Answer:
#include <iostream>
int main() {
// The length of the list
int l;
// The array containing the numbers
int *list;
// Threshold, last value in array
int thresh;
// Read in first value and create an array with the size of that value
scanf("%d", &l);
list = (int*) malloc(l * sizeof(int));
for(int i = 0; i < l; i++) {
scanf("%d", &list[i]);
}
thresh = list[l - 1];
// Print the values
for(int i = 0; i < l - 1; i++) {
if (list[i] <= thresh) {
printf("%d ", list[i]);
}
}
printf("\n");
free(list);
}
Explanation:
The program assumes at least two values are provided. The length of the list and the threshold.
We first read in an integer, and find out how many more integers we need to read. We create an array with the appropriate size, and loop through to fill the array with values. We know the last value is the threshold, and so we do one more loop to compare the values in the array with the threshold.
Argue your points as to wether i.c.t tools in Africa is harmful or helpful to students
Answer: It is helpful.
Explanation:
Access to more information.
ICT tools such as computers and laptops are able to connect to the internet which has a lot more information on most subjects than a student can find in school.
ICT tools will therefore broaden the information base for African students to enable them acquire more knowledge that could aid the continent in catching up to the west.
Skills acquisition.
The world is increasing moving online and this means that those capable of designing online tools and services will be very successful. This is why Jeff Bezos is so rich.
ICT tools in Africa will enable the students learn about these things from a younger age so that they would be able to launch their own online services for the benefit of the continent and the world.
Making schooling more accessible.
For a long time, there has been a shortage of teachers and schools in certain parts of Africa which has led to a lot of children going without education.
Like the Coronavirus pandemic showed us, with ICT tools, a teacher would be able to reach students that are far from them thereby increasing the number of children who can be educated in Africa even with a shortage of teachers and schools.
When considering the mobility aspect of cloud-based enterprise systems, it's important to consider that with a cloud-based system, employee can access information from _____.
Answer:
anywhere in the world
Explanation:
Employee can access information from anywhere in the world. That is the main upside of using cloud-based enterprise system. They run completely remote and are accessible from anywhere as long as you have an internet connection and authorized access to the system. This increased accesibility is crucial for companies that have employees that move from place to place solving problems and solves many of the problems with on-site systems.
Write a function gcdRecur(a, b) that implements this idea recursively. This function takes in two positive integers and returns one integer.
''def gcdRecur(a, b):
'''
a, b: positive integers
returns: a positive integer, the greatest common divisor of a & b.
'''
# Your code here
if b == 0:
return a
else:
return gcdRecur(b, a%b)
#Test Code
gcdRecur(88, 96)
gcdRecur(143, 78)
© 2021 GitHub, Inc.
Answer & Explanation:
The program you added to the question is correct, and it works fine; It only needs to be properly formatted.
So, the only thing I did to this solution is to re-write the program in your question properly.
def gcdRecur(a, b):
if b == 0:
return a
else:
return gcdRecur(b, a%b)
gcdRecur(88, 96)
gcdRecur(143, 78)
program 3.Study the code carefully and write out the line where there is error, debug it and write out the correct code
1. ModuleModule1
2. Sub Main0
3. Dim num AsDouble
4. Num=10.0
5. Console.writeLine('The square root of '&num & "is"$Math.sqrt(num))
6. Console.ReadKey0
7. EndSub
8. EndModule
Answer:
Several errors:
0 where ( ) was intended (probably OCR problem)space between As and DoubleSingle quote in stead of double quote in text string$ in stead of & near Math.sqrtmissing spaces around "is" for proper formattingdescribe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.
Answer:
Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.
A __________ search engine focuses on a specific subject.
answer : Specialized
Answer:
Specialized fr just want point lol
Explanation:
Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 350 msec and 10 msec, respectively (see Section 3.5.3 for a discussion of these variables). Suppose that the next three measured values of the RTT are 220 msec, 260 msec, and 390 msec respectively.
(Compute TCP's new value of DevRTT, estimatedRTT, and the TCP timeout value after each of these three measured RTT values is obtained. Use the values of α = 0.125, and β = 0.25. Round your answers to two decimal places after leading zeros.)
