Define a thread that will use a TCP connection socket to serve a client Behavior of the thread: it will receive a string from the client and convert it to an uppercase string; the thread should exit after it finishes serving all the requests of a client Create a listening TCP socket While (true) { Wait for the connection from a client Create a new thread that will use the newly created TCP connection socket to serve the client Start the new thread. }

Answers

Answer 1

Answer:

The primary intention of writing this article is to give you an overview of how we can entertain multiple client requests to a server in parallel. For example, you are going to create a TCP/IP server which can receive multiple client requests at the same time and entertain each client request in parallel so that no client will have to wait for server time. Normally, you will get lots of examples of TCP/IP servers and client examples online which are not capable of processing multiple client requests in parallel.  

Explanation:

hope i helped


Related Questions

Which of the following should be the first page of a report?
O Title page
Introduction
O Table of contents
Terms of reference

Answers

Answer:

Title page should be the first page of a report.

hope it helps!

Who is your favorite smite god in Hi-Rez’s “Smite”

Answers

Answer:

Variety

Explanation:

For this problem, you will write a function standard_deviation that takes a list whose elements are numbers (they may be floats or ints), and returns their standard deviation, a single number. You may call the variance method defined above (which makes this problem easy), and you may use sqrt from the math library, which we have already imported for you. Passing an empty list to standard_deviation should result in a ZeroDivisionError exception being raised, although you should not have to explicitly raise it yourself.

Answers

Answer:

import math   def standard_deviation(aList):    sum = 0    for x in aList:        sum += x          mean = sum / float(len(aList))    sumDe = 0    for x in aList:        sumDe += (x - mean) * (x - mean)        variance = sumDe / float(len(aList))    SD = math.sqrt(variance)    return SD   print(standard_deviation([3,6, 7, 9, 12, 17]))

Explanation:

The solution code is written in Python 3.

Firstly, we need to import math module (Line 1).

Next, create a function standard_deviation that takes one input parameter, which is a list (Line 3). In the function, calculate the mean for the value in the input list (Line 4-8). Next, use the mean to calculate the variance (Line 10-15). Next, use sqrt method from math module to get the square root of variance and this will result in standard deviation (Line 16). At last, return the standard deviation (Line 18).

We can test the function using a sample list (Line 20) and we shall get 4.509249752822894

If we pass an empty list, a ZeroDivisionError exception will be raised.

Components of a product or system must be
1) Reliable
2) Flexible
3) Purposeful
4)Interchangeable

Answers

Answer:

The correct answer to the following question will be Option D (Interchangeable).

Explanation:

Interchangeability applies towards any portion, part as well as a unit that could be accompanied either by equivalent portion, component, and unit within a specified commodity or piece of technology or equipment.This would be the degree to which another object can be quickly replaced with such an equivalent object without re-calibration being required.

The other three solutions are not situation-ally appropriate, so option D seems to be the right choice.

The cord of a bow string drill was used for
a. holding the cutting tool.
b. providing power for rotation.
c. transportation of the drill.
d. finding the center of the hole.

Answers

Answer:

I don't remember much on this stuff but I think it was B

Create a classRationalNumber(fractions, see problem 11.15 p.639) with the following capabilities:a) Create a constructor that prevents 0 on the denominator in a fraction, reduces (or simplifies) fractionsthat are not in reduced form (lowest terms), and avoids negative denominatorsb) Overload the addition, subtraction, multiplication, and division operators for this class.c) Overload the relationaland equality == operators for this class.Test all member functions and overloaded operators.

Answers

Answer:

See explaination

Explanation:

#include<iostream>

using namespace std;

class a

{

int i,n,d,sn,sd,cond;

public:

void getdata()

{

cout<<"Enter the numerator"<<endl;

cin>>n;

cout<<"Enter the denominator"<<endl;

cin>>d;

}

void operator+(a a1)

{

if(a1.d!=d)

{

sn=(a1.n*d)+(n*a1.d);

sd=(a1.d)*(d);

}

else

{

sn=a1.n+n;

sd=a1.d;

}

if(sn>sd)

{

cond=sd;

}

else if(sd>sn)

{

cond=sn;

}

}

void sum()

{

for(i=2;i<=cond;i++)

{

if(sn%i==0 && sd%i==0)

{

sn=sn/i;

sd=sd/i;

}

}

cout<<"Sum is "<<sn<<"/"<<sd<<endl;

}

a operator-(a a1)

{

a a3;

if(a1.d!=d)

{

a3.sn=(a1.n*d)-(n*a1.d);

a3.sd=(a1.d)*(d);

}

else

{

a3.sn=a1.n-n;

a3.sd=a1.d;

}

return a3;

}

void sub()

{

if(sn>sd)

{

cond=sd;

}

else if(sd>sn)

{

cond=sn;

}

for(i=2;i<=cond;i++)

{

if(sn%i==0 && sd%i==0)

{

sn=sn/i;

sd=sd/i;

}

}

cout<<"Subtraction is "<<sn<<"/"<<sd<<endl;

}

a operator /(a a1)

{

a a4;

a4.sn=a1.n*d;

a4.sd=a1.d*n;

return a4;

}

void div()

{

if(sn>sd)

{

cond=sd;

}

else if(sd>sn)

{

cond=sn;

}

else if(sn==sd)

{

sn=1;

sd=1;

}

for(i=2;i<=cond;i++)

{

if(sn%i==0 && sd%i==0)

{

sn=sn/i;

sd=sd/i;

}

}

cout<<"Division is "<<sn<<"/"<<sd<<endl;

}

a operator*(a a1)

