Watchman-Allocation-For-Security Problem: (100 pts)
Imagine that you are a security officer and a guest president’s visit to your country is planned. Your
responsibility is to decide about allocation of watchmansto junction points of a single storey building having
several hallways. Each watchman situated at an hallway junction is responsible from watching all the
hallways connected to the junction point and inform you about possible insecure event that may happen.
In order to minimize your government’s expenditure, you need to achieve your allocation task by assigning
minimum number of watchmans to the junction locations.
i. Design an algorithm that aims to solve the watchman-allocation-for-security problem
efficiently. Write down a report that explains each step of your design solution, clearly (30
points)
ii. Implement the algorithm that you designed in part(i). The format of your sample input and
output is given below. Do NOT hard-code the sample problem input instance below but
read the sample input either from the screen or from a text file (60 points)
iii. Analyze your algorithm’s time complexity SAMPLE INPUT:
11 // Number of hallway junctions of the single storey building ()
2 4 5 // The junction IDs to which Junction #1 is connected through an hallway
1 // The junction IDs to which Junction #2 is connected through an hallway
5 6 // The junction IDs to which Junction #3 is connected through an hallway
1 5 8 // The junction IDs to which Junction #4 is connected through an hallway
1 3 4 // The junction IDs to which Junction #5 is connected through an hallway
3 7 10 // The junction IDs to which Junction #6 is connected through an hallway
6 11 // The junction IDs to which Junction #7 is connected through an hallway
4 9 // The junction IDs to which Junction #8 is connected

Answers

Answer 1

The watchman-allocation-for-security problem involves determining the minimum number of watchmen needed to secure a single-story building with multiple hallways. A watchman stationed at a hallway junction is responsible for monitoring all connected hallways and reporting any security concerns. To solve this problem efficiently, an algorithm can be designed as follows:

1. Create a graph representation of the hallway junctions and their connections.

2. Initialize an empty set to store the allocated watchmen.

3. Sort the hallway junctions in descending order based on the number of connections.

4. Iterate through each junction:

  a. If the junction is not already allocated a watchman, assign a new watchman to it and add it to the allocated set.

  b. Mark all connected junctions as allocated.

5. The number of watchmen allocated is the size of the allocated set.

The problem is approached by representing the hallway junctions and their connections as a graph, where each junction is a node and the connections are edges. The algorithm prioritizes allocating watchmen to junctions with the highest number of connections first to ensure maximum coverage. By iterating through each junction and checking if it has been allocated a watchman, we can assign a new watchman if needed and mark the connected junctions as allocated. Finally, the number of watchmen allocated is determined by the size of the allocated set.

This algorithm efficiently solves the watchman-allocation-for-security problem by minimizing the number of watchmen needed while ensuring adequate coverage of the building. It optimizes resource allocation and reduces government expenditure. The time complexity of the algorithm depends on the specific implementation and the efficiency of graph operations such as node and edge traversal.

To learn more about Algorithm - brainly.com/question/21172316

#SPJ11


Related Questions

017. A process identifier (a) includes IP address and port number (b) is only a port number (c) is used to address processes when processes in different hosts communicate (d) is the combination of local port number, and remote port number

Answers

A process identifier is the combination of local port number, and remote port number. (option d)

A process identifier, also known as a port number, is used in computer networking to identify a specific process or application running on a computer. The combination of the local port number and the remote port number is what identifies a specific process or connection between two processes.

When two processes communicate with each other over a network, they use their process identifier to establish a connection and send and receive data. The local port number identifies the process on the sender's computer, while the remote port number identifies the process on the recipient's computer.

Learn more about port number here:

https://brainly.com/question/14671890

#SPJ11

does anyone know how to make a astronaut hop while using loop?

