* HELP FAST*Which Section do you need to go on in the Ribbon, to get to the button that will allow you Create a Link between text boxes?

Answers

Answer 1

Answer:

Insert

Explanation:

Take with a pinch of salt cuz I'm not a coder or anything, but I've got a few skillz.


Related Questions

answer in java.
Write a class named TestScores. The class constructor should accept an array of test scores as its
argument. You will need to do a deep copy of the array, don’t just copy the address of the array. The
class should have a method that returns the average of the test scores. If any test score in the array is
negative or greater than 100, the class should throw an IllegalArgumentException.
Write an exception class named InvalidTestScore. Create a setScores() method in TestScores which
accepts an array of test scores. Validate each item in the array and if any test score in the array is
negative or greater than 100, the class should throw an InvalidTestScore Exception.
Next create another method in TestScore called getScoresFromFile(). This method should open a file
that you created in Notepad and it should contain a list of test scores, some valid and others not. Read
in each of these test scores and store into an array. The first entry in the file should be the number of
scores that should be read. This number should be used to properly create the test score array. The
method should properly handle the potential FileNotFoundException. If file does not exist the program
should stop and exit with your own error message. As each score is read from the file (use nextInt())
throw either an IllegalArgumentException or an InvalidTestScore if the number read is not between 1
and 100 inclusive. You also need to handle an InputMismatchException. This means that either a
string was encountered or a floating-point number was encountered while reading the file. When this
happens issue an error message, but continue processing the file until you reach end of file. Note:
When this happens the entry you will add to the test score array will contain 0. How you accomplish
this is up to you. Feel free to discuss with your instructor.
Demonstrate all this functionality in a main() program

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that a class named TestScores. The class constructor should accept an array of test scores as its argument.

Writting the code:

import java.util.Scanner;

class TestScores

{

int scores[];

TestScores(int array[])

{

scores=new int[array.length];

for(int i=0;i<array.length;i++)

{

scores[i]=array[i];

}

}

double calAverage()

{

double avg;

int sum=0;

for(int i=0;i<scores.length;i++)

{

sum=sum+scores[i];

}

avg=sum/scores.length;

return avg;

}

}

class TestDriver

{

public static void main(String args[])

{

try

{

Scanner s=new Scanner(System.in);

int count;

System.out.print("Enter number of test scores : ");

count=s.nextInt();

int array[]=new int[count];

System.out.println("\nEnter test scores ");

for(int i=0;i<count;i++)

{

array[i]=s.nextInt();

if(array[i]<0||array[i]>100)

{

throw new IllegalArgumentException("Test scores must have a value less than 100 and greater than 0.");

}

}

TestScores ts=new TestScores(array);

double avg=ts.calAverage();

System.out.println("\n Test Scores average is : "+avg);

}catch(IllegalArgumentException e)

{

System.out.println(e.getMessage());

}

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

answer in java. Write a class named TestScores. The class constructor should accept an array of test

The management wants to you to calculate a 95% confidence interval for the average relative skill of all teams in 2013-2015. To construct a confidence interval, you will need the mean and standard error of the relative skill level in these years. The code block below calculates the mean and the standard deviation. Your edits will calculate the standard error and the confidence interval. Make the following edits to the code block below:Replace ??SD_VARIABLE?? with the variable name representing the standard deviation of relative skill of all teams from your years. (Hint: the standard deviation variable is in the code block below)Replace ??CL?? with the confidence level of the confidence interval.Replace ??MEAN_VARIABLE?? with the variable name representing the mean relative skill of all teams from your years. (Hint: the mean variable is in the code block below)Replace ??SE_VARIABLE?? with the variable name representing the standard error. (Hint: the standard error variable is in the code block below)The management also wants you to calculate the probability that a team in the league has a relative skill level less than that of the team that you picked. Assuming that the relative skill of teams is Normally distributed, Python methods for a Normal distribution can be used to answer this question. The code block below uses two of these Python methods. Your task is to identify the correct Python method and report the probability.print("Confidence Interval for Average Relative Skill in the years 2013 to 2015")print("------------------------------------------------------------------------------------------------------------")# Mean relative skill of all teams from the years 2013-2015mean = your_years_leagues_df['elo_n'].mean()# Standard deviation of the relative skill of all teams from the years 2013-2015stdev = your_years_leagues_df['elo_n'].std()n = len(your_years_leagues_df)#Confidence interval# ---- TODO: make your edits here ----stderr = ??SD_Variable?? (n ** 0.5)conf_int_95 = st.norm.interval(??CL??,??MEAN_VARIABLE??,??SE_VARIABLE??)print("95% confidence interval (unrounded) for Average Relative Skill (ELO) in the years 2013 to 2015 =", conf_int_95)print("95% confidence interval (rounded) for Average Relative Skill (ELO) in the years 2013 to 2015 = (", round(conf_int_95[0], 2),",", round(conf_int_95[1], 2),")")print("\n")print("Probability a team has Average Relative Skill LESS than the Average Relative Skill (ELO) of your team in the years 2013 to 2015")print("----------------------------------------------------------------------------------------------------------------------------------------------------------")mean_elo_your_team = your_team_df['elo_n'].mean()choice1 = st.norm.sf(mean_elo_your_team, mean, stdev)choice2 = st.norm.cdf(mean_elo_your_team, mean, stdev)# Pick the correct answer.print("Which of the two choices is correct?")print("Choice 1 =", round(choice1,4))print("Choice 2 =", round(choice2,4))

