Answer:
This can be done by a greedy solution. The algorithm does the following:
Put song 1 on CD1.
For song 1, if there's space left on the present CD, then put the song on the present CD. If not, use a replacement CD.
If there are not any CDs left, output "no solution".
Explanation:
The main thing is prove the correctness, do that by the "greedy stays ahead argument". For the primary song, the greedy solution is perfect trivially.
Now, let the optimal solution match the greedy solution upto song i. Then, if the present CD has space and optimal solution puts song (i+1) on an equivalent CD, then the greedy and optimal match, hence greedy is not any worse than the optimal.Else, optimal puts song (i + 1) on subsequent CD. Consider an answer during which only song (i + 1) is moved to the present CD and zip else is modified. Clearly this is often another valid solution and no worse than the optimal, hence greedy is not any worse than the optimal solution during this case either. This proves the correctness of the algorithm. As for every song, there are constantly many operations to try to do, the complexity is O(n).
Why input screens are better data entry than entreing data dirrctly to a table
Answer:
are better data entry designs than entering data directly to a table. ... hence a user can design input fields linked to several tables/queries.
Explanation:
Input screens are better data entry designs than entering data directly to a table because a user can design input fields linked to several tables/queries.
What is digital information?Digital information generally consists of data that is created or prepared for electronic systems and devices such as computers, screens, calculators, communication devices. These information are stored by cloud.
They are converted from digital to analog and vice versa with the help of a device.
Data entered in the table directly is easier than data entry method.
Thus, input screens are better data entry than entering data directly to a table.
Learn more about digital information.
https://brainly.com/question/4507942
#SPJ2
How does OOP keep both code and data safe from outside interference and
incuse?
Answer:
it is the process that binds together the data and code into a single unit and keeps both from being safe from outside interference and misuse. In this process, the data is hidden from other classes and can be accessed only through the current class's methods
12. How many different documents can
you have open at one time?
Answer:
10 documents ^_^
Explanation:
I can open it at the same time on my laptop ●~●
In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated first.
Answer:
"if" is the right response.
Explanation:
Forward chaining is being utilized just to split the logical sequential order down as well as operate throughout every component once the preceding one is accomplished, from start to finish.Its whole algorithm begins with proven information that activates all the rules, which are fulfilled as well as makes established realities even more complete.The importance of the 8 functions of an operating system
Answer:
Explanation:
Important functions of an operating System:
Security –
The operating system uses password protection to protect user data and similar other techniques. it also prevents unauthorized access to programs and user data.
Control over system performance –
Monitors overall system health to help improve performance. records the response time between service requests and system response to have a complete view of the system health. This can help improve performance by providing important information needed to troubleshoot problems.
Job accounting –
Operating system Keeps track of time and resources used by various tasks and users, this information can be used to track resource usage for a particular user or group of user.
Error detecting aids –
Operating system constantly monitors the system to detect errors and avoid the malfunctioning of computer system.
Coordination between other software and users –
Operating systems also coordinate and assign interpreters, compilers, assemblers and other software to the various users of the computer systems.
Memory Management –
The operating system manages the Primary Memory or Main Memory. Main memory is made up of a large array of bytes or words where each byte or word is assigned a certain address. Main memory is a fast storage and it can be accessed directly by the CPU. For a program to be executed, it should be first loaded in the main memory. An Operating System performs the following activities for memory management:
It keeps tracks of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used. In multi programming, the OS decides the order in which process are granted access to memory, and for how long. It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.
Processor Management –
In a multi programming environment, the OS decides the order in which processes have access to the processor, and how much processing time each process has. This function of OS is called process scheduling. An Operating System performs the following activities for processor management.
Keeps tracks of the status of processes. The program which perform this task is known as traffic controller. Allocates the CPU that is processor to a process. De-allocates processor when a process is no more required.
Device Management –
An OS manages device communication via their respective drivers. It performs the following activities for device management. Keeps tracks of all devices connected to system. designates a program responsible for every device known as the Input/Output controller. Decides which process gets access to a certain device and for how long. Allocates devices in an effective and efficient way. Deallocates devices when they are no longer required.
File Management –
A file system is organized into directories for efficient or easy navigation and usage. These directories may contain other directories and other files. An Operating System carries out the following file management activities. It keeps track of where information is stored, user access settings and status of every file and more… These facilities are collectively known as the file system.
