A foreign exchange student brought his desktop computer from his home in Europe to the United States. He brought a power adapter so that the power cord would plug into the power outlet. He tried turning on his computer, but it wouldn't power on. What is likely the problem

Answers

Answer 1

Answer:

Desktop computer is probably single-voltage

Explanation:

The problem is most likely as a result of voltage difference. He have to get a dual-voltage switch that can accept both 110-120V and 220-240V. As the voltage of the the United States will most likely be different from the voltage in his home country.  Or get a power adapter (single voltage) that suits the voltage of the US.


Related Questions

A perfect binary tree is a complete binary tree with all levels fully filled. Add a method in the BST class to return true if the tree is a perfect binary tree.

Answers

Answer:

class BST {

static class Node

{

int val;

Node left, right;

}

static boolean checkPerfectBT(Node node, int h, int d)

{

if (node == null)

return true;

 

if (node.left == null && node.right == null)

{

if(h==d+1)

return true;

else

return false;

}

 

if (node.left == null || node.right== null)

return false;

 

return checkPerfectBT(node.left, h, d+1) && checkPerfectBT(node.right, h, d+1);

}

static int height(Node node)

{

int dep = 0;

while (node != null)

{

node = node.right;

dep=dep+1;

}

return dep;

}

static boolean isPerfectBT(Node node)

{

int h = height(node);

return checkPerfectBT(node, h, 0);

}

 

static Node addNode(int x)

{

Node node = new Node();

node.val= x;

node.right = null;

node.left = null;

return node;

}

public static void main(String args[])

{

int i,j,k;

Node node= null;

node = addNode(34);

node.left = addNode(2);

node.right = addNode(322);

 

node.left.left = addNode(21);

node.left.right = addNode(23);

node.right.left = addNode(37);

node.right.right = addNode(54);

 

if (isPerfectBT(node) == true)

System.out.println("This is a Perfect Binary tree");

else

System.out.println("This is Not a perfect Binary Tree");

}

}

Explanation:

Calculate the depth of BST by using a while loop until it reaches a null value.In the addNode method, make an object of Node class.In the main method, pass the values to addNode method.Finally display the relevant message to show if it's Perfect or not.

Which of the following is NOT a disadvantage of a simulation? An optimal solution cannot be guaranteed, but relatively good ones are generally found. Simulation software sometimes requires special skills because of the complexity of the formal solution method. Simulation model construction can be a slow and costly process, although newer modeling systems are easier to use than ever. Simulation is often the only DSS modeling method that can readily handle relatively unstructured problems.

Answers

Answer:

D. Simulation is often the only DSS modeling method that can readily handle relatively unstructured problems.

Explanation:

One of the advantages of simulation is that simulation is often the only DSS modeling method that can readily handle relatively unstructured problems.

Simulation is an imitation of reality which is carried out on a computer. It starts by first defining a problem that needs to be solved then a simulation model is constructed after that experiments are conducted and results are evaluated and then optimization is done where needed.

Decision Support Systems (DSS) is a simulation based information system that helps in decision making by incorporating various models to imitate real world scenarios. These models are capable of handling semi-structured or unstructured data that is in-fact one of the advantages of simulation.

You must install JMP pro on your computer before attempting this assignment. You must use the data file: MedicalMalpractice. JMP. Read the case very carefully and answer the questions (fill in the blanks) when necessary. In addition, you must reproduce all the exhibits (via screenshots of your work) by following the instructions provided in the case. Exhibit 1 [1.5 pt] a. The mean (average) payment is _ while the median (middle) is _. When a histogram is right skewed, as is the case here, the mean will exceed the median.

Answers

Answer:

Explanation:

Deliverable:

Create a word document and answer all the questions and attach the screen shot of all the figures in the case (Exhibit-1 to 11). The first page of your document must have your full name and student ID.

Analysis

We begin by looking at the key variable of interest, the amount of claim payment. Exhibit 1 displays a histogram and summary statistics for Amount.

Exhibit 1 Distribution of Amount

(Analyze > Distribution; Select Amount as Y, Columns, and click OK. For a horizontal layout select Stack under the top red

triangle.)