Answers

Answer:

Explanation:

print("Confidence Interval for Average Relative Skill in the years 2013 to 2015")

print("------------------------------------------------------------------------------------------------------------")

# Mean relative skill of all teams from the years 2013-2015

mean = your_years_leagues_df['elo_n'].mean()

# Standard deviation of the relative skill of all teams from the years 2013-2015

stdev = your_years_leagues_df['elo_n'].std()

n = len(your_years_leagues_df)

#Confidence interval

stderr = stdev/(n ** 0.5) # variable stdev is the calculated the standard deviation of the relative skill of all teams from the years 2013-2015

# Calculate the confidence interval

# Confidence level is 95% => 0.95

# variable mean is the calculated the mean relative skill of all teams from the years 2013-20154

# variable stderr is the calculated the standard error

conf_int_95 = st.norm.interval(0.95, mean, stderr)

print("95% confidence interval (unrounded) for Average Relative Skill (ELO) in the years 2013 to 2015 =", conf_int_95)

print("95% confidence interval (rounded) for Average Relative Skill (ELO) in the years 2013 to 2015 = (", round(conf_int_95[0], 2),",", round(conf_int_95[1], 2),")")

print("\n")

print("Probability a team has Average Relative Skill LESS than the Average Relative Skill (ELO) of your team in the years 2013 to 2015")

print("----------------------------------------------------------------------------------------------------------------------------------------------------------")

mean_elo_your_team = your_team_df['elo_n'].mean()

# Calculates the probability a Team has Average Relative Skill GREATER than or equal to the Average Relative Skill (ELO) of your team in the years 2013 to 2015

choice1 = st.norm.sf(mean_elo_your_team, mean, stdev)

# Calculates the probability a Team has Average Relative Skill LESS than or equal to the Average Relative Skill (ELO) of your team in the years 2013 to 2015

choice2 = st.norm.cdf(mean_elo_your_team, mean, stdev)

# Pick the correct answer.

print("Which of the two choices is correct?")

print("Choice 1 =", round(choice1,4))

print("Choice 2 =", round(choice2,4)) # This is correct

How many bit positions to borrow from the host address field to subnet the network address 169.67.0.0 exactly into 5 subnets

Answers

Answer:

send me the opportunity to work with you and your family and friends and family are doing well and that you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient you are not the intended recipient

I need help with the following c program:

(1) Prompt the user for a string that contains two strings separated by a comma. (1 pt)

Examples of strings that can be accepted:
Jill, Allen
Jill , Allen
Jill,Allen

Ex:

Enter input string:
Jill, Allen


(2) Report an error if the input string does not contain a comma. Continue to prompt until a valid string is entered. Note: If the input contains a comma, then assume that the input also contains two strings. (2 pts)

Ex:

Enter input string:
Jill Allen
Error: No comma in string.

Enter input string:
Jill, Allen


(3) Extract the two words from the input string and remove any spaces. Store the strings in two separate variables and output the strings. (2 pts)

Ex:

Enter input string:
Jill, Allen
First word: Jill
Second word: Allen


(4) Using a loop, extend the program to handle multiple lines of input. Continue until the user enters q to quit. (2 pts)

Ex:

Enter input string:
Jill, Allen
First word: Jill
Second word: Allen

Enter input string:
Golden , Monkey
First word: Golden
Second word: Monkey

Enter input string:
Washington,DC
First word: Washington
Second word: DC

Enter input string:
q

Answers

Answer: ↓NEW↓

#include <stdio.h>

#include <string.h>

int main() {

   char input[100];

   char first[50];

   int i, len;

   while (1) {

       printf("Enter input string:\n");

       fgets(input, 100, stdin);

       len = strlen(input);

       if (len > 0 && input[len-1] == '\n') {

           input[len-1] = '\0';

       }

       if (strcmp(input, "q") == 0) {

           break;

       }

       int found_comma = 0;

       for (i = 0; i < len; i++) {

           if (input[i] == ',') {

               found_comma = 1;

               break;

           }

       }

       if (!found_comma) {

           printf("Error: No comma in string.\n");

           continue;

       }

       int j = 0;

       for (i = 0; i < len; i++) {

           if (input[i] == ' ') {

               continue;

           }

           if (input[i] == ',') {

               first[j] = '\0';

               break;

