Answer:
A.
Explanation:
Just a wild guess. :)
given a computer running four types of instructions, named classes a through d, calculate the execution time of a program that has an instruction count per category as follows: class a: 9 millions of instructions, with an average cpi of 4.1, class b: ic of 5m and cpi of 3, class c: ic of 11m and cpi of 0.9, and class d: ic of 2m and cpi of 1. the cpu runs at 14 mhz. what is the compute time of this program in seconds
Answer:
Kindly check explanation
Explanation:
Calculate the execution Time of the following :
class a: 9 millions of instructions, with an average cpi of 4.1, class b: ic of 5m and cpi of 3, class c: ic of 11m and cpi of 0.9, and class d: ic of 2m and cpi of 1. the cpu runs at 14 mhz.
Clock rate = 14 mhz
1/clock rate = 1/14,000,000Hz = 0.00000007143
Execution time = instruction count × cycle per instruction × 1/ clock rate
A) 9 millions of instructions, with an average cpi of 4.1,
Execution time = 9000000 × 4.1 × 0.00000007143 = 2.635767s
B.) ic of 5m and cpi of 3,
Execution time = 5000000 × 3 × 0.00000007143 = 1.07145 s
class c: ic of 11m and cpi of 0.9,
Execution time = 11000000 × 0.9 × 0.00000007143 = 0.707157 s
class d: ic of 2m and cpi of 1
Execution time = 2000000 × 1 × 0.00000007143 = 1.071450. 14286 s
2 or more computers that are linked together are called which of the following ?
Explanation:
When two or more computers are connected together so they can communicate with one another, they form a Network
Consider the following 2 pseudocode options for implementing the Allocate-Node() functionality of the BTree in C++. How would each impact the runtime of the
B-Tree-Insert function? Consider both asymptotic analysis as well as real time impacts.
Allocate-Node()
x = Node()
x.leaf = true
x.n = 0
x.keys = new int[2*t-1] \\ member variable int* keys
x.c = new Node*[2*t] \\ member variable Node** c
Allocate-Node()
x = Node()
x.leaf = true
x.n = 0
x.keys = { } \\ member variable vector keys
x.c = { } \\ member variable vector c
Answer:
The first option, using new, has a worst-case runtime of O(n), where n is the number of elements in the B-Tree. This is because the new operator must allocate memory for the entire node, which can be a significant amount of time if the node is large. The second option, using a vector, has a worst-case runtime of O(1). This is because vectors are automatically resized as needed, so there is no need to allocate a new block of memory each time a node is created.
In practice, the difference in runtime between the two options is likely to be small. However, if the B-Tree is large, the first option could have a significant impact on performance.
Here is a more detailed analysis of the two options:
Option 1: new
The new operator allocates memory on the heap. This means that the operating system must find a free block of memory large enough to hold the node, and then update the memory allocation tables. This process can be relatively slow, especially if the node is large.
In addition, the new operator can be a source of memory leaks. If a node is created but never deleted, the memory it occupies will eventually be reclaimed by the garbage collector. However, this can take a long time, especially if the node is large or if there are many other objects in the heap.
Option 2: vector
Vectors are a type of data structure that automatically resizes as needed. This means that when a new node is created, the vector will automatically allocate enough memory to hold the node's data. This is much faster than using new, and it also eliminates the risk of memory leaks.
However, there is one downside to using vectors: they can be slower than arrays for accessing individual elements. This is because vectors must first check to see if the element is within bounds, which can add a small amount of overhead.
In general, the second option (using a vector) is the better choice for implementing Allocate-Node(). It is faster, it eliminates the risk of memory leaks, and it is just as efficient for most operations. However, if performance is critical, and the nodes in the B-Tree are large, the first option (using new) may be a better choice.
How does a computer go through technical stages when booting up and navigating to the sample website? Answer the question using Wireshark screenshots.
When a computer is turned on, it goes through several technical stages before it can navigate to a sample website. The following are the basic steps involved in booting up a computer and accessing a website:
How to explain the informationPower On Self Test (POST): When a computer is turned on, it undergoes a Power On Self Test (POST) process, which checks the hardware components such as RAM, hard drive, CPU, and other peripherals to ensure they are functioning properly.