Which of the following terms describes an attacker walking or driving through business areas and neighborhoods to identify unprotected wireless networks from the street using a laptop or a handheld computer?
A. Wi-Fi stealing.
B. Wi-Fi trolling.
C. Wi-Fi jacking.
D. Wi-Fi hacking.
Answer:
C. Wi-Fi jacking
Explanation:
Answer: yessir b
Explanation:
3. Most widely used structure for recording database modifications is called
A. Scheduling
B. Buffering
C. Log
D. Blocking
Answer:
C. log
Explanation:
The log is a sequence of log records, recording all the update activities in the database
hope this helps
Answer:
C. Log is the
answer
Explanation:
a sequence of log records recording all update activity in database
Write a Python program square_root.py that asks a user for an integer n greater or equal to 1. The program should then print the square root of all the odd numbers between 1 and n (Including n if n is odd). Print the square roots rounded up with no more than two digits after the decimal point.
Answer:
import math
n = int(input("Enter n: "))
for number in range(1, n+1):
if number % 2 == 1:
print("{:.2f}".format(math.sqrt(number)), end=" ")
Explanation:
In order to calculate the square roots of the numbers, import math. Note that math.sqrt() calculates and gives the square root of the given number as a parameter
Ask the user to enter the n
Create a for loop that iterates from 1 to n+1 (Since n is included, you need to write n+1)
Inside the loop, check whether the number is odd or not using the if structure and modulo. If the number is odd, calculate its square root using the math.sqrt() and print the result with two digits after the decimal
In this technique, each attribute is associated with a specific feature of a face, and the attribute value is used to determinethe way a facial feature is expressed. This technique is called._______________
Answer:
Chernoff faces.
Explanation:
Chernoff faces is a data visualization technique that was developed by a statistician named Herman Chernoff. He introduced this data visualization technique to the world in 1973 to represent multivariate or multidimensional data containing at least eighteen (18) variables.
In Chernoff faces, each attribute is associated with a specific feature of a face (nose, eyes, ears, hair, mouth, and eyebrows), and the attribute value with respect to size, shape, orientation, colour and placement is used to determine the way a facial feature is expressed.
The Chernoff face is a technique designed and developed to help detect similarities between different items and discern subtle changes in facial expressions from the perspective of an observer.
How did the military in the early 1900s move resources?
engines.
In the early 1900s, military moved their resources to distant locations with the help of
Answer:
In the early 1900s, military moved their resources to distant locations with the help of trains, ships, and, to a lesser extent, horse-drawn wagons. This was so because at that time airplanes did not yet exist, capable of transporting inputs to any part of the world in a very short period of time. Therefore, inputs and resources were brought by sea and, if impossible, through land, using railways or highways.
It is common for people to name directories as dir1, dir2, and so on. When there are ten or more directories, the operating system displays them in dictionary order, as dir1, dir10, dir11, dir12, dir2, dir3, and so on. That is irritating, and it is easy to fix. Provide a comparator that compares strings that end in digit sequences in a way that makes sense to a human. First compare the part before the digit as strings, and then compare the numeric values of the digits.
Your program should work with the provided test program
DirectorySortDemo.java.
Call the class you write DirectoryComparator.java.
Submit the two files in your submission.
DirectoryComparator.java
DirectorySortDemo.java
import java.util.ArrayList;
import java.util.Arrays;
import java.util.collections;
public class DirectorySortDemo
{
public static void main (String [] args)
{
String dirNames ("dir12", "dir5", "dir9", "dirl", "dir4",
"lab10", "1ab2", "lab7", "lab17", "lab8",
"quiz8", "quiz10", "quiz11", "quiz12",
"dirll", "dir8", "dir7", "dir15", "dir3");
ArrayList directories = new
ArrayList<> (Arrays.asList (dirNames));
System.out.println ("Unsorted List:");
System.out.println (directories);
Collections.sort (directories, new DirectoryComparator ());
System.out.println ():
System.out-println ("Sorted List: ");
System.out.-println (directories);
Answer:
Here the code is given as follows,
Explanation:
how to identify mistakes in a html code??
D State Six Impact of ICT the society
Answer:
home officebankhospital hotelExplanation:
ICT is a device that display and command information outside.
All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonymous email Preventing client computers from accepting cookies Email encryption Anonymous surfing
Answer:
Data use policies
Explanation:
Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.
