Given two character strings s1 and s2. Write a Pthread program to find out the number of substrings, in string s1, that is exactly the same as s2

Answers

Answer 1

Answer:

Explanation:

#include <stdlib.h>

#include <stdio.h>

#include <string.h>

#define MAX 1024

int total = 0 ;

int n1, n2;

char s1, s2;

FILE fp;

int readf(FILE fp)

{

 if((fp=fopen("strings.txt", "r"))==NULL) {

   printf("ERROR: can’t open string.txt!\n");

   return 0;

 }

 s1=(char)malloc(sizeof(char)MAX);

 if(s1==NULL) {

   printf("ERROR: Out of memory!\n");

   return 1;

 }

 s2=(char)malloc(sizeof(char)MAX);

 if(s1==NULL) {

   printf("ERROR: Out of memory!\n");

   return 1;

 }

 /* read s1 s2 from the file */

 s1=fgets(s1, MAX, fp);

 s2=fgets(s2, MAX, fp);

 n1=strlen(s1); /* length of s1 */

 n2=strlen(s2)-1; /* length of s2 */

 if(s1==NULL || s2==NULL || n1<n2) /* when error exit */

   return 1;

}

int num_substring(void)

{

 int i, j, k;

 int count;

 for(i=0; i<=(n1-n2); i++) {

   count=0;

   for(j=i, k=0; k<n2; j++, k++){ /* search for the next string of size of n2 */

   if((s1+j)!=(s2+k)) {

     break;

   }

   else

     count++;

   if(count==n2)

     total++; /* find a substring in this step */

   }

 }

 return total;

}

int main(int argc, char argv[])

{

 int count;

 readf(fp);

 count=num_substring();

 printf("The number of substrings is: %d\n", count);

 return 1;

}


Related Questions

you are installing two new hard drives into your network attached storage device your director asks that they be put into a raid solution that offers redundndancy over performance which would you use

Answers

Question options:

a. RAID 0

b. RAID 1

c. RAID 5

d. RAID 6

e. RAID 10

Answer:

d. RAID 6

Explanation:

RAID is Redundant Array of Inexpensive/Independent Disks. RAID combines low cost physical hard disk drives in one hard disk drive. RAID is used to achieve data redundancy(data backup but with synchronization) or improved performance or both.

To get what the director requires he would need to use RAID 6. RAID 6 is RAID level optimized to achieve data redundancy but with slow performance.

Carl is planning for a large advertising campaign his company will unveil. He is concerned that his current e-commerce server farm hosted in a public cloud will be overwhelmed and suffer performance problems. He is researching options to dynamically add capacity to the web server farm to handle the anticipated additional workload. You are brought in to consult with him on his options. What can you recommend as possible solutions

Answers

Answer:

Cloud Bursting

Explanation:

One of the best possible solutions for this scenario would be Cloud Bursting. This is a solution of using Cloud Server services to handle the server farm workload. The difference is that Cloud Bursting allows the company to use the Cloud services only when their own personal web server farms hit peak demand and can no longer handle the incoming demand. The excess demand is outsourced to the Cloud Server and lets them handle it dynamically without the company having to add any additional hardware to their server farm.

A recursive method may call other methods, including calling itself. Creating a recursive method can be accomplished in two steps. 1. Write the base case -- Every recursive method must have a case that returns a value or exits from the method without performing a recursive call. That case is called the base case. A programmer may write that part of the method first, and then lest. There may be multiple base cases.Complete the recursive method that returns the exponent of a given number. For e.g. given the number 5 and the exponent 3 (53) the method returns 125. Note: any number to the zero power is 1. Note: Do not code for the example. Your method must work for all given parameters! Use this as your method header: public static int raiseToPower(int base, int exponent)

Answers

Answer:

Explanation:

The following code is written in Java. It creates the raiseToPower method that takes in two int parameters. It then uses recursion to calculate the value of the first parameter raised to the power of the second parameter. Three test cases have been provided in the main method of the program and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println("Base 5, Exponent 3: " + raiseToPower(5,3));

       System.out.println("Base 2, Exponent 7: " + raiseToPower(2,7));

       System.out.println("Base 5, Exponent 9: " + raiseToPower(5,9));