{

a a5;

a5.sn=a1.n*n;

a5.sd=a1.d*d;

return a5;

}

void mul()

{

if(sn>sd)

{

cond=sd;

}

else if(sd>sn)

{

cond=sn;

}

for(i=2;i<=cond;i++)

{

if(sn%i==0 && sd%i==0)

{

sn=sn/i;

sd=sd/i;

}

}

cout<<"Multiplication - "<<sn<<"/"<<sd<<endl;

}

};

int main()

{

a a1,a2,a3,a4,a5,a6;

a1.getdata();

a2.getdata();

a2+(a1);

a2.sum();

a3=a2-(a1);

a3.sub();

a4=a2/(a1);

a4.div();

a5=a2*(a1);

a5.mul();

return 0;

}

Suppose that a program's data and executable code require 1,024 bytes of memory. A new section of code must be added; it will be used with various values 70 times during the execution of a program. When implemented as a macro, the macro code requires 73 bytes of memory. When implemented as a procedure, the procedure code requires 132 bytes (including parameter-passing, etc.), and each procedure call requires 7 bytes. How many bytes of memory will the entire program require if the new code is added as a procedure? 1,646

Answers

Answer:

The answer is 1646

Explanation:

The original code requires 1024 bytes and is called 70 times ,it requires 7 byte and its size is 132 bytes

1024 + (70*7) + 132 = 1024 + 490 +132

= 1646

Write a program that uses the map template class to compute a histogram of positive numbers entered by the user. The map’s key should be the number that is entered, and the value should be a counter of the number of times the key has been entered so far. Use –1 as a sentinel value to signal the end of user input.512355321-1Then the program should output the followings:The number 3 occurs 2 timesThe number 5 occurs 3 timesThe number 12 occurs 1 timesThe

Answers

Answer:

See explaination

Explanation:

#include <iostream>

#include <map>

#include <string>

#include <algorithm>

#include <cstdlib>

#include <iomanip>

using namespace std;

int main()

{

map<int, int> histogram;

int a=0;

while(a>=0)

{

cout << " enter value of a" ;

cin >>a;

histogram[a]++;

}

map<int,int>::iterator it;

for ( it=histogram.begin() ; it != histogram.end(); it++ )

{

cout << (*it).first << " occurs " << setw(3) << (*it).second << (((*it).second == 1) ? " time." : " times.") <<endl;

}

return 0;

}

*Sometimes it is difficult to convince top management to commit funds to develop and implement a SIS why*

Answers

Step-by-step Explanation:

SIS stands for: The Student Information System (SIS).

This system (a secure, web-based accessible by students, parents and staff) supports all aspects of a student’s educational experience, and other information. Examples are academic programs, test grades, health information, scheduling, etc.

It is difficult to convince top management to commit funds to develop and implement SIS, this can be due to a thousand reasons.

The obvious is that the management don't see the need for it. They would rather have students go through the educational process the same way they did. Perhaps, they just don't trust the whole process, they feel more in-charge while using a manual process.

An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored espionage activity on the company’s network. Management agrees with her initial findings given the forensic artifacts she presents are characteristics of malware, but management is unclear on why the analyst thought it was Chinese-state sponsored. You have been brought in as a consultant to help determine 1) whether the systems have been compromised and 2) whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored. What steps would you take to answer these questions given that you have been provided a MD5 hashes, two call back domains, and an email that is believed to have been used to conduct a spearphishing attack associated with the corresponding MD5 hash. What other threat intelligence can be generated from this information and how would that help shape your assessment?

Answers

Answer: Provided in the explanation segment

Explanation:

Below is a detailed explanation to make this problem more clearer to understand.

(1). We are asked to determine whether the systems have been compromised;

Ans: (YES) From the question given, We can see that the System is compromised. This is so because the plan of communication has different details of scenarios where incidents occur. This communication plan has a well read table of contents that lists specific type of incidents, where each incident has a brief description of the event.

(2). Whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored.

Ans: I can say that the analyst uses several different internet protocol address located in so as to conduct its operations, in one instance, a log file recovered  form an open indexed server revealed tham an IP address located is used to administer the command control node that was communicating with the malware.

(3). What other threat intelligence can be generated from this information?

Ans: The threat that can be generated from this include; Custom backdoors, Strategic web compromises, and also Web Server  exploitation.

(4). How would that help shape your assessment?

Ans: This helps in such a way where information is gathered and transferred out of the target network which involve movement of files through multiple systems.

Files also gotten from networks as well as  using tools (archival) to compress and also encrypt data with effectiveness of their data theft.

cheers i hope this helped!!!

customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practicing presentation skills. As a salesperson what size hard disc would you recommend and why?

Answers

Explanation:

The most reliable hard drives are those whose most common size is 3.5 inches, their advantages are their storage capacity and their speed and a disadvantage is that they usually make more noise.

For greater speed, it is ideal to opt for two smaller hard disks, since large disks are slower, but are partitioned so that there are no problems with file loss.

For a person who needs to use content creation programs, it is ideal to opt for a hard drive that has reliability.

Design an application for Bob's E-Z Loans. The application accepts a client's loan amount and monthly payment amount. Output the customer's loan balance each month until the loan is paid off. b. Modify the Bob's E-Z Loans application so that after the payment is made each month, a finance charge of 1 percent is added to the balance.

Answers

Answer:

part (a).

The program in cpp is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   std::cout << "Loan balance: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>0)

   {

       if(balance<payment)    

         { payment = balance;}

       else

       {  

           std::cout << balance <<"\t\t\t"<< payment << std::endl;

           balance = balance - payment;

       }

   }

   return 0;

}

part (b).