Show the result of inserting 10, 12, 1, 14, 6, 5, 8, 15, 3, 9, 7, 4, 11, 13, and 2, one at a time, into an initially empty binary heap. b. Show the result of using the linear-time algorithm to build a binary heap using the same input.
Show the result of performing three deleteMin operations in the heap of the previous exercise.
Answer:
Explanation:
A)
10 10 10 1 1
/ / \ --> / \ / \
12 12 1 12 10 12 10
/
14
1 1 1 1
/ \ / \ / \ / \
12 10 --> 6 10 6 10 --> 6 5
/ \ / \ / \ / / \ /
14 6 14 12 14 12 5 14 12 10
1 1 1 1
/ \ / \ / \ / \
6 5 6 5 6 5 --> 3 5
/ \ / \ / \ / \ / \ / \ / \ / \
14 12 10 8 14 12 10 8 14 12 10 8 6 12 10 8
/ / \ / \
15 15 3 15 14
After inserting all 1
/ \
3 2
/ \ / \
6 7 5 4
/ \ / \ / \ / \
15 14 12 9 10 11 13 8
b)
First level build : 10
/ \
12 1
/ \ / \
14 6 5 8
/ \ / \ / \ / \
15 3 9 7 4 11 13 2
Heap bottom level: 10
/ \
12 1
/ \ / \
3 6 4 2
/ \ / \ / \ / \
15 14 9 7 5 11 13 8
Heap next level up: 10
/ \
3 1
/ \ / \
12 6 4 2
/ \ / \ / \ / \
15 14 9 7 5 11 13 8
Final heap: 1
/ \
3 2
/ \ / \
12 6 4 8
/ \ / \ / \ / \
15 14 9 7 5 11 13 10
c)
Duing the first time,
First, assume the last element, the 8, is at the root and bubble down.
Then, assume the last element, the 13, is at the root and bubble down.
Then, assume the last element, the 11, is at the root and bubble down.
Final heap:
4
/ \
6 5
/ \ / \
13 7 10 8
/ \ / \ /
15 14 12 9 11
In the next iteration,
First, assume the last element, the 10, is at the root and bubble down.
Then, assume the last element, the 13, is at the root and bubble down.
Then, asssume the last element, the 11, is at the root and bubble down.
So, after performing all operations, the heap looks like below:
4
/ \
6 5
/ \ / \
12 7 10 8
/ \ / \ /
15 14 9 13 11
What type of device is a computer? Where does it use
Answer:A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web.
have y’all beat shinobi 3 return of The ninja Master for The sega genesis
Explanation:
sorry l don't watch anime or ninja things.
Eureka! Is a telephone and Internet-based concierge service that specializes in obtaining things that are hard to find (e.g., Super Bowl tickets, first-edition books from the 1500s, Faberge eggs). It currently employs 60 staff members who work 24 hours per day (over three shifts). Staff answer the phone and respond to requests entered on the Eureka! Web Site. Much of their work is spent on the phone and on computers searching on the Internet. What type of connections should Eureka! consider from it’s offices to the outside world, in terms of phone and Internet? Outline the pros and cons of each alternative below and make a recommendation. The company has four alternatives:
1. Should it use traditional analog services, with standard voice lines, and use modems to dial into its ISP ($40 per month for each voice line plus $20 per month for each Internet access line)?
2. Should the company use standard voice lines but use DSL for its data ($40 per month per line for both services)?
3. Should the company separate its voice and data needs, using standard analog services for voice but finding some advanced digital transmission services for data ($40 per month for each voice line and $300 per month for a circuit with 1.5 Mbps for data)?
4. Should the company search for all digital services for both voice and data ($60 per month for an all-digital circuit that provides two PCM phone lines that can be used for two voice calls, one voice call and one data call at 64 Kbps, or one data call at 128 Kbps)?
5. Should the company invest in a modern-day fiber optic 10Mb/s flex? Research price.
NOTE: PLEASE PROVIDE DETAIL ANSWER OF THIS QUESTION.
Explanation:
Should the company separate its voice and data needs, using standard analog services for voice but finding some advanced digital transmission services for data ($40 per month for each voice line and $300 per month for a circuit with 1.5 Mbps for data)?
You are between flights at the airport and you want to check your email. Your wireless settings show two options:
a) a free unsecured site called TerminalAir and b) a pay-by-the-hour site called Boingo.