Answers

Answer:

In Java

Explanation:

package application;

import java.util.Scanner;

import entities.Astronaut;

public class Main {

public static void main(String[] args) {

 Scanner sc = new Scanner(System.in);

 

 System.out.print("How is the astronaut's energy in a scale of 0 to 100? ");

 int energy = sc.nextInt();

 

 Astronaut fakeArmstrong = new Astronaut();

 

 while (energy > 0) {

  fakeArmstrong.hop();

  energy--;

 }

 

 System.out.println("The astronaut is tired eh? Let him rest you psychopato");

 sc.close();

}

}

----------------------------------------------------------------------------------------------

package entities;

public class Astronaut {

private int bodyEnergy;

 

public Astronaut() {

 

}

 

 

public int getBodyEnergy() {

 return bodyEnergy;

}

public void hop() {  

 System.out.println("up and down!");    

}

}

Write a program that computes the average number of hours a student spends on scriptingand mathassignments over a long weekend.

Answers

The provided steps and code demonstrate how to write a program in Python that calculates the average number of hours a student spends on scripting and math assignments over a long weekend. User inputs and a loop are utilized to compute the average.

To write a program that computes the average number of hours a student spends on scripting and math assignments over a long weekend, you can follow these steps:

Define a variable to keep track of the total number of hours spent on assignments.Define a variable to keep track of the number of assignments completed.Ask the user for the number of days in the long weekend.Use a loop to iterate over each day of the long weekend.Inside the loop, ask the user for the number of hours spent on scripting and math assignments for that day.Add the number of hours to the total number of hours spent on assignments and increment the number of assignments completed.After the loop, calculate the average number of hours by dividing the total number of hours by the number of assignments completed.Display the average number of hours to the user.

Here is a Python code example to implement this program:

```python
total_hours = 0
num_assignments = 0

num_days = int(input("Enter the number of days in the long weekend: "))

for day in range(1, num_days+1):
   hours = int(input("Enter the number of hours spent on scripting and math assignments for day {}: ".format(day)))
   total_hours += hours
   num_assignments += 1

average_hours = total_hours / num_assignments

print("The average number of hours spent on scripting and math assignments over the long weekend is: {:.2f}".format(average_hours))
```

Please note that this code assumes the user will input valid integers for the number of days and hours spent on assignments. You can add error handling and validation if needed.

Learn more about Python : brainly.com/question/26497128

#SPJ11

A data set includes data from 500 random tornadoes. The display from technology available below results from using the tornado lengths​ (miles) to test the claim that the mean tornado length is greater than 2.2 miles. Use a 0.05 significance level. Identify the null and alternative​ hypothesis, test​ statistic, P-value, and state the final conclusion that addresses the original claim. LOADING... Click the icon to view the display from technology. What are the null and alternative​ hypotheses

Answers

Answer:

The answer is:

\(H_0:\mu=2.2\\H_1:\mu> 2.2\)

Explanation:

\(H_0:\mu=2.2\\H_1:\mu> 2.2\)

The test value of statistic t= \(\frac{\bar x-\mu}{\frac{s}{\sqrt{n}}}\)

                                               \(=\frac{2.31688-2.2}{0.206915}\\\\=0.56\)

The value of P = P(T>0.56)

                          =1-P(T<0.56)

                          =1-0.712

                          =0.288

Since the P value exceeds its mean value (0.288>0.05), the null assumption must not be rejected.  Don't ignore H0. This assertion, it mean length of the tornado is greater than 2.2 miles also isn't backed by enough evidence.

What type of document would typically be printed on a plotter?

Answers

Architectural and engineering drawings are typically printed on a plotter.

Plotters are large-format printers specifically designed for printing technical drawings, blueprints, and other large-scale graphical documents. They are commonly used in industries such as architecture, engineering, and construction where precise and detailed drawings are required.

Architectural drawings, such as floor plans, elevations, and site plans, often contain intricate details and precise measurements. These drawings are typically created using Computer-Aided Design (CAD) software and are best suited for printing on plotters due to their large size and the need for accurate scaling.

Engineering drawings, including mechanical, electrical, and structural designs, also require the use of plotters. These drawings often involve complex diagrams, schematics, and technical specifications that need to be printed on larger paper sizes. Plotters can reproduce these detailed drawings with high precision and clarity, ensuring that every element is accurately represented.

