Using the knowledge in computational language in python it is possible to write a code that he main program calls a method to read in (from an input file) a set of people's three-digit id numbers and their donations to a charity .
Writting the code:import java.io.File;
import java.io.FileNotFoundException;
import java.util.Scanner;
public class SortUsingSelection {
public static void main(String[] args) throws FileNotFoundException {
//Declare 2 parrallel arrays
int[] IDs=new int[100];
double[] donations=new double[100];
//Call function to read data from file
int donationsCnt=readFile(IDs,donations);
//Display details
System.out.println("Print original details:");
printDonations(IDs,donations,donationsCnt);
//Sort ascending order of ID
sortAscending(IDs,donations,donationsCnt);
//Display
System.out.println("\nPrint after ascending order sort details:");
printDonations(IDs,donations,donationsCnt);
//Sort descending
sortDescending(IDs,donations,donationsCnt);
//Display details
System.out.println("\nPrint after descending order sort details:");
printDonations(IDs,donations,donationsCnt);
}
/*
* Method take 2 parallel arrays are input
* Read data from file and add into arrays
* Return count of data read
*/
public static int readFile(int[] IDS,double[] donations) throws FileNotFoundException {
Scanner sc=new Scanner(new File("input.txt"));
int cnt=0;
while(sc.hasNextLine()) {
String[] temp=sc.nextLine().split(" ");
IDS[cnt]=Integer.parseInt(temp[0]);
donations[cnt]=Double.parseDouble(temp[1]);
cnt++;
}
return cnt;
}
See more about JAVA at brainly.com/question/12974523
#SPJ1
What is the Turing machine and how does it work?As for example how does it work out questions like 4+2 and 3+3.
Answer:
I have photographic memory, and I memorized this from Wikipedia; I hope it can help! "A Turing machine is mathematical model of computation that defines an abstract machine, which manipulates symbols on a strip of tape according to a table of rules. Despite the model's simplicity, given any computer algorithm, a Turing machine capable of simulating that algorithm's logic can be constructed."
A ______________ is enough memory to store a letter of the alphabet or a small number.
A bit is enough memory to store a letter of the alphabet or a small number. Its binary nature allows us to encode and represent various characters and digits using specific bit patterns.
A bit, short for binary digit, is the smallest unit of information in computing. It can represent two possible states, usually denoted as 0 or 1. With just one bit, we can store a single binary value. In the context of storing a letter of the alphabet or a small number, we can assign a specific bit pattern to each character or digit. For example, let's consider the English alphabet. With 26 letters, we can represent them using 5 bits (2^5 = 32). A through Z can be mapped to 00000 through 11001 in binary, respectively. Similarly, for small numbers, we can assign specific bit patterns to represent them.
In summary, a bit, the smallest unit of memory, is sufficient to store a letter of the alphabet or a small number.
To know more about binary visit:
https://brainly.com/question/33333942
#SPJ11
Heres a survey
What's your fav food
What do you do for a living
What do you do for fun
Are you a boy or girl
What's your fav color
And last what kind of pet do you have if you dont have a pet then whats ypu fav game to play
food.
I'm a child of God snatching lost souls out of Hell
bake
I go to church
some is to much information to give thx and have a blessed day
Answer:
My favourite food is pizza.
I have food, I drink water and stay neat to live.
I play indoor games, read books and plays social media for fun.
I am a girl.
My favourite colour is black and white.
I have a dog name Freddie and a cat called Jacky. My favourite game is football and badminton
How will Mario know which words are misspelled in his document?
The word would have a red font.
The word would be bold and red.
The word would have a red highlight.
The word would have a red underline.
Answer:
The word would have a red underline.
Explanation:
Answer:
The word would have a red underline.
Explanation:
How big of a role does social media play in the mental health of people? Does it do more harm or good? Explain why. in 400 words
The role that social media play in the mental health of people is big. The use of social media is one that is known to have c positive effects for example connecting people, giving a platform for self-expression, and others.