Basic Input/Output System (BIOS) startup: Once the POST process is complete, the BIOS program stored in a chip on the motherboard is loaded. The BIOS program initializes the hardware components and prepares the system for booting.
Boot Loader: After the BIOS startup is complete, the boot loader program is loaded. This program is responsible for loading the operating system into the computer's memory.
Operating System (OS) startup: Once the boot loader program has loaded the operating system, the OS startup process begins. During this process, the OS initializes the hardware, loads device drivers, and starts system services.
Web browser launch: After the OS startup is complete, the user can launch a web browser. The web browser program is loaded into the memory, and the user can navigate to a sample website.
DNS Lookup: When the user types in the website address, the computer performs a Domain Name System (DNS) lookup to translate the website name into an IP address.
HTTP Request: After the IP address is obtained, the web browser sends an HTTP request to the web server that hosts the website.
Website content delivery: Once the web server receives the HTTP request, it sends back the website content to the web browser, and the website is displayed on the user's screen.
These are the basic technical stages involved in booting up a computer and navigating to a sample website.
Learn more about computer on;
https://brainly.com/question/24540334
#SPJ1
By definition, a computer
has a screen
helps solve problems
requires batteries
O uses the internet
Answer:
helps solve problems
Explanation:
PLEASE HELP
Find five secure websites. For each site, include the following:
the name of the site
a link to the site
a screenshot of the security icon for each specific site
a description of how you knew the site was secure
Use your own words and complete sentences when explaining how you knew the site was secure.
The name of the secure websites are given as follows:
Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.
What is Website Security?The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.
It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.
Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.
Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.
Learn more about website security:
https://brainly.com/question/28269688
#SPJ1
Select the correct answer from each drop-down menu.
A spreadsheet is the computerized form of the
that people traditionally used to
. brainlist to best
Answer:
A spreadsheet is a computer application for organization, analysis and storage of data in tabular form. Spreadsheets were developed as computerized analogs of paper accounting worksheets. The program operates on data entered in cells of a table.
How is LUA different from Python?
Give an example.
This is the answer I couldn't write it here since brainly said it contained some bad word whatever.
Answer:
good old brainly think stuff is bad word even tho it is not had to use txt file since brainly think code or rblx is bad word
A coworker just sent you a presentation to review. You noticed that she used different types of transitions on the same slide, and the animations and videos were distracting from the topic. Give your coworker advice about guidelines she can follow when using animation, transitions, and multimedia. Be sure to include at least four guidelines
Answer:
The transitions presented should either be different on each slide or the same type but only one on each slide shown. Pictures and videos shouldnt be included a lot. At least two photos or one on each slide, while videos should only be one on the very last slide.
Explanation:
BitTorrent, a P2P protocol for file distribution, depends on a centralized resource allocation mechanism through which peers are able to maximize their download rates.
True or False?
Answer:
yes. it is true. mark as brainlest
Write a short essay (roughly 300 words) about some topic related to computing and/or communication technology that interests you and has social or ethical implications. Describe the background; then identify the social or ethical issues, problems, or questions that you think are important. (Don't make your essay be just an argument for one point of view. You may express your views if you want to, but first explain what the issues are, why there is a problem or a controversy.) Remember to define the problem.
A topic related to computing and/or communication technology that interests you and has social or ethical implications is computer programming.
What is the role of computer programming in the society?Information Communication Technology (ICT) is known to be one that has brought about a lot of new ethical concerns as regards the protection of personal privacy, and also that of of intellectual property. It also encompasses the user responsibility, acceptable access and use of information.
Note that Computer programming is vital today because a lot of our world is said to be automated in nature. Humans do need to be able to control the communication that exist between people and machines.
Note that Since computers and machines are said to have the ability to do things so well and accurately, we therefore need to use computer programming to get that computing power.
Learn more about computer programming from
https://brainly.com/question/23275071
#SPJ1
need help with the second part of the problem. I did "userNum1". I just need help with 2nd part, "userNum2".
