and the life cycle of a fern? What differences, if any, can you think of? If a proton with velocity v is inside a uniform magnetic field, the work done on the proton by the magnetic field is greater than zero. True OR False After retiring, Cheryl decided to read every book on alist of great science-fiction novels. Before beginning,she had read none of the books on the list. Once shestarted reading, the number of books on the list thatshe had yet to read could be modeledby y = 168 - 2x, where x is the number of weekssince she started reading and y is the number of bookson the list that she had yet to read. In the equation,what are the meanings of the numbers 2 and 168 ? A new drug on the market is known to cure 20% of patients with breast cancer. If a group of 20 patients is randomlyselected, what is the probability of observing, at most, one patient who will be cured of breast cancer?A (20)/1 (0-20)^1 (0.80)^19B. 1-(20)/1 (.20)'(0.230)C. (20)/0( .80)^20+(20/1)(.20)^1(.80)^19D (20)/0 (.80)^20E. 1-(20/0)(.80)^2001-(20)10.2010 what actions by the Kulaks put them in direct conflict with the power and authority of stalin The four most common elements in living organisms are Discuss how a photon (aka the light particle) can be affected by gravity despite being massless. Which of these is an advantage of hydropower?AOA. It is expensive to build and maintain.OB. It has high power-plant efficiency.OC. It harms aquatic organisms.OD. It is available only in limited areas.SUBMIT if angle a is 50 and angle b is 75 what is the measurement of angle c With organolithium and organomagnesium compounds, approach to the carbonyl carbon from the less hindered direction is generally preferred. Assuming that this is the case, draw the structure of the major product formed when 4-tert-butylcyclohexanone reacts with phenylmagnesium bromide, followed by treatment with aqueous acid. Light bulb 1 operates with a filament temperature of 2700 K whereas light bulb 2 has a filament temperature of 2100 K. Both filaments have the same emissivity, and both bulbs radiate the same power. Find the ratio A1/A2 of the filament areas of the bulbs. Why is it important to power on the computer before you begin?