What is the estimatedRTT after the first RTT?
Answer:
260
Explanation:
I hope it helps choose me the brainest
What are the advantages of using a database management system (DBMS) over using file-based data storage?
Answer:
Advantage of DBMS over file system
No redundant data: Redundancy removed by data normalization. No data duplication saves storage and improves access time.
Data Consistency and Integrity: As we discussed earlier the root cause of data inconsistency is data redundancy, since data normalization takes care of the data redundancy, data inconsistency also been taken care of as part of it
Data Security: It is easier to apply access constraints in database systems so that only authorized user is able to access the data. Each user has a different set of access thus data is secured from the issues such as identity theft, data leaks and misuse of data.
Privacy: Limited access means privacy of data.
Easy access to data – Database systems manages data in such a way so that the data is easily accessible with fast response times.
Easy recovery: Since database systems keeps the backup of data, it is easier to do a full recovery of data in case of a failure.
Flexible: Database systems are more flexible than file processing systems
Your new trainee is interested in ACLs (access control lists). He asks you want they can be used for. What should you tell him? A. Protect hosts from viruses.B. Classify network traffic.C. Provide high network availability.D. IP route filtering.
Answer:
B. Classify network traffic.
D. IP route filtering.
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list primarily is composed of a set of permissions and operations associated with a network or file.
In Computer networking, access control lists (ACLs) can be used to perform the following tasks;
I. Classify network traffic: it can be used to classify the different networks on a router and define whether packets are rejected or accepted.
II. Internet protocol (IP) route filtering: any internet protocol (IP) address that's is not on the accept list would be refused permission into accessing a network. Thus, ACLs can either deny or accept IP addresses depending on the routing table configured on the router.
Write a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask user to guess number. Inform if high or low. Exit when entered number correct. Tell user how many tries it took to guess number.
Answer:
download the .txt file and change the file name to guess_number.py then run it in a python interpreter. I used Python 3.9.6 for this project and I used Visual Studio Code as my IDE.
Explanation:
The code has comments that tell you what is happening.
I hope this helped :) If it didn't please let me know what went wrong so I can fix it.
In a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask the user to guess the number.
What are programming used for?The motive of programming is to discover a series of commands with the intention to automate the overall performance of a task (which may be as complicated as a running system) on a computer, regularly for fixing a given problem.
Import NumPy as np def main(): # Random variety Random Number = np.random.randint(1, 100) # A begin variable Start = Try.# This value is the handiest used to decide if the person has been known that the fee is excessive or low High Or Low Message Displayed Already = False # Amount of guesses that the person were given incorrectly. Guess Gotten Wrong 0 # The general quantity of guess AmountOfGuesses = 0 # Beginning of some time loop in order to maintain the software jogging till the person guesses the random variety print("The fee is excessive") High Or Low Message DisplayedAlready = True Elif RandomNumber <= forty nine and High OrLow MessageDisplayedAlready == False:print("The fee is low")
High Or Low Message Displayed Already = True.
AmountOfGuesses += print("Wrong! You have gotten " + str(GuessGottenWrong) + " guesses incorrect. main()Read more about the program :
https://brainly.com/question/1538272
#SPJ2
I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time I turn it on it shuts itself down. I had a problem exactly like this before with my old computer, was not a Dell though, and I ended up having to have it recycled. This computer I have now is pretty new and I really don't want to have to buy a new computer. What should I do to fix this problem? Please help, I'm a college student almost ready to graduate and all of my classes are online. I'm starting to panic. Thanks for helping me figure this situation out.
The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked
Suppose that a disk unit has the following parameters: seek time s = 20 msec; rotational delay rd = 10 msec; block transfer time btt = 1 msec; block size B = 2400 bytes; interblock gap size G = 600 bytes. An EMPLOYEE file has the following fields: Ssn, 9 bytes; Last_name, 20 bytes; First_name, 20 bytes; Middle_init, 1 byte; Birth_date, 10 bytes; Address, 35 bytes; Phone, 12 bytes; Supervisor_ssn, 9 bytes; Department, 4 bytes; Job_code, 4 bytes; deletion marker, 1 byte. The EMPLOYEE file has r = 30,000 records, fixed-length format, and unspanned blocking.