   }

   public static int raiseToPower(int base, int exponent) {

       if (exponent == 0) {

           return 1;

       } else if (exponent == 1) {

           return base;

       } else {

           return (base * raiseToPower(base, exponent-1));

       }

   }

 

}

Write a class Example() such that it has a method that gives the difference between the size of strings when the '-' (subtraction) symbol is used between the two objects of the class. Additionally, implement a method that returns True if object 1 is greater than object 2 and False otherwise when the (>) (greater than) symbol is used. For example: obj1

Answers

Answer:

Here the code is given as follows,

Explanation:

class Example:

   def _init_(self, val):

       self.val = val

   def _gt_(self, other):

       return self.val > other.val

   def _sub_(self,other):

       return abs(len(self.val) - len(other.val))

def main():

   obj1 = Example('this is a string')

   obj2 = Example('this is another one')

   print(obj1 > obj2)

   print(obj1 - obj2)

main()

Output:-

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

Answers

Answer:

Bro this is my area the answer is WPA2 and AES  

Explanation:

its because AES is a more secure encryption protocol introduced with WPA2. AES isn't some creaky standard developed specifically for Wi-Fi networks, either. It's a serious worldwide encryption standard that's even been adopted by the US government.

There are many possible variations in wireless network design depending on the surroundings.

What is wireless network?

Even in a complicated single site, different wireless networks running on the same hardware as part of the broader wireless LAN environment can have different network configuration fundamentals needed for a successful deployment.

At the same time, a number of essential network configuration activities are part of any successful wireless project's typical chores. Let's look at the broad and specific procedures that wireless experts should take while setting up enterprise-grade Wi-Fi networks.

Therefore, There are many possible variations in wireless network design depending on the surroundings.

To learn more about wifi, refer to the link:

https://brainly.com/question/6145118

#SPJ5

Write a function int checkBalance(char exp[]); that can take an expression as input and check whether the parenthesis used in that expression are valid or invalid. It returns 1 if it is valid, and returns 0 if it is not valid.For example, the following expressions are valid: [ A * {B (C D)}] and [{()()}]The following expressions are invalid: [ A * {B (C D})], [ { ( ] ) ( ) }

Answers

Answer:

Explanation:

The following code is written in Java. It uses for loops to loop through the array of characters, and uses IF statements to check if the symbols in the expression are balanced. If so it returns true, otherwise it breaks the function and returns false. Two test cases have been provided in the main method and the output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       char[] exp = { '[', 'A', '*', '{', 'B', '(', 'C', 'D', ')', '}', ']'};

       char[] exp2 = {'[', 'A', '*', '(', 'C', '}', ']'};

       System.out.println(checkBalance(exp));

       System.out.println(checkBalance(exp2));

   }

   public static boolean checkBalance(char exp[]) {

       ArrayList<Character> symbols = new ArrayList<>();

       for (char x: exp) {

           if ((x =='[') || (x == '{') || (x == '(')) {

               symbols.add(x);

           }

           if (x ==']') {

               if (symbols.get(symbols.size()-1) == '[') {

                   symbols.remove(symbols.size()-1);

               } else {

                   return false;

               }

           }

           if (x =='}') {

               if (symbols.get(symbols.size()-1) == '{') {

                   symbols.remove(symbols.size()-1);

               } else {

                   return false;

               }

           }

           if (x ==')') {

               if (symbols.get(symbols.size()-1) == '(') {

                   symbols.remove(symbols.size()-1);

               } else {

                   return false;

               }

           }

       }

       return true;

   }

}

9.17 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input.

Answers

Answer:

Hence the code is given as follows,

import java.util.Scanner;

public class LabProgram {

   public static String createAcronym(String userPhrase){

       String result = "";

       String splits[] = userPhrase.split(" ");

       for(int i = 0;i<splits.length;i++){

           if(splits[i].charAt(0)>='A' && splits[i].charAt(0)<='Z')

               result += splits[i].charAt(0);

       }

       return result;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       String s = scan.nextLine();

       System.out.println(createAcronym(s));

   }

}

Select the correct statement(s) regarding DCE and DTE interfaces.

a. DTE and DCE describes the device types (e.g., computers, switches, routers, etc.)
b. distinguishing between DTE and DCE is only required for half-duplex communications
c. DTE and DCE describes the interface and direction of data flow between devices; a single device may have both types of interfaces
d. all statements are correct

Answers

Answer:

The correct statement regarding DCE and DTE interfaces is:

c. DTE and DCE describes the interface and direction of data flow between devices; a single device may have both types of interfaces.