Moreover, plotters are capable of printing on various media types, including different types of paper, vellum, and even glossy materials. This versatility allows for printing on specialized media required for specific applications.

In summary, architectural and engineering drawings are the types of documents that are typically printed on plotters. Plotters excel at reproducing large-scale technical drawings accurately, making them an essential tool for professionals in the architecture, engineering, and construction fields.

Learn more about Architectural here

https://brainly.com/question/30955292

#SPJ11

transport layer protocols, like tcp and udp, introduce the concept of a port. how many bits is a port field?

Answers

The correct answer is transport layer protocols, like tcp and udp 16-bit number, meaning there are theoretically 65,535 possible values it can have.

TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. A key difference between TCP and UDP is speed, as TCP is comparatively slower than UDP. Overall, UDP is a much faster, simpler, and efficient protocol, however, retransmission of lost data packets is only possible with TCP.

To learn about tcp and udp click the link below:

brainly.com/question/16984740

#SPJ4

What best describes the purpose of the Occupational Safety and Health Administration (OSHA)?
to fine negligent employers and businesses
to provide safety equipment to businesses
to promote the use of hardhats at work
to protect the health and safety of workers

Answers

To protest the health and safety of workers

The main purpose of the Occupational Safety and Health administration is to protect the health and safety of workers

OSHA is an acronyms for Occupational Safety and Health Administration who's administration is mainly responsible for workplace safety.

Therefore, the Option D is correct.

Read more about OSHA

brainly.com/question/17667993

Suppose a heap is stored in an array list as follows: {100, 55, 92, 23, 33, 81}. After inserting 103, what is the content of the array list

Answers

After inserting 103 in the array list  [100, 55, 92, 23, 33, 81], the content of the array list will be [100, 55, 92, 23, 33, 81, 103].

How to insert in an array list?

The code is written in python.

list1 = [100, 55, 92, 23, 33, 81]

list1.insert(7, 103)

print(list1)

Code explanationWe declared a list named list1  and stored integers in it.Then, we use the insert statement to insert 103 at the index 1.Finally, we print the list1.

Therefore, inserting 103 in the list will make 103 appear in the new list depending on the index position.

learn more on python here: https://brainly.com/question/17216747

#SPJ4

What is the term for the psychology, reasoning, and history behind a character's reactions in certain situations?

Answers

There are a lot of factors in behavioral neuroscience. For starters, there are social-cultural influences and biological and psychological influences. You can operate on a social script ( an action made off of previously perceived scenarios)
Most teenagers operate off of social-cultural psychology, primarily because of propaganda on TV, family traditions, etc.
Psychological factors like cognition could serve as a trait for situations.
Biological traits like testosterone, bipolar disorder, etc. It can affect these situations.

Which correctly calls the add() function?
def add(a, b, c):
print(a + b + c)
add(2; 4; 6)
add(2 4 6)
add(2, 4, 6)
add(2 + 4 + 6)

Answers

The correct option is add(2, 4, 6) ,it is a correct function call to the add() function.

How to correctly call a function?

The correct function call to the add() function is add(2, 4, 6). In this call, the function is invoked with three arguments: 2, 4, and 6, which are separated by commas.

This syntax follows the standard convention for passing multiple arguments to a function in many programming languages.

The semi-colon (;) is not used to separate arguments in a function call. It is a syntax error to write add(2; 4; 6) as shown in the second option.

Similarly, in the third option add(2 4 6), the absence of commas between the arguments is incorrect and would result in a syntax error.

The fourth option add(2 + 4 + 6) is also incorrect because it attempts to perform addition within the function call itself.

Instead, the individual values should be passed as separate arguments to the function, as shown in the correct function call example.

Learn more about function

brainly.com/question/31062578

#SPJ11

4.9 question 2 edhesive
Anyone know how to do this???