From Exhibit 1 we see that the histogram of Amount is skewed right, meaning that there is a long tail,

with several very high payments. The mean (average) payment is _______ while the median (middle) is

___________. When a histogram is right skewed, as is the case here, the mean will exceed the

median. This is because the mean is influenced by extreme values – the high payments that we

observe in the histogram inflate the mean.

A measure of the spread of the data is the standard deviation (StdDev in Exhibit 1). The higher the

standard deviation, the larger the spread, or variation, in the data. When the data are skewed, the

standard deviation, like the mean, will be inflated.

Other useful summary statistics are the quartiles. The first quartile (next to 25.0% in Exhibit 1) is

________ and the third quartile (next to 75.0%) is __________. The interquartile range, defined as Q3 –

Q1, is a measure of the amount of spread or variability in the middle 50% of the data. This value is

displayed graphically in the outlier box plot (above the histogram). A larger version of this plot is

displayed below.

The left edge of the box is the first quartile, the center line is the median or second quartile, and the right

edge of the box is the third quartile. Hence, the width of the box is the interquartile range, or IQR.

1.5 pt.

(Find attached histogram diagram)

You are given the following code snippet which executes on a 5-stage pipelined processor. How many cycles does the code take to execute, if no data bypassing is implemented ?

addi $s1, $0, 10
lw $t0, 4($s0)
srl $t1, $t0, 1
add $t2, $t1, $s1
sw $t2, 4($s0)

a. 5
b. 9
c. 10
d. 14

Answers

5-Stage Pipeline Diagram for given set of instructions is given below. From the table we get to know that given code snippet need 14 clock cycles to execute with 5 stage pipelines without bypassing technique.

Option: (d)

Explanation:

If there is hazard on one instruction immediately after load/store or memory instructions then there is more delay than usual. So, we use two stalls for hazard present immediately after load instruction i.e. instruction 2.

IF denotes fetch instruction. ID denotes Decode instruction .EX for execution and MEM for memory-based Operations. WB foe register read/Write operations used for stall ir delay.

Create a Java programming example of passing a name and age to a method. in the Main method, create variables for name and age. use the Scanner class to input the name and then the age. create a method called displayNameAge. pass the name and age to the method. display --"The name is _" -- "The age is ____" from the method. example: -"The name is Tom" "The age is 15"

Answers

Answer:

import java.util.Scanner;

public class num14 {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       System.out.println("Enter a Name");

       String name = input.next();

       System.out.println("Enter the age");

       int age = input.nextInt();

       //Calling the Method

       displayNameAge(name,age);

   }

   public static void displayNameAge(String name, int age){

       System.out.println("The name is "+name+". The age is "+ age);

   }

}

Explanation:

Using Java Programming language:

Firstly create a method called displayNameAge() That accepts two parameter a string for name and an int for ageThe method uses string concatenation to produce the required outputIn a main method the scanner class is used to prompt user to enter values for name and age. These are stored in two seperate variableThe method  displayNameAge() is then called and passed these values as arguments.

A compound containing only C, H, and O, was extracted from the bark of the sassafras tree. The combustion of 81.7 mg produced 222 mg of CO2 and 45.4 mg of H2O. The molar mass of the compound was 162 g/mol. Determine its empirical and molecular formulas.

Answers

Answer:

Empirical formula= C4H20

Molecular formula = C8H4O2

Explanation:

It is given that 81.7 mg produced 222 mg of CO2 and 45.4 mg of H2O.

Note:Molar mass of C = 12g/mol

Molar mass of CO2 = 44g/mol

Therefore mass of C in 222mg of CO2= 12/44*(0.222)

=0.0605g

Note: Molar mass of H=1g/mol

Molar mass of H2O=18g/mil

Therefore, mass of H in 45.4mg of H2O= 1/18*(0.0454)

=0.0025g

Therefore, Mass of O = 0.0817-0.0025-0.0605

=0.0187g

Divide through by the atomic mass:

C=0.0605/12=0.00504

H=0.002/1=0.002

O=0.0187/16=0.00117

Divide through by the smallest number

C=0.00504/0.00117 = 4.3 ; Approx 4

H=0.002/0.00117=1.7 ; Approx 2

O=0.00117/0.00117=1

The empirical formula= C4H20

To calculate Molecular formula, (C4H20)n = 162

((12*4)+(1*2)+16)n=162

66n=162

n=162/66=2.45 ; Approx 2

Molecular formula = C8H4O2

In this exercise, you will create a couple of helper methods for ArrayLists in a class called ArrayListMethods.