Answer:
20
Explanation:
I hope it helps choose me the brainst
Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using Excel over lists, paper files, or simple word documents? Summarize one thing in you home life that could be improved or more easily managed using Excel?
Excel
Excel is a software program that contains spreadsheet. Spreadsheet is an electric document that works numbers and display results in graphs. There are vertical columns and horizontal rows.
they are several advantages of excel which is;
Excel is very efficient to use, especially when you have to calculate your data, it's not hard to calculate the computer itself calculates it for you.they are also disadvantages of excel which is;
some users might get a little bit problem when you send Microsoft Excel, here is one sometimes the spreadsheet are difficult to share internally.Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. Which of the following is a step that the cloud administrator needs to perform as part of the move?
a. Migrate to an external DNS solution
b. Create a new VPC that will serve DNS needs for multiple other VPCs
c. Discontinue using DNS
d. Remove the DNS entries within the VPC that are no longer relevant
Answer:
Here the correct option is option b Create a new VPC that will serve DNS needs for multiple other VPCs.
Explanation:
Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. It's not possible to maneuver an existing instance to a different subnet or VPC. Instead, you'll manually migrate the instance by creating a new VPC Image from the source instance.
b. Create a new VPC that will serve DNS needs for multiple other VPCs
What is the SQL command to list the total sales by customer and by product, with subtotals by customer and a grand total for all product sales
Answer:
Please find the complete query and question in the attached file.
Explanation:
In this query, we use the select command in which we select the column that is "CUS_CODE, P_CODE" with the sum method that multiples the "SALE_UNITS * SALE_PRICE" values and use them as and group by the clause that stores all the values in the column that are "CUS_CODE, P_CODE WITH ROLLUP".
Write the correct statements for the above logic and syntax errors in program below.
#include
using namespace std;
void main()
{
int count = 0, count1 = 0, count2 = 0, count3 = 0;
mark = -9;
while (mark != -9)
{
cout << "insert marks of students in your class, enter -9 to stop entering";
cin >> mark;
count++;
if (mark >= 0 && mark <= 60);
count1 = count1 + 1;
else if (mark >= 61 && mark <= 70);
count2 = count2 + 1;
else if (mark >= 71 && mark <= 100);
count3 = count3 + 1;
}
cout <<"Report of MTS3013 course" << endl;
cout <<"Mark" << count << endl << endl;
cout << "0-60" << "\t\t\t\t" << count1 << endl;
cout << "61-70" << "\t\t\t\t" << count2 << endl;
cout << "71-100" << "\t\t\t\t" << count3 << endl<< endl << endl;
cout << "End of program";
}
In cell K8, create a formula using the SUM function that calculates the total of range D17:D20 and subtracts it from the value in J8
Answer:
=(J8 - SUM(D17:D20))
Explanation:
Required
Add D17 to D20
Subtract the result from J8
Save the result in K8
To do this, we make use of a nested bracket.
The innermost bracket is to add up D17 To D20 using the sum function.
i.e. SUM(D17:D20)
While the outermost bracket will subtract the calculated sum from J8.
=(J8 - SUM(D17:D20))
The SUM function is used to Adds values, in which users can add different values, in cells or range references or a mix of each of them, and the further calculation can be defined as follows:
In this question, we use the "=(J8 - SUM(D17:D20))" function that's description can be defined as follows:
D17 to D20 AddSubtract the J8 resultSave K8 resultsWe use a nested bracket to do this.D17-D20 is added to the innermost bracket with the sum function.SUM, i.e. (D17:D20)The calculated amount from J8 is taken from the outermost bracket.Therefore the final answer is "=(J8 - SUM(D17:D20))".
Learn more:
brainly.com/question/24245
2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality the earth takes longer to rotate around the sun. To account for the
difference in time every 4 years a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700 1800. etc.), the year must be evenly divisible by 400
Some example leap years are 600712 and 2016
Wirte a program that takes n a year and determines whether that year is a leap year.