           }

           if (j < 50) {

               if (input[i] >= 'A' && input[i] <= 'Z') {

                   first[j] = input[i] - 'A' + 'a';

               } else {

                   first[j] = input[i];

               }

               j++;

           }

       }

       printf("First word: %s\n", first);

   }

   return 0;

}

Explanation:

↓OLD↓

#include <stdio.h>

#include <string.h>

int main() {

   char input[100];

   char first[50], second[50];

   int i, len;

   while (1) {

       printf("Enter input string:\n");

       fgets(input, 100, stdin);

       len = strlen(input);

       if (len > 0 && input[len-1] == '\n') { // remove newline character

           input[len-1] = '\0';

       }

       if (strcmp(input, "q") == 0) { // check if user wants to quit

           break;

       }

       // check if input contains a comma

       int found_comma = 0;

       for (i = 0; i < len; i++) {

           if (input[i] == ',') {

               found_comma = 1;

               break;

           }

       }

       if (!found_comma) { // report error if no comma is found

           printf("Error: No comma in string.\n");

           continue;

       }

       // extract first and second words and remove spaces

       int j = 0;

       for (i = 0; i < len; i++) {

           if (input[i] == ' ') {

               continue;

           }

           if (input[i] == ',') {

               first[j] = '\0';

               j = 0;

               continue;

           }

           if (j < 50) {

               if (input[i] >= 'A' && input[i] <= 'Z') { // convert to lowercase

                   first[j] = input[i] - 'A' + 'a';

               } else {

                   first[j] = input[i];

               }

               j++;

           }

       }

       second[j] = '\0';

       j = 0;

       for (i = 0; i < len; i++) {

           if (input[i] == ' ') {

               continue;

           }

           if (input[i] == ',') {

               j = 0;

               continue;

           }

           if (j < 50) {

               if (input[i] >= 'A' && input[i] <= 'Z') { // convert to lowercase

                   second[j] = input[i] - 'A' + 'a';

               } else {

                   second[j] = input[i];

               }

               j++;

           }

       }

       second[j] = '\0';

       printf("First word: %s\n", first);

       printf("Second word: %s\n", second);

   }

   return 0;

}

This program prompts the user for a string that contains two words separated by a comma, and then extracts and removes any spaces from the two words. It uses a loop to handle multiple lines of input, and exits when the user enters "q". Note that the program converts all uppercase letters to lowercase.

Choose the term that matches the action.

: files for patents they never intend to develop

A patent thief

B patent troll

C patent tax

D patent hacker

Answers

Answer:Patent Troll

Explanation:

I just took the quiz lol

Which development approach was used in the article, "Protecting American Soldiers: The Development, Testing, and Fielding of the Enhanced Combat Helmet"? Predictive, adaptive or Hybrid

Answers

The sequential and predetermined plan known as the waterfall model is referred to as the predictive approach.

What is the  development approach

The process entails collecting initial requirements, crafting a thorough strategy, and implementing it sequentially, with minimal flexibility for modifications after commencing development.

An approach that is adaptable, also referred to as agile or iterative, prioritizes flexibility and cooperation. This acknowledges that needs and preferences can evolve with time, and stresses the importance of being flexible and reactive to those alterations.

Learn more about development approach from

https://brainly.com/question/4326945

#SPJ1

The development approach that was used in the article  "Protecting American Soldiers: The Development, Testing, and Fielding of the Enhanced Combat Helmet" is Hybrid approach. (Option C)

How is this so?

The article   "Protecting American Soldiers: The Development, Testing, and Fielding of the Enhanced Combat Helmet" utilizes a hybrid development approach,combining aspects of both predictive and adaptive methods.

Predictive development   involves predefined planning and execution, suitable for stable projects,while adaptive methods allow for flexibility in adapting to changing requirements and environments.

Learn more about development approach at:

https://brainly.com/question/4326945

#SPJ1

code is code that can be inserted directly into a .rmd file. 1 point yaml markdown executable a.inlineb. markdowmc. executabled. YAML

Answers

The correct term is "executable" code that can be inserted directly into a.rmd file

The correct option is A. YAML is code that can be inserted directly into a .rmd file. What is a YAML file? YAML (YAML Ain't Markup Language) is a human-readable data serialization format. It is often used for configuration files and data exchange between languages that are not compatible. It's easy to read and write because it resembles English. What is an RMD file? RMD stands for R Markdown. It's a file format for authoring dynamic documents with R. Markdown syntax is used in R Markdown. It allows users to produce a range of output formats from a single .Rmd file, including HTML, PDF, and Microsoft Word documents.

To know more about code click here

brainly.com/question/17293834

#SPJ11

9. Which of the following is the
leading use of computer?​

Answers

Complete Question:

What is the leading use of computers?

Group of answer choices.

a. web surfing.

b. email, texting, and social networking.

c. e-shopping.

d. word processing.

e. management of finances.

Answer:

b. email, texting, and social networking.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.