What is the role that social media?The key bad impacts of social media on mental health is one that is known to have the potential for addiction. Social media platforms are said to be set up to be a form of engaging, which can result to individuals spending excessive amounts of time going through their feeds and this may lead to depression.
Hence the negative impact of social media on mental health is the one that can also lead to cyberbullying that is Online harassment.
Learn more about role that social media from
https://brainly.com/question/1163631
#SPJ1
Give three advantages of using computers and sensors rather than an actual person.
computes are very smart sensors help to detect things very fast and easier
Answer:
Computers are more accurate and they work faster
Which of the following BEST describes the relationship between the Boston Marathon bombing and biometrics?
Answer:
Because of the newly developed biometric technology, the FBI was able to
quickly identify two suspects.
The blurry photos released by the FBI after the bombing prompted
researchers to improve their early biometric software.
Because biometric technology was unavailable at the time, the Boston
Marathon bomber remains at large.
The Boston Marathon bombing made researchers aware of how biometric
technology is sometimes useless and ineffective.
Explanation:
"Prevention is better than cure" .justify this statement and mention the preventive measures of your computer from viruses
The statement, "Prevention is better than cure", refers to the fact that it is better to prevent a computer from getting a virus than to try and remove a virus from a computer.
This statement is true because if a computer gets a virus, it is possible that sensitive information can be stolen or leaked, important documents can be deleted, or the computer can be permanently damaged. In that case, even if the virus is removed, there is unrecoverable damage. However, none of this can happen if the computer never gets a virus.
A popular preventative measure on your computer is antivirus software, which monitors the activity of websites, apps, and files on your computer to determine if any of them might be viruses and tries to stop them before any damage occurs.
Please please help ASAP it’s timed
Answer:By pressing the Control key and the “C” key
Explanation:
Hopefully it could help you
Which option best describes a Wi-Fi router?
A. A device that converts data from an electrical signal into a digital
format
B. A device that connects devices on a network without physical
cables
C. A computer that provides client devices with access to resources
and data
D. A device that physically connects multiple devices on the same
local network
Option B. A device that connects devices on a network without physical cables best describes a Wi-Fi router.
What is Wi-Fi router?A Wi-Fi router is a device that creates a wireless local area network (WLAN) by connecting to an internet source, such as a modem or Ethernet cable, and then wirelessly broadcasts a signal, allowing other devices to connect to the internet through it.
Therefore, This means that devices can connect to the network without the need for physical cables, making it a convenient way to connect multiple devices in a location such as a home or office. The router acts as a central hub for the devices on the network, managing and directing traffic and providing a secure way to connect to the internet.
Learn more about Wi-Fi router from
https://brainly.com/question/21495279
#SPJ1
Which of these are examples of data sources? Check all that apply.
-central processing units
-databases
-electronic archives
-folders
-online libraries
-spreadsheets
Example of data sources include the following:
Online librariesSpreadsheetsWhat is sources of data?Sources of data is the main or primary location from where data is being obtained.
For computer programs, the main sources of data include:
File, Data sheet,Spreadsheet, Online librariesTherefore, examples of data sources are the online libraries and spreadsheets.
Learn more about data here:
https://brainly.com/question/25720881
#SPJ2
Answer:
B,C,E,F
Explanation:
The DELETE statement is used to delete existing records in a table. True/False?
A DML (Data Manipulation Language) instruction is DELETE. With this command, records from a table are deleted. It is not used to remove a table from the database; rather, it is only used to delete data from a table.
Does the Remove command delete tables?The Data Manipulation Language, a subset of SQL that enables the alteration of data in databases, includes the Delete command. Existing records in a table can be deleted with this command. You can use this to either delete all the records from a table or selected records based on a criterion.
To eliminate every row from a table, which statement should be used?Always use TRUNCATE TABLE to remove every record from a table. It is quicker to use TRUNCATE TABLE than.
To know more about DML visit:-
https://brainly.com/question/13441193
#SPJ4
Look at the logos below, decide which one would be the most suitable to use for a Cooking App? Please explain your reason below. Remember explain your answer in good detail, please.
