For each situation, describe an algorithm or data structure presented during the course (data structure) that relates to the situation (or at least shares the complexity) Name, describe and explain the algorithm / data structure.
1. You are at the library and will borrow a book: "C ++ template metaprogramming: concepts, tools, and techniques from boost and beyond / David Abrahams, Aleksey Gurtovoy". The library applies the SAB system for classification. You see a librarian who seems to want to answer a question. Find the shelf where your book is.
2. You have a balance scale with two bowls. You have received N bullets. One of the bullets weighs 1% more than the others. Find the heavy bullet.

Answers

Answer 1

Situation: Finding the shelf for a book in a library using the SAB system for classification.

Algorithm/Data Structure: Binary Search Tree (BST)

A Binary Search Tree is a data structure that organizes elements in a sorted manner, allowing for efficient searching, insertion, and deletion operations. In the given situation, the SAB system for classification can be viewed as a hierarchical structure similar to a BST. Each level of the classification system represents a level in the BST, and the books are organized based on their classification codes.

To find the shelf where the book "C ++ template metaprogramming: concepts, tools, and techniques from boost and beyond" is located, we can perform a binary search by comparing the book's classification code with the nodes of the BST. This search process eliminates half of the search space at each step, leading us to the correct shelf more efficiently.

Situation: Finding the heavy bullet using a balance scale with two bowls.

Algorithm/Data Structure: Divide and Conquer (Binary Search)

In this situation, we can apply the divide and conquer algorithm to efficiently find the heavy bullet among N bullets. The basic idea is to divide the set of bullets into two equal halves and compare the weights on the balance scale. If the weights are balanced, the heavy bullet must be in the remaining set of bullets. If one side is heavier, the heavy bullet must be in that set.

This process is repeated recursively on the unbalanced side until the heavy bullet is found. This algorithm shares the complexity of a binary search, as the set of bullets is divided into two halves at each step, reducing the search space by half. By dividing the problem into smaller subproblems and eliminating one half of the remaining possibilities at each step, the heavy bullet can be efficiently identified.

Learn more about Algorithm  here:

https://brainly.com/question/21172316

#SPJ11


Related Questions

53.8% complete question a startup company adds a firewall, an ids, and a hips to its infrastructure. at the end of the week, they will install hvac in the server room. the company has scheduled penetration testing every month. which type of layered security does this represent?

Answers

The setup described represents a layered security approach that includes both preventive and detective controls, which is a common approach to securing IT infrastructure.

What is the firewall about?

The firewall, IDS (Intrusion Detection System), and HIPS (Host Intrusion Prevention System) are examples of preventive controls. These are designed to prevent security incidents by blocking unauthorized access and detecting and stopping attacks before they can cause damage.

The scheduled penetration testing is an example of a detective control. Penetration testing is a method of testing the security of a system by attempting to exploit vulnerabilities in a controlled environment.

Therefore, the installation of HVAC in the server room is an example of a physical security control. This control is designed to protect the physical infrastructure from environmental threats such as overheating, humidity, and dust.

Read more about firewall here:

https://brainly.com/question/13693641

#SPJ1

Which range function creates the following list of numbers?

21 25 29 33 37 41

Group of answer choices

range(21, 44, 4)

range(21, 41)

range(21, 41, 4)

range(21, 44)

Answers

Note that the range function that creates the following list of numbers is:  range(21, 44, 4) (Option A)

What is the rationale for the above response?

The rationale for the above response is that the range function generates a sequence of numbers from a starting value to an ending value with a specific step size.

The list of numbers, "21 25 29 33 37 41", starts from 21 and increments by 4 until it reaches 44. Therefore, range(21, 44, 4) would generate this sequence of numbers.

The first argument is the starting value, the second argument is the ending value, and the third argument is the step size, which in this case is 4.

Learn more about  range function:

https://brainly.com/question/29145252

#SPJ1

each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the brain using learning, memory, and generalization?

Answers

Answer:

Neural Network

Explanation:

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

Why is Charles Babbage is known as the father of computer?​

Answers

Answer:

Charles Babbage is known as the father of computer because he invented a machine called Analytical Engine, which is a model of today's computers.

have a great dayyyy

___________is used to extract information from a database?

a) Validation
b) Data type
c) Record
d) Query

Answers

thee answer is thy letter A

Answer: b

Explanation:

i believe it is the answer b Data type

What do you call the commonly used AI technology for learning input (A) to output (B) mappings?