Create three static methods:

print- This method takes an ArrayList as a parameter, and simply prints each value of the ArrayList on a separate line in the console.
condense- This method takes an ArrayList as a parameter, and condenses the ArrayList into half the amount of values. While traversing, this method will take the existing value at the index and add the index following to the existing value. For example, if we had an ArrayList that consisted of Strings ["0", "1", "2", "3"], the ArrayListMethods.condense(["0", "1", "2", "3"]) would alter the ArrayList to be ["01", "23"].
duplicate- This method takes an ArrayList and duplicates the value of the index at the position index + 1. As a result, ArrayListMethods.duplicate(["01", "23"] would be ["01", "01", "23", "23"].
If done correctly, the methods should work in the ArrayListMethodsTester file.

[ArrayListMethodsTester.java]

import java.util.ArrayList;

public class ArrayListMethodsTester
{
public static void main(String[] args)
{
ArrayList stringArray = new ArrayList();
stringArray.add("This");
stringArray.add("is");
stringArray.add("an");
stringArray.add("ArrayList");
stringArray.add("of");
stringArray.add("Strings");

ArrayListMethods.print(stringArray);
System.out.println("\nArrayList is condensing:");
ArrayListMethods.condense(stringArray);
ArrayListMethods.print(stringArray);
System.out.println("\nArrayList is duplicating:");
ArrayListMethods.duplicate(stringArray);
ArrayListMethods.print(stringArray);

}
}

[ArrayListMethods.java]

import java.util.ArrayList;
public class ArrayListMethods
{



}

Answers

Final answer:

The student needs to implement three methods in the ArrayListMethods class: print, condense, and duplicate. Each method manipulates an ArrayList in different ways, such as printing all elements, condensing the list to half the size by combining elements, and duplicating each element in the original list.

Explanation:

To complete the ArrayListMethods class, start by importing the java.util.ArrayList package. Then, define each method with the appropriate logic. For example, your print method should iterate through the ArrayList, printing each element.

ArrayListMethods.java

import java.util.ArrayList;
public class ArrayListMethods {
   public static void print(ArrayList list) {
       for (String element : list) {
           System.out.println(element);
       }
   }

   public static void condense(ArrayList list) {
       for (int i = 0; i < list.size() - 1; i++) {
           list.set(i, list.get(i) + list.get(i + 1));
           list.remove(i + 1);
       }
   }

   public static void duplicate(ArrayList list) {
       for (int i = 0; i < list.size(); i += 2) {
           list.add(i + 1, list.get(i));
       }
   }
}

The condense method reduces the size of the ArrayList by half by merging adjacent elements, while the duplicate method doubles the size of the ArrayList by duplicating each element.

Write a program roman which converts numbers from decimal notation into Roman numerals. roman takes a single argument, a string containing a non-negative integer, and prints its Roman numeral equivalent to standard output. g

Answers

Answer:

// Program is written in C++ programming language

/ Comments are used for explanatory purpose

// Program starts here

#include<bits/stdc++.h>

using namespace std;

//Declare a function named value to represent the symbols of Roman Numerals

int value(char xy)

{

if (xy == 'I') { return 1; }

if (xy == 'V') { return 5; }

if (xy == 'X') { return 10; }

if (xy == 'L') { return 50; }

if (xy == 'C') { return 100; }

if (xy == 'D') { return 500; }

if (xy == 'M') { return 1000; }

return -1;

}

// Convert to numbers , taking Variable named input as input

int Converted(string &input)

{

// Declare a variable to store the calculated output

int calc;

// Set to 0

calc = 0;

// Iterate through input from 0 to the last character

for (int i=0; i<input.length(); i++)

{

int check1 = value(input[i]);

if (i+1 < input.length())

{

int check12= value(input[i+1]);

// Comparing both values

if (check1>= check2)

{

calc+ =check1;

}

else

{

calc+ =check2 - check1;

i++;

}

}

else

{

calc+ =check1;

}

}

return calc;

}

// Main method starts here

int main()

{

// String input declaration

string inp;

cout<"Enter any valid Roman numeral";

cout << "Result is "

<< Converted(inp);

return 0;

}

The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cryptographic algorithm or system.