Which one is likely to be the most secure?
That's the code that's was already provided with the assignment
// Program takes a hot dog order
// And determines price
using System;
using static System.Console;
class DebugFour1
{
static void Main()
{
const double BASIC_DOG_PRICE = 2.00;
const double CHILI_PRICE = 0.69;
const double CHEESE_PRICE = 0.49;
String wantChili, wantCheese;
double price;
Write("Do you want chili on your dog? ");
wantChilli = ReadLine();
Write("Do you want cheese on your dog? ");
wantCheese = ReadLine();
if(wantChili = "Y")
if(wantCheese = "Y")
price == BASIC_DOG_PRICE + CHILI_PRICE + CHEESE_PRICE;
else
price == BASIC_DOG_PRICE + CHILI_PRICE;
else
if(wantCheese = "Y")
price = BASIC_DOG_PRICE;
else
price == BASIC_DOG_PRICE;
WriteLine("Your total is {0}", price.ToString("C"));
}
}
Answer:
Code:-
// Program takes a hot dog order
// And determines price
using System;
using static System.Console;
class DebugFour1
{
static void Main()
{
const double BASIC_DOG_PRICE = 2.00;
const double CHILI_PRICE = 0.69;
const double CHEESE_PRICE = 0.49;
String wantChili, wantCheese;
double price;
Write("Do you want chili on your dog? ");
wantChili = ReadLine();
Write("Do you want cheese on your dog? ");
wantCheese = ReadLine();
if (wantChili == "Y")
{
if (wantCheese == "Y")
price = BASIC_DOG_PRICE + CHILI_PRICE + CHEESE_PRICE;
else
price = BASIC_DOG_PRICE + CHILI_PRICE;
}
else
{
if (wantCheese == "Y")
price = BASIC_DOG_PRICE + CHEESE_PRICE;
else
price = BASIC_DOG_PRICE;
}
WriteLine("Your total is {0}", price.ToString("C"));
}
}
The next few questions will be based on interpretations of a topographic map from East Brownsville, TX. To answer these questions you will have to access the topographic map of East Brownsville attached below:
What stage of fluvial landscape development is shown across the region displayed here?
a. Youthful
b. Mature
c. Old age
Answer:
a. Youthful
Explanation:
The river gets its water from youth stage fluvial water. The river meanders from side to side. East Brownsville will be less stable in international boundary in terms of physical position on the landscape because its base level drops.
Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate type (such as including a .0 at the end of a double or quotes around a String).
4 + 1 + 9 + "." + (-3 + 10) + 11 / 3
8 + 6 * -2 + 4 + "0" + (2 + 5)
1 + 1 + "8 - 2" + (8 - 2) + 1 + 1
5 + 2 + "(1 + 1)" + 4 + 2 * 3
"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)
Answer:
[tex](a)\ 14"."43[/tex]
[tex](b)\ 0"0"7[/tex]
[tex](c)\ 2"8 - 2"611[/tex]
[tex](d)\ 7"(1 + 1)"46[/tex]
[tex](e)\ "1"23"4"30"7"17[/tex]
Explanation:
Required
Evaluate each expression
The simple rules to follow are:
(1) All expressions in bracket will be evaluated based on its data type
(2) Divisions will return only integer values
(3) Integers immediately after string values will be concatenated (not added)
So, the results are as follows:
[tex](a)\ 4 + 1 + 9 + "." + (-3 + 10) + 11 / 3[/tex]
Evaluate till a string is encountered
[tex]4 + 1 + 9 = 14[/tex]
Followed by "."
Then:
[tex](-3 + 10) = 7[/tex]
[tex]11/ 3 = 3[/tex]
[tex]"." + (-3 + 10) + 11/3 = "."73[/tex] -- because expressions after string operations are concatenated.