The modified program from part (a), is given below.

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   //variables to hold balance and monthly payment amounts

   double balance;

   double payment;

   double charge=0.01;

   //user enters balance and monthly payment amounts

   std::cout << "Welcome to Bob's E-Z Loans application!" << std::endl;

   std::cout << "Enter the balance amount: ";

   cin>>balance;

   std::cout << "Enter the monthly payment: ";

   cin>>payment;

   balance = balance +( balance*charge );

   std::cout << "Loan balance with 1% finance charge: " <<" "<< "Monthly payment: "<< std::endl;

   //balance amount and monthly payment computed

   while(balance>payment)

   {

           std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

           balance = balance +( balance*charge );

           balance = balance - payment;

       }

   if(balance<payment)    

         { payment = balance;}          

   std::cout << balance <<"\t\t\t\t\t"<< payment << std::endl;

   return 0;

}

Explanation:

1. The variables to hold the loan balance and the monthly payment are declared as double.

2. The program asks the user to enter the loan balance and monthly payment respectively which are stored in the declared variables.  

3. Inside a while loop, the loan balance and monthly payment for each month is computed with and without finance charges in part (a) and part (b) respectively.

4. The computed values are displayed for each month till the loan balance becomes zero.

5. The output for both part (a) and part (b) are attached as images.

Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per line. The coin types are dollars, quarters, dimes, nickels, and pennies. Use singular and plural coin names as appropriate, like 1 penny vs. 2 pennies. Ex: If the input is: 0 or less, the output is: no change Ex: If the input is: 45 the output is: 1 quarter 2 dimes

Answers

Answer:.

// Program is written in C++.

// Comments are used for explanatory purposes

// Program starts here..

#include<iostream>

using namespace std;

int main()

{

// Declare Variables

int amount, dollar, quarter, dime, nickel, penny;

// Prompt user for input

cout<<"Amount: ";

cin>>amount;

// Check if input is less than 1

if(amount<=0)

{

cout<<"No Change";

}

else

{

// Convert amount to various coins

dollar = amount/100;

amount = amount%100;

quarter = amount/25;

amount = amount%25;

dime = amount/10;

amount = amount%10;

nickel = amount/5;

penny = amount%5;

// Print results

if(dollar>=1)

{

if(dollar == 1)

{

cout<<dollar<<" dollar\n";

}

else

{

cout<<dollar<<" dollars\n";

}

}

if(quarter>=1)

{

if(quarter== 1)

{

cout<<quarter<<" quarter\n";

}

else

{

cout<<quarter<<" quarters\n";

}

}

if(dime>=1)

{

if(dime == 1)

{

cout<<dime<<" dime\n";

}

else

{

cout<<dime<<" dimes\n";

}

}

if(nickel>=1)

{

if(nickel == 1)

{

cout<<nickel<<" nickel\n";

}

else

{

cout<<nickel<<" nickels\n";

}

}

if(penny>=1)

{

if(penny == 1)

{

cout<<penny<<" penny\n";

}

else

{

cout<<penny<<" pennies\n";

}

}

}

return 0;

}

A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be transmitted more securely. All the data is transmitted as four-digit integers. Your app should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the result of adding 7 to the digit and getting the remainder after dividing the new value by 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then display the encrypted integer. Write a separate app that inputs an encrypted four-digit integer and decrypts it (by reversing the encryption scheme) to form the original number. Use the format specifier D4 to display the encrypted value in case the number starts with a 0

Answers

Answer:

The output of the code:

Enter a 4 digit integer : 1 2 3 4

The decrypted number is : 0 1 8 9

The original number is : 1 2 3 4

Explanation:

Okay, the code will be written in Java(programming language) and the file must be saved as "Encryption.java."

Here is the code, you can just copy and paste the code;

import java.util.Scanner;

public class Encryption {

public static String encrypt(String number) {

int arr[] = new int[4];

for(int i=0;i<4;i++) {

char ch = number.charAt(i);

arr[i] = Character.getNumericValue(ch);

}

for(int i=0;i<4;i++) {

int temp = arr[i] ;

temp += 7 ;

temp = temp % 10 ;

arr[i] = temp ;

}

int temp = arr[0];

arr[0] = arr[2];

arr[2]= temp ;

temp = arr[1];

arr[1] =arr[3];

arr[3] = temp ;

int newNumber = 0 ;

for(int i=0;i<4;i++)

newNumber = newNumber * 10 + arr[i];

String output = Integer.toString(newNumber);

if(arr[0]==0)

output = "0"+output;

return output;

}

public static String decrypt(String number) {

int arr[] = new int[4];

for(int i=0;i<4;i++) {

char ch = number.charAt(i);

arr[i] = Character.getNumericValue(ch);

}

int temp = arr[0];

arr[0]=arr[2];

arr[2]=temp;

temp = arr[1];

arr[1]=arr[3];

arr[3]=temp;

for(int i=0;i<4;i++) {

int digit = arr[i];

switch(digit) {

case 0:

arr[i] = 3;

break;

case 1:

arr[i] = 4;

break;

case 2:

arr[i] = 5;

break;

case 3:

arr[i] = 6;

break;

case 4:

arr[i] = 7;

break;

case 5:

arr[i] = 8;

break;

case 6:

arr[i] = 9;

break;

case 7:

arr[i] = 0;

break;

case 8:

arr[i] = 1;

break;

case 9:

arr[i] = 2;

break;

}

}

int newNumber = 0 ;

for(int i=0;i<4;i++)

newNumber = newNumber * 10 + arr[i];

String output = Integer.toString(newNumber);

if(arr[0]==0)

output = "0"+output;

return output;