Explanation:

DTE stands for Data Terminal Equipment.  It is a device that initiates or controls a device's serial connection. The term DCE stands for Data Communications Equipment.  It is a device that is used to a modem or other communication interfaces to the DTE device.  DTE is a communication receptor, while DCE is a communication broadcaster or distributor.

Which statement is NOT a source of threats?

a.
Poor management decisions, accidents and natural disasters.

b.
Data recovery 

c.
financial mistakes

d.
loss of customers​

Answers

Answer:

B

Explanation:

because data is phone business

The answer is B because it is recovering data so it’s not a threat financial mistakes is a problem and the other one to so the answer is B.

Hope this helps :)))))

Resize vector countDown to have newSize elements. Populate the vector with integers {newSize, newSize - 1, ..., 1}. Ex: If newSize = 3, then countDown = {3, 2, 1}, and the sample program outputs:
#include
#include
using namespace std;
int main() {
vector countDown(0);
int newSize = 0;
int i = 0;
newSize = 3;
STUDENT CODE
for (i = 0; i < newSize; ++i) {
cout << countDown.at(i) << " ";
}
cout << "Go!" << endl;
return 0;
}

Answers

Answer:

Following are the code to the given question:

#include <iostream>//defining header file

#include <vector>//defining header file

#include <numeric>//defining header file

using namespace std;

int main()//main method

{

vector<int> countDown(0);//defing an integer array variable countDown

int newSize = 0;//defing an integer variable newSize that holds a value 0

int i = 0;//defing an integer variable i that initialize with 0

newSize = 3;// //use newSize to hold a value

countDown.resize(newSize,0);// calling the resize method that accepts two parameters

for (i = 0; i < newSize; ++i)//defining a loop that reverse the integer value

{

countDown[i] = newSize -i;//reverse the value and store it into countDown array

cout << countDown.at(i) << " ";//print reverse array value

}

cout << "Go!" << endl;//print message

return 0;

}

Output:

3 2 1 Go!

Explanation:

In the given code inside the main method an integer array "countDown" and two integer variables "newSize and i" is declared that initializes a value that is 0.

In the next step, an array is used that calls the resize method that accepts two parameters, and define a for a loop.

In this loop, the array is used to reverse the value and print its value with the message.

A technician is configuring the static TCP/IP settings on a client computer.
Which of the following configurations are needed for internet communications?
a. DHCP server address
b. DNS server address
c. Default gateway address
d. WINS address
e. APIPA address
f. Alternate IP address
g. IP address including a subnet mask (IPv4) or subnet prefix length (IPv6)

Answers

Answer:

The answer is below

Explanation:

Considering the situation and the available options above, the following configurations are needed for internet communications:

B. DNS server address: this matches the domain name to the IP address of a website such that browsers can bring internet resources.

C. Default gateway address: this uses the internet protocol suites and serves as a router to other networks in the absence of other route specifications that could match the destination IP address of a packet.

G. IP address including a subnet mask (IPv4) or subnet prefix length (IPv6): this is used by the internet-connected device to receive messages.

Which line could be added to the lesson plan to strengthen the teacher’s point?

Different languages and communication styles might hinder your ability to benefit from global learning.
The digital divide will likely prevent you from having a major impact in the global communications environment.
Language and cultural differences will likely make it too frustrating to have an effective learning experience.
Learning in a global community enables you to expand your horizons and learn new languages.

Answers

Answer:

ムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダムダ

Answer:

Learning in a global community enables you to expand your horizons and learn new languages.

Explanation:

Im not sure what the teacher's point is, but the other options seem to hinder students from wanting to learn in a global community. If her goal is to convince students to learn globally then option D is your answer :)

Write the name of test for the given scenario. Justify your answer.

The input values are entered according to the output values. If the results are ok then software is also fine but if results does not matched the input values then means any bugs are found which results the software is not ok. The whole software is checked against one input.