Answers

Answer:

Strength

Explanation:

A huge number of systems use a process called Pseudo Random Number Generation (PRNG). In NIST SP 800-90, The PRNG has a set of parameters that define various variables within the algorithm. The PRNG variable strength is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cryptographic algorithm or system.

Which of the following is true about binary and linear searches? A linear search iterates through the entire array one by one while a binary search repeatedly divides in half a portion of the array that could contain the item. In general, a binary search is faster than a linear search. A binary search always begins at the first element of an array. A linear search always begins at the middle element of an array

Answers

Answer:

1) A linear search iterates through the entire array one by one while a binary search repeatedly divides in half a portion of the array that could contain the item.

2) In general, a binary search is faster than a linear search.

Explanation:

The options that are true about binary and linear searches are;

A) A linear search iterates through the entire array one by one while a binary search repeatedly divides in half a portion of the array that could contain the item.

B) In general, a binary search is faster than a linear search.

A linear search is also called sequential search in computer operations and it is defined as a method used to locate an element inside a list. The way this search is done is that It checks each element of the list in a sequential manner until it finds a match or till the whole list has been searched.

Whereas, binary search is also called half-interval search or logarithmic search and it is defined as a method of searching algorithms to locate the position of a target value within a well organized array. This means that binary search is used to compare the target value in relation to the middle element of the sorted array.

In conclusion, looking at the options the only ones that correspond with the terms binary and linear searches are options A and B.

Read more about binary and linear searches at; https://brainly.com/question/20411780

Case ExercisesThe nest day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to re-install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previos day.Discussion Questions1. Do you think this event was caused by an insider or outsider? Explain your anwer.2. Other than installing virus and worm control software, what can SLS do to prepare for the nest incident?3. Do you think this attack was the result of a virus or a worm? Explain your answer.

Answers

Answer:

In the explanation section, the further description of the problem is defined.

Explanation:

(1) According to the above paragraph, this isn't obvious what kind of assault it would be, It could be an attacker or maybe an outsider assault that has contributed to the re-installation and restore of the applications.

(2) Apart from just downloading the SLS malware configuration tool, the records also should be thoroughly checked as well as the server and devices monitored and the new virus, ransomware defenses enabled, and also the authentication method should be followed to avoid such future attacks.

(3) Sure, this intrusion may have been due to malware that infected the documents as well as the network.

It could also be attributed to data theft, due to which networks have not responded as a consequence from which the devices have been reinstated.

So, it's the right answer.

I would say that the attack was caused by an outsider because everyone in technical support were affected.

What is information security?

Information security can be defined as a preventive practice which is used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technology, frameworks, processes and network engineers.

Based on the scenario, I would say that the attack was caused by an outsider because more often than not cyber attacks are mainly orchestrated by external actors (hackers).

Aside installing virus and worm control software, SLS can prepare for the next incident by adopting the principle of least privilege and use an intrusion prevention system (IPS).

In conclusion, I strongly think the attack was the result of a worm because it seems the threat spread from a standalone malware computer program to other workstations.

Read more on information security here: https://brainly.com/question/14286078

We begin with a computer implemented in single-cycle implementation. When the stages are split by functionality, the stages do not require exactly the same amount of time. The original machine had a clock cycle time of 7 ns. After the stages were split, the measured times were IF, 1 ns; ID, 1.5 ns; EX, 1 ns; MEM, 2 ns; and WB, 1.5 ns. The pipeline register delay is 0.1 ns.

a. What is the clock cycle time of the 5-stage pipelined machine?
b. If there is a stall every 4 instructions, what is the CPI of the new ?machine?
c. What is the speedup of the pipelined machine over the single- cycle machine?
d. If the pipelined machine had an infinite number of stages, what would its speedup be over the single-cycle machine?

Answers

Answer:

a) First, we need to determine the pipeline stage amounting to the maximum time. In the given case, the maximum time required is 2ns for MEM. In addition, the pipeline register delay=0.1 ns.

Clock cycled time of the pipelined machine= max time+delay

=2ns+0.1 ns

=2.1 ns

b) For any processor, ideal CPI=1. However, since there is a stall after every four instructions, the effective CPI of the new machine is specified by:

[tex]1+(1 / 4)=1.25[/tex]

c) The speedup of pipelined machine over the single-cycle machine=avg time per instruction of single cycle/avg time per instruction of pipelined.