So, we have:
[tex]4 + 1 + 9 + "." + (-3 + 10) + 11 / 3 = 14"."43[/tex]
[tex](b)\ 8 + 6 * -2 + 4 + "0" + (2 + 5)[/tex]
Evaluate till a string is encountered
[tex]8 + 6 * -2 + 4 =0[/tex]
[tex]"0" + (2 + 5) ="0"7[/tex]
So, we have:
[tex]8 + 6 * -2 + 4 + "0" + (2 + 5) = 0"0"7[/tex]
[tex](c)\ 1 + 1 + "8 - 2" + (8 - 2) + 1 + 1[/tex]
Evaluate till a string is encountered
[tex]1 + 1 = 2[/tex]
[tex]"8 - 2" + (8 - 2) + 1 + 1 = "8 - 2"611[/tex]
So, we have:
[tex]1 + 1 + "8 - 2" + (8 - 2) + 1 + 1 = 2"8 - 2"611[/tex]
[tex](d)\ 5 + 2 + "(1 + 1)" + 4 + 2 * 3[/tex]
Evaluate till a string is encountered
[tex]5 + 2 =7[/tex]
[tex]"(1 + 1)" + 4 + 2 * 3 = "(1 + 1)"46[/tex] --- multiply 2 and 3, then concatenate
So, we have:
[tex]5 + 2 + "(1 + 1)" + 4 + 2 * 3= 7"(1 + 1)"46[/tex]
[tex](e)\ "1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)[/tex]
Since a string starts the expression, the whole expression will be concatenated except the multiplication and the expressions in bracket.
So, we have:
[tex]"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9) = "1"23"4"30"7"17[/tex]
Many companies possess valuable information they want to guard closely (ex. new chip design, competition plans, legal documents). Personal computer hard disks these days are full of important photos, videos, and movies. As more and more information is stored in computer systems, the need to protect it is becoming increasingly important. Which of the following statements is incorrect with respect to Security?
a. security has many facets; three of the more important ones are: the nature of the threats, the nature of intruders, and cryptography
b. data integrity means that unauthorized users should not be able to modify any data without the owner's permission
c. a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for
d. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes
Answer: D. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes
Explanation:
Data security is essential to protecting unwanted people from having access to ones data, malicious attack should also be prevented and unusual behavior should be monitored.
Data security has many facets such as threat nature, the nature of intruders, and cryptography. Furthermore, data integrity means that unauthorized users should not be able to modify any data without the owner's permission. Also, the statement that a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for is correct.
It should be no noted that rats gnawing backup tapes cannot prevent data loss. Therefore, the correct option is D
Write a function that takes six arguments of floating type (four input arguments and two output arguments). This function will calculate sum and average of the input arguments and storethem in output arguments respectively. Take input arguments from the user in the main function.
Answer:
Answer:Functions in C+
The integer variable n is the input to the function and it is also called the parameter of the function. If a function is defined after the main() .....
Your dashboard should show the sum and average as two separate columns. If you use measure names as the column field, what should you use for the marks
Answer:
Hence the answer is a sum.
Explanation:
Here the statement shows that the dashboard should show the sum and average as two separate columns if we name measure names because the column field then for marks we'll use the sum. Since the sum displays the sum of the values of all the fields, which refers to the marks of the person.
Therefore the answer is a sum.
If we use measure names as the column field, we should use "the sum".
A set of cells that are support equipment on about a similar vertical line, is considered as a column.
Usually, the name of the user or a client represents a field column, while the total and sometimes even averaging columns in our dashboards or screen are different.When using a summation of total summary, perhaps the column field (title), as well as its amount and averaging marking, are indicated.The preceding reply is thus right.
Learn more:
https://brainly.com/question/17271202
The subroutines/function calls you need to call to pass an application message down to the transport layer is called the
Answer:
"TCP/IP library" is the appropriate answer.
Explanation:
A communications protocol that always connects to yet another system or device and guarantees transmissions were also correctly converted to digital signals or received, is termed as TCP/IP.Technology can also do a variety of things on its own and. However, when you speak among each other devices' maximum throttle emerges.If you fail a course as a MAIN (residency) course, you can repeat that course as either a MAIN (residency) or an online (IG or IIG) course.
A. True
B. False
The computer that is used in scientific research is ........
Answer:
supercomputers are the computer that is used in scientific research.
Answer:
super computer is the right answer
The purpose of the five-entity minimum, six-entity maximum is to establish a relatively small baseline for you to keep the scope of your database project constrained.
a. True
b. False
what its the difference between Arduinos and Assembler?
Answer:
The Arduino boards can be programmed in assembly. All you need is an ICSP Cable (In Circuit Serial Programmer) and the AVR toolchain (free from ATMEL) to write to the board. You then get the advantage of on board debugging.
As you suggested, you can just slap an ATMEL chip on a breadboard and go to town.
Explanation: cause i said so