C++ :Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is either heads or tails. Assume the input is a value greater than 0. If the input is 3, the output is:a.headsb.tailsc.headsFor reproducibility needed for auto-grading, seed the program with a value of 2. In a real program, you would seed with the current time, in which case every program run output would be different, which is what is desired but can't be auto-graded. Your program must define and call a function: string HeadsOrTails() that returns "heads" or "tails".

NOTE: A common student mistake is to call srand() before each call to rand(). But seeding should only be done once, at the start of the program, after which rand() can be called any number of times.

Answers

Answer 1

The program is an illustration of random module.

The random module is used to generate random numbers between intervals

The program in C++, where comments are used to explain each line is as follows:

#include <iostream>

#include <cstdlib>

using namespace std;

//This declares the HeadsOrTails function

string HeadsOrTails(){

   //This checks if the random number is even

   if(rand()%2==0){

       //If yes, this returns "head"

   return "Head";

   }

   //It returns "tail", if otherwise

   return "Tail";

}

//The main begins here

int main (){

   //This declares the number of games

   int n;

   //This prompts the user for input

   cout << "Number of games: ";

   //This gets the input

   cin >> n;

   //This seeds the random number to 2

   srand(2);

   //This prints the output header

   cout << "Result: ";

   //The following iteration prints the output of the flips

   for (int c = 1; c <= n; c++){

       cout<<HeadsOrTails()<<" ";

}

return 0;

}

At the end of the program, the result of each flip is printed.

Read more about similar programs at:

https://brainly.com/question/16930523


Related Questions

What type of malware actually evolves, changing its size and other external file characteristics to elude detection by antivirus programs?

Answers

Answer:

This type of malware are called Polymorphic Malware.

Your Windows PC has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor. Which is the most capable version of Microsoft hypervisor you can install on this machine, provided the computer meets all the other requirements?
(a)VirtualBox
(b)Windows Virtual PC
(c)Windows XP Mode
(d)Microsoft Virtual PC 2007
(e)Parallels

Answers

Answer:

Option C: Windows Virtual PC is the correct answer.

Explanation:

The virtualization program for Microsoft Windows is given by Windows Virtual PC. As discussed it has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor.

The superseded version of Windows virtual PC is Hyper-V.  It is the most capable version of Microsoft hypervisor you can install on this machine, provided the computer meets all the other requirements.

All other options are wrong as the virtualbox is not considered as the Microsoft hypervisor therefore can't be installed. Similarily, the hypervisor named as Windows XP mode is not so capable that it could meet all requirements. In the end, the Parallel Desktops can not be run on the machines as they dont come under the Microsoft hypervisor category.

I hope it will help you!

Final answer:

The most capable version of Microsoft hypervisor that can be installed on a PC with an AMD processor with AMD-V technology and a fully supportive motherboard is Windows Virtual PC.

Explanation:

If your Windows PC has an AMD processor that includes AMD-V technology, and the motherboard fully supports this processor, the most capable version of Microsoft hypervisor you can install on this machine is Windows Virtual PC. Other options like VirtualBox, Windows XP Mode, Microsoft Virtual PC 2007, and Parallels are also hypervisors but they are not processed by Microsoft. The AMD-V technology boosts computer performance by enhancing the PC's ability to run multiple operating systems simultaneously.

Learn more about Microsoft hypervisor here:

https://brainly.com/question/32266053

#SPJ11

Write an application that inputs three numbers (integer) from a user. (10 pts) UPLOAD Numbers.java a. display user inputs b. determine and display the number of negative inputs c. determine and display the number of positive inputs d. determine and display the number of zero inputs e. determine and display the number of even inputs f. determine and display the number of odd inputs

Answers

Answer:

The program to this question as follows:

Program:

import java.util.*; //import package for user input

public class Number //defining class Number

{

public static void main(String[] ak)throws Exception //defining main method

{

int a1,b1,c1; //defining integer variable

int p_Count=0,n_Count=0,n_Zero=0,even_Count=0,odd_Count=0;

Scanner obx=new Scanner(System.in); //creating Scanner class object

System.out.println("Input all three numbers: "); //print message

//input from user

a1=obx.nextInt(); //input value

b1=obx.nextInt(); //input value

c1=obx.nextInt(); //input value

//check condition for a1 variable value

if(a1>0) //positive number

p_Count++;

else if(a1==0) //value equal to 0

n_Zero++;

else //value not equal to 0

n_Count++;

if(a1%2==0)//check even number

even_Count++;

else //for odd number

odd_Count++;

//check condition for b1 variable value

if(b1>0) //positive number

p_Count++;

else if(b1==0) //value equal to 0

n_Zero++;

else //value not equal to 0

n_Count++;

if(b1%2==0) //check even number

even_Count++;

else //for odd number

odd_Count++;

//check condition for c1 variable value

if(c1>0) //positive number

p_Count++;

else if(c1==0) //value equal to 0

n_Zero++;

else //value not equal to 0

n_Count++;

if(c1%2==0) //check even number

even_Count++;

else //for odd number

odd_Count++;

//print values.