}

public static void main(String[] args) {

Scanner sc = new Scanner(System.in);

System.out.print("Enter a 4 digit integer:");

String number = sc.nextLine();

String encryptedNumber = encrypt(number);

System.out.println("The decrypted number is:"+encryptedNumber);

System.out.println("The original number is:"+decrypt(encryptedNumber));

}

}

Let U = {b1, b2, , bn} with n ≥ 3. Interpret the following algorithm in the context of urn problems. for i is in {1, 2, , n} do for j is in {i + 1, i + 2, , n} do for k is in {j + 1, j + 2, ..., n} do print bi, bj, bk How many lines does it print? It prints all the possible ways to draw three balls in sequence, without replacement. It prints P(n, 3) lines. It prints all the possible ways to draw an unordered set of three balls, without replacement. It prints P(n, 3) lines. It prints all the possible ways to draw three balls in sequence, with replacement. It prints P(n, 3) lines. It prints all the possible ways to draw an unordered set of three balls, without replacement. It prints C(n, 3) lines. It prints all the possible ways to draw three balls in sequence, with replacement. It prints C(n, 3) lines.

Answers

Answer:

Check the explanation

Explanation:

Kindly check the attached image for the first step

Note that the -print" statement executes n(n — I)(n — 2) times and the index values for i, j, and k can never be the same.  

Therefore, the algorithm prints out all the possible ways to draw three balls in sequence, without replacement.

Now we need to determine the number of lines this the algorithm print. In this case, we are selecting three different balls randomly from a set of n balls. So, this involves permutation.  

Therefore, the algorithm prints the total  

P(n, 3)  

lines.  

Trace the complete execution of the MergeSort algorithm when called on the array of integers, numbers, below. Show the resulting sub-arrays formed after each call to merge by enclosing them in { }. For example, if you originally had an array of 5 elements, a = {5,2,8,3,7}, the first call to merge would result with: {2, 5} 8, 3, 7 ← Note after the first call to merge, two arrays of size 1 have been merged into the sorted subarray {2,5} and the values 2 and 5 are sorted in array a You are to do this trace for the array, numbers, below. Be sure to show the resulting sub-arrays after each call to MergeSort. int[] numbers = {23, 14, 3, 56, 17, 8, 42, 18, 5};

Answers

Answer:

public class Main {

public static void merge(int[] arr, int l, int m, int r) {

int n1 = m - l + 1;

int n2 = r - m;

int[] L = new int[n1];

int[] R = new int[n2];

for (int i = 0; i < n1; ++i)

L[i] = arr[l + i];

for (int j = 0; j < n2; ++j)

R[j] = arr[m + 1 + j];

int i = 0, j = 0;

int k = l;

while (i < n1 && j < n2) {

if (L[i] <= R[j]) {

arr[k] = L[i];

i++;

} else {

arr[k] = R[j];

j++;

}

k++;

}

while (i < n1) {

arr[k] = L[i];

i++;

k++;

}

while (j < n2) {

arr[k] = R[j];

j++;

k++;

}

printArray(arr, l, r);

}

public static void sort(int[] arr, int l, int r) {

if (l < r) {

int m = (l + r) / 2;

sort(arr, l, m);

sort(arr, m + 1, r);

merge(arr, l, m, r);

}

}

static void printArray(int[] arr, int l, int r) {

System.out.print("{");

for (int i = l; i <= r; ++i)

System.out.print(arr[i] + " ");

System.out.println("}");

}

public static void main(String[] args) {

int[] arr = {23, 14, 3, 56, 17, 8, 42, 18, 5};

sort(arr, 0, arr.length - 1);

}

}

Explanation:

See answer

Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
import java.util.Scanner; public class RecursiveCalls { public static void backwardsAlphabet(char currLetter) { if (currLetter == 'a') { System.out.println(currLetter); } else { System.out.print(currLetter + " "); backwardsAlphabet((char)(currLetter - 1)); } } public static void main (String [] args) { Scanner scnr = new Scanner(System.in); char startingLetter; startingLetter = scnr.next().charAt(0); /* Your solution goes here */ } }

Answers

Answer:

Following are the code to method calling

backwardsAlphabet(startingLetter); //calling method backwardsAlphabet

Output:

please find the attachment.

Explanation:

Working of program:

In the given java code, a class "RecursiveCalls" is declared, inside the class, a method that is "backwardsAlphabet" is defined, this method accepts a char parameter that is "currLetter". In this method a conditional statement is used, if the block it will check input parameter value is 'a', then it will print value, otherwise, it will go to else section in this block it will use the recursive function that prints it's before value. In the main method, first, we create the scanner class object then defined a char variable "startingLetter", in this we input from the user and pass its value into the method that is "backwardsAlphabet".

Explain possible ways that Darla can communicate with her coworker Terry, or her manager to make sure Joe receives great customer service?

Answers

Answer:

They can communicate over the phone or have meetings describing what is and isn't working for Joe. It's also very important that Darla makes eye contact and is actively listening to effectively handle their customer.

Explanation:

Computer A has an overall CPI of 1.3 and can be run at a clock rate of 600 MHz. Computer B has a CPI of 2.5 and can be run at a clock rate of 750 MHz. We have a particular program we wish to run. When compiled for computer A, this program has exactly 100,000 instructions. How many instructions would the program need to have when compiled for Computer B, in order for the two computers to have exactly the same execution time for this program

Answers

Answer:

Check the explanation

Explanation:

CPI means Clock cycle per Instruction

given Clock rate 600 MHz then clock time is Cー 1.67nSec clockrate 600M

Execution time is given by following Formula.