Also, social media platforms (social network) serves as an effective communication channel for the dissemination of information in real-time from one person to another person within or in a different location. Both email and social networking involves texting and are mainly done on computer.

Hence, the leading use of computer is email, texting, and social networking.

Which entry by the user will cause the program to halt with an error statement?

# Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")
guess = int(guess)

Multiple Choice
a. 22
b. 2.5
c. -1
d. 3

Answers

Answer:

2.5

Explanation:

The program expects an integer input from the user. This is evident in the second line where the program attempts to convert the input from the user to an integer value.

Please note that the integer value could be negative or positive.

Options (a), (c) and (d) are integer values while option (b) is a floating point value.

Hence, option (c) will halt the program and raise an error because it is not an integer.

Answer:

2.5 for it is a float not an integer

Explanation:

How is the Internet Simulator similar to the Internet?

Answers

Answer:

The internet simulator is similar to the internet because it connects multiple independent devices together to create a web of networks. the internet simulator is also not similar to the internet because the internet simulator is much slower than the actual internet because it transmits data bit by bit.

Explanation:

The Internet, as well as the Internet simulator, would be comparable in that they both connect many devices to establish communication. A further explanation is provided below.

Internet Simulator: It seems to be a technology meant to assist learners throughout obtaining practical learning or knowledge in addressing various difficulties associated with interconnected computing devices.Internet: A worldwide networking system that links computers all across the entire globe, is described as the internet.

Thus the above response is correct.

Learn more about the internet here:

https://brainly.com/question/17971707

How is the Internet Simulator similar to the Internet?

84 104 101 32 97 110 115 119 101 114 32 105 115 32 53 48 33 There's a way to make this meaningful; find it!

Answers

The question is about identifying the various ways of manipulating numbers. One of such is using following pair:

Input Format: Decimal ASCIITransformed Output String.

Using the above process, the result given is 50.

What is ASCII?

ASCII is the acronym for American Standard Code for Information Interchange.

Another way of approaching the above problem is by bucketizing.

The act of describing a problem, discovering the origin of the problem, finding, prioritizing, and selecting alternatives for a solution, and executing a solution is known as problem solving.

Similarly, bucketizing is a data organizing technique that decomposes the space from which geographic data is gathered into areas.

Some criteria for selecting area borders include the amount of things contained inside them or their physical arrangement (e.g. minimizing overlap or coverage).

A bucket data structure utilizes key values as bucket indices and stores things with the same key value in the appropriate bucket.

As a result, the job necessary to address the problem is completed.

Learn more bout Decimal ASCII:
https://brainly.com/question/26307436
#SPJ1

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

1. Create a Java program that asks the user for three
numbers using the Scanner class, and outputs the
smallest number.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class SmallestNumber {

public static void main(String[] args) {

Scanner scanner = new Scanner(System.in);

System.out.print("Enter the first number: ");

int num1 = scanner.nextInt();

System.out.print("Enter the second number: ");

int num2 = scanner.nextInt();

System.out.print("Enter the third number: ");

int num3 = scanner.nextInt();

int smallest = num1;

if (num2 < smallest) {

smallest = num2;

}

if (num3 < smallest) {

smallest = num3;

}

System.out.println("The smallest number is: " + smallest);

}

}



2.7.1: LAB: Smallest of two numbers

Write a program whose inputs are two integers, and whose output is the smallest of the two values.

Ex: If the input is:

7
15
the output is:

7

Answers

Here's an example code in Python:

a = int(input("Enter first number: "))

b = int(input("Enter second number: "))

print("The smallest of the two numbers is", min(a, b))

Program:

def find_smallest(a, b):

   if a < b:

       return a

   else:

       return b

num1 = int(input())

num2 = int(input())

print(find_smallest(num1, num2))

How to determine the smallest value between integers?

To determine the smallest value between two integers, you can use a simple Python program like the one provided. The program defines a function find_smallest that takes two integers as input and compares them using an if-else statement.

It returns the smaller value. By taking user inputs and calling this function, the program then prints the smallest value. This approach helps in finding the smaller value without using conditional phrases like "can."

Read more about Programs

brainly.com/question/30783869

#SPJ2

What word does
this pattern spell?
d.

What word doesthis pattern spell?d.

Answers

Answer:

BEG

Explanation:

In traditional music theory, pitch classes are typically represented by first seven Latin alphabets (A,B,C,D,E ,F and G) . And in the below music notes attachment we can understand that the answer is option (a) BEG

What word doesthis pattern spell?d.

Determine the value for the following recursive method when x = 19.

Determine the value for the following recursive method when x = 19.