Answers

The commonly used AI technology for learning input (A) to output (B) mappings is called supervised learning.

Supervised learning is a machine learning approach where a model learns from a given dataset that contains input-output pairs. The goal is for the model to learn the underlying pattern or relationship between the inputs and outputs, allowing it to make predictions or generate outputs for new, unseen inputs.

In supervised learning, the model is trained using labeled data, where each input is associated with a corresponding output or target value. The model then generalizes from the training data to make predictions on new, unseen data.

The process of supervised learning involves training the model by optimizing a specific objective or loss function, which measures the disparity between the predicted outputs and the actual outputs.

Various algorithms can be used for supervised learning, such as linear regression, decision trees, support vector machines, and neural networks.

Supervised learning is widely used in various domains, including image classification, natural language processing, speech recognition, and recommendation systems, among others. It is a fundamental approach in machine learning and has been successful in solving a wide range of predictive and pattern recognition tasks.

Learn more about supervised learning here:

https://brainly.com/question/31456360

#SPJ11

Which one of the following is a type of network security?
a) Login Security
b) Rights Security
c) Both (a) and (b)
d) Neither (a), nor (b)


Answers

Answer:

I think it's (login security)

Implement a program to find the average of 100 integers that are randomly generated, using both C and RISC-V assembly, and simulate the assembly program execution using RARS.

The C program MUST follow these steps: 1) declare an int array of 100 elements, and use a for loop to generate 100 integers and store them in the array; 2) use another for loop to accumulate those numbers by reading them from the array and adding up to a variable; 3) calculate the average by dividing the accumulated sum with 100, and 4) print the average and return the average. Your program should NOT do the number generation and accusation in one loop

Answers

To simulate the assembly program execution using RARS, you can simply load the RISC-V assembly program into RARS, assemble it, and run it.

To implement a program to find the average of 100 integers that are randomly generated using both C and RISC-V assembly, you can follow the steps below:

C program:

```

#include

#include

#include

int main()

{

int array[100], i, sum = 0, avg;

srand(time(0));

// Generate 100 random integers and store them in the array

for(i=0; i<100; i++)

{

  array[i] = rand() % 100;

}

// Accumulate the numbers by reading them from the array and adding up to a variable

for(i=0; i<100; i++)

{

  sum += array[i];

}

// Calculate the average by dividing the accumulated sum with 100

avg = sum / 100;

// Print the average and return the average

printf("The average is %d\n", avg);

return avg;

}

```

RISC-V assembly program:

```

.data

array: .space 400

sum: .word 0

avg: .word 0

.text

.globl main

main:

# Generate 100 random integers and store them in the array

li t0, 0

li t1, 100

li t2, 0

loop1:

  blt t0, t1, loop1_body

  j loop1_end

  loop1_body:

    li a0, 42

    li a7, 168

    ecall

    sw a0, array(t2)

    addi t0, t0, 1

    addi t2, t2, 4

    j loop1

loop1_end:

# Accumulate the numbers by reading them from the array and adding up to a variable

li t0, 0

li t1, 100

li t2, 0

loop2:

  blt t0, t1, loop2_body

  j loop2_end

  loop2_body:

    lw t3, array(t2)

    lw t4, sum

    add t4, t4, t3

    sw t4, sum

    addi t0, t0, 1

    addi t2, t2, 4

    j loop2

loop2_end:

# Calculate the average by dividing the accumulated sum with 100

lw t0, sum

li t1, 100

div t0, t0, t1

sw t0, avg

# Print the average and return the average

lw a0, avg

li a7, 1

ecall

li a7, 10

ecall

```

To simulate the assembly program execution using RARS, you can simply load the RISC-V assembly program into RARS, assemble it, and run it. The output will be displayed in the RARS console.

Learn more about assembly program:

brainly.com/question/13171889

#SPJ11

Consider a B+ tree being used as a secondary index into a relation. Assume that at most 2 keys and 3 pointers can fit on a page. (a) Construct a B+ tree after the following sequence of key values are inserted into the tree. 10, 7, 3, 9, 14, 5, 11, 8,17, 50, 62 (b) Consider the the B+ tree constructed in part (1). For each of the following search queries, write the sequence of pages of the tree that are accessed in answering the query. Your answer must not only specify the pages accessed but the order of access as well. Assume that in a B+ tree the leaf level pages are linked to each other using a doubly linked list. (0) (i)Find the record with the key value 17. (ii) Find records with the key values in the range from 14 to 19inclusive. (c) For the B+ tree in part 1, show the structure of the tree after the following sequence of deletions. 10, 7, 3, 9,14, 5, 11

Answers

The B+ tree structure after the sequence of deletions (10, 7, 3, 9, 14, 5, 11) results in a modification of the tree's structure.