The code is given below.
What do you mean by Python Programming?Python is a high-level, interpreted programming language that was first released in 1991. It is named after the Monty Python comedy group and was created by Guido van Rossum. Python is known for its readability, simplicity, and ease of use. It supports multiple programming paradigms, including procedural, object-oriented, and functional programming.
Here is the sample Python code to accomplish the task:
userNum1 = int(input("Enter userNum1: "))
if userNum1 < 0:
print("userNum1 is negative.")
userNum2 = int(input("Enter userNum2: "))
if userNum2 > 15:
userNum2 = 2
else:
print("userNum2 is less than or equal to 15.")
This code prompts the user to enter two integer values userNum1 and userNum2. Then, it checks if userNum1 is less than 0, and if it is, it prints "userNum1 is negative.". The code also checks if userNum2 is greater than 15, and if it is, it assigns userNum2 to 2. Otherwise, it prints "userNum2 is less than or equal to 15.".
To know more about integer visit:
https://brainly.com/question/13265645
#SPJ1
what portion of companies use social media to locate new employees?
A. About a third
B. About Half
C. About Two-Third
D. Nearly All
Most companies will CHECK over social media when hiring, but not all companies ADVERTISE or use social media to get employees. About a third of companies ADVERTISE over social media.
A chord 6.6cm long is 5.6cm from the centre of a circle, calculate the radius of the circle
Answer:
chord 30cm long is 20cm from the centre of a circle calculate the length of a chord ... Find the length of an arc of a circle of radius 5.6cm which subtends an angle of 60°at the centre of the circle of the ...
Answer: radius = 6.5 cm
Explanation:
The distance from the center to the chord is measured at its perpendicular.
Therefore we can use Pythagorean Theorem to find the radius.
r² = 5.6² + 3.3²
r² = 31.36 + 10.89
r² = 42.25
\(\sqrt{r^2}=\sqrt{42.25}\)
r = 6.5
Name:
Sup-R Game Desktop – Model EEXL
Inteel® Core i7
6GB Tri-Channel DDR3
500GB SATA-II (7200 rpm)
16x CD/DVD burner
21.5” HD widescreen monitor
NVIDIA® GeForce
Creative Sound Blaster® X-Fi Titanium
Altec Lansing speakers
Gigabit Ethernet port
3 – year limited warranty
Windows 10
1. Suppose you are reading a computer magazine and you come across the ad pictured above. By looking at the specs, you can see that: (2 Points)
The amount of RAM is ___________.
The microprocessor manufacturer is __________.
The amount of disk storage is _______________.
The amount of Solid State Drive storage is ______________
2. In the table below, list the hardware/peripheral components in the ad and check which function the component performs. (Add additional rows to the table if needed). (5 Points)
Component
Processor
Memory
Storage
Input
Output
Other
3. In the table below, list 5 functions/features you would look for in purchasing a computer and explain why each is important to you. (3 Points)
Function/Feature
Explanation as to why and size, capacity, etc. you need this feature/function
5. List and describe the factors that affect the performance of a microprocessor. Name two manufacturers of central processing units (CPUs) and some for the different models of processors that they manufacture. (5 points)
6. At the beginning of an update for your smart phone, you notice a warning that says “Make sure your device is connected to a wall outlet and do not turn the device off until the update is complete.” You suspect that the update is going to _______________ the ROM boot loader to fix a security vulnerability. (2 Points)
7. You are working on a group project and you suggest to your team that they use a ______________ storage service where members can access a shared folder. (2 Points)
8. One of the ports on your laptop is rectangular and the inside of it is blue. It is a(n) _________ port. (2 Points)
9. You need an external keyboard for your Android device, and thankfully you can add a wireless one because it has ________________ capability. (2 Points)
10. You volunteer to produce a large quantity of black-and-white leaflets for a charity organization. It is fortunate that you have access to a(n) _____________________ printer with a high duty cycle and low operating costs.