Answers

Answer:

\(f(19) = 2\)

Explanation:

Given

\(f(x) = f(x - 5)+ 2\) --- \(x > 9\)

\(f(x) = -2\) --- \(x \le 9\)

Required

Find f(19)

f(19) implies that: x = 19

Since 19 > 9, we make use of:

\(f(x) = f(x - 5)+ 2\)

\(f(19) = f(19 - 5) + 2\)

\(f(19) = f(14) + 2\) ----- (1)

Calculate f(14)

f(14) implies that: x = 14

Since 14 > 9, we make use of:

\(f(x) = f(x - 5)+ 2\)

\(f(14) = f(14 - 5) + 2\)

\(f(14) = f(9) + 2\) ------ (2)

Calculate f(9)

f(9) implies that: x = 14

Since \(9 \le 9\), we make use of:

\(f(x) = -2\)

\(f(9) = -2\)

So:

\(f(14) = f(9) + 2\)

\(f(14) = -2 + 2\)

\(f(14) = 0\)

\(f(19) = f(14) + 2\)

\(f(19) = 0 + 2\)

\(f(19) = 2\)

How does the OS used and the specific applications on the system impact selection of a file management system?

Answers

Answer:

Explanation:

The functions of a file manager include the following.

The ability to format and copy disks

Listing of files in a storage channel.

A regular routine check of space used and unused space in the storage device.

The ability to organize, copy, move, delete, sort, or create shortcuts.

Storage and retrieval of data for the storage device. etc

In contrast, the system has some of the following functions.

Assigning queued document numbers for processing- Applications and Operating system dependent

Owner and process mapping to track various stages of processing - Operating system dependent

Report generation - Applications and Operating system dependent

Status - Operating system dependent

Create, modify, copy, delete, and other file operations - Operating system dependent

We can thereby conclude that file management system is dependent on OS and specific applications.

So this one is puzzling me and my boss asked if I could look into it. She received an email from Ulta beauty about a big sale they were having that only lasted a few hours. She went back later in the day and pulled up the exact same email and the text/picture inside the body of the email had magically changed saying "this event has ended." So how is that possible? How can the text change in an email already sent?? Help me understand!

Answers

Normally we cannot edit email that already sent but , we can edit mail through:

Click Sent Items in the Navigation Pane of Mail.

How can we edit email?e-mail, or electronic mail, refers to messages sent and received by digital computers via a network. An e-mail system allows computer users on a network to communicate with one another by sending text, graphics, sounds, and animated images.Open the message you want to replace and recall. Click Other Actions in the Actions group on the Message tab, and then click Recall This Message. Delete unread copies and replace with a new message or Delete unread copies and replace with a new message are the options.

To learn more about email refer to :

https://brainly.com/question/28073823

#SPJ1

A Quicksort (or Partition Exchange Sort) divides the data into 2 partitions separated by a pivot. The first partition contains all the items which are smaller than the pivot. The remaining items are in the other partition. You will write four versions of Quicksort:
• Select the first item of the partition as the pivot. Treat partitions of size one and two as stopping cases.
• Same pivot selection. For a partition of size 100 or less, use an insertion sort to finish.
• Same pivot selection. For a partition of size 50 or less, use an insertion sort to finish.
• Select the median-of-three as the pivot. Treat partitions of size one and two as stopping cases.
As time permits consider examining additional, alternate methods of selecting the pivot for Quicksort.

Merge Sort is a useful sort to know if you are doing External Sorting. The need for this will increase as data sizes increase. The traditional Merge Sort requires double space. To eliminate this issue, you are to implement Natural Merge using a linked implementation. In your analysis be sure to compare to the effect of using a straight Merge Sort instead.

Create input files of four sizes: 50, 1000, 2000, 5000 and 10000 integers. For each size file make 3 versions. On the first use a randomly ordered data set. On the second use the integers in reverse order. On the third use the
integers in normal ascending order. (You may use a random number generator to create the randomly ordered file, but it is important to limit the duplicates to <1%. Alternatively, you may write a shuffle function to randomize one of your ordered files.) This means you have an input set of 15 files plus whatever you deem necessary and reasonable. Files are available in the Blackboard shell, if you want to copy them. Your data should be formatted so that each number is on a separate line with no leading blanks. There should be no blank lines in the file. Even though you are limiting the occurrence of duplicates, your sorts must be able to handle duplicate data.

Each sort must be run against all the input files. With five sorts and 15 input sets, you will have 75 required runs.

The size 50 files are for the purpose of showing the sorting is correct. Your code needs to print out the comparisons and exchanges (see below) and the sorted values. You must submit the input and output files for all orders of size 50, for all sorts. There should be 15 output files here.

The larger sizes of input are used to demonstrate the asymptotic cost. To demonstrate the asymptotic cost you will need to count comparisons and exchanges for each sort. For these files at the end of each run you need to print the number of comparisons and the number of exchanges but not the sorted data. It is to your advantage to add larger files or additional random files to the input - perhaps with 15-20% duplicates. You may find it interesting to time the runs, but this should be in addition to counting comparisons and exchanges.