Single cycle processor:

CPI=1

Clock period=7 ns

Pipelined processor:

Clock period=2.1 ns

CPI=1.25

Therefore, speedup=[tex]=7^{*} 1 /\left(2.1^{*} 1.25\right)[/tex]

=7/2.625

= 2.67

d) As the number of stages approach infinity, the speedup=k where k is the number of stages in the machine.

A ball is released from a 10 m high roof and bounces two thirds as high on each successive bounce. After traveling a total of 40 m (up and down motion), how many times did the ball bounce (e.g. touch the ground)? Put the answer in

Answers

Answer:

Four times traveling 40,12345 mts

Explanation:

We can express this as a sum as follows

[tex]\sum_{i=1}^4(10\cdot \frac{2}{3}^{i - 1} + 10\cdot \frac{2}{3}^{i } ) = 3250/81=40.12345679[/tex]

The first term is the dropping part and the second is the upward motion. this sums up to 40,12345 m after bouncing four times. As a program we could write using the while loop.

distance=0;

i:=0;

while distance<40 do

i:=i+1;

distance:=distance+ [tex]10\cdot \frac{2}{3}^{i - 1} + 10\cdot \frac{2}{3}^{i };[/tex]

end while;

Here the answer is in i and the closest distance traveled after reaching 40 is in the variable distance.

Final answer:

The ball bounces 3 times after being released from a 10 m height to cover a total distance of 40 m, considering each bounce reaches two-thirds of the height of the previous bounce.

Explanation:

We are tasked with finding how many times a ball bounces when dropped from a 10 m height, given that it bounces two-thirds of its previous height with each bounce and that the total distance covered up and down is 40 m. This is a geometric series problem, where each bounce can be considered a term in the series.

The total distance covered by the ball includes its initial fall plus the subsequent bounces. The initial fall is 10 m. For each bounce, the ball travels up and then down the same distance, effectively doubling the distance covered per bounce in relation to its height. Let's designate the number of bounces as n and the total distance traveled as D, with D=40 m.

The sequence for the distances covered by the ball after each bounce forms a geometric series: 10 + 2*(10*(2/3)) + 2*(10*(2/3)^2) + ... + 2*(10*(2/3)^n). The sum of this infinite series can be found via the formula for the sum of a geometric series, S = a / (1 - r), where a is the first term and r is the common ratio. However, in this problem, we know the sum (S = 40 m) and need to find the number of terms (n).

Upon solving, it becomes apparent the question involves determining n based on cumulative distance rather than solving directly with the formula. With the first drop and subsequent bounces, by setting up the terms and considering the total distance, we observe that the ball bounces 3 times to cover a distance slightly over 40 m.

Suppose that you accidentally executed an infinite-loop program, but no longer have access to the command line / terminal from which you ran the program. Upon opening another terminal, you type command 'ps a' and see this: PID TTY STAT TIME COMMAND 9551 pts/1 Ss 0:00 -tcsh 9575 pts/0 S+ 0:00 ./a.out 9577 pts/1 R+ 0:00 ps a What exact command should you type to stop execution of the infinite-loop program?

Answers

To stop the execution of the infinite-loop program with PID 9575, use the command 'kill -9 9575'. The '-9' flag sends the SIGKILL signal to forcefully terminate the specified process.

To stop the execution of the infinite-loop program, you need to identify its Process ID (PID) from the output of the 'ps a' command. In the given output:

PID   TTY    STAT    TIME   COMMAND

_______________________________________

9551  pts/1    Ss      0:00   -tcsh

9575  pts/0    S+      0:00   ./a.out

9577  pts/1    R+      0:00   ps a

________________________________________

The process with the PID 9575 is associated with the './a.out' command, which is likely the infinite-loop program. To stop its execution, you can use the 'kill' command with the PID:

kill -9 9575

The '-9' flag indicates the use of the SIGKILL signal, which forcefully terminates the specified process. In this case, it will terminate the process with PID 9575, stopping the execution of the infinite-loop program.

The question probable maybe:

Suppose that you accidentally executed an infinite-loop program, but no longer have access to the command line/terminal from which you ran the program. Upon opening another terminal, you type command 'ps a' and see this:
PID TTY             STAT            TIME COMMAND
_______________________________________

9551 pts/1             Ss                    0:00 -tcsh
9575 pts/0           S+                    0:00 ./a.out
9577 pts/1             R+                    0:00 ps a
________________________________________
What exact command should you type to stop execution of the infinite-loop program?