(a) Constructing a B+ tree after the given sequence of key values:

The B+ tree construction process for the given sequence of key values is as follows:

Initially, the tree is empty. We start by inserting the first key value, which becomes the root of the tree:

```

                   [10]

```

Next, we insert 7 as the second key value. Since it is less than 10, it goes to the left of 10:

```

               [10, 7]

```

We continue inserting the remaining key values following the B+ tree insertion rules:

```

               [7, 10]

              /     \

         [3, 5]   [9, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14, 17]

```

```

               [7, 10, 14]

              /     |     \

         [3, 5]  [8, 9] [11] [17]

                            \

                            [50, 62]

```

The final B+ tree after inserting all the key values is shown above.

(b) Sequence of pages accessed for the search queries:

(i) To find the record with the key value 17:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is: Page 1 (root), Page 2 (child of root), Page 3 (child of Page 2), Page 4 (leaf containing 17).

(ii) To find records with key values in the range from 14 to 19 inclusive:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is the same as in (i).

(c) Structure of the tree after the given sequence of deletions:

To show the structure of the tree after the deletion sequence, we remove the specified key values one by one while maintaining the B+ tree properties.

After deleting 10:

```

               [7, 14]

              /     |     \

         [3, 5]  [8, 9] [11, 17]

                            \

                            [50, 62]

```

After deleting 7:

```

               [8, 14]

              /     |     \

         [3, 5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 3:

```

               [8, 14]

              /     |     \

         [5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 9:

```

               [8, 14]

              /     |     \

         [5]  [11, 17]

                            \

                            [50, 62]

```

After deleting 14:

```

               [8, 11]

              /         \

         [5]          [17]

                            \

                            [50, 62]

```

After deleting 5:

```

               [11]

              /         \

         [8]          [17]

                            \

                            [50, 62]

```

After deleting 11:

```

               [17]

              /         \

         [8]           [50, 62]

```

The final structure of the tree after the deletion sequence is shown above.

Learn more about B+ tree here

https://brainly.com/question/30710838

#SPJ11

Which of these technologies has been most used by terrorist organizations?
Group of answer choices

phishing

social media

cloud computing

encoding

Answers

Answer:

Phishing and Social Media

Explanation:

A quick web search can give you this information. Terrorist organizations have used social media to socially engineer innocent people into joining their organizations and more. Phishing is also an attack that's used to obtain critical information such as hashes or plaintext credentials to get into people's accounts. This is a tactic that's also been used by terrorist organizations in the past.

a person who uses computers to gain unauthorized access to data.

Answers

Answer:

Hacker

Explanation:

They break password codes to get access to unauthorized data.

Answer:

a hacker

Explanation:

2. dreamhouse realty wants to offer a form on its experience cloud site where inspectors will submit findings from a property inspection. which feature should an administrator place on the page to fulfill this requirement?

Answers

A web form feature should be placed on the page of Dreamhouse Realty's Experience Cloud Site where inspectors will submit findings from a property inspection to fulfill this requirement.

A web form is a common way for a user to interact with a website. It is a container that collects data from users and sends it to the site's server. Web forms can have various types of inputs, such as text fields, radio buttons, checkboxes, and dropdown menus. They can also have complex elements like file uploads, captcha tests, and rich text editors. Web forms are widely used on e-commerce sites, contact forms, and job application forms.

You can learn more about web form at: brainly.com/question/28315791

#SPJ11

A topographical map of the world, with no labels is _____ abstract than a map with the names of all the countries and their capitals.

The blank is either more/less

Answers

Answer:

more

Explanation:

my Brian is so big, some would even go as far as to say its the biggest Brian in America

where does windows store ad group policy objects gpos?

Answers

In Windows, Group Policy settings are stored in the GPT (Group Policy Template) that exists in SYSVOL folder within the domain controller. The location where Windows stores the AD Group Policy Objects (GPOs) is on SYSVOL folder that exists in domain controller.