Turn in an analysis comparing the two sorts and their performance. Be sure to comment on the relative numbers of exchanges and comparison in the various runs, the effect of the order of the data, the effect of different size files, the effect of different partition sizes and pivot selection methods for Quicksort, and the effect of using a Natural Merge Sort. Which factor has the most effect on the efficiency? Be sure to consider both time and space efficiency. Be sure to justify your data structures. Your analysis must include a table of the comparisons and exchanges observed and a graph of the asymptotic costs that you observed compared to the theoretical cost. Be sure to justify your choice of iteration versus recursion. Consider how your code would have differed if you had made the other choice.

Answers

The necessary conditions and procedures needed to accomplish this assignment is given below. Quicksort is an algorithm used to sort data in a fast and efficient manner.

What is the Quicksort?

Some rules to follow in the above work are:

A)Choose the initial element of the partition as the pivot.

b) Utilize the same method to select the pivot, but switch to insertion sort as the concluding step for partitions that contain 100 or fewer elements.

Lastly,  Utilize the same method of pivot selection, but choose insertion sort for partitions that are of a size equal to or lesser than 50 in order to accomplish the task.

Learn more about Quicksort  from

https://brainly.com/question/29981648

#SPJ1

Barbarlee suspected and found a loophole in the university computer's security system that allowed her to access other students' records. She told the system administrator about the loophole, but continued to access others' records until the problem was corrected 2 weeks later. Was her actions unethical or not. Explain your position? What should be the suggested system administrators response to Barbarlee's actions? How should the university respond to this scenario?​

Answers

Answer:

Explanation:

I can give you my opinion on the matter, not sure if this was taught to you or not so please take it with a grain of salt.

Her actions are highly unethical and even illegal to some extent. Especially in USA, FERPA prevents random people from accessing your educational records without your permission and there's hundreds of universities with their own rules/regulations on protecting students' privacy. The sys admin should have first recorded this event when she reported it and then actually went into the system to see if unwanted access has been done by any user(s). University should look at disciplinary actions since the person willingly accessed the system even after they reported the bug and also let ALL the university student/faculty/staff know of the problem and how they plan on fixing it.

This is only a summary, and this is my opinion. please expand in places where needed.

I found another answer in go.ogle:

I feel the actions of this person were unethical.

The student's action in searching for the loophole was neither definitively ethical nor unethical, as their motives are unclear.

The student's action in continuing to access records for two weeks was unethical, as this is a violation of privacy.

The system admin's failure to correct the problem could be considered unethical, but it is difficult to surmise, as there are not enough details.

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. g

Answers

Answer:

The program in Python is as follows:

string = input("String: ")

chr = input("Character: ")[0]

total_count = string.count(chr)

print(total_count,end=" ")

if total_count > 1:

   print(chr+"'s")

else:

   print(chr)

Explanation:

This gets the string from the user

string = input("String: ")

This gets the character from the user

chr = input("Character: ")[0]

This counts the occurrence of the character in the string

total_count = string.count(chr)

This prints the total count of characters

print(total_count,end=" ")

If the count is greater than 1

if total_count > 1:

Then it prints a plural form

   print(chr+"'s")

If otherwise

else:

Then it prints a singular form

   print(chr)

is it true guyz!
if its true
mag handa na tayo pag totoo
kasi nabasa ko din sa bible​

is it true guyz!if its truemag handa na tayo pag totookasi nabasa ko din sa bible

Answers

Answer:

wdbqdduwdhqacwuihdqwuihdowu

Explanation:

wddwddaascaca

In 5-6 sentences explain how technology has impacted engineers.

Answers

Answer:

gissa vem som är tillbaka, tillbaka igen

Explanation:

translate it pls

I need help finishing this coding section, I am lost on what I am being asked.

I need help finishing this coding section, I am lost on what I am being asked.
I need help finishing this coding section, I am lost on what I am being asked.
I need help finishing this coding section, I am lost on what I am being asked.

Answers

Answer:

when cmd is open tell me

Explanation:

use cmd for better explanatios

You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network?
A. The client is only able to get line of sight with an omnidirectional antenna.
B. The client is using a network adapter with outdated firmware.
C. The client has a wireless profile configured for the ""campus"" SSID, but the access point is broadcasting the ""CAMPUS"" SSID.
D. The client is using an 802.11n wireless adapter, but the access point only supports up to 802.11g.

Answers

The option that will prevent the client from connecting to the network is option  C. The client has a wireless profile configured for the ""campus"" SSID, but the access point is broadcasting the ""CAMPUS"" SSID.

What is the most typical wireless service issue?

Some of the most frequent network connection problems that IT departments need to solve include slow network speeds, weak Wi-Fi signals, and damaged cabling.

There is some form of network connectivity on a wireless device. If a laptop or PDA had a wireless modem, they would also be wireless, just like a cell phone. Applications are wireless when they connect to a network and exchange data with it.

Therefore, one can still say that the  interference causes are:

Physical obstacles.Interference in frequency.Wireless Technology

Learn more about troubleshooting  from

https://brainly.com/question/14394407

#SPJ1

Do you think that it is acceptable to base employment decisions solely on historical data?
No, the historical data may be biased against some candidates.
Yes, because knowing what worked before leads to choosing qualified candidates.
No, previous decisions should not be considered.
Yes, since the data can be used to create a decision-making algorithm.