Answers

I've included my code in a picture. I hope this helps!

4.9 question 2 edhesive Anyone know how to do this???

Answer:

sum = 0

for x in range (20, 91, 10):

   sum= sum + x

   print(sum)

 

Explanation:

Design a combinational circuit with four input lines that represent a decimal digit in BCD and four output lines that generate the 9's complement of the input digit. Provide a fifth output that detects an error in the input BCD number. This output should be euqal to logic 1 when the four inputs have one of the unused combinations of the BCD code. Try to minimize the amount of IC's used.

Answers

A combinational circuit with four input lines that represent a decimal digit in BCD and four output lines that generate the 9's complement of the input digit is shown below.

One additional output detects an error in the input BCD number. When the four inputs have one of the unused combinations of the BCD code, this output is high.The circuit can be constructed using one 7486 XOR gate, one 7400 NAND gate, and one 7404 NOT gate.

To design a combinational circuit with four input lines that represent a decimal digit in BCD and four output lines that generate the 9's complement of the input digit, follow these steps:

1. To get a four-digit BCD number, four input lines are needed. Let's say A, B, C, and D are the four input lines.

2. Determine the 9's complement of the BCD number.

(a) In each digit, subtract the digit from 9.

(b) Add 1 to the least important digit.

(c) Ignore the carry generated by the least important digit.

3. To obtain four output lines for the 9's complement, use an XOR gate (7486) for each digit.

4. Combine the outputs of these gates using a NAND gate (7400) to get the 9's complement of the input digit.

5. Use a NOT gate (7404) to obtain the output of the error-detection circuit.

To more about XOR gate visit:

https://brainly.com/question/30403860

#SPJ11

The city of ottawa has a land-use plan for one of its communities.
it wants to distribute part of a 517 ha area as follows:

residential 196 ha
roads 75 ha
green space 55 ha
businesses 111 ha

what percent of the 517 ha is designated for each type of land use?

Answers

Residential: 37.92%, Roads: 14.50%, Green space: 10.64%, Businesses: 21.45%

What are the percentages of land designated for residential, roads, green space, and businesses in the city of Ottawa's land-use plan for one of its communities?

To determine the percentage of land designated for each type of land use, we divide the area of each type by the total area (517 ha) and multiply by 100 to convert it to a percentage.

Residential: (196 ha / 517 ha) ˣ 100% = 37.92%Roads: (75 ha / 517 ha) ˣ 100% = 14.50%Green space: (55 ha / 517 ha) ˣ 100% = 10.64%Businesses: (111 ha / 517 ha) ˣ 100% = 21.45%

Therefore, the land-use plan designates approximately 37.92% for residential, 14.50% for roads, 10.64% for green space, and 21.45% for businesses.

Learn more about Residential

brainly.com/question/19250395

#SPJ11

limitation of the 8-bit extended ASCII character set is that it can only represent up to 128 explain how can these limitations can be overcome?

Answers

use more bits to allow for more characters for example unicode uses i think up to 32 bit

Create a C++ program that will accept five (5) numbers using the cin function and display the numbers on different lines with a comma after each number.

Answers

Answer:

code:

#include<iostream>

using namespace std;

int main()

{

//declare an array of size 5

int array[5];

cout<<"Enter the numbers"<<endl;

//applying the for loop

for(int i=0;i<5;i++)

{

   //taking the input from user

   cin>>array[i];

}

cout<<"The Entered numbers are : "<<endl;

for(int i=0;i<5;i++)

{

   //displaying the output

   cout<<array[i]<<", "<<endl;

}

return 0;

}

Explanation:

First of all you will declare an array of size 5

then you are going to apply the for loop logic where you will take input from the user

again you will apply the for loop to print the entered numbers on screen

#include <iostream>

int store[5];

int main() {

   

   for(int i=0;i<5;i++) {

       std::cin>>store[i];

   }

   

   for(auto& p:store) {

       std::cout << p << ",\n";

   }

   return 0;