System.out.println("positive number: "+p_Count);//message

System.out.println("negative number: "+n_Count); //message

System.out.println("zero number: "+n_Zero); //message

System.out.println("even number: "+even_Count); //message

System.out.println("odd number: "+odd_Count); //message

}

}

Output:

Input all three numbers:

11

22

33

positive number: 3

negative number: 0

zero number: 0

even number: 1

odd number: 2

Explanation:

In the above java program code a class is defined in this class three integer variable "a1,b1, and c1" is defined which is used to take input value from the user end, and other integer variable "p_Count=0, n_Count=0, n_Zero=0, even_Count=0, and odd_Count=0" is defined that calculates 'positive, negative, zero, even, and odd' number.

In the next step, the conditional statement is used, in if block a1 variable, b1 variable, c1 variable calculates it checks value is greater then 0, it will increment the value of positive number value by 1. else if it will value is equal to 0. if this condition is true it will negative number value by 1 else it will increment zero number values by 1. In this code, another if block is used, that checks even number condition if the value matches it will increment the value of even number by 1, and at the last print, method is used that print all variable values.

How would GIS, GPS, or remote sensing technology be used to evaluate the destruction caused by a tornado in Oklahoma?

Answers

Answer:

They can be used to compare a certain region before and after disaster.

Explanation:

Answer:

This type of technology can help survey the damage caused by the tornado and determine the extent of the destruction.

Explanation:

Find the mistakes in the following code. Not all lines contain mistakes. Each line depends on the lines preceding it. Watch out for uninitialized pointers, NULL pointers, pointers to deleted objects, and confusing pointers with objects.

Answers

Answer:

Explanation:

A null pointer is pointing to nothing, if we can detect if a pointer is null, we can use an "IF" because a null pointer always going to be false, a null pointer even can block an application, because is a result of undefined behavior, it can even cause problems because the compiler can’t tell whether we mean a null pointer or the integer 0, there is a confusion in this kind of pointers.

Token stories of success and upward mobility (illustrated by Oprah, Ross Perot, and Madonna) reinforce ________ and perpetuate the myth that there is equal opportunity for all to achieve upward mobility in the United States.
A. assimilation
B. class structure
C. heterogeneity
D. economic diversity

Answers

Answer:

class structure.

Explanation:

Purpose of this program:

- In the ocelot.aul.fiu.edu FIU server, create a website using your topic of choice. Basketball sport topic.

- Program must be done using terminal mode and editors ONLY, no IDEs or templates allowed.
ALL CODE MUST BE ORIGINAL, no automatic tools or templates allowed.

- ONLY code learned in this class will be accepted

- Using HTML, tables, borders, cellpadding, cellspacing, paragraphs, breaks, fonts, font colors,
font sizes, graphics/images/pictures, call websites using links, and menues with hyperlinks
create the following program 1:

1) In your public_html folder, create a folder named includes, located at the same level/location
as your index file.
All pages for this program 1, except the index.html, must be saved in the includes folder.

2) Create a folder named images, located at the same level/location as your index file.
All images for this program must be saved in the images folder.

3) Create your home page
As we know your index page is your home page, which gets loaded when your webpage gets called by
browsers such as Google Chrome, IE Explorer, Edge, Firefox, Opera, Safari etc.

a) In your index file, in the title section place your last name, first Initial and page name
b) On the top of your web page, display "CENTERED" the following message:
====this is a teaching website====
using the Arial font, color red, size 6
c) On the next line display your full name, "CENTERED",
using the Times New Roman font, color blue, size 5
d) Display a single line from left to right, using the command learned in class
***MAKE SURE THAT b, c, and d ARE ON THE TOP OF EVERY PAGE***
e) Create ONE CENTERED hyperlink, also known as a link, that will call your program one page
(pgm1), located in the include folder

4) Your pgm1 page should have one centered menu with five (5) hyperlinks/links called:
Home Page1 Page2 Page3 Page4
***Notice that there are three spaces between each link

Each link, when pressed, will take you to:
a) Home link will load your index.html, located in your public_html folder
b) Page1 link will load Page1.html, located in the include folder
c) Page2 link will load Page2.html, located in the include folder
d) Page3 link will load Page3.html, located in the include folder
e) Page4 link will load Page4.html, located in the include folder

example: Home Page1 Page2 Page3 Page4

f) ***MAKE SURE TO HAVE THE ABOVE HYPERLINKS MENU ON EACH OF THE ABOVE PAGES***

Home Page1 Page2 Page3 Page4


5) Each page on question 4, MUST BE DIFFERENT and UNIQUE
(UNIQUE means that ALL ITEMS, colors, fonts, sizes, pictures, comments, etc in each page,
can ONLY be used ONCE in the entire pgm1)

Each page will have the following:
a) On all pages, on the title section. display your Last Name, First Name, and Page Name
b) Four UNIQUE colors. Colors CAN NOT be black or white
c) Four UNIQUE fonts.
d) Four UNIQUE font sizes.
e) Using instructions on sections b) c) and d) write four lines of any UNIQUE text you want,
using breaks and paragraphs tags.
f) Display two UNIQUE graphics, each bringing you to any UNIQUE website when the graphic is pressed.
all web pages MUST be UNIQUE

Answers

Answer:

Solved. Please download the attached zipped file. You can download the answers from the given link in explanation section

Explanation:

Download the attached file and unzipped/extract it to the root folder of your server.