Answers

Answer:

no

Explanation:

No, the historical data may be biased against some candidates.

The employment decisions should base solely on historical data because the data can be used to create a decision-making algorithm.

What is historical data?

A historical data is the data that is collected based on past events and circumstances concerning an individual during an employment or about an organisation.

Employment decisions by human resource officers should be based solely on the historical data of their employees because it will give them insight on final decision to make.

Learn more about data here:

https://brainly.com/question/26711803

#SPJ2

Prepare Mounthly Payroll to xy Company which Calculate Tax, Pension Allowance, over time and Vet for each employce​

Answers

Make a payroll calculation using ADP® Payroll. Get 3 Months of Payroll Free! ADP® Payroll makes the payroll process quicker and simpler. Get ADP® Payroll Started Today! Time and presence. IRS tax deductions.

How do you calculate Monthly Payroll ?

You're ready to determine the employee's pay and the amount of taxes that must be deducted once you've set up your employees (and your firm, too). Making appropriate deductions for things like health insurance, retirement benefits, or garnishments, and, if necessary, adding back reimbursements for expenses. Going from gross compensation to net pay is the technical word for this.

Feel free to jump to the step you're searching for if you're having trouble understanding a particular one: First, determine your gross pay. Step 2: Determine the employee tax with holdings for 2019 or earlier and 2020 or later. Add any expense reimbursements in step four. Step 5: Compile everything.

To learn more about Payroll refer to :

https://brainly.com/question/30086703

#SPJ1

Read the following statement:

if(x > 5 and x < 10):

Which values of x make the if condition true? (5 points)

5, 6, 7, 8, 9
5, 6, 7, 8, 9, 10
6, 7, 8, 9
1, 2, 3, 4, 5, 6, 7, 8, 9

Answers

The values of x make the if condition true is 6, 7, 8, 9.

The statement "if(x > 5 and x < 10)" represents a conditional statement that checks if the value of x falls within the range of numbers greater than 5 and less than 10. To determine the values that make this condition true, we need to examine the range between 5 and 10, excluding the boundary values.

The condition explicitly states that x must be greater than 5 and less than 10. By satisfying both parts of the condition, the values of x that make the if condition true are 6, 7, 8, and 9.

These values meet the criteria of being greater than 5 and less than 10. It is important to note that the condition specifically excludes the values of 5 and 10. Therefore, they are not considered true for the given condition.

The values of x that make the if condition "x > 5 and x < 10" true are 6, 7, 8, and 9. Any values below 6 or equal to or greater than 10 do not satisfy both parts of the condition and  would not make the if statement true.

Correct option is 6, 7, 8, 9.

For more such questions on Condition

https://brainly.com/question/30848414

#SPJ11

Hello I take computer science and i just wanted to know if somone could do this and explain to me how. thank you!

(100 points)

Hello I take computer science and i just wanted to know if somone could do this and explain to me how.

Answers

Answer:

We are provided with three sets of assembly language instructions, and for each set, we need to understand the order in which memory addresses and contents are accessed.

Diagram A:

LDD 106

This instruction means "Load Direct to the accumulator from address 106." The accumulator is a special register in the processor used to hold data for arithmetic or logical operations. In this case, the value stored at memory address 106 (which is 114) will be loaded into the accumulator.

Diagram B:

LDI 104

This instruction means "Load Indirect to the index register from address 104." The index register is another special register in the processor, typically used for memory addressing calculations. Here, the value stored at memory address 104 (which is 100) will be loaded into the index register.

Diagram C:

LDR #3

This instruction means "Load immediate value 3 into the accumulator." Instead of accessing memory, this instruction loads an immediate value (in this case, 3) directly into the accumulator.

LDX 101

This instruction means "Load Direct to the index register from address 101." The value stored at memory address 101 (which is 104) will be loaded into the index register.

To summarize, each diagram represents a different set of assembly language instructions, and the memory addresses and contents accessed are as follows:

Diagram A:

Address 106: Content 114 (loaded into the accumulator)

Diagram B:

Address 104: Content 100 (loaded into the index register)

Diagram C:

No memory address accessed for LDR #3 (immediate value 3 loaded into the accumulator)

Address 101: Content 104 (loaded into the index register)

I hope my explanation has made it easier for you to comprehend these assembly language instructions and the memory accesses they need.