In the 1940s, computers were programmed using punch cards, or pieces of paper that had holes in them that represented binary code. If a mistake was made using this type of primitive programming, which of the following BEST describes what would need to be done to correct the problem?
A.
The entire program of punch cards had to be re-punched.
B.
The entire program of punch cards had to be loaded again and started over.
C.
The entire program needed to be rewritten and a different set of punch cards were used.
D.
The entire program could be fixed by adding or removing a card for the existing stack of papers.
Answer:
If a mistake was made using punch cards to program computers in the 1940s, the entire program of punch cards had to be re-punched to correct the problem. This was because punch cards were the primary means of input for the computer, and any changes or corrections to the program had to be physically made by punching new cards or modifying existing ones. Once the program was re-punched correctly, it could be loaded into the computer and executed.
Explanation:
onsider the below given table and write queries for
(i) & (ii) and output of
(iii) –(v):Table Name: Pet
i) Display name, owner and gender for all dogs.
ii) Display Name, owner and age of all pets whose age is more 2 years.
iii)select name, owner from pet where owner name like ‘%ya’;
iv) select name, age from pet where species = dog and age between 1 and 3;
v) select * from pets where species in (‘horse’,’parrot’)
Note that this is an SQL prompt. This is because we are asked to create queries. When you have information on tables are are asked to create queries that will result in a certain output, you are looking at a dataase query. Queries are created in SQL. Here are the queries below. The expected output are all attached.
(i) Display name, owner and gender for all dogs.
Query:
SELECT Name, Owner, Gender
FROM Pet
WHERE Species = 'Dog';
(ii) Display Name, owner and age of all pets whose age is more 2 years.
Query:
SELECT Name, Owner, Age
FROM Pet
WHERE Age > 2;
(iii) select name, owner from pet where owner name like ‘%ya’;
Query:
SELECT Name, Owner
FROM Pet
WHERE Owner LIKE '%ya';
(iv) select name, age from pet where species = dog and age between 1 and 3;
Query:
SELECT Name, Age
FROM Pet
WHERE Species = 'Dog' AND Age BETWEEN 1 AND 3;
(v) select * from pets where species in (‘horse’,’parrot’)
Query:
SELECT *
FROM Pet
WHERE Species IN ('Horse', 'Parrot');
An SQL query is a command used to retrieve or manipulate data in a relational database. It is important because it allows users to extract specific data from large databases, make updates to existing data, and create new records.
SQL queries are essential in many industries that rely on large amounts of data, such as finance, healthcare, and e-commerce.
SQL queries are used to interact with data stored in relational databases, which are typically organized into tables. Queries allow users to extract, modify, and manage data within those tables.
See all output attached.
Learn more about SQL Query on:
https://brainly.com/question/30755095
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Assuming this is a database, consider the above given table and write queries for:
(i) & (ii) and output of
(iii) –(v):Table Name: Pet
i) Display name, owner and gender for all dogs.
ii) Display Name, owner and age of all pets whose age is more 2 years.
iii)select name, owner from pet where owner name like ‘%ya’;
iv) select name, age from pet where species = dog and age between 1 and 3;
v) select * from pets where species in (‘horse’,’parrot’)
In which of the following situations must you stop for a school bus with flashing red lights?
None of the choices are correct.
on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus
you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus
The correct answer is:
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school busWhat happens when a school bus is flashing red lightsWhen a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.
It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.
Learn more about school bus at
https://brainly.com/question/30615345
#SPJ1
Why computer manufacturers constantly releasing faster computers ?
Answer:
do not copy word for word!!!!
Explanation:
The Computer manufacturers constantly releasing faster computers as in every month or in a year new technologies are discovered. ... By making the faster computers manufacturers want to earn much profit and they want to beat the competition. If the computer will be slow, it will take much time to open a file or to save a file.
Which of these are examples of a Single Sign-On (SSO) service?
A. Kerberos.
B. Relying Parties.
C. OpenID.
D. Tokens.
It should be noted that examples of a Single Sign-On (SSO) service are
Kerberos.OpenID.According to the question, we are to discuss the examples of Single Sign-On (SSO) service and how it works in term of the user experience.