Exif the inputs
1712
Answer:
The program in Python is as follows:
year = int(input("Enter a year: "))
print(year,end=" ")
if year % 4 == 0:
if year % 100 == 0:
if year % 400 == 0: print("is a leap year")
else: print("is not a leap year")
else: print("is a leap year")
else: print("is not a leap year")
Explanation:
This gets input for year
year = int(input("Enter a year: "))
This prints year, followed by a blank
print(year,end=" ")
If year is divisible by 4
if year % 4 == 0:
If yes, check if year is divisible by 100
if year % 100 == 0:
If yes, check if year is divisible by 400; print leap year if true
if year % 400 == 0: print("is a leap year")
print not leap year if year is not divisible by 400
else: print("is not a leap year")
print leap year if year is not divisible by 100
else: print("is a leap year")
print leap year if year is not divisible by 4
else: print("is not a leap year")
Answer:
def is_leap_year(user_year):
if(user_year % 400 == 0):
return True
elif user_year % 100 == 0:
return False
elif user_year%4 == 0:
return True
else:
return False
if __name__ == '__main__':
user_year = int(input())
if is_leap_year(user_year):
print(user_year, "is a leap year.")
else:
print(user_year, "is not a leap year.")
Explanation:
Write a function, named FileLineCount(), that returns an integer and accepts a string. Pass the function the file name. It should then use a while loop to return the number of lines in a file. Hint: The function will be reading the file you just created above. g
Answer:
Explanation:
The following code is written in Python. It is a function that accepts a file string and uses that string to read the file in that location. Then it uses a while loop that keeps going until there are no more lines in the file. Each iteration it adds 1 to the count variables. Finally, it prints the count variable which contains the total number of lines in the file. The code has been tested and the output can be seen in the attached image below.
def countLines(file):
file = open(file, 'r')
count = 0
while file.readline():
count += 1
print(str(count) + " total lines")
Which tool, first introduced in Windows Server 2008 but remains in Windows Server 2019, provides one location to set up, deploy, and manage servers and server roles
Answer:
Server Manager
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM, Windows Server 2008, Windows Server 2009, etc.
Windows Server 2008 is a Microsoft Windows Server operating system and released to the general public on the 27th of February, 2008, as part of the Windows NT family.
Server Manager is a tool that was first introduced in Windows Server 2008 (OS) but remains in Windows Server 2019 (OS). It was designed and developed by Microsoft to provide end users with one location to set up, deploy, and manage servers and server roles.
On the 14th of January, 2020, Microsoft stopped providing online technical content update, free support options, non-security and free security updates on-premises for Windows Server 2008 and Windows Server 2008 R2, as they have reached the end of their support lifecycle.
various sources of ict legislation
Answer:
oh ma ma my here it is
Explanation:
Legislation of ICT The purpose of legislation is to control and regulate the use of ICT. Different acts in result in different benefits to the end user or other people affected by the technology. ... Legislation protects people and ensures that there is no abuse by others to those investing in the technology
GENERATIONS OF
ACTIVITY 12
In tabular form differentiate the first four generations of computers.
How has Linux affected the market for proprietary software?
Answer:
Linux is an operating system made up of free software, which can be installed and run on a wide variety of computer systems, from small devices such as mobile phones to large computer systems and supercomputers.
Linux is often offered to the user in various Linux distributions. A characteristic of the distributions is the great possibility of customization and selection that they offer since each one is aimed at a different type of user. Depending on the philosophy, each distribution can provide a greater foundation for ease of use, multimedia applications, ease of configuration, system simplicity, only free software, low resource requirements, and more.
Because of its low cost, high configurability and availability on various platforms, Linux is becoming increasingly popular not only among specialized users, but also among domestic users.
IN C++
A. Create an abstract base class called Currency with two integer attributes, both of which are non-public. The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part.
B. Create one derived class - Money - with two additional non-public string attributes which will contain the name of the currency note (Dollar) and currency coin (Cent) respectively. DO NOT add these attributes to the base Currency class.