A-Assume you are being hired as a Scrum project Manager. Write down the list of responsibilities you are going to perform.
B-What are the qualifications required to conduct a glass box testing.
C-Write the main reasons of project failure and success according to the 1994 Standish group survey study.
D- Discuss your semester project.

Answers

Answer:

Cevap b okey xx

Explanation:

Sinyorrr

Giải thích mục đích của các thao tác open() và close().

Answers

Answer:

Which lan is it

Answer:

Đang học năm nhất trường TDT đúng k bạn :D

Explanation:

Why is OS important in every data processing system?
Please Answer Fast! ​

Answers

Answer:

Functions of an operating system. An operating system provides three essential capabilities: It offers a UI through a CLI or GUI; it launches and manages the application execution; and it identifies and exposes system hardware resources to those applications -- typically, through a standardized API.

Explanation:

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation. An application you are using is unable to connect to a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

Answers

Answer:

PING

Explanation:

To check if there's still connectivity between the computer and server, I would use the ping command.

The ping command is primarily a TCP/IP command. What this command does is to troubleshoot shoot. It troubleshoots connection and reachability. This command also does the work of testing the name of the computer and also its IP address.

A computer with a five-stage pipeline deals with conditional branches by stalling for the next three cycles after hitting one. How much does stalling hurt the performance if 20% of all instructions are conditional branches

Answers

Answer:

The stalling hurt the performance by 60%.

Explanation:

This can be calculated as follows:

Value of CPI ideally taken by pipeline = 1

From the question, we are given:

Stall frequency = 20%,

Number of frequency = 3

Therefore, we have:

Cycles per instruction (CPI) of the architecture = Value of CPI ideally taken by pipeline + (Stall frequency * Number of frequency) = 1 + (20% * 3) = 1.60

Amount by which the stalling hurt the performance = Cycles per instruction (CPI) of the architecture Value of CPI ideally taken by pipeline = 1 - 0.60 = 0.60, or 60%

Therefore, the stalling hurt the performance by 60%.

Write a program in Cto define a structure Patient that has the following members

Answers

Answer:

Explanation:

The answer should be 1.16 or 61.1

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance. True False

Answers

Answer:

True

Explanation:

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance.

How many fingers do you need to type floor

Answers

Answer:

About 0-1 fingers at minimum

Explanation:

you can type with your toes/elbow as well. Any body part really.

To type the word "floor" on a regular keyboard layout, you would generally need six fingers: three on your left hand and three on your right.

Your index finger (usually used for the "F" key) on your left hand would be utilised for the letter "f." Your middle finger (which is normally used for the "D" key) would be utilised for the letter "l."

Finally, your ring finger (which is normally used for the "S" key) would be utilised for the letter "o."

Your index finger (usually used for the "J" key) on your right hand would be utilised for the letter "o." Your middle finger (which is normally used for the "K" key) would be utilised for the second letter "o."

Finally, your ring finger (which is normally used for the "L" key) would be utilised for the letter "r."

Thus, on a typical keyboard layout, you would type the word "floor" with three fingers from each hand.

For more details regarding Keyboard layout, visit:

https://brainly.com/question/17182013

#SPJ6

Computer data that is suitable for sound​

Answers

Answer:

Answer:In this context sound data is stored and transmitted in an analog form. Since computers represent data in digital form, (as bits and bytes) the







Program is set of instruction written in programming language.​

Answers

Answer:

Program is set of instruction written in programming language.

 program is a collection of instructions that can be executed by a computer to perform a specific task

2.2 Write a program that uses input to prompt a user for their name and then welcomes them. Note that input will pop up a dialog box. Enter Sarah in the pop-up box when you are prompted so your output will match the desired output.