Given the string “supercalifragilisticexpialidocious”.
1. What is the length of the string i.e. write the script to find the length? (2 points)
2. Find the sub-string of first 5 positions and the other sub-string with last 5 positions. (4 points)
3. Find how many times “i” occurs in this word in python

Answers

The string and the three instructions is an illustration of the python strings

The length of the string

The following instruction calculates the length of the string using the Python script:

len("supercalifragilisticexpialidocious")

The returned value of the above instruction is: 34

The substrings

The following instruction calculates the sub-string of first 5 positions and the other sub-string with last 5 positions

myStr[:5]+myStr[-5:]

The returned string of the above instruction is: "supercious"

The number of occurrence of i

The following instruction calculates the occurrences of i in the string

"supercalifragilisticexpialidocious".count("i")

The returned value of the above instruction is: 7

Read more about python strings at:

https://brainly.com/question/13795586

Other Questions
Consider the following information: Rate of Return If State Occurs State of Probability of Stock C Economy State of Economy Stock A Stock B Boom Good Poor Bust .20 .25 .10 45 .19 .16 .05 .38 .23 -.09 Which statement best identifies how the passage reflects a quest archetype? A. The main character makes the journey alone to reach the destination. B. The main character must battle a supernatural being to survive. C. The main character takes a dangerous journey encountering foes. D. The main character is symbolically reborn following the shipwreck. A medical equipment industry manufactures X-ray machines. The unit cost C (the cost in dollars to make each X-ray machine) depends on the number ofmachines made. If x machines are made, then the unit cost is given by the function C(x)=0.9x-414x+52,794. How many machines must be made to minimize the unit cost?Do not round your answer.Number of X-ray machines= If an observation period is divided into a number of time periods, and the behavior is recorded during only part of each interval it is called ______________ recording. An ________ is the process by which two pieces of information from the environment are repeatedly linked, so that we begin to connect them in our minds. How many times will the print statement execute? for i in range (10) : for j in range (3): print('{:d}. {:d}'.format(1, 3)) O 3 10 O 13 30 Underline the conjunction in each sentence. Tell whether it connects subjects, predicates, direct objects, or sentences. 3. __________ Earth Creationists believe that the Ice Age had to occur sometime within the last 6,000 years, probably around 4,000 years ago, and that there was one ice age that occurred shortly after Noahs Flood and lasted for about 700 years. answer chooses YoungCreationOld PLEASE ANSWER ASAP WILL MARK BRAINLIEST!!Find the surface area of a rectangular prism that has the following dimensions.length: 4.5 in.width: 6 in.height: 12 in.surface area = ____ in^2 What is the value of X?Enter your answer in the box why should him professionals be aware of laws affecting the management of personnel? What did Pound draw from in Whitman's poetry, and what did he want to change? Family influence has a large impact on individuals suffering from somatoform disorders, especially if there is awith the same diagnosis.A female relativeB. male relativeC. parentD. sibling Suppose in Autarky they produce Betty: 1 F and 1C Ann: 1F and 2C What is the total produced? If each specializes in the production of the good in which she has comparative advantage, then how much will each produce? What will be the total produced? What will be the gain from specializatio? What will be the range for the terms-of-trade (TOT)? (i) Draw the social PPF for this society if these are the only two individuals in this society. Assume that Betty and Ann live on a desert island. With a day's labor they can either catch fish (F) or collect coconuts (C). The individual RPAs are given by the following equations: According to Strain and Hammeter, what can teachers do so that they become more comfortable with disturbing behavior?A. Remove the child from the class so that the teacher can be more effective with the other childrenB. Report the family to social services since the parents have not been involved with trying to solve the child's problemC. Focus on small successes and avoid blaming parents or other uncontrollable eventsD. Stop looking at why the child is misbehaving and just intervene by providing consequences for the misbehavior Select the true statement about arbitration as a conflict resolution technique.1. Arbitration is often preferred to litigating a dispute in court because it preserves confidentiality.2. Businesses often seek alternative conflict resolution processes to arbitration because their disputes can be quite technical and difficult for arbitrators to understand.3. An arbitration award is only binding if both parties to the dispute agree to the decision.4. An arbitration tribunal selects the arbitrator that will be used to decide the outcome of a dispute. Which of the following are components of the compensation package for production workers at your company's plants?a. Annual base salary, teamwork bonuses, fringe benefits, and stock optionsb. Weekly salary, fringe benefits, year-end bonuses tied to the number of non-defective pairs produced, and overtime payc. Hourly wages, fringe benefits, and overtime payd. Base wages, incentive payments per non defective pair produced, and overtime paye. Annual base pay, piecework incentives per pair produced, perfect attendance bonuses at best practices training programs, stock options, fringe benefits, and overtime pay 20% de los animales en un centro de rescate de animales son gatos. Qu porcentaje son perros? What is the circumferance of a sphere 1. How would you describe the economic transactions described in the document? To what extent were they conducted between equal parties? Who, if anyone, held the upper hand in these dealings? 2.How might an African merchant have described the same transaction? How might Equiano describe it?3.Notice the outcome of Phillips voyage to Barbados in the last two paragraphs. What does this tell you about European preferences for slaves, about the middle passage, and about the profitability of the enterprise?Source: The Interesting Narrative of the Life of Olaudah Equiano (1789)