C. In your base Currency class, add public class (C++ students are allowed to use friend methods as long as a corresponding class method is defined as well) methods for the following, where appropriate:
Default Construction (i.e. no parameters passed)
Construction based on parameters for all attributes - create logical objects only, i.e. no negative value objects allowed
Copy Constructor and/or Assignment, as applicable to your programming language of choice
Destructor, as applicable to your programming language of choice
Setters and Getters for all attributes
Adding two objects of the same currency
Subtracting one object from another object of the same currency - the result should be logical, i.e. negative results are not allowed
Comparing two objects of the same currency for equality/inequality
Comparing two objects of the same currency to identify which object is larger or smaller
Print method to print details of a currency object
All of the above should be instance methods and not static.
The add and subtract as specified should manipulate the object on which they are invoked. It is allowed to have overloaded methods that create ane return new objects.
D. In your derived Money class, add new methods or override inherited methods as necessary, taking care that code should not be duplicated or duplication minimized. Think modular and reusable code.
E. Remember -
Do not define methods that take any decimal values as input in either the base or derived classes.
Only the print method(s) in the classes should print anything to console.
Throw String (or equivalent) exceptions from within the classes to ensure that invalid objects cannot be created.
F. In your main:
Declare a primitive array of 5 Currency references (for C++ programmers, array of 5 Currency pointers).
Ask the user for 5 decimal numbers to be input - for each of the inputs you will create one Money object to be stored in the array.
Once the array is filled, perform the following five operations:
Print the contents of the array of objects created in long form, i.e. if the user entered "2.85" for the first value, it should be printed as "2 Dollar 85 Cent".
Add the first Money object to the second and print the resulting value in long form as above.
Subtract the first Money object from the third and print the resulting value in long form as above.
Compare the first Money object to the fourth and print whether both objects are equal or not using long form for object values.
Compare the first Money object to the fifth and print which object value is greater than the other object value in long form.
All operations in the main should be performed on Currency objects demonstrating polymorphism.
Remember to handle exceptions appropriately.
There is no sample output - you are allowed to provide user interactivity as you see fit.
Answer:
I only do Design and Technology
sorry don't understand.
What are some of the advantages and disadvantages of connection-oriented WAN/Man as opposed to connection-less?
Answer and Explanation:
Connection oriented WAN/MAN as opposed to connection less network is a type of wide area network that requires communicating entities in the network to establish a dedicated connection for their communication before they start communicating. This type of network will use these established network layers only till they release it, typical of telephone networks.
Advantages include:
Connection is reliable and long.
Eliminates duplicate data issues.
Disadvantages include:
Resource allocation while establishing dedicated connection slows down speed and may not fully utilize network resources.
There are no plan B's for network congestion issues, albeit occurring rarely with this type of network.
Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subject. As they're discussing some of the topics, he gives the co-worker permissions to the resources so they can look at the information on their own. Which of the following access control methods does Kareem's company use?
a. DAC
b. RBAC
c. MAC
d. TSAC
Answer: RBAC
Explanation:
The access control methods that Kareem's company uses us the role based access control.
The Role-based access control (RBAC) simply means assigning permissions to users based on the role that such individual plays within an organization.
RBAC is a simple approach to access management and is typically less prone to error than in a scenario whereby permissions are assigned to users individually. Access rights are given to the workers based on what their job entails and what is needed and other information which isn't needed won't be accessible to them.
No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program that determines the number of months it will take to pay off a $1000 stereo. Write code also outputs the monthly status of the loan.
Answer:
10000
Explanation:
Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.a. System.b. Satisfaction.c. Speedy.d. Subscriber.e. Switch.
Answer:
D. Subscriber
Explanation:
Digital Subscriber Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.
The high speed data transmission property helps to transmit data in a fast and timely manner between two or more points or people during calls, texts and other activities.
convert 198 / 61 to ratio
I think the answer is
198:61
I'm not sure
Discuss and illustrate the operation of the AND, OR, XOR and NOT gate of a Boolean logical operation giving examples of possible outcomes of 0 and 1 as input in a truth set tabular format.
Answer:
Use below picture as a starting point.