Answers

Answer:

Explanation:

The following program is written in Javascript. It creates a prompt that asks the user for his/her name and saves it in a variable called userName. Then it uses that variable to welcome the user. A test case is shown in the images below with the desired output.

let userName = prompt("Enter Your Name")

alert(`Hello ${userName}`)

Add (total) all the number in the list (below) using a for loop, but skip over the number at index 3.
numbers = [10,20,30,40,50,60,100]

Answers

Answer:

The program in Python is as follows:

numbers = [10,20,30,40,50,60,100]

total = 0

for i in range(len(numbers)):

   if i != 3:

       total+=numbers[i]

print(total)

Explanation:

This initializes the list

numbers = [10,20,30,40,50,60,100]

Set total to 0

total = 0

This iterates through numbers

for i in range(len(numbers)):

This ensures that the index 3, are not added

   if i != 3:

       total+=numbers[i]

Print the calculated sum

print(total)

How would you type the word floor

Answers

Answer:

f l o o r

Explanation:

I need the SQL statements for these questions:
1. For each reservation, list the reservation ID, trip ID, customer number, and customer last name. Order the results by customer last name.
2. For each reservation for customer Ryan Goff, list the reservation ID, trip ID, and number of persons.
3. List the trip name of each trip that has Miles Abrams as a guide.
4. List the trip name of each trip that has the type Biking and that has Rita Boyers as a guide.
5. For each reservation that has a trip date of July 23, 2016, list the customer’s last name, the trip name, and the start location.
6. List the reservation ID, trip ID, and trip date for reservations for a trip in Maine (ME). Use the IN operator in your query.
7. Repeat Exercise 6, but this time use the EXISTS operator in your query.
8. Find the guide last name and guide first name of all guides who can lead a paddling trip. (Note: The query results should include duplicate values.)
Here are the tables:
CUSTOMER FIRST NAME POSTAL CODE CUSTOMER NUM LAST NAME ADDRESS Northfold Liam 9 Old Mill Rd Londonderry 10 NH 03053 103 Kasuma Sujata 132 Main St. #1 East Hartford CT 06108 MA 01854 Goff 164A South Bend Rd. Lowell Ryan 105 McLean Kyle 345 Lower Ave. Wolcott NY 14590 106 Morontoia Joseph 156 Scholar St Johnston 02919 107 Marchand Quinn 76 Cross Rd Bath NH 03740 108 32 Sheep stop St Edinboro PA Rulf Usch 16412 109 Caron Jean Luc 10 Greenfield St Rome ME 04963 110 Martha York Bers 65 Granite St NY 14592 112 Jones Laura 373 Highland Ave. Somerville MA 02143 115 Nu Adam 1282 Ocean Walk Ocean City Vaccari 08226 116 Murakami Iris 7 Cherry Blossom St. Weymouth MA 02188 119 Londonderry vT Chau 18 Ark Ledge Ln Clement 05148 120 Gernowski Sadie 24 stump Rd. Athens ME 04912 121 Cambridge VT Bretton-Borak Siam 10 Old Main St 122 Hefferson orlagh 132 South St. Apt 27 Manchester NH 03101 123 25 Stag Rd Fairfield Barnett Larry 06824 124 Busa Karen 12 Foster St. South Windsor CT 06074 125 51 Fredrick St Albion Peterson Becca NY 14411 126 Brown Brianne 154 Central St Vernon CT 06066 PHONE Click to Add 603-555-7563 413-555-3212 860-555-0703 781-555-8423 585-555-5321 401-555-4848 603-555-0456 814-555-5521 207-555-9643 585-555-0111 857-555-6258 609-555-5231 617-555-6665 802-555-3096 207-555-4507 802-555-3443 603-555-3476 860-555-9876 857-555-5532. 585-555-0900 860-555-3234

Answers

Answer:

Explanation:

/* From the information provided, For now will consider the name of table as TRIPGUIDES*/

/*In all the answers below, the syntax is based on Oracle SQL. In case of usage of other database queries, answer may vary to some extent*/

1.

Select R.Reservation_ID, R.Trip_ID , C.Customer_Num,C.Last_Name from Reservation R, Customer C where C.Customer_Num=R.Customer_Num ORDER BY C.Last_Name

/*idea is to select the join the two tables by comparing customer_id field in two tables as it is the only field which is common and then print the desired result later ordering by last name to get the results in sorted order*/

2.

Select R.Reservation_ID, R.Trip_ID , R.NUM_PERSONS from Reservation R, Customer C where C.Customer_Num=R.Customer_Num and C.LAST_NAME='Goff' and C.FIRST_NAME='Ryan'

/*Here, the explaination will be similar to the first query. Choose the desired columns from the tables, and join the two tables by equating the common field

*/

3.