As a result if this , we can explain Single sign-on (SSO) as session that is required when authentication service us been need by the user, it helps the user have one set of login credentials
Therefore, examples of a Single Sign-On (SSO) service is OpenID.
Learn more about Single Sign-On (SSO) service at;
https://brainly.com/question/13171394
What is an example of an absolute cell reference? 52% D2 $B$5 !90!
Answer:
$B$5 is an example of absolute cell reference
Explanation:
There are two types of referencing in MS Excel.
1. Relative
2. Absolute
Relative cell referencing changes according to the corresponding new cells when it is copied in other cells. MS Excel uses relative cell referencing by default.
Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.
From the given choices in question,
$B$5 is an example of absolute cell reference
An example of an absolute cell reference is "$B$5".
Thus, option (C) is correct.
Cell references can be either relative or absolute.
A relative cell reference changes when it is copied to another cell.
For example, if you have a formula in cell C2 that references cell A2 as "=A2+1", and you copy this formula to cell C3, it will automatically adjust to "=A3+1".
An absolute cell reference remains constant, regardless of where it is copied. When a cell reference is made absolute, the dollar sign ($) is used to indicate this.
For example, if you have a formula in cell C2 that references cell B5 as "=B$5+1", and you copy this formula to cell D3, it will still refer to cell B5 as "=B$5+1". The row and column references remain fixed.
Therefore, "$B$5" is an absolute cell reference.
Thus, option (C) is correct.
Learn more about Cell Reference here:
https://brainly.com/question/30714866
#SPJ6
Help me with this with the question in the image
Answer:
1. I see value and form in there, and I see unity in there.
2. It create a better image by using words it also could inform people.
3. Maybe the you could add some cold color in it not just warm color.
Select the best answer for the question.
5. To save time, Carlos is estimating the building as one large room for purposes of calculating heat loss. This is called
A. envelope.
B. full space.
C. design.
D. wall-less.
Code to be written in R language:
The Fibonacci numbers is a sequence of numbers {Fn} defined by the following recursive relationship:
Fn= Fn−1 + Fn−2, n > 3
with F1 = F2 = 1.
Write the code to determine the smallest n such
that Fn is larger than 5,000,000 (five million). Report the value of that Fn.
Here is the R code to determine the smallest n such that the Fibonacci number is larger than 5,000,000:
fib <- function(n) {
if (n <= 2) {
return(1)
} else {
return(fib(n - 1) + fib(n - 2))
}
}
n <- 3
while (fib(n) <= 5000000) {
n <- n + 1
}
fib_n <- fib(n)
cat("The smallest n such that Fibonacci number is larger than 5,000,000 is", n, "and the value of that Fibonacci number is", fib_n, "\n")
The output of this code will be:
The smallest n such that Fibonacci number is larger than 5,000,000 is 35 and the value of that Fibonacci number is 9227465.
Learn more about R language here: https://brainly.com/question/14522662
#SPJ1
An internet filter is firewall software used to block a users access to specific internet content. An internet filter can be installed on which three of the following
An internet filter can be installed on a variety of devices, including:Computers: Internet filters can be installed on individual computers, whether they are desktops, laptops, or tablets.
This allows users to control their own access to certain websites or types of content.Routers: Some routers have built-in internet filtering capabilities, which allow network administrators to control access to specific websites or types of content for all devices connected to the network.Mobile devices: Internet filters can also be installed on smartphones and other mobile devices, which can be particularly useful for parents who want to restrict their children's access to certain types of content while using their mobile devices. internet filters can be installed on a range of devices, depending on the specific needs of the user or organization. By blocking access to certain websites or types of content, internet filters can help to protect users from harmful or inappropriate content, and promote responsible internet use.
To learn more about laptops click the link below:
brainly.com/question/30551024
#SPJ1
What are the challenges associated with not being ‘tech savvy’ in 2023?
In 2023, not being 'tech-savvy' can present several challenges due to the increasing reliance on technology in various aspects of life.