Answer:
The logo on the top right
Explanation:
It's pretty obvious :/
Everything else is not related to baking or cooking (kiiiinda excluding taco bell, but thats a fast food chain)
State the meaning of (1) plaintext (in) encryption (iii) decryption
(1) Plain text is a term that refers to text that has not been encrypted or coded. Plain text is plain, simple, and straightforward. It can be interpreted and read by anybody.
Plaintext is the data that is going to be encoded, while ciphertext is the data that has already been encoded (encrypted).Encryption is the process of converting plain text into a coded language (ciphertext) so that it can only be read by authorized people. In cryptography, encryption is the procedure of encoding information so that it becomes unreadable to anybody except the intended recipient.
(iii) Decryption is the process of converting encrypted or coded information (ciphertext) back into readable text (plaintext). In cryptography, decryption is the process of converting ciphertext into plaintext, which is the original message or data. When an encrypted message is received, it must be decrypted in order to be read by the receiver.
To know more about coded visit:
https://brainly.com/question/31228987
#SPJ11
When comparing and
, what is the main difference?
O The first symbol changes action, and the second symbol changes text.
The first symbol is available in quick edit, and the second is not available in quick edit.
The first symbol moves text, and the second symbol changes actions.
O The first symbol is available in HTML, and the second is not available in HTML.
Answer:
HTNML
Explanation:
The new text will be typed at the cursor location when you start typing, displacing any previous content to the right.
When you select text and begin typing fresh text, what happens? At the place where the cursor is when you start typing, fresh text will be inserted, pushing any previously written content to the right.To move the pointer around the document and start typing, you can also use the arrow keys.When you start typing, the cursor will show you where on the page text will appear.Using the Home tab's Font group, select the Font Color button.Activate the Font Color toolbar button on the Mini toolbar.Set up text.The text you want to format should be selected.Click it again to select only one word.Click to the left of the text to choose that line.To change the text's font, size, color, or to add bold, italicized, or underlined text, choose a corresponding option.To learn more about select text refer
https://brainly.com/question/26940131
#SPJ4
How many binary digits are in 10^100.
Answer:
333 binary digits.
Explanation:
The methods getmessage(), printstacktrace(), and tostring() are available in ________ class.
These methods are inherited by all subclasses of `Throwable`, including `Exception` and `Error` classes.
The methods `getMessage()`, `printStackTrace()`, and `toString()` are commonly available in the `java.lang.Throwable` class in the Java programming language.
The `java.lang.Throwable` class is the superclass of all errors and exceptions in Java. It provides methods to retrieve information about the error or exception, such as the error message (`getMessage()`), printing the stack trace (`printStackTrace()`), and obtaining a string representation of the error or exception (`toString()`). These methods are inherited by all subclasses of `Throwable`, including `Exception` and `Error` classes.
To know more about Java click-
https://brainly.com/question/33432393
#SPJ11
What might happen to the wire if the uneven load is never balanced
If an uneven load on a wire is never balanced, it can lead to a variety of potential problems and risks. One of the most common consequences of uneven loading is the buildup of stress and tension in the wire, which can cause it to become overstretched and potentially snap or break.
When a wire is subjected to uneven loading, such as when a heavier weight is placed on one side of the wire than the other, the tension in the wire becomes unbalanced. This can cause the wire to become stretched beyond its normal limits, which can lead to deformation, fatigue, and ultimately failure. If the wire is not balanced, it may also be more susceptible to external factors such as wind, vibration, and temperature changes, which can exacerbate the stress and strain on the wire.
In addition to the risk of wire failure, uneven loading can also lead to other safety hazards. For example, if the wire is used to support a structure or equipment, an imbalance in the load can cause the structure to become unstable or the equipment to malfunction. This can result in property damage, injuries, and even loss of life.
To prevent these types of issues, it is important to ensure that loads are evenly distributed on wires and other support structures. This can be achieved through the use of proper rigging techniques, such as the use of equalizer bars or spreader bars, and by carefully monitoring loads to ensure that they are balanced at all times. By taking these precautions, the risk of wire failure and other safety hazards can be minimized.