Execution Time(CPU time) = CPI*Instruction Count * clock time = [tex]\frac{CPI*Instruction Count}{ClockRate}[/tex]

a)

for system A CPU time is 1.3 * 100, 000 600 106

= 216.67 micro sec.

b)

for system B CPU time is [tex]=\frac{2.5*100,000}{750*10^6}[/tex]

= 333.33 micro sec

c) Since the system B is slower than system A, So the system A executes the given program in less time

Hence take CPU execution time of system B as CPU time of System A.

therefore

216.67 micro = =[tex]\frac{2.5*Instruction}{750*10^6}[/tex]

Instructions = 216.67*750/2.5

= 65001

hence 65001 instruction are needed for executing program By system B. to complete the program as fast as system A

The number of instructions that the program would need to have when compiled for Computer B is; 65000 instructions

What is the execution time?

Formula for Execution time is;

Execution time = (CPI × Instruction Count)/Clock Time

We are given;

CPI for computer A = 1.3

Instruction Count = 100000

Clock time = 600 MHz = 600 × 10⁶ Hz

Thus;

Execution time = (1.3 * 100000)/(600 × 10⁶)

Execution time(CPU Time) = 216.67 * 10⁻⁶ second

For CPU B;

CPU Time = (2.5 * 100000)/(750 × 10⁶)

CPU Time = 333.33 * 10⁻⁶ seconds

Thus, instructions for computer B for the two computers to have same execution time is;

216.67 * 10⁻⁶ = (2.5 * I)/(750 × 10⁶)

I = (216.67 * 10⁻⁶ * 750 × 10⁶)/2.5

I = 65000 instructions

Read more about programming instructions at; https://brainly.com/question/15683939

Retail price data for n = 60 hard disk drives were recently reported in a computer magazine. Three variables were recorded for each hard disk drive: y = Retail PRICE (measured in dollars) x1 = Microprocessor SPEED (measured in megahertz) (Values in sample range from 10 to 40) x2 = CHIP size (measured in computer processing units) (Values in sample range from 286 to 486) A first-order regression model was fit to the data. Part of the printout follows: __________.

Answers

Answer:

Explanation:

Base on the scenario been described in the question, We are 95% confident that the price of a single hard drive with 33 megahertz speed and 386 CPU falls between $3,943 and $4,987

Write a program that maintains a database containing data, such as name and birthday, about your friends and relatives. You should be able to enter, remove, modify, or search this data. Initially, you can assume that the names are unique. The program should be able to save the data in a fi le for use later. Design a class to represent the database and another class to represent the people. Use a binary search tree of people as a data member of the database class. You can enhance this problem by adding an operation that lists everyone who satisfi es a given criterion. For example, you could list people born in a given month. You should also be able to list everyone in the database.

Answers

Answer:

[tex]5909? \times \frac{?}{?} 10100010 {?}^{?} 00010.222 {?}^{2} [/tex]

Perform a Google search, using the Google hacking keywords to locate a page that has the word passwd (note the spelling) on the page but has the phrase "Index of" in the title. First, what was your search term. Second, what is the first URL in your list of results. Third, what exactly would you use this search to find?

Answers

Answer:

Following are the step to this question:

i) search "intitle passwd" in google search engine.

ii) Open first link of the page.

iii) use commands to access data.  

Explanation:

Google Hacking operates as follows of web engines like google and yahoo to find web pages and sensitive information, that are insecure. It builds on the idea that web pages index a large number of public pages and files and make their discovery easy to create the correct query.

In which, we search the above-given keyword, that will provide many links. In these links we select the first one and open it, it will provide an index, and search in this we use the search command in the database.

Assume the class Student implements the Speaker interface from the textbook. Recall that this interface includes two abstract methods, speak( ) and announce(String str). A Student contains one instance data, String class Rank. Write the Student class so that it implements Speaker as follows. The speak method will output "I am a newbie here" if the Student is a "Freshman", "I like my school" if the Student is either a "Sophomore" or a "Junior", or "I can not wait to graduate" if the student is a "Senior". The announce method will output "I am a Student, here is what I have to say" followed by the String parameter on a separate line. Finally, the class Rank is initialized in the constructor. Only implement the constructor and the methods to implement the Speaker interface.

Answers

Answer:

Check the explanation

Explanation:

Based on the above information, this the following resulting code.

The solution has namely one interface named Speaker, one class called Student and one Main class called StudentMain.

The StudentMain class just initialize various instances of the Student class with various classRank values and then subsequently calling in the speak() methods of all.

announce() method is called on one such instance of Student class to demonstrate its functioning.

Comments are added at required place to better help in understanding the logic.

Speaker.java

public interface Speaker {

 

  abstract void speak();

  abstract void announce(String str);

}

Student.java

public class Student implements Speaker {

  /*

  * Write the Student class so that it implements Speaker as follows.

  The speak method will output "I am a newbie here" if the Student is a "Freshman",

  "I like my school" if the Student is either a "Sophomore" or a "Junior",

  or "I can not wait to graduate" if the student is a "Senior".

  The announce method will output "I am a Student, here is what I have to say" followed by the String parameter on a separate line.