Some challenges associated with not being tech-savvyDigital Communication: Communication has largely shifted to digital platforms, such as email, messaging apps, and video conferencing. Not being tech-savvy can make it difficult to effectively communicate and connect with others, especially in professional settings where digital communication is prevalent.
Online Information and Resources: The internet is a primary source of information and resources for various purposes, including education, research, and everyday tasks. Not being tech-savvy may hinder the ability to navigate and access online information, limiting opportunities for learning, decision-making, and staying informed.
Digital Skills Gap: Many job roles and industries now require basic digital skills. Not being tech-savvy can create a skills gap, making it challenging to find employment or succeed in the workplace. Basic skills such as using productivity software, digital collaboration tools, and online research are increasingly expected in many job positions.
Learn more about tech savvy at
https://brainly.com/question/30419998
#SPJ1
Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False
Answer:
True
Explanation:
Imagine that you want to build a radio telescope and an optical telescope and that you want them to both have the same angular resolution, assume that both telescopes can reach the diffraction limit. Which telescope will have to have a larger diameter? Explain your reasoning.
Answer:
The radio telescope will have to have a larger diameter than the optical telescope in order to achieve the same angular resolution. This is because radio waves have a longer wavelength than optical waves, and the angular resolution of a telescope is inversely proportional to the wavelength of the radiation it is observing. Since the radio waves have a longer wavelength, the telescope observing them will need a larger diameter in order to achieve the same level of resolution as a telescope observing optical waves. Additionally, the diffraction limit for radio telescopes is greater than for optical telescopes, so the radio telescope will need to be larger to reach the diffraction limit.
Assuming the user types the sentence
Try to be a rainbow in someone's cloud.
and then pushes the ENTER key, what will the value of ch be after the following code executes?.
char ch = 'a';
cin >> ch >> ch >> ch >> ch;
(in c++)
The value of ch will be the character entered by the user after executing the code.
What is the value of ch after executing the code?The code snippet cin >> ch >> ch >> ch >> ch; reads four characters from the user's input and assigns them to the variable ch. Since the user input is "Try to be a rainbow in someone's cloud." and the code reads four characters, the value of ch after the code executes will depend on the specific characters entered by the user.
In conclusion, without knowing the input, it is not possible to determine the exact value of ch. Therefore, the value of ch will be the character entered by the user after executing the code.
Read more about code execution
brainly.com/question/26134656
#SPJ1
A cookie recipe calls for the following ingredients:
• 1.5 cups of sugar
• 1 cup of butter
• 2.75 cups of flour
The recipe produces 48 cookies with this amount of ingredients. Write a program that asks the user how many cookies they want to make and then displays the number of cups of each ingredient needed for the specified number of cookies in the following format:
You need 5 cups of sugar, 3 cups of butter, and 7 cups of flour.
Note: Don’t worry about formatting the numbers in the output.
def cookie_Recipe(recipe):
sugar=(0.03125*recipe)
butter=(0.02083333333*recipe)
flour=(0.05729166666*recipe)
LF1=round(sugar, 2)
LF2=round(butter,2)
LF3=round(flour, 2)
print("You will need:")
print(LF1, "cups of sugar")
print(LF2, "cups of butter")
print(LF3, "cups of flour")
print("To make", recipe, 'cookies')
recipe=int(input("How many cookies do you want to make?\n"))
cookie_Recipe(recipe)
The program is a sequential program and does not require loops, iterations, and conditions.
What is python?Python is a general-purpose programming language.
The Python program that uses comments to clarify each line is as follows:
#This gets the number of cookies
cookies = float(input("Number of cookies: "))
#This calculates the amount of sugar
sugar = (1.5 * cookies) / 48.0
#This calculates the amount of butter
butter = cookies / 48
#This calculates the amount of flour
flour = (2.75 * cookies) / 48
#This prints the amount of sugar, butter and flour needed
print("You need ", format(sugar, '.2f'), " cups of sugar, ", format(butter, '.2f'), " cups of butter and ", format(flour, '.2f'), " cups of flour", sep='')
Therefore, the program is written above.
To learn more about python, refer to the link:
https://brainly.com/question/12867701
#SPJ2