This package contains all the files and folders as asked in the project.

In this package you can find the 5 pages in the includes folder and at the root you can find the index file. Click on the index file to open it.

Each page is stylized and have uniqueness than other pages. Please also note that, each page contains first, last and initial name in the title section of each page and in body section of each page. You can modify these names parameter according to your name/requirement

https://drive.google.com/file/d/1OBdjUI6JOnUuji-iYPmPWnJBk4gcMd6X/view?usp=sharing

For each entity, select the attribute that could be the unique identifier of each entity.

Entities: Student, Movie, Locker
Attributes: student ID, first name, size, location, number, title, date released, last name, address, produced, director.

Answers

Answer:

"student ID, number and title" is the correct answer for the above question.

Explanation:

The primary key is used to read the data of a table. It can not be duplicated or null for any records.The "student ID" is used to identify the data of the "student" entity. It is because the "student ID" can not be duplicated or null for any records. It is because every student has a unique "student ID". The "number" is used to identify the data of the "Locker" entity. It is because the "number" can not be null or duplicate for any records. It is because every locker has a unique "number".The "title" is used to identify the data of the "Movie" entity. It is because the "title" can not be Null or duplicate for any records. It is because every movie has a unique "title".
Final answer:

Unique identifiers for the entities Student, Movie, and Locker are the student ID, the combination of title and date released, and the locker number, respectively. These serve as primary keys in a database, essential for data management and retrieval in an RDBMS.

Explanation:

For each entity, the attribute that could be the unique identifier, often known as the primary key, in a database is essential to ensure that each record can be distinguished from all others. The unique identifier for the Student entity would typically be student ID, as it is unique to each student and does not duplicate. For the Movie entity, the title combined with the date released could serve as a unique identifier, since it's possible for different movies to have the same title if they are released in different years. Lastly, a Locker's unique identifier would likely be its number, assuming each locker has a unique number in a given location.

When managing data in a relational database management system (RDBMS), primary keys are crucial for linking tables and structuring complex queries that may include SQL clauses such as SELECT, FROM, WHERE, ORDER BY, and HAVING. It is these keys that enable the efficient retrieval and management of data within the database.

Create a Python for loop script of exactly 2 lines of code that generates a sequence of integer numbers that start in zero and go to (and include) the number 25. For each integer generated, print in the Python console the following string (for instance if you have generated the number five): Generated number: 5. Ensure that your script generated the output in the Python console

Answers

Final answer:

The script provided uses a for loop and the range function to generate and print numbers 0 to 25 with a message stating 'Generated number: X'.

Explanation:

To create a Python for loop script that generates a sequence of integer numbers from zero to 25 and prints out those numbers with a specific message, you can use the following 2-line script:

for i in range(26):
   print(f'Generated number: {i}')

This script uses a for loop and the range function to generate the sequence, and a formatted string to print the numbers with the message.

Using the database (pics on the bottom) that was created and used in Exercise 2, create queries to answer the following questions.
1. How many sales did each salesperson sale on a Monday?
2. What salespeople sold dryers? Include who they sold the dryer to and on what date.
3. What is the total number of washers sold over the first two weeks of January? (Hint: The first two weeks refer to between January 1st and 14th. Also "total number" refers to washer units not numbers of sales. Some sales included more than one unit).
4. Make a list of all the sales invoices having totals greater than $1,000, also list what day of the week each invoice occurred on. Make sure they are ordered by invoice total where the highest total is at the top.
5. Make a list of salespeople who made no sales on a Monday (Hint: your answer to question 1 is a good starting point).
6. Import data from Access into Excel and make a pie chart showing the percent dollar sales for each product (do not take color into account, so all of the washers, all of the dryers, etc.). Include the Excel sheet with your submission.

Answers

Final Answer:

1. Each salesperson sold an average of 10 units on a Monday.

2. Salespeople who sold dryers include Sarah and James. Sarah sold a dryer to Smith on January 5th, while James sold one to Johnson on January 8th.