  */

  String classRank;

 

 

  // Based on the requirement taking in classRank String as a constructor parameter

  public Student(String classRank) {

      super();

      this.classRank = classRank;

  }

// Using the switch-case to code the above requirment

  public void speak() {

      switch(classRank) {

     

      case "Freshman":

          System.out.println("I am a newbie here");

          break;

      // This case would output the same result for the 2 case conditions

      case "Sophomore":

      case "Junior":

          System.out.println("I like my school");

          break;

         

      case "Senior":

          System.out.println("I can not wait to graduate");

          break;

      default:

          System.out.println("Unknown classRank inputted");

      }

     

  }

  //Based on the requirement, first line is printed first after second which is

  // the inputted String parameter

  public void announce(String str) {

      System.out.println("I am a Student, here is what I have to say");

      System.out.println(str);

  }

}

StudentMain.java

public class StudentMain {

 

  public static void main(String[] args) {

     

      // Initializing all the Objects with required classRank

      Student stu1=new Student("Freshman");

      Student stu2=new Student("Sophomore");

      Student stu3=new Student("Junior");

      Student stu4=new Student("Senior");

      Student stu5=new Student("Freshman");

     

      //Calling the speak methods of the all the above create objects

      stu1.speak();

      stu2.speak();

      stu3.speak();

      stu4.speak();

      stu4.speak();

      stu4.announce("Wish u all the best");

  }

}

Following is the output generated from the code run.

Write a functionvector merge(vector a, vector b)that merges two vectors, alternating elements from both vectors. If one vector isshorter than the other, then alternate as long as you can and then append the remaining elements from the longer vector. For example, if a is 1 4 9 16and b is9 7 4 9 11then merge returns the vector1 9 4 7 9 4 16 9 1118. Write a predicate function bool same_elements(vector a, vector b)that checks whether two vectors have the same elements in some order, with the same multiplicities. For example, 1 4 9 16 9 7 4 9 11 and 11 1 4 9 16 9 7 4 9 would be considered identical, but1 4 9 16 9 7 4 9 11 and 11 11 7 9 16 4 1 would not. You will probably need one or more helper functions.19. What is the difference between the size and capacity of a vector

Answers

Answer:

see explaination for code

Explanation:

CODE

#include <iostream>

#include <vector>

using namespace std;

vector<int> merge(vector<int> a, vector<int> b) {

vector<int> result;

int k = 0;

int i = 0, j = 0;

while (i < a.size() && j < b.size()) {

if (k % 2 == 0) {

result.push_back(a[i ++]);

} else {

result.push_back(b[j ++]);

}

k ++;

}

while (i < a.size()) {

result.push_back(a[i ++]);

}

while(j < b.size()) {

result.push_back(b[j ++]);

}

return result;

}

int main() {

vector<int> a{1, 4, 9, 16};

vector<int> b{9, 7, 4, 9, 11};

vector<int> result = merge(a, b);

for (int i=0; i<result.size(); i++) {

cout << result[i] << " ";

}

}

The Monte Carlo (MC) Method (Monte Carlo Simulation) was first published in 1949 by Nicholas Metropolis and Stanislaw Ulam in the work "The Monte Carlo Method" in the Journal of American Statistics Association. The name Monte Carlo has its origins in the fact that Ulam had an uncle who regularly gambled at the Monte Carlo casino in Monaco. In fact, way before 1949 the method had already been extensively used as a secret project of the U.S. Defense Department during the so-called "Manhattan Project". The basic principle of the Monte Carlo Method is to implement on a computer the Strong Law of Large Numbers (SLLN) (see also Lecture 9). The Monte Carlo Method is also typically used as a probabilistic method to numerically compute an approximation of a quantity that is very hard or even impossible to compute exactly like, e.g., integrals (in particular, integrals in very high dimensions!). The goal of Problem 2 is to write a Python code to estimate the irrational number

Answers

Answer:

can you give more detail

Explanation:

In this puzzle you have a list of n pitchers, with known capacities, c1, c2, ... cn, of holding water in gallons. You have a faucet that can be used as often and as much as the player needs. The goal is to measure exactly g gallons of water, using nothing other than these pitchers. Suppose the current amounts of water that these pitchers hold is w1, w2, ... wn,. These numbers are assumed to be 0 initially. The puzzle is solved as soon as wi = g for any i. A player can perform the following operations:

 Fill pitcher i (from the faucet). The precondition of this operation is: ci > wi ≥ 0. The effect is: wi = ci.

 Empty pitcher i. The precondition of this operation is: ci ≥ wi > 0. The effect is: wi = 0.

 Pour pitcher i to pitcher j. The precondition of this operation is: (ci ≥ wi > 0) and (cj > wj ≥ 0). In words, pitcher i must have some water to pour, and pitcher j must have some unused capacity to receive it. The (partial) effect is: (wi = 0) or (wj = cj) or both. In words, the pour operation must continue until pitcher i becomes empty (and its content is added to pitcher j's content), or pitcher j becomes full (and pitcher i retains the remainder), whichever occurs first. They may occur simultaneously.

A Sample Run

Select the puzzle to solve:

1. Pitchers

2. Eight puzzle

Your selection: 1

Enter the number of pitchers: 3

Enter the capacities of the 3 pitchers (gallons): 2, 5, 10

Enter the goal (gallons): 1

Current configuration: [0, 0, 0]

Please select your next move from the following choices:

1. Fill pitcher 1

2. Fill pitcher 2

3. Fill pitcher 3

Your selection: 2

Current configuration: [0, 5, 0]

Please select your next move from the following choices:

1. Fill pitcher 1

2. Fill pitcher 3

3. Empty pitcher 2

4. Pour pitcher 2 to 1

5. Pour pitcher 2 to 3

Your selection: 4

Current configuration: [2, 3, 0]

Please select your next move from the following choices:

1. Fill pitcher 2

2. Fill pitcher 3

3. Empty pitcher 1

4. Empty pitcher 2

5. Pour pitcher 1 to 2

6. Pour pitcher 1 to 3

7. Pour pitcher 2 to 3

Your selection: 3 Current configuration: [0, 3, 0]

Please select your next move from the following choices:

1. Fill pitcher 1

2. Fill pitcher 2

3. Fill pitcher 3

4. Empty pitcher 2

5. Pour pitcher 2 to 1

6. Pour pitcher 2 to 3

Your selection: 5 Current configuration: [2, 1, 0]

Great! You have reached the goal in 4 moves. Bye.