These templates store various Group Policy settings in a file format that can be read by the Group Policy component of the operating system, and used to apply the settings to client computers within a specific domain or organizational unit (OU).The SYSVOL folder within a domain controller stores both GPT and GPC files. GPTs are replicated amongst domain controllers of a specific domain. Meanwhile, GPCs are stored within a registry key on each machine using the Group Policy Engine. Therefore, you should always keep both the SYSVOL and the registry key in synchronization.

To learn more about GPOs and where they are stored, you can refer to Microsoft's official documentation on Group Policy in Windows. Also, it is important to note that Group Policy settings only affect client computers that are members of an Active Directory domain or workgroup. Group Policy does not apply to standalone computers or computers that are not part of a domain or workgroup.

Learn more about Synchronization here,Without proper synchronization, which is possible, a deadlock, corrupted data, neither or both? Give reasons for your an...

https://brainly.com/question/25541016

#SPJ11

steps to run a Q-BASIC programme

Answers

Answer:

Cls

Read

Input

Print

END

Billy Business has decided to open up a local delivery service, bringing students on campus food from exciting places like Chick-Fil-A, China Station, Chipotle and Crazy Crepe Cafe (you know, because C's get degrees). However, since Billy has spent his entire upper division CS career freeloading off of his teammates, he has pretty much forgotten how to code. He therefore needs your help designing a computer-based stop scheduler. Being a clever 214 student, you realize that the best way to schedule stops on a delivery route is with a linked list, so your goal is to implement a stop scheduler that will let Mr. Business arrange his deliveries in the most optimal order. He must be able to add delivery jobs, remove them (in case the client doesn't offer him enough bitcoin), reorder them (by -ie: crl x- an order, moving the cursor and pasting it) and mark an order as completed. If Billy is successful enough, he might expand his delivery business by hiring his friend Money Mike, so he must be able to switch between his delivery list and Mike's, and transfer delivery jobs back and forth.


Required:

Write a fully-documented class named Delivery which contains the source, destination, and instruction for a delivery .

Answers

Class `Delivery` should be implemented with attributes `source`, `destination`, and `instruction` to represent a delivery job, allowing for operations like adding, removing, reordering, marking as completed, and switching between delivery lists.

How should the class `Delivery` be implemented to represent a delivery job with attributes for the source, destination, and instruction, allowing for various operations and flexibility in managing delivery lists?

Explanation:

To fulfill the requirements, we need to implement a class named `Delivery` with the following attributes: `source`, `destination`, and `instruction`. Here's an explanation of each attribute:

- `source`: Represents the starting point or location from where the delivery needs to be made. It could be a restaurant or any other place.

- `destination`: Represents the endpoint or the location where the delivery needs to be dropped off. It could be a customer's address or any specified location.

- `instruction`: Contains any additional instructions or notes related to the delivery, such as special requests from the customer or specific delivery instructions.

The `Delivery` class can have getter and setter methods for each attribute to access and modify the values.

Here's an example implementation in Python:

class Delivery:

   def __init__(self, source, destination, instruction):

       self source = source

       self destination = destination

       self-instructional = instruction

   def get source(self):

       return self source

   def set source(self, source):

       self. source = source

   def get destination(self):

       return self destination

   def set destination (self, destination):

       self destination = destination

   def get instruction(self):

       return self instruction

   def set instruction (self, instruction):

       self-instructional = instruction

By using this `Delivery` class, Billy Business can create objects representing each delivery job, set the necessary attributes, and perform operations such as adding, removing, reordering, and marking deliveries as completed.

Additionally, if he expands his business and hires Money Mike, he can switch between different delivery lists or transfer jobs between them.

Learn more about Delivery`

brainly.com/question/2500875

#SPJ11

Consider an array of n ticket prices, tickets. a number, m, is defined as the size of some subsequence, s, of tickets where each element covers an unbroken range of integers. that is to say, if you were to sort the elements in s, the absolute difference between any elements j and j + 1 would be either 0 or 1.

required:
determine the maximum length of a subsequence chosen from the tickets array.

Answers

The maximum length of a subsequence chosen from the tickets array is m = max - min + 1.

Let S = {s1, s2, s3, ..., sm} be the subsequence of tickets. First, we need to find the range of integers that the tickets cover. This can be done by finding the minimum element in S and the maximum element in S.

Let min = min (s1, s2, s3, ..., sm) and max = max (s1, s2, s3, ..., sm)

Then, the range of integers is given by max - min + 1.

Therefore, the maximum length of the subsequence is given by m = max - min + 1.