Select T.TRIP_NAME from TRIP T,GUIDE G,TRIPGUIDES TG where T.TRIP_ID=TG.TRIP_ID and TG.GUIDE_NUM=G.GUIDE_NUM and G.LAST_NAME='Abrams' and G.FIRST_NAME='Miles'

/*

Here,we choose three tables TRIP,GUIDE and TRIPGUIDES. Here we selected those trips where we have guides as Miles Abrms in the GUIDES table and equated Trip_id from TRIPGUIDES to TRIP.TRIP_Name so that can have the desired results

*/

4.

Select T.TRIP_NAME

from TRIP T,TRIPGUIDES TG ,G.GUIDE

where T.TRIP_ID=TG.TRIP_ID and T.TYPE='Biking' and TG.GUIDE_NUM=G.GUIDE_NUM and G.LAST_NAME='Boyers' and G.FIRST_NAME='Rita'

/*

In the above question, we first selected the trip name from trip table. To put the condition we first make sure that all the three tables are connected properly. In order to do so, we have equated Guide_nums in guide and tripguides. and also equated trip_id in tripguides and trip. Then we equated names from guide tables and type from trip table for the desired results.

*/

5.

SELECT C.LAST_NAME , T.TRIP_NAME , T.START_LOCATION FROM CUSTOMER C, TRIP T, RESERVATION R WHERE R.TRIP_DATE='2016-07-23' AND T.TRIP_ID=R.TRIP_ID AND C.CUSTOMER_NUM=R.CUSTOMER_NUM

/*

The explaination for this one will be equivalent to the previous question where we just equated the desired columns where we equiated the desired columns in respective fields and also equated the common entities like trip ids and customer ids so that can join tables properly

*/

/*The comparison of dates in SQL depends on the format in which they are stored. In the upper case if the

dates are stored in the format as YYYY-MM-DD, then the above query mentioned will work. In case dates are stored in the form of a string then the following query will work.

SELECT C.LAST_NAME , T.TRIP_NAME , T.START_LOCATION FROM CUSTOMER C, TRIP T, RESERVATION R WHERE R.TRIP_DATE='7/23/2016' AND T.TRIP_ID=R.TRIP_ID AND C.CUSTOMER_NUM=R.CUSTOMER_NUM

*/

6.

Select R.RESERVATION_ID, R.TRIP_ID,R.TRIP_DATE FROM RESERVATION R WHERE R.TRIP_ID IN

{SELECT TRIP_ID FROM TRIP T WHERE STATE='ME'}

/*

In the above question, we firstly extracted all the trip id's which are having locations as maine. Now we have the list of all the trip_id's that have location maine. Now we just need to extract the reservation ids for the same which can be trivally done by simply using the in clause stating print all the tuples whose id's are there in the list of inner query. Remember, IN always checks in the set of values.

*/

7.

Select R.RESERVATION_ID, R.TRIP_ID,R.TRIP_DATE FROM RESERVATION WHERE

EXISTS {SELECT TRIP_ID FROM TRIP T WHERE STATE='ME' and R.TRIP_ID=T.TRIP_ID}

/*

Unlike IN, Exist returns either true or false based on existance of any tuple in the condition provided. In the question above, firstly we checked for the possibilities if there is a trip in state ME and TRIP_IDs are common. Then we selected reservation ID, trip ID and Trip dates for all queries that returns true for inner query

*/

8.

SELECT G.LAST_NAME,G.FIRST_NAME FROM GUIDE WHERE G.GUIDE_NUM IN

{

SELECT DISTINCT TG.GUIDE_NUM FROM TRIPGUIDES TG WHERE TG.TRIPID IN {

SELECT T.TRIP_ID FROM TRIP T WHERE T.TYPE='Paddling'

}

}

/*

We have used here double nested IN queries. Firstly we selected all the trips which had paddling type (from the inner most queries). Using the same, we get the list of guides,(basically got the list of guide_numbers) of all the guides eds which were on trips with trip id we got from the inner most queries. Now that we have all the guide_Nums that were on trip with type paddling, we can simply use the query select last name and first name of all the guides which are having guide nums in the list returned by middle query.