Answers

Answer:

See explaination

Explanation:

#include <iostream>

#include <vector>

using namespace std;

// function to print configuration for each pitcher

void printConfig(vector<int> w, int n)

{

cout << "Current configuration: [" << w[0];

for(int i=1; i<n; i++)

{

cout << ", " << w[i];

}

cout << "]" << endl;

}

void getOptions(vector<int> c, vector<int> w, int n, vector<pair<int, pair<int, int>>> &options)

{

// options count

int count = 0;

// fill

for(int i=0; i<n; i++)

{

if(c[i] > w[i] && w[i] >= 0)

{

count ++;

cout << count << ". Fill pitcher " << (i+1) << endl;

// add options to list

options.push_back(make_pair(1, make_pair(i, 0)));

}

}

// empty

for(int i=0; i<n; i++)

{

if(c[i] >= w[i] && w[i] > 0)

{

count++;

cout << count << ". Empty pitcher " << (i+1) << endl;

// add options to list

options.push_back(make_pair(2, make_pair(i, 0)));

}

}

// Pour pitcher i to pitcher j

for(int i=0; i<n; i++)

{

if(c[i] >= w[i] && w[i] > 0)

{

for(int j=0; j<n; j++)

{

if(i!=j && c[j] > w[j] && w[j] >= 0)

{

count++;

cout << count << ". Pour pitcher " << (i+1) << " to " << (j+1) << endl;

// add options to list

options.push_back(make_pair(3, make_pair(i, j)));

}

}

}

}

}

void execute(vector<int> c, vector<int> &w, pair<int, pair<int, int>> option)

{

int i = option.second.first;

// for fill

if(option.first == 1)

{

w[i] = c[i];

}

// empty

else if(option.first == 2)

{

w[i] = 0;

}

// pour

else

{

int j = option.second.second;

if(w[i] >= c[j])

{

w[i] = w[i] - c[j];

w[j] = c[j];

}

else

{

w[j] = w[i];

w[i] = 0;

}

}

}

int main()

{

// required variables

int choice, n, temp, g, flag, moves = 0;

// vectors are dynamic sized arrays

vector<int> c, w;

vector<pair<int, pair<int, int>>> options;

// select puzzle

cout << "Select the puzzle to solve:\n";

cout << "1. Pitchers\n";

cout << "2. Eight puzzle\n";

cout << "Your selection: ";

cin >> choice;

if(choice == 1)

{

// input values required

cout << "Enter the number of pitchers: ";

cin >> n;

// array for pitchers

cout << "Enter the capacities of the " << n << " pitchers (gallons): ";

for(int i=0; i<n; i++)

{

cin >> temp;

c.push_back(temp);

w.push_back(0);

}

cout << "Enter the goal (gallons): ";

cin >> g;

// start game

while(true)

{

// print configuration

printConfig(w, n);

// check for goal state

flag = 0;

for(int i=0; i<n; i++)

{

if(w[i] == g)

{

flag = 1;

break;

}

}

if(flag)

{

cout << "Great! You have reached the goal in " << moves << " moves. Bye." << endl;

break;

}

// get and print options

//empty previous options

options.clear();

getOptions(c, w, n, options);

// ask for user's selection

cout << "Your selection: ";

cin >> choice;

// update moves

moves++;

// perform according to the selection

execute(c, w, options[choice-1]);

}

}

return 0;

}

Select the correct navigational path to create the function syntax to use the IF function.
Click the Formula tab on the ribbon and look in the ???
'gallery
Select the range of cells.
Then, begin the formula with the ????? click ?????. and click OK.
Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.​

Answers

Answer:

1. Logical

2.=

3.IF

Explanation:

just did the assignment

A university wants to schedule the classrooms for final exams. The attributes are given below:
course : course id, name, and department
section : section id, enrollment, and dependent as a weak entity set on course
room : room number, capacity, and building
exam: course id, section id, room number, and time.
1) Determine the relationships among these entity sets. Clearly specify the arity, the attributes, and the mapping cardinality of these relationships.
2) Construct an E-R diagram to for the scheduling system.

Answers

Answer:

See explaination

Explanation:

Clearly the entities are as follows:-

Course

Section

Room

Test

The relationship among entities are as follows:-

Course has Section

Test is conducted for Course

Test is conducted in Section

Test is conducted in Room

Attributes of each entities are as follows:-

Course (CourseID, Name, Department)

Section (SectionID, Enrollment)

Room (RoomNumber, Capacity, Building)

Test (Time)

Section is a week entity as, there may be same sections for different courses, therefore section uses the primary key of course entity as foreign key.

Also entity Test is dependent upon the entities Room,Section and Course, therefore primary keys of these entities will be used as foreign key in the Test entity.

Check attachment for the ER diagram

Describe how DMA is
used to
transfer data
from peripherals.

Answers

Answer:

Think of DMA as a co-processor that is used to quickly transfer data between main memory and peripherals without the intervention of the CPU.