For more questions like Tickets array click the link below:

https://brainly.com/question/17183799

#SPJ4

Prove by induction that the height of a perfect binary tree is log(n+1)-1. Recall that a perfect binary tree is a binary tree in which all interior nodes have two children and all leaves have the same depth.

Answers

To prove that the height of a perfect binary tree is log(n+1)-1, we will use mathematical induction. First, we will show that this formula holds for a tree with only one node (n=1). In this case, the height of the tree is 0, and log(n+1)-1 equals 0, so the formula holds.



Next, we will assume that the formula holds for a perfect binary tree with k nodes, and show that it also holds for a tree with k+1 nodes. To do this, we will add one node to the tree, which must be added as a leaf node. This means that the height of the tree increases by 1. By the induction hypothesis, the height of the original tree was log(k+1)-1. Adding a leaf node does not affect the depth of any other nodes in the tree, so the height of the new tree is log(k+2)-1, which is equal to log((k+1)+1)-1. Therefore, the formula holds for a perfect binary tree with k+1 nodes.

By the principle of mathematical induction, we have shown that the formula holds for all perfect binary trees.
To prove by induction that the height of a perfect binary tree is log(n+1)-1, we need to establish two steps: base case and induction step.
Base case: For n = 1 (one node), height = log(1+1)-1 = log(2)-1 = 0, which is correct as the single node tree has height 0.
Induction step: Assume the height of a perfect binary tree with n nodes is log(n+1)-1. Now, consider a tree with 2n+1 nodes (one extra level). This new tree has double the nodes plus one additional root. The height increases by 1.
New height = log(2n+1+1)-1 = log(2(n+1))-1 = log(n+1)+log(2)-1 = (log(n+1)-1)+1.
This shows the height of a perfect binary tree with 2n+1 nodes is log(n+1)-1 +1, maintaining the relationship as we add a level, proving the statement by induction.

To know more about induction visit-

https://brainly.com/question/18575018

#SPJ11

what is the full form of CCTV​

Answers

Answer:

CCTV stands for closed-circuit television

closed-circuit television

why does a wooden spoon not get hot when used in stirring hot liquids​

Answers

Answer:

Explanation:

A wooden spoon does not get hot when used in stirring hot liquids​ is because its an insulator.

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

To create a Custom Dimension for membership status (i.e., rewards level), what scope would be applied?

a. Hit
b. Product
c. Session
d. User

Answers

The scope that would be applied to create a Custom Dimension for membership status (i.e., rewards level) would be d. User. This is because membership status is a characteristic of the user rather than a specific hit, product or session.

By setting the scope as User, the membership status will be associated with the user's actions throughout their entire visit to the website or app.The scope that should be applied for a Custom Dimension for membership status (i.e., rewards level) depends on the nature of the data you want to collect and the analysis you want to perform.If you want to track the membership status for a specific page or interaction, then you would use Hit scope.If you want to track the membership status for a specific product or group of products, then you would use Product scope.If you want to track the membership status for a specific user session or visit, then you would use Session scope.If you want to track the membership status for a specific user across multiple sessions, then you would use User scope.

Learn more about characteristic  about

https://brainly.com/question/22813270

#SPJ11

For this assignment, you will create a calendar program that allows the user to enter a day, month, and year in three separate variables as shown below.

Please enter a date
Day:
Month:
Year:
Then, your program should ask the user to select from a menu of choices using this formatting:

Menu:
1) Calculate the number of days in the given month.
2) Calculate the number of days passed in the given year.
If a user chooses option one, the program should display how many days are in the month that they entered. If a user chooses option two, the program should display how many days have passed in the year up to the date that they entered.

Your program must include the three following functions:

leap_year: This function should take the year entered by the user as a parameter. This function should return 1 if a year is a leap year, and 0 if it is not. This information will be used by other functions. What is a Leap Year? (Links to an external site.)
number_of_days: This function should take the month and year entered by the user as parameters. This function should return how many days are in the given month. (Links to an external site.)
days_passed: This function should take the day, month, and year entered by the user as parameters. This function should calculate the number of days into the year, and return the value of number of days that have passed. The date the user entered should not be included in the count of how many days have passed.
Hints
Start by defining your variables, using comments. You will need a separate variable for day, month, and year that store numbers input from the user.
Make sure to name your three functions exactly as they are named above, and pass the parameters exactly in the order specified below:
leap_year(y)
number_of_days(m, y)
days_passed(d, m, y)
Once you have a function that calculates whether a year is a leap year, that function should be called within your number_of_days() function. February can have either 28 or 29 days, so your number_of_days() function needs to take into account whether or not it is a leap year.
Once you have a function that calculates the number of days in a given month, that function should be called within your days_passed() function. Different months have different numbers of days, so your days_passed() function needs to take into account what month of the year it is.