To learn more about Wire loading, visit:
https://brainly.com/question/25922783
#SPJ11
what is workplace procedure?
Answer:
MY ANSWER
Explanation:
Workplace procedures explain specific action plans for employees when carrying out a policy. Workplace procedures are important because they tell your employees how to deal with a situation and when.14 Mar 2021
Answer:
ksksozozozosmsmsmssoqoqaokanzxbbxjdjsoaoalassbsbsjjajajakakakakanananannan
clearing browser settings provide added privacy and frees up _____ on a computer.
Clearing browser settings provide added privacy and frees up fixes certain problems on a computer.
What happens when you clean your browser?A browser, such as Chrome, stores certain information from websites in its cache and cookies when you use it. Certain difficulties, such slow site loading or improper site formatting, are resolved by clearing them.Your cache is kept on your computer or phone in a temporary directory; as these files occupy some disc space, clearing your cache will remove them, freeing up some space on your device.Open the Chrome app on your Android smartphone or tablet. Tap More in the top right corner. Click History remove browsing history. Select a time range at the top.To learn more about browser refer to:
https://brainly.com/question/22650550
#SPJ4
Multiple Select
It is important to be polite to people when you are online because
it reflects your level of professionalism
it helps build a good reputation
you can be fined if you are impolite
it says a lot about your character
you must avoid getting into trouble
Select 3 options.
It is important to be polite to people when you are online because
it reflects your level of professionalism.it helps build a good reputation.it says a lot about your character.What is online presence?Online presence is said to be the numbers or all activity and content that an individual or a business entails under their name in regards to the internet.
Note that It is important to be polite to people when you are online because
it reflects your level of professionalism.it helps build a good reputation.it says a lot about your character.Learn more about Online presence from
https://brainly.com/question/27830306
#SPJ1
Kara's teacher asked her to create a chart with horizontal bars. Which chart or graph should she use?
1.) Bar graph
2.) Column chart
3.) Line graph
4.) Pie chart
Answer:
Line graph
Explanation:
Horizontal bar graphs represent the data horizontally. It is a graph whose bars are drawn horizontally. The data categories are shown on the vertical axis and the data values are shown on the horizontal axis.
Line is horizontal
A computer would do a better job than a human at solving lengthy, complex math problems. True False
Answer:
I would say true
Explanation:
Humans, by contrast, can master many things, from tying our shoes to cooking an omelet to solving complex math equations. The best AI hardly comes close to the incredible creativity and design of any human, and it’s an open question whether AI can ever become what its prophets claim. Second, when we make AI, we are basically copying our Creator.
Answer:
Its true and give the man brainlyest! or me. that would be nice too!
Explanation:
In cyberspace, bret attempts to steal consumers' credit card numbers stored in the networked computers of cinco corporation, a financial payments service provider. The quantity of data that can be stolen is limited by
The quantity of data that can be stolen is limited by the same physical limits that exist in the real world.
Quantitative data is defined as data that can be measured in numerical values. The two main kinds of quantitative data are discrete data and continuous data. Height in feet, age in years, and weight in pounds are examples of quantitative data. Qualitative data can be described as descriptive data that is not expressed numerically. Data quality means a measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability and whether it's up to date.
You can learn more about the quantitative data at https://brainly.com/question/96076
#SPJ4
Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”
Python and using function
Answer:
def ix(s):
return s[1:3]=="ix"
Explanation:
1, Identify 4 online resources you can access that will provide you with research evidence to support clinical practice. If possible, try to find at least one from the upper 3 layers of the 6S pyramid. Write a short summary of the type of information provided from each resource (for example, systematic review reports, clinical guidelines, etc.)
There are a variety of online resources available for accessing research evidence to support clinical practice.