*/

Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6, 7, 7, 12, then isSorted(a, 5) should return 1 . If array b stores 3, 4, 9, 8, then isSorted(b, 4) should return 0.int isSorted(int *array, int n){

Answers

Answer:

Here the code is given as follows,

Explanation:

Code:-

#include <stdio.h>  

int isSorted(int *array, int n) {

   if (n <= 1) {

       return 1;

   } else {

       return isSorted(array, n-1) && array[n-2] <= array[n-1];

   }

}  

int main() {

   int arr1[] = {3, 6, 7, 7, 12}, size1 = 5;

   int arr2[] = {3, 4, 9, 8}, size2 = 4;  

   printf("%d\n", isSorted(arr1, size1));

   printf("%d\n", isSorted(arr2, size2));

   return 0;

}

Output:-

Use NAND operator to write; P or Q, and P -Q make an everyday implication sentence using only NAND

Answers

Answer:

Hence the answer is given as follows,

Explanation:

By using the NAND operator:-

P or Q and P -Q make an everyday implication sentence using the only NAND is given as,

An e-mail program allows?
A. users to access and view web pages on the internet.
B. geographically separated people to transfer audio and video.
C. real-time exchange of messages or files with another online user.
D. transmission of messages and files via a network such as the internet.​

Answers

Answer:

C

Explanation:

Real time exchange of messages or files with another online user

Which information can you apply to every page of your document with the page layout options?
header
conclusion
body
footer
introduction

Answers

Answer:

Header and footer

Explanation:

The page layout tab usually found in document programs such as Microsoft Word hold options used to configure several page options which is to be applied to a document. The page layout option gives users options to set page margins, orientation, page numbering, indentation and the other page layout options which is primarily how we would like our document to look like when printed. The page layout option also allows the insertion of a header and footer which is a note which can be written at the topmost and bottomost part of the document. Once, a header and footer option is selected, it is applied to every page of the document being worked on at the moment.

Other Questions
In a computer crime, computers ____________________. Group of answer choices are immune to all crimes committed by humans must be the only instrument of the crime cannot be the target of the crime may be both the target of the crime and an instrument of the crime. On Edg: Use the following definitions to answer the question.assent:1. (noun) an agreement2. (verb) to express agreementascent:1. (noun) an upward slope or incline2. (verb) to climbRead the sentence.The measure passed with a majority _________.Which word correctly completes the sentence?A. assent (noun)B. assent (verb)C. ascent (noun)D. ascent (verb) 30 points if helped, question in the picture at pretend highschool there are 325 boys and 275 girls.express the ratio of boys and girlsreduce to simplest form PLEASE HELP WILL GIVE BRAINLIEST The structural integrity of bacteria is to peptidoglycan as the structural integrity of plant spores is to Which equation describes the summer for two vectors plotted below? Please help will give brainliest Which of the following best describes the state of the US economy at the end of World War 11?It was starting to come out of the Great Depression.It was out of the Great Depression and doing better.It was one of the most powerful economies in the world.It was entering another recession Where should the author of a case study introduce the central question of the text?at the conclusionat the beginningafter the evidencealong with the supplemental facts is this right? [extra characters] Simplify the expression Identify the coefficient, variable, and exponent of the monomial: 4y3 Which sequence is generated by the function f(n + 1) = f(n) - 2 for f(1) = 10?-10, -12, -14, -16, -18,...0-2, 8, 18, 28, 38, ...08, 18, 28, 38, 48, ...O ,10, 8, 6, 4, 2, ... Determine the axis of symmetry of the parabola with x-intercepts at (4, 0) and (12, 0) Help please. Need to get this right to get 100% a therate ticket cost 63 plus a booking fee of 3%what is the total price of the ticket PLEASEEEE HELPP MEEEE I NEED HELPPPPPPP PLELASEEEEEE I REALLY DONT GET THIS AT ALL I JUST WANNA PAST THE 6th grade what sets one organization apart from others and provides the firm with a distinctive edge for meeting marketplace needs is known as _____ a target market by decentralization c competitive distinction d competitive advantage e core competency Find value of x.A. 110B. 47C. 68D. 112