Sample Run 1
Please enter a date
Day: 5
Month: 5
Year: 1984
Menu:
1) Calculate the number of days in the given month.
2) Calculate the number of days passed in the given year.
1
31

Sample Output 1
Please enter a date
Menu:
1) Calculate the number of days in the given month.
2) Calculate the number of days passed in the given year.
31

Sample Run 2
Please enter a date
Day: 21
Month: 6
Year: 2016
Menu:
1) Calculate the number of days in the given month.
2) Calculate the number of days passed in the given year.
2
172

Sample Output 2
Please enter a date
Menu:
1) Calculate the number of days in the given month.
2) Calculate the number of days passed in the given year.
172

Answers

Answer:

hummm i have the same work i got a A

is this it is

Explanation:

For this assignment, you will create a calendar program that allows the user to enter a day, month, and year in three separate variables as shown below. Please enter a date Day: Month: Year: Then, your program should ask the user to select from a menu of choices using this formatting: Menu: 1) Calculate the number of days in the given month. 2) Calculate the number of days passed in the given year. If a user chooses option one, the program should display how many days are in the month that they entered. If a user chooses option two, the program should display how many days have passed in the year up to the date that they entered. Your program must include the three following functions: leap_year: This function should take the year entered by the user as a parameter. This function should return 1 if a year is a leap year, and 0 if it is not. This information will be used by other functions. What is a Leap Year? (Links to an external site.) number_of_days: This function should take the month and year entered by the user as parameters. This function should return how many days are in the given month. (Links to an external site.) days_passed: This function should take the day, month, and year entered by the user as parameters. This function should calculate the number of days into the year, and return the value of number of days that have passed. The date the user entered should not be included in the count of how many days have passed. Hints Start by defining your variables, using comments. You will need a separate variable for day, month, and year that store numbers input from the user. Make sure to name your three functions exactly as they are named above, and pass the parameters exactly in the order specified below: leap_year(y) number_of_days(m, y) days_passed(d, m, y) Once you have a function that calculates whether a year is a leap year, that function should be called within your number_of_days() function. February can have either 28 or 29 days, so your number_of_days() function needs to take into account whether or not it is a leap year. Once you have a function that calculates the number of days in a given month, that function should be called within your days_passed() function. Different months have different numbers of days, so your days_passed()

A ________ is a malicious piece of self-replicating code embedded within another program/computer called the host. (Hint: one word)

Answers

Answer:

A self-contained program that spreads through a computer network by exploiting security holes is called a worm A program with a benign capability that conceals another, sinister purpose is called a trojan horse

Explanation:

The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.

Answers

Answer:

ZOO WEE MAMA

Explanation:

ZOO WEE MAMA 23

9.) A principle of visual message use to present results gathered from survey data.
A. Comparison
C. Presenting survey data
B. Explaining how things work
D. Simplifying a complicated concept
bias​

Answers

Answer:

. Presenting survey data

Explanation:

Given that Presenting survey data involves the display of data in a graphical representation such as charts, video infographics, tables, and many more.

Therefore, a principle of the visual message is used to present results gathered from survey data is known as "Presenting Survey Data."

The data presented can then later be analyzed and eventually explained to the readers or the audience.

whenever a web client visits a web server, saved ____ for the requested web page are sent from the client to the server.

Answers

Whenever a web client visits a web server, saved data or information for the requested web page are sent from the client to the server.

This can include cookies, session information, and cache files. The web server then uses this information to provide a personalized and efficient browsing experience for the user. The web server then sends the requested web page back to the client for display.

A web server is software and hardware that responds to client requests sent over the World Wide Web using the HTTP (Hypertext Transfer Protocol) and other protocols. A web server's primary responsibility is to show website content by storing, processing, and sending webpages to users.

A web client is a client-side program used to establish an HTTP connection to a web server. The tool that shows online pages downloaded from the server and enables user interaction with the web server is often a web browser or web app. WebMail Explanation Describe Webmail. Definition of a web browser.