}

what is the output from the following java program? (assume that a tab is expanded into eight spaces.) public class letter {

Answers

The output from the following java program is given below:

public class Letter {

   public static void main(String[] args) {

       System.out.println("Dear \"DoubleSlash\" magazine,");

       System.out.println();

       System.out.println("\tYour publication confuses me.  Is it");

       System.out.println("a \\\\ slash or a //// slash?");

       System.out.println("\nSincerely,");

      System.out.println("Susan \"Suzy\" Smith");

   }

}

The Output

Dear "DoubleSlash" magazine,

       Your publication confuses me.  Is it

a \\ slash or a //// slash?

Sincerely,

Susan "Suzy" Smith

The given code declares variables, defines a method and gives commands..

It creates a public class and then uses print commands to tell the compiler the output to give and the output is given above.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

how major is the technology problem in the United States? Why is it such a big problem?

Answers

Answer:

Explanation:

the problem is predators can get to children easier through the internet

create a comic strip about prepering hand tools for operation and safety

paaa helppp ​

Answers

Answer:

Hammer stools

ahsnsksns

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

Computer has brought radical change in every field​

Answers

Answer:

Yes it has brought change in every field

Explanation:

Write a program that hardcodes a proposed password and checks that it is an acceptable password.
If the proposed password is acceptable password, the program writes a message "Password zzzzzzzzz is acceptable" and ends.
If it is not acceptable, it writes a message "Password is acceptable because it "
Where
is the password which was checked.
is one of:
"is not at least 7 characters long."
"does not contain both upper and lower case alphabetic characters."
"does not contain at least 1 digit."

is used if the PW is not acceptable, else the word not isn't printed.
"is an acceptable password."




Acceptable passwords:

are at least 7 characters long.
contain both upper and lower case alphabetic characters.
contain at least 1 digit.
The logic of this program can be quite tricky. Hint: use toUpperCase(), toLowerCase, and equals(). You will also need nested ifs.

Here some sample runs of the program; your output should look substantially the same:

C:\>java PasswordChecker
Enter your password:
snowflake
Password snowflake is not acceptable because it does not contain both upper and lower case alphabetic characters."

Enter your password:
SnowFlake

Answers

Using the knowledge in computational language in JAVA it is possible to write the code that write a program that hardcodes a proposed password and checks that it is an acceptable password.

Writting the code:

class InvalidPasswordException extends Exception {

 

   int passwordConditionViolated = 0;

 

   public InvalidPasswordException(int conditionViolated)

   {

       super("Invalid Password: ");

       passwordConditionViolated = conditionViolated;

   }

 

   public String printMessage()

   {

       switch (passwordConditionViolated) {

 

       case 1:

           return ("Password length should be"

                   + " between 8 to 15 characters");

 

       case 2:

           return ("Password should not"

                   + " contain any space");

 

       case 3:

           return ("Password should contain"

                   + " at least one digit(0-9)");

 

      case 4:

           return ("Password should contain at "

                   + "least one special character");

 

              case 5:

           return ("Password should contain at"

                   + " least one uppercase letter(A-Z)");

 

       case 6:

           return ("Password should contain at"

                   + " least one lowercase letter(a-z)");

       }

 

       return ("");

   }

}

 

 

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program that hardcodes a proposed password and checks that it is an acceptable password.If the

an excel function that returns the serial number of the current date

Answers

The Excel function that returns the serial number of the current date is the TODAY function. The main answer to the question is the TODAY function.

The function returns the serial number of the current date. Here is an explanation of how to use the TODAY function in Excel: Excel stores dates as serial numbers, starting with January 1, 1900, which is serial number 1. This means that the serial number for today's date will be a large number.

To use the TODAY function, simply type "=TODAY()" into a cell in your spreadsheet. The function will automatically update to the current date whenever you open or recalculate the spreadsheet .There are a few things to keep in mind when using the TODAY function in Excel: The TODAY function returns the current date based on your computer's system date and time.  