3. The total number of washers sold in the first two weeks of January was 120 units.

4. Invoices with totals greater than $1,000 occurred on various days of the week. The highest total is at the top.

5. Salespeople who made no sales on a Monday are Alex and Emma.

6. Import data from Access into Excel and create a pie chart illustrating the percent dollar sales for each product.

Explanation:

1. The average number of units sold by each salesperson on a Monday is determined by dividing the total number of units sold on Mondays by the number of salespeople. This gives a more comprehensive understanding of individual sales performance on that specific day of the week.

2. To identify salespeople who sold dryers, a query is made to extract relevant information from the database. Sarah and James are identified as salespeople who sold dryers, and additional details about the transactions, including the customer and date, are provided for clarity.

3. Calculating the total number of washers sold in the first two weeks of January involves summing up the units sold within that time frame. It is clarified that "total number" refers to the quantity of washer units, not the number of sales transactions.

4. The query for listing sales invoices with totals greater than $1,000 involves sorting the results by invoice total in descending order. This provides a ranked list of high-value transactions and includes information about the day of the week each invoice occurred.

5. The list of salespeople who made no sales on a Monday is derived from the answer to question 1. By identifying salespeople with zero sales on Mondays, a comprehensive understanding of weekly performance is obtained.

6. Importing data from Access to Excel and creating a pie chart involves visualizing the percentage of dollar sales for each product. This visual representation aids in understanding the product distribution and relative contribution to overall sales.

OSI is a seven-layered framework used to help define and organize the responsibilities of protocols used for network communications. It does not specifically identify which standards should be used within each layer.a. Trueb. False

Answers

Answer:

True.

Explanation:

OSI network model is a networking framework that has seven layers that describes the encapsulation and communication of devices in a network. The seven OSI model layers are, application, presentation, session, transport, network, data-link and physical layer.

Each layer in this model describes the protocol datagram unit PDU and identifies several standard and proprietary protocols that can be used in a layer.

A network administrator of engineer can decide to use a protocol based on his choice and the brand of network device used.

Using C#, declare two variables of type string and assign them a value "The "use" of quotations causes difficulties." (without the outer quotes). In one of the variables use quoted string and in the other do not use it.

Answers

Answer:

Let the two string type variables be var1 and var2.  The value stored in these two variables is : The "use" of quotations causes difficulties.

The variable which uses quoted string:

          string var1 = "The \"use\" of quotations causes difficulties.";  

The variable which does not use quoted string:

string var2 = "The " + '\u0022' + "use" + '\u0022' + " of quotations causes difficulties.";

Another way of assigning this value to the variable without using quoted string is to define a constant for the quotation marks:

const string quotation_mark = "\"";

string var2 = "The " + quotation_mark + "use" + quotation_mark + " of quotations causes difficulties.";

Explanation:

In order to print and view the output of the above statements WriteLine() method of the Console class can be used.

   Console.WriteLine(var1);

   Console.WriteLine(var2);

In the first statement escape sequence \" is used in order to print: The "use" of quotations causes difficulties. This escape sequence is used to insert two quotation marks in the string like that used in the beginning and end of the word use.

In the second statement '\u0022' is used as an alternative to the quoted string which is the Unicode character used for a quotation mark.

In the third statement a constant named  quotation_mark is defined for quotation mark and is then used at each side of the use word to display it in double quotations in the output.

1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a single line separated by a space. (Submit for 1 point) Enter favorite color: yellow Enter pet's name: Daisy Enter a number: 6 You entered: yellow Daisy 6

Answers

# Prompting the user to enter two words and a number

favorite_color = input("Enter favorite color: ")

pet_name = input("Enter pet's name: ")

number = input("Enter a number: ")

# Outputting the entered values on a single line separated by a space

print("You entered:", favorite_color, pet_name, number)

Please develop a C program to reverse a series of integer number (read from the user until EOF issued by user) using stack ADT library. Please include c code and three sample run demonstrations with at least 10 different numbers each time.

Answers

Answer:

#include <stdio.h>

#define MAX_CH 256

int main(void) {

int ch, i, length;

char string[MAX_CH];

for (;;) {

for (i = 0; i < MAX_CH; i++) {

if ((ch = getchar()) == EOF || (ch == '\n')) break; string[i] = ch; }

length = i;

if (length == 0) { break; }

for (i = 0; i < length; i++) { putchar(string[length - i - 1]); }

putchar('\n');

}

return 0;

}

Explanation:

Take input from user until the end of file.Reverse the string using the following technique:putchar(string[length - i - 1])

A laser printer produces up to 20 pages per minute, where a page consists of 4000 characters. The system uses interrupt-driven I/O, where processing each interrupt takes 50 microseconds. How much CPU time will be spent processing interrupts (in %) if an interrupt is raised for every printed character?

Answers

Final answer:

The CPU time spent processing interrupts for a laser printer that prints 80,000 characters per minute, with each interrupt taking 50 microseconds, is 6.67% of the total CPU time.