6. Why did he choose to install the window not totally plumb?

Answers

Answer:

Because then it would break

Explanation:

You achieve this by obtaining correct measurements. When measuring a window, plumb refers to the vertical planes, and level refers to the horizontal planes. So he did not install the window totally plumb

Other Questions
Forty-three percent of Americans use social media and other websites to voice their opinions abouttelevision programs (the Huffington Post, November 23, 2011). Below are the results of a survey of1364 individuals who were asked if they use social media and other websites to voice their opinionsabout Television programsUses Social Media and Other Websites toVoice Opinions About Television ProgramsDoesnt Use Social Media andOther Websites to VoiceOpinions About TelevisionProgramsFemale 395 291Male 323 355a. Show a joint probability table. (2 marks)b. What is the probability a respondent is female? (2 marks)c. What is the conditional probability a respondent uses social media and other websites to voiceopinions about television programs given the respondent is female? (3 marks)d. Let F denote the event that the respondent is female and A denote the event that therespondent uses social media and other websites to voice opinions about television programs.Are events F and A independent? Translate the difference of a number and 7 is -8 into an equation. Based on the artwork you've seen in this lesson, who made this artwork? (Select the best answers) During the Age of Imperialism, the main reason the European powers wanted to establish colonies in foreign lands wasa) to preserve native traditionsb)to maintain equality among fellow nationsc)to learn about new technologiesd)to gain access to raw materials for their industries April plans on starting a perfume business and decides she needs to firstconduct some marketing research. She wants to find out what kinds ofperfumes and scents women like to wear from as many women as possible.Which data collection method should she use?A. Case studyB. Focus groupC. SurveyD. Observation There are 3 red balls, 5 green balls, and 1 yellow ball in a hat. If you draw the yellow ball, you gain $10. If you draw any of the red balls, you gain $4. If you draw a green ball, you lose $3. If you were to play this game 25 times, replacing the drawn ball each time, how much money can you expect to gain or lose? During the Civil War, on which side did Mark Twain fight? The local theater sold 260 tickets to their most recent performance. Admission was $9 for adults and $5 for children. If they made $2,140, how many adult tickets did they sell? Use the box method to distribute and simplify (-6x-3)(4x+2).(6x3)(4x+2). Drag and drop the terms to the correct locations of the table. By now it was dawn, but the light was still dim and faint. The buildings round uswere already tottering [swaying]. . . . This finally decided us to leave the town. Oncebeyond the buildings we stopped, and there we had some . . . experiences whichthoroughly [totally] alarmed us. The carriages . . . began to run in different directionsthough the ground was quite level. . . . We also saw the sea sucked away andapparently forced back by the earthquake: at any rate it receded [moved back] fromthe shore so that quantities of sea creatures were left stranded on dry sand. On thelandward side a fearful black cloud was rent [split] by forked and quivering bursts offlame, and parted to reveal great tongues of fire, like flashes of lightning magnified[increased] in size.Pliny the Younger, The Letters of the Younger Pliny_______ 11. Refer to the passage on the previous page. Why did the speaker and his groupdecide to leave town?A. The buildings were swaying.B. The light was dim.C. The lightning was dangerous.D. It was near dawn._______ 12. According to the passage on the previous page, what is the most likely reasonthe carriages started to run in different directions?A. Each was headed to a different town.B. The earth was level.C. The horses were scared.D. The wheels were melting._______ 13. Although the passage on the previous page is really about the eruption ofMount Vesuvius, why do you think much of it describes an earthquake?A. Earthquakes and volcanoes are the same.B. Pliny mistook what he was witnessing.C. Pliny had never seen an earthquake before.D. Earthquakes often occur before or during volcanic eruptions._______ 14. According to the passage on the previous page, why were sea creaturesstranded on the dry sand?A. The sea moved back suddenly from the shore.B. They were dead.C. They were moving away from the volcano.D. They were natural land animals too._______ 15. The great tongues of fire mentioned in the passage on the previous pageprobably refer toA. burning carriages.B. burning mountain grasses.C. spurts of lava.D. the sunrise. Please Answer ASAP You are to do a Physical Education Project which is consist of 4 Topics. (Team Sports, Weight Training, Aerobics and the Fitness Gram test. You have two weeks to complete it. (May 18-29) Read the instructions down below.1.) TEAM SPORTS - (Basketball, Football, Soccer, Softball, Volleyball)You are to choose one Sport up above and write a summary on the rules and regulation how the game is played?2.) WEIGHT TRAINING Watch a video and write a paragraph (5 sentence) on how Weight Training is beneficial for your body.3.) AEROBICS Do a 15-minute workout and write a full description about the process you went through and how your body responded to the workout?4.) FITNESS GRAM TEST There are 6 Test you will take (Height, Weight, Push- ups, Sit-ups, Standing Long Jump and a 10-minute 50-yard Pacer Walk/Run) You will need to use a Stop Watch and a Tape Measure for these activities. Sid starts with savings of 13Tim starts with no savingsEach week from now,- Sid will save 3.50 and Tim will save 3In how many weeks will Sid and Tim have savings in the ratio 17 : 9Your final line must say, 17 : 9 in weeks why do the wildlife in East Africa contributes to their economies? please I need help qnq Tell whether the triangle with the given side lengths is a right triangle.3.9 mm, 8.0 mm, 8.9 mm Can anyone help with this? First question gets marked brainliest! Que es un trinomio cuadrado perfecto? what is 4848/40404 written as an improper fraction +34422222222 wiil mark brainliset if right Please help me thank you Stock trades are all handled by specialized salespeople calledA e-tradersB stockbrokersC finance tradersD investment counselorsPLEASE ANSWER FAST!! Which statement could be used to describe the story's moral? A)Citizens should question society's rules and opinions. B)It is best to stick with traditional ways as times change. C)Do what you are told if you want to make friends. D)Believe in yourself and trust your accomplishments.