Here are four online resources you can access along with a short summary of the type of information provided from each resource:1. PubMed Central (Layer 2) - This resource is an archive of biomedical and life science journal literature and is managed by the National Institutes of Health (NIH). It provides free access to millions of full-text articles and is a valuable resource for finding primary research studies.2. Cochrane Library (Layer 1) - This is a database of systematic reviews and meta-analyses, which provide high-level evidence-based information on a specific clinical question. It is considered the gold standard for systematic reviews and provides information on the effectiveness and safety of interventions.3. National Guideline Clearinghouse (Layer 4) - This resource provides access to evidence-based clinical practice guidelines that are developed by expert panels and organizations. Guidelines are typically based on a systematic review of the literature and provide recommendations for clinical practice.4. TRIP (Turning Research Into Practice) (Layer 3) - This is a clinical search engine that allows you to search for evidence-based content from a variety of sources, including journals, guidelines, and systematic reviews. It also provides access to additional resources such as patient education materials and images.
Learn more about clinical practice here :-
https://brainly.com/question/32222964
#SPJ11
1. Implement a three layer feedforward artificial neural network (ANN) training by Backpropagation for the MNIST dataset (https://en.wikipedia.org/wiki/MNIST_database). Output the prediction accuracy. The dataset can be downloaded here: https://pypi.org/project/python-mnist/. Or you can download it from other source
upload the solution with step by step in jupyter and screenshots of output and source code.
Thank you
Implementing a three-layer feedforward artificial neural network (ANN) training by Backpropagation for the MNIST dataset and outputting the prediction accuracy can be achieved by using Jupyter notebook, Python, and the appropriate libraries such as TensorFlow or PyTorch.
How can you implement a three-layer feedforward artificial neural network (ANN) training by Backpropagation for the MNIST dataset and obtain the prediction accuracy?To implement a three-layer feedforward artificial neural network (ANN) training by Backpropagation for the MNIST dataset, follow these steps:
1. Set up the Jupyter notebook environment and import the necessary libraries such as TensorFlow or PyTorch.
2. Load the MNIST dataset using the provided link or any other reliable source.
3. Preprocess the dataset by performing tasks such as data normalization, splitting it into training and testing sets, and converting labels into one-hot encoded vectors.
4. Design the architecture of the three-layer feedforward ANN with appropriate activation functions, number of hidden units, and output layer.
5. Initialize the network parameters (weights and biases) randomly or using predefined methods.
6. Implement the forward propagation algorithm to compute the predicted outputs.
7. Implement the backpropagation algorithm to update the weights and biases based on the calculated errors.
8. Repeat steps 6 and 7 for a specified number of epochs or until convergence.
9. Evaluate the trained model on the testing set and calculate the prediction accuracy.
10. Upload the solution in Jupyter notebook along with the necessary screenshots of the output and the complete source code.
Learn more about Backpropagation
brainly.com/question/32647624
#SPJ11
How prepared are you to lead a Internet-based project?
Check all that apply.
I have used an online chat application.
I enjoy solving problems or starting new activities.
I have met with other students online using a web-based conferencing service.
I am comfortable navigating my way around the Internet.
I am an excellent
communicator.
I know how to create and use slide-based presentation software.
Answer:
Yes all the answers are correct because it says how prepared are you it is asking about you so it is what ever you think
Explanation:
To prepare for leading an internet-based project are:
A. I have used an online talk application.
C. I have met with other students online using a web-based conferencing service.
E. I am an excellent communicator.
F. I know how to create and use slide-based presentation software.
What is an internet-based project?They are projects that incorporate the usage of the Internet over the course of several lessons. A project that involves students communicating, finding, process, and reporting on material found on external Websites using the Internet.
Nowadays, projects are made on computers because there is so much on the internet and due to technology, information will become very easy to get and its good for students and teachers.
Therefore, the correct options are A, C, E, and F.
To learn more about the internet-based project, refer to the link:
https://brainly.com/question/22076518
#SPJ5
Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
O SmartArt.
O WordArt.
O Clip Art
O Pictures
Please help ASAP
Answer:
clip art
Explanation:
i hope this helps you
The three most important factors that affect the distribution of resources are:
Answer:
The main factors that affect distribution of population are natural resources, climatic conditions, soils, cultural factors, age of human settlement, industrial development and means of transport and communication. The factors affecting distribution of population are described below one by one in a nutshell manner.
Explanation:
Hope it helps :)