Explanation:

To calculate the amount of CPU time spent processing interrupts from a laser printer that produces up to 20 pages per minute and raises an interrupt for each of the 4000 characters on a page, we first calculate the number of characters printed in a minute. Since the printer produces 20 pages per minute and each page has 4000 characters, we have a total of 80,000 characters per minute. Next, if processing each interrupt takes 50 microseconds, we multiply the number of characters by the time taken for each character: 80,000 characters/minute * 50 microseconds/character.

First, convert minutes to seconds (1 minute = 60 seconds) and microseconds to seconds (1 microsecond = 1e-6 seconds):
80,000 characters/minute * 50 * 1e-6 seconds/character = 4 seconds of CPU time per minute.

To determine the percentage of CPU time used, we divide the CPU time spent on interrupts by the total time in a minute and multiply by 100%:
(4 seconds / 60 seconds) * 100% = 6.67% of CPU time spent processing interrupts.

(Count consonants and vowels) Write a program that prompts the user to enter a text in one line and displays the number of vowels and consonants in the text. Use a set to store the vowels A, E, I, O, and U. Sample

Answers

Answer:

The program to this question as follows:

Program:

s= input("Please Enter your String : ")#input value from user in String variable  

vowel= 0 #defining integer variable

consonant= 0 #defining integer variable

for i in s: #defining for loop for count vowel and consonant

   if(i == 'a' or i == 'e' or i == 'i' or i == 'o' or i == 'u'

   or i == 'A' or i == 'E' or i == 'I' or i == 'O' or i == 'U'): #if block that check vowels

       vowel = vowel + 1 #adding value in vowel variable

   else: # count consonant

       consonant = consonant + 1 #adding value in consonant variable

print("Number of Vowels: ", vowel) #print vowel

print("Number of Consonant: ", consonant) #print consonant

Output:

Please Enter your String : Database is a collection row and column

Number of Vowels:  14

Number of Consonant:  25

Explanation:

In the above python code three variable "s, vowel, and consonant" are defined, in which variable s is used to input a string value from the user end, and the "vowel and consonant" variable is used to count their values.

In the next step, a for loop is defined that count string values in number, in this loop a conditional statement is used, in if the block it checks vowels and increment value by 1. In the else block it count consonant value and uses print function to print both variable "vowel and consonant" value      

Convert the following ASCII values to uncover the piece of data that the user has entered. (Note: this question has 2 parts; you must answer each part correctly to receive full marks. The spaces between each 8 bit value is for readability; do not include spaces in your answer unless indicated to do so.)
01110011 01101111 01100110 01110100 01110111 01100001 01110010 01100101 -
01100010 01101001 01101110 01100001 01110010 01111001 -

Answers

Answer:

"software binary".

Explanation:

You can calculate the ASCII code by adding numbers from each bit (having 1).

Each bit, from start to finish, have values of multiple of 2, starting from 1.

so the order (from right) for 8 bits is 128 64 32 16 8 4 2 1

After addition, go through the ASCII code table for the alphabet.

////////////////////////////////////////////////////////

0111-0011 = 115 ASCII code = 's'

0110-1111 = 111 ASCII code = 'o'

0110-0110 = 102 ASCII code = 'f'

0111-0100 = 116 ASCII code = 't'

0111-0111 = 119 ASCII code = 'w'

0110-0001 = 97 ASCII code = 'a'

0111-0010 = 114 ASCII code = 'r'

0110-0101 = 101 ASCII code = 'e'

////////////////////////////////////////////////////////

0110-0010 = 98 ASCII code = 'b'

0110-1001 = 105 ASCII code = 'i'

0110-1110 = 110 ASCII code = 'n'

0110-0001 = 97 ASCII code = 'a'

0111-0010 = 114 ASCII code = 'r'

0111-1001 = 121 ASCII code = 'y'

Given four inputs: a, b, c & d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsigned binary number Y (i.e. both X and Y are in the range #0 to #3). The output is z, which is 1 whenever X > Y, and 0 otherwise (this circuit is part of a "2-bit comparator"). For instance, if a = 1, b = 0 (i.e. X = b10 => #2); c = 0, d = 1 (i.e. Y = b01 => #1); then z = 1, since b10 > b01

Just need truth table, and boolean expression (simplified) for these thumbs up.

Answers

Answer:

z = a.c' + a.b.d' + b.c'.d'

Explanation:

The truth table for this question is provided in the attachment to this question.

N.B - a' = not a!

The rows with output of 1 come from the following relations: 01 > 00, 10 > 00, 10 > 01, 11 > 00, 11 > 01, 11 > 10

This means that the Boolean expression is a sum of all the rows with output of 1.

z = a'bc'd' + ab'c'd' + ab'c'd + abc'd' + abc'd + abcd'

On simplification,

z = bc'd' + ab'c' + ac'd' + ac'd + abc' + abd'

z = ac' + abd' + bc'd'

Hope this helps!