To know more about Excel function visit:

https://brainly.com/question/32157517

#SPJ11

list 6 points and explain why you shouldn't use the
company computers to visit unauthorized sites.

Answers

Answer:

Here are six reasons why you shouldn't use company computers to visit unauthorized sites:

1. Security risks: Unauthorized access to organizational systems or user accounts can lead to attackers stealing or destroying private data, stealing money or goods by carrying out fraud, stealing user identities, compromising systems and using them for illegitimate or criminal activity, sabotaging organizational systems or defacing websites, and causing physical damages by gaining access to connected devices.

2. Loss of productivity: Unauthorized employee use of company computers for personal business can lead to a loss of productivity.

3. Broken equipment: Unauthorized use of company resources and supplies can lead to broken equipment and disputes over who is responsible for repairs.

4. Confidentiality: Employers often monitor their employees' activities when using company computers. This includes email content and private messages, screen content and keystrokes, social media activity, time spent online on the device, and websites visited on a company computer.

5. Liability: Unauthorized use of company computers can lead to criminal or civil liability based on the employee's actions.

6. Company policy: Many companies have a comprehensive acceptable use policy (AUP) that makes clear the employees' and employer's rights and responsibilities and the rules regarding employee use of company equipment.

Order the steps to describe how to import a contact list in Outlook 2016.

Order the steps to describe how to import a contact list in Outlook 2016.

Answers

Answer:  above is correct

In Backstage view...

Click Import/Export

Choose Import from...

Select CSV format...

Choose a destination....

Explanation:

The steps followed to import a contact list in the Microsoft Outlook 2016 are:

In background view, click open and export.Click import/ export.Choose import from another program.Select CSV format, and browse for a file list.Choose a destination folder, and click Finish.

What is Outlook 2016?

The Microsoft Outlook 2016 is a software system that helps the users to manage  their personal information. There are various functions of outlook such as manage emails, contact managing, journal logging and many more.

The Microsoft outlook allows the user to import the contact list into their personal computer by following the steps as mentioned above.

Learn more about Microsoft Outlook , here:

https://brainly.com/question/26695071

#SPJ2

What is the purpose of the LCD screen on a digital camera?

Answers

Explanation:

LCD, or Liquid Crystal Display, is the display technology used to create the screens embedded in the back of nearly all digital cameras. In a digital camera, the LCD works for reviewing photos, displaying menu options and serving as a live viewfinder

External equity pay comparisons focus on: a. using job evaluation tools to determine a job's worth to other jobs in the organization. b. what individuals in the same organization doing the same job are paid. c. what other organizations pay for roughly the same job. d. what employees within the same organization but in different jobs are paid.

Answers

what other organizations pay for roughly the same job.External equity pay comparisons focus on comparing the pay levels of similar jobs in other organizations.

The purpose is to assess how an organization's compensation practices align with the external market and to ensure that employees' pay is competitive and in line with industry standards. By comparing pay rates for similar jobs in other organizations, employers can gather information about prevailing market rates and make adjustments to attract and retain talent. This process involves collecting data on compensation surveys and analyzing salary ranges, benefits, and other forms of remuneration provided by other employers for similar roles. The goal is to establish equitable pay structures that are competitive in the external job market and help attract and retain qualified employees.

learn more about comparisons here :

https://brainly.com/question/1516829

#SPJ11

Bob is interested in examining the relationship between the number of bedrooms in a home and its selling price. After downloading a valid data set from the internet, he calculates the correlation. The correlation value he calculates is only 0.05. What does Bob conclude? Bob gives up on his research because r=.05 means there is no relationship of any kind between bedrooms and selling price. Bob continues his research because even though there is no linear relationship here, there could be a different relationship.

Answers

Bob continues his research because even though there is no linear equation relationship between the number of bedrooms and selling price, there could be another type of relationship.