To know more about  web server, click here:

https://brainly.com/question/13055823

#SPJ11

Which of the following candidates would most likely be hired as a graphic artist?
o a visual design artist with seven years of experience in advertising
a multimedia artist with five years of experience in multimedia design
O a recent college graduate with a degree in multimedia design
O a recent college graduate with a degree in film design

Answers

Answer:

a multimedia artist with five years of experience in multimedia design

Explanation:

Which of the following memory is faster? PC4 22400 DDR4 3200

Answers

Answer:

DDR4-3200

Explanation:

PC4 22400 is the bus speed that can get a memory upt to DDR4-2800.. sort of

Other Questions
a 100.0 ml sample of 0.10 m nh3 is reacted with 50.0 ml of 0.10 m hno3. determine the ph of the final solution. the kb of nh3 is 1.8 105. a) 4.74 b) 7.78 c) 10.34 d) 9.26 e) 7.05 29. The two quadrilaterals are similar Findthe perimeter of the larger figure to thenearest hundredth.P93R 84 PQRS - XYZWS13W26A 24 unitsB 54 unitsC 78 unitsD 86 unitsE 92 units Evidence believed to support the theory of evolution fall into which major categories? the minimum length of time potential is determined by? if a monopolist increases output from 14 to 15 by lowering its price from $32 to $31, marginal revenue is: You are thinking about relocating after college. now you need to decide what city will work best for your priorities of career, affordability, and social life. what should you do next? How many milliliters of 0.20 M NaOH must be added to 75 mL of 0.050 M HCl to make a neutral solution? Evaluate the iterated integral: 2,04,1 sqrt(x+4y)dxdy 3. (3 pts) Find the general solution of the following homogeneous differential equations. 2xyy' + (x? - y) = 0 4. (3 pts) Find and classify all equilibrium solutions of: y' = (1 - 1)(y-2)(y + 1)3 HomeworkPlzz help me i have to submit it after 1 hour plzz fast a citizens advisory board can?a) vote on a new education policyb) write a new education policyc) enact a new education policyd) study a new education policy Medical information can be released legally for all of the following reasons except to _____. aupdate records for treatment information bcomply with court orders csend patient information to another healthcare provider dfile insurance claims Identify the prepositional phrase in each sentence.She caught the bus on time.the bus on timecaught the buson timeShe caught the bus Question ( please help me )1 . Which diagram shows pure substance that are elements2. Which diagram shows pure substance are compounds3. Which diagram shows a mixture of compounds4. Which diagram shows a mixture of elements5. Which diagram shows a mixture of an element and a compound The product of 0.61 and 4 please a policyowner is permitted to take out a policy loan on a whole life policy at what point? patricia plaintiff, a resident of california, has a valid judgment against dyson defendant, a resident of nevada, which she now wishes to execute. dyson owns hundreds of acres of beach-front property in california. patricia may execute her judgment in california based on what type of jurisdiction? An automat machine make good pieces with a probability 0,96. Wich are the chances that the two piece is wrong? Silver Star Bicycle Company will be manufacturing both mens and womens models of its Easy - Pedal bicycles during the next tw o months. Management wants to develop a production schedule indicating how many bicycles of each model should be produced in each month. Current demand forecasts call for 150 mens and 125 womens models to be shipped during the first month and 200 mens a nd 150 womens models to be shipped during the second month. Additional data are shown:ModelProduction CostsLabor Requirments(hours)Current InventoryManufacturingAssemblyMen's$1202.01.520Women's$901.61.030Last month the company used a total of 1000 hours of labor. The companys labor relations policy will not allow the combined total hours of labor (manufacturing plus assembly) to increase or decrease by more than 100 hours from month to month. In addition, the company charges monthly inventory at the rate of 2% of the production cost based on the inventory levels at the end of the month. The company would like to have at least 25 units of each model in inventory at the end of the two months. Formulate this problem as a linear programming model so that a production schedule can be established in order to minimizes production and inventory costs and satisfies the labor-smoothing, demand, and inventory requirements. A study was done on the batting averages for two baseball players: Hitmore and Bunter. Data were collected over a period of time for baseball parks that are natural and artificial turf. It was found that Hitmore does better overall (.e., has a better batting average). However, for both natural and artificial turf separately, Bunter does better. Which of the following is correct? This is an example of a negative association between variables. This is an example of Simpson's Paradox. "Turf" is a lurking variable in this example Both (B) and (C) are correct This situation is mathematically impossible