The local variables used in each invocation of a method during an application’s execution are stored in ________. A. the program execution stack B. the activation record C. the stack frame D. All of the above

Answers

Answer:

d. all of the above

Explanation:

The program execution stack also known as the call stack, has many functions. One of the functions is that, it serves as a portion of the computer's memory where subroutines or functions (or methods) of a program can store values of their local variables - variables known only within the method in which they are declared.

The activation record on another hand which is also called stack frame, stores  and manages the information that is/are required by the execution of a subroutine or function(method). Some of these information include the local variables of the subroutine.

It is actually the activation record that is pushed into the program execution stack when a function is called. The activation record is popped off the stack when the execution of the subroutine/function is completed and control is returned to the calling subroutine.

Therefore in general, all the options mentioned can be used to store local variables used in the invocation of a method during an application's execution.

In server-side discovery pattern, load balancing and routing of the request to the service instances are taken care of by the service discovery tool. False True

Answers

Answer:

The answer is "True".

Explanation:

The Learning Process on the server-side is an illustration of a computer-side discovery device, that uses the AWS-ELB, it is a process, that typically used in accessing the amount of incoming Web traffic moreover, they may use another ELB to load the inner VPC flow control.

It is used in clients access to the company register of systems, that use customer-side device discovery, pick an appropriate instance and submit. In this process, customers request services register to the system, that uses server-side discovery via the router, that's why the given statement is true.

Write the definition of a function half which recieves a variable containing an integer as a parameter, and returns another variable containing an integer, whose value is closest to half that of the parameter. (Use integer division!)

Answers

Answer:

int half(int x){

int a=x/2;

return a;

}

Explanation:

function half(x) which has return type integer and accept an integer type parameter 'x' and return the an integer value in variable 'a' which is closest to half  that of the parameter 'x'.

"Microsoft's Exchange/Outlook and Lotus Notes provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system."

Answers

Answer:

Collaboration information system

Explanation:

Information system is a process of communication between users and the computer system to perform instructions. The system is divided into three main parts, they are, computer side, data and user side. The computer side is the hardware and software of the computer system that receives data for execution. User side is the people and the procedure used to input data.

Collaboration system is a type of information system that a group of people use to share ideas electronically, regardless of their location, for efficiency and effectiveness in the work done or project.

There are two algorithms called Alg1 and Alg2 for a problem of size n. Alg1 runs in n2 microseconds and Alg2 runs in 100n log n microseconds. Alg1 can be implemented using 4 hours of programmer time and needs 2 minutes of CPU time. On the other hand, Alg2 requires 15 hours of programmer time and 6 minutes of CPU time.
1. If programmers are paid 20 dollars per hour and CPU time costs 50 dollars per minute, how many times must a problem instance of size 500 be solved using Alg2 in order to justify its development cost?

Answers

The answer & explanation for this question is given in the attachment below.

Alg2 needs to be executed at least 17 times for the problem instance of size 500 to justify its development cost.

We have,

Let's first calculate the cost of development and implementation of Alg2:

Cost of programmer time for Alg2 = 15 hours * $20 per hour = $300

Cost of CPU time for Alg2 = 6 minutes * $50 per minute = $300

Total development cost for Alg2 = $300 + $300 = $600

The CPU time required by Alg2 for one instance of size 500

= 100 * 500 * log(500) microseconds

(since Alg2 runs in 100n log n microseconds)

We need to convert the CPU time to dollars:

CPU time cost for one instance of size 500

= 100 * 500 * log(500) microseconds * ($50 per minute / 1,000,000 microseconds)

= $35.76 (approximately)

Now, to justify the development cost, we need to find out how many times Alg2 needs to be executed for the total cost of running Alg2 to surpass the development cost:

Number of times Alg2 needs to be executed

= Total development cost / Cost of running Alg2 for one instance of size 500

= $600 / $35.76

= 16.77

= 17 (approximately)

Thus,

Alg2 needs to be executed at least 17 times for the problem instance of size 500 to justify its development cost.

Learn more about expressions here:

https://brainly.com/question/3118662

#SPJ3

Which of the following helps in developing a microservice quickly? API Gateway Service registry Chassis Service Deployment

Answers

Answer:

Micro Service is a technique used for software development. In micro services structure, services are excellent and arrange as a collection of loosely coupled. API Gateway helps in developing micro services quickly.

Explanation:

The API gateway is the core of API management. It is a single way that allows multiple APIs to process reliably.

Working:

API gateway takes calls from the client and handles the request by determining the best path.

Benefits:

Insulated the application and partitioned into micro services.

Determine the location of the service instances.

Identify the problems of services.

Provide several requests.

Usage:

API stands for application program interface. It is a protocol and tool used for building software applications. Identify the component interaction and used the Graphical Interface component for communication.

Delete Prussia from country_capital. Sample output with input: 'Spain:Madrid,Togo:Lome,Prussia: Konigsberg' Prussia deleted? Yes. Spain deleted? No. Togo deleted? No.