Bob continues his research because even though the correlation value he calculated between the number of bedrooms and the selling price was only 0.05, this does not necessarily mean that there is no relationship of any kind between these two variables. It simply means that there is no linear relationship between the two. There could still be other types of relationships between the two variables, such as an exponential or quadratic relationship. It is possible that further analysis and exploration of the data set would reveal such a relationship and allow Bob to uncover the relationship between the two variables. Additionally, even if the correlation value is low, it does not necessarily mean that there is no relationship between the two variables. It simply means that the relationship is weak. Therefore, Bob should continue his research in order to uncover any potential relationships between the number of bedrooms and selling price.

Here you can learn more about linear equation

brainly.com/question/11897796

#SPJ4

What contribution did ada byron make to computing?

Answers

Answer:

Around 1843, she described the first computer principles, later built by Charles Babbage in the form of a mechanical calculator.

Ada Byron was a writer and mathematician known for her work on Babbage's early mechanical general-purpose computer. She helped to write the first algorithm intended to be processed by a machine.

what kind of off brand Apple Pencil work with an iPad Air 2?

Answers

When it comes to finding an off-brand Apple Pencil that is compatible with an iPad Air 2, there are a few things to consider. The first thing is that the iPad Air 2 does not have the same technology as the iPad Pro models, which means that it cannot use the same Apple Pencil.

Instead, the iPad Air 2 requires a stylus that uses a capacitive touch screen, which is the same technology used in most other touch screen devices. This means that any stylus that is compatible with a capacitive touch screen should work with the iPad Air 2.

There are many off-brand styluses on the market that claim to work with the iPad Air 2, so it can be difficult to know which ones to choose. Some popular options include the Adonit Jot Pro, the Wacom Bamboo Sketch, and the Fifty Three Pencil. These styluses all have different features and designs, so it's important to do your research and find one that meets your needs.


Ultimately, the best off-brand Apple Pencil for your iPad Air 2 will depend on your specific needs and preferences. It's important to read reviews and compare different models to find one that works well with your device and meets your needs.

To know more about Pencil visit:

brainly.com/question/25153759

#SPJ11

13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails". The program below simulates randomly
flipping that coin many times,
var heads -
var tails - ;
var rolls - 100;
for(var i=0; i
if(randonlumber(0,1) - )
heads
} else
tails
Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
O A. tails has a value of O and heads has a value of 100
B. tails has a value of 100 and heads has a value of O
0 C.tails has a value of 20 and heads has a value of 20
O D. tails has a value of 50 and heads has a value of 50

Answers

Answer: tails has a value of 20 and heads has a value of 20

Explanation: Both Values have to add up to 100 for it to work. You cant have a 60% chance of a side that doesn't exist on a coin.

The combination that is not possible is (b)  tails has a value of 20 and heads has a value of 20

The first and the second line of the program initializes heads and tails to 0.

The third line of the program initializes roll to 100

This means that at the end of the program, the combined value of heads and tails variables must add up to 100.

The above highlight is true for options (a), (b) and (d), because

\(0 + 100 = 100\)

\(100 + 0 = 100\)

\(50 + 50 = 100\)

However, this is not true for the third option because

\(20 + 20 \ne 100\)

Hence, the combination that is not possible is (c)

Read more about similar programs at:

https://brainly.com/question/18430675

Other Questions
Hi, please help me (its science) The records of Pippins, Inc., included the following information: Net sales $ 1,000,000 Gross margin 475,000 Interest expense 50,000 Income tax expense 80,000 Net income 240,000 Compute the times interest earned ratio, rounded to the nearest decimal. 4.8 6.4 7.4 20.0 Muscle tissue provides which of the followingfunctions?movement in the esophagus and stomachprotection of the brainbody movementcontraction of the heartNeed answers ASAP The following questions refer to Nobel Prize Banquet Speech by Bob Dylan (p. 359). Throughout the passage, "literature" is used to mean 1. Identify TWO geographic patterns indicated in the graph of the top automobile-producing countries in 2019.2. Explain TWO reasons for the geographic patterns that you identified in Part C. Mr. Pinello has 80 colored pencils and 64 markers to divide into containers for his class. He wants each container to have the same number of items. What is the greatest number of containers he can make if he wants each container to have the same number of colored pencils and markers a mass m0 is attached to a spring and hung vertically. the mass is raised a short distance in the vertical direction and released. the mass oscillates with a frequency f0. if the mass is replaced with a mass thirteen times as large, and the experiment was repeated, what would be the frequency of the oscillations in terms of f0? Which is a valid prediction about the continuous function f(x)? PA 137 (Algo) Goop Incorporated needs to order a raw material to make a special a. Goop incoporated needs to order a raw materiel to make a special polymer, The demand for the polymet is forectasted to be normaly distributed with a mean of 220 gatons and a standard deviation of wo gatons. Goop seils the polymer for $25 per gation. Goop purchases raw material for $6 per galion and must spend $13 per gation to dispose of al unased raw material tue to goveriment regulations. (One galion of taw material yields one gallon of polymer, If demand is more than Gpop can make, then Goop sets only What it has made and the rest of the demand is lost. Use Tabie.13.4. Note: If a part of the question specifies whether to use Table 13,4, or to use Excel, then credit for a correct answer will depend on using the specified method. a. How many gallons should Goop purehase to maximite its expected pront? Use Table 13.4. Note: Enter your answer as a whele number. b. Suppose Goop purchases 120 gallons of raw materiak, What is the probablity that it wil fun out of ras malerial? Note: Round your answer to 4 decimal places. c. Suppose Goep piachases 300 gatons of raw materis. What are the eapected sales in galiong? Use Table tz a and exi mund-up c. Suppose Goop purchases 300 gallons of raw material, What are the expected sales (in gallons)? Use Table 13.4 and the round-up rule, Note: Round your answer to 2 decimal places. d. Suppose Goop purcheses 450 gallons of raw material How much should it expect to spend on disposal cosis (in dellarpl7 Use Table 17.4 and the round-up rule. Notes Reund your answer to 2 decimal piaces, 6. Suppose Goop wants to ensure that there is a 92 percent probability that it will bo able to saticy its customiters' entie demand, How ifany galions of the taw material should it purchase? Use Tabie 13.4 and the roundap rule. Note: Enter your answer as a whole numbec. La hermana de mi hermana es mi ________. simplify the equation 2a=18 Janae and Jerome each have m marbles. Gwen has 4(m + 2) marbles. John has 8m + 4 marbles. If John has more marbles than Janae, Jerome, and Gwen combined, how many marbles might Janae and Jerome each have? Select each possible answer. Please Help!!!NO xtiny urls Jason agreed to make 12 payments of $38.50 to buy a new TV so far he has made Seven payments how much more money does Jason owe Answer the following.Copyright 2018 Georgia Public Broadcasting. All rights reserved. Use or distribution by an unintended recipient isprohibited. Unit 50 Series Circuits STUDENT5. For the following series circuit, at each black dot along the circuit write how muchvoltage remains. Assume that 1) the resistors are all the same, and 2) the wires do not useup any voltage.V6.+As the number of resistors in a series circuit increases, the overall resistanceDecreases. Remains the same. The current in the circuitIeroncos which of the following is a constitutional command that Seidman believes we should keep? (Apex) A. the rule that tax issues originate in the House B. the unchallengeable power of the president C. the right of soldiers to stay in civillians' homes D. the right of for people to follow any religon How do I get to my account page on Hulu? Best answer gets brainleist 1 and 2 You went to Sweet Spot to get some candy. The cost is $5.00 per pound. You have a coupon that gives you a discount of $0.20 off per pound. If you buy $4 pounds of candy, what will your total cost be, excluding tax? Mr. Myrna can't understand why lecturing and scolding his freshmen students for disruptive classroom behaviors makes them even more unruly. Explain Mr. Myrna's predicament in terms of operant conditioning principles. Show how he could use operant conditioning techniques to (a) reduce disruptive behaviors and (b) increase cooperative behaviors.