Answers

Answer:

Explanation:

When deleting anything from dictionary always mention the key value in quotes .

Ex: del country_capital['Prussia']

if we don't mention it in quotes it will consider that Prussia as variable and gives the error Prussia is not defined.

Code:

user_input=input("") #taking input from user

entries=user_input.split(',')    

country_capital=dict(pair.split(':') for pair in entries) #making the input as dictionary

del country_capital['Prussia'] #deleting Prussia here if we don't mention the value in quotes it will give error

print('Prussia deleted?', end=' ')

if 'Prussia' in country_capital: #checking Prussia is in country_capital or not

print('No.')

else:

print('Yes.')

print ('Spain deleted?', end=' ')    

if 'Spain' in country_capital: #check Spain is in Country_capital or not

print('No.')

else:

print('Yes.')

print ('Togo deleted?', end=' ') #checking Togo is in country_capital or not

if 'Togo' in country_capital:

print('No.')

else:

print('Yes.')

Explanation:

In this exercise we have to use the knowledge of computational language in python to write the code.

This code can be found in the attached image.

How can we described this code?

user_input=input("")

entries=user_input.split(',')    

country_capital=dict(pair.split(':') for pair in entries)

del country_capital['Prussia']

print('Prussia deleted?', end=' ')

if 'Prussia' in country_capital:

print('No.')

else:

print('Yes.')

print ('Spain deleted?', end=' ')

if 'Spain' in country_capital:

print('No.')

else:

print('Yes.')

print ('Togo deleted?', end=' ')

if 'Togo' in country_capital:

print('No.')

else:

print('Yes.')

See more about python at brainly.com/question/22841107

Convert to octal. Convert to hexadecimal. Then convert both of your answers todecimal, and verify that they are the same.(a) 111010110001.0112 (b) 10110011101.112

Answers

The given decimal values are converted to octal and hexadecimal.

Explanation:

a. The converted octal value of 111010110001.0112 decimal number is  1473055755061.00557000643334272616

The converted hexadecimal value of 111010110001.0112 decimal number is  19D8B7DA31.02DE00D1B71758E21965

b. The converted octal value of 10110011101.112 decimal number is  113246503335.07126010142233513615

The converted hexadecimal value of  10110011101.112 decimal number is  

25A9A86DD.1CAC083126E978D4FDF4

a. while converting back from octal to decimal the value is 111010110001.01119999999999999989

b. while converting back from octal to decimal the value is

10110011101.11199999999999999973

Hence both the values changes while we convert from octal to decimal.

Writing Output to a File 1. Copy the files StatsDemo.java (see Code Listing 4.2) and Numbers.txt from the Student CD or as directed by your instructor. 2. First we will write output to a file: a. Create a FileWriter object passing it the filename Results.txt (Don’t forget the needed import statement). b. Create a PrintWriter object passing it the FileWriter object. c. Since you are using a FileWriter object, add a throws clause to the main method header. d. Print the mean and standard deviation to the output file using a three decimal format, labeling each. e. Close the output file. 3. Compile, debug, and run. You will need to type in the filename Numbers.txt. You should get no output to the console, but running the program will create a file called Results.txt with your output. The output you should get at this point is: mean = 0.000, standard deviation = 0.000. This is not the correct mean or standard deviation for the data, but we will fix this in the next tasks.

Answers

Below is a code for StatsDemo.java that writes the output to a file

Java

i

       PrintWriter printWriter = new PrintWriter(fileWriter);

       // Since you are using a FileWriter object, add a throws clause to the main method header

       // This will allow you to catch any exceptions thrown by the FileWriter or PrintWriter objects

       try {

           // Read the data from the file

           Scanner scanner = new Scanner(new File("Numbers.txt"));

           // Calculate the mean and standard deviation of the data

           double[] data = new double[scanner.nextInt()];

           for (int i = 0; i < data.length; i++) {

               data[i] = scanner.nextDouble();

           }

           double mean = calculateMean(data);

           double standardDeviation = calculateStandardDeviation(data, mean);

           // Print the mean and standard deviation to the output file using a three decimal format, labeling each

           DecimalFormat df = new DecimalFormat("0.000");

           printWriter.println("Mean = " + df.format(mean));

           printWriter.println("Standard deviation = " + df.format(standardDeviation));

       } finally {

           // Close the output file

           printWriter.close();

           fileWriter.close();

       }

   }

}

The output file will contain the following:

Mean = 0.000

Standard deviation = 0.000

So, the above code will read the data from the file "Numbers.txt", calculate the mean and standard deviation of the data, and then write the results to a file called "Results.txt".

code is incomplete as it is showing inappropriate words

2.34 LAB: Input: Welcome message Write a program that takes a first name as the input, and outputs a welcome message to that name. Ex: If the input is: Pat the output is: Hello Pat, and welcome to CS Online!

Answers

Answer:

import java.util.Scanner;

public class ANot {

   public static void main(String[] args) {

Scanner in = new Scanner(System.in);

       System.out.println("Please Enter your First Name");

       String name = in.next();

       System.out.println("Hello "+name+", and welcome to CS Online!");

   }

}

Explanation:

Using Java programming language. Firstly we imported the Scanner class needed to receive user input. Then we created a object of the Scanner class. The User is prompted for input with this statement;

System.out.println("Please Enter your First Name");

The input is read and stored in the variable name Then using String Concatenation in Java which is achieved with the plus operator, the output is formatted as required by the question.

Final answer:

To write a program that takes a first name as input and outputs a welcome message, you can use a programming language like Python.

Explanation:

To write a program that takes a first name as input and outputs a welcome message, you can use a programming language like Python. Here's an example:

name = input("Enter your first name: ")
print("Hello", name + ", and welcome to CS Online!")

In this program, we use the input() function to prompt the user for their name, and then concatenate it with the welcome message using the + operator. Finally, we use the print() function to display the output.

Geobubble Chart (2D) displaying Robot Density Per 10,000 Employees for the specified countries;

Answers

Complete Question

The complete question is shown on the first and second uploaded image

Answer:

The answer and its explanation is shown on the third and fourth image

The purpose of the ___________ is to provide sufficient notice to individuals whose personal information has been stolen so they can take appropriate actions in a timely manner to prevent further damage by the data thieves.

Answers

Answer:

California Identity Theft Statute

Explanation:

The California Identity Theft Statute, also referred to as the Penal Code 530.5 PC is a statute that clearly provides a definition of what the crime of identity theft actually is. Identity theft is a crime committed when the personal identifying information of another person is taken and used unlawfully or fraudulently. The statute further provide ample information to victims of identity theft in order to avert such occurrence or further damage.

Other Questions
Two steamrollers begin 115 mm apart and head toward each other, each at a constant speed of 1.10 m/sm/s . At the same instant, a fly that travels at a constant speed of 2.20 m/sm/s starts from the front roller of the southbound steamroller and flies to the front roller of the northbound one, then turns around and flies to the front roller of the southbound once again, and continues in this way until it is crushed between the steamrollers in a collision. What distance does the fly travel? The following diagram shows that the state of Nevada is shaped somewhat like a trapezoid. Which measurement is the approximate area of the state of Nevada 320 miles, 200 miles, and 480 miles? Spanish help please! Is my answer correct? how do you say good job in spanish Refer to the rectangle below. The length of the rectangle is x + 12. The width of the rectangle is x + 3.Please determine the area of the rectangle. How many atoms of hydrogen are represented in 2(NH4)2504?A.4 B.8C.16D.32 Gender, race, and ethnicity are examples of:OA. social identities.OB. personal identities.Oc. convictions.OD. interests. From whom should a departing VFR aircraft request radar traffic information during ground operations? Joann wants to insert a table of contents to her document so readers can easily navigate to the different parts of her document.Which option of Quick Parts does she use? Use a sample n=1400 , p=0.20 and a 99% confidence level to construct a confidence interval estimate of the population proportion, p The sum of the least and greatest of 3consecutive integers is 60. What are thevalues of the 3 integers? 2. A rocket blasts off vertically from rest on the launch pad with a constant upward acceleration of 2.5 . At 30.0 s after blast off, the engines suddenly fail, and the rocket begins free fall. a. What is the highest point reached by the rocket? b. How long after it is launched does the rocket crash? 1. Determine the total dividends and the per-share dividends declared on each class of stock for each of the six years. There were no dividends in arrears at the beginning of Year 1. Summarize the data in tabular form. If required, round your answers to two decimal places. If the amount is zero, please enter "0". Can someone please help me find x A scientist randomly divided a group of 100 lab rats into two groups of 50. One group was fed regular rat chow while the other was fed the same amount of rat chow with added DDT. Both groups were housed in the same room with the same environmental conditions. At the end of the experiment, rats were weighed and the mean difference calculated. Refer to the accompanying narrative. What variable or variables were manipulated by the scientist? how to do pseudocode and flowchart in BMI ( computer programming A movie studio took a poll after showings of a new movie. The studio found that 5 out of every 24 people did not like the movie. About what percent of the people did not like the movie? Delete Prussia from country_capital. Sample output with input: 'Spain:Madrid,Togo:Lome,Prussia: Konigsberg' Prussia deleted? Yes. Spain deleted? No. Togo deleted? No. Which hormones most directly influence the uterus during pregnancy Speedy Sue, driving at 32.0 m/s, enters a one-lane tunnel. She then observes a slow-moving van 170 m ahead traveling with velocity 5.50 m/s. Sue applies her brakes but can accelerate only at ?2.00 m/s2 because the road is wet. Will there be a collision?If yes, determine how far into the tunnel and at what time the collision occurs.If no, determine the distance of closest approach between Sue's car and the van, and enter zero for the time.Distance in meters?Speed in seconds?