Suppose the fixed width of an aside element in a fixed layout is 300 pixels, and the fixed width of its parent element (body) is 900 pixels. If you convert the page from fixed to fluid layout, the width of the aside should be set to
answer choices
a. 33.33%
b. 0333
c. 300%
d. 3

Answers

Answer:

The width of the aside should be set to 33.33%

Explanation:

Given:

Let F1 = Fixed width of an aside element in a fixed layout

F1 = 300 pixels

Let F2 = Fixed width of its parent element (body)

F2 = 900 pixels

Let W = The width, after converting the page from fixed to fluid layout

W is calculated as F1/F2

W = F1/F2

W = 300 pixels/900 pixels

W = 300/900

W = 0.3333 ---- Convert to percentage

W = 33.33%

Hence, the width of the aside should be set to 33.33%

Use a correlated subquery to return one row per customer, representing the customer’s oldest order (the one with the earliest date). Each row should include these three columns: email_address, order_id, and order_date.

CUSTOMERS TABLE: CUSTOMER_ID, EMAIL_ADDRESS, PASSWORD, FIRST_NAME, LAST_NAME, SHIPPING_ADDRESS_ID, BILLING_ADDRESS_ID

ORDERS TABLE: ORDER_ID, CUSTOMER_ID, ORDER_DATE, SHIP_AMOUNT, TAX_AMOUNT, SHIP_DATE_SHIP_ADDRESS_INFO, CARD_TYPE, CARD_NUMBER, CARD_EXPIRES, BILLING_ADDRESS_ID

Answers

Final answer:

To provide each customer's oldest order, a SQL query with a correlated subquery is used. This query joins the CUSTOMERS and ORDERS tables and matches the earliest order_date for each customer.

Explanation:

To find each customer's oldest order using a correlated subquery, you would need to join the CUSTOMERS table with the ORDERS table based on the CUSTOMER_ID and then compare ORDER_DATEs. The query will return one row per customer containing their email_address, order_id, and order_date for the oldest order. Here is an example of how that SQL query may look:

SELECT c.EMAIL_ADDRESS, o.ORDER_ID, o.ORDER_DATE FROM CUSTOMERS c JOIN ORDERS o ON c.CUSTOMER_ID = o.CUSTOMER_ID WHERE o.ORDER_DATE = ( SELECT MIN(sub_o.ORDER_DATE) FROM ORDERS sub_o WHERE sub_o.CUSTOMER_ID = c.CUSTOMER_ID )

In this correlated subquery, 'sub_o' is an alias for the ORDERS table and is used to retrieve the minimum ORDER_DATE (the earliest) for each customer by comparing it with the ORDER_DATE in the outer query.

You're helping Professor Joy to calculate the grades for his course. The way his course is organised, students take two exams and their final grade is the weighted average of the two scores, where their lowest score weights 70% and their highest score 30%.

To accomplish this, you are going to need to do the following:

(1) Build the Student named tuple with the following attributes:

name (string)
exam1 (float)
exam2 (float)
(2) Write a function create_student, which will ask the user to input a single student's name, exam 1 score, and exam 2 score. The function will then create a named tuple with this information and return it.

(3) Write a function create_class, which takes as input an integer n, calls create_student n times and returns a list with the n students created.

(4) Write a function calculate_score, which takes a single Student named tuple as input, and returns the final score, where their lowest grade is weighted 70% and their highest grade is weighted 30%.

(5) Print the value returned by calculate_score for each student created in main. Round each score to two decimal places (using round(value, 2)).

Example 1: if the input is:

1
Student 1
10
0
then the output is:

3.0
Example 2: if the input is:

2
Student 1
10
0
Student 2
7
8
then the output is:

3.0
7.3
Example 3: if the input is:

0
then the output is:

Code:

from collections import namedtuple

''' Build named tuple here '''

''' Write Functions Here '''

if __name__ == "__main__":
''' Call functions and print here '''

Answers

Answer:

C++.

Explanation:

#include <iostream>

#include <string>

using namespace std;

///////////////////////////////////////////////////////////////////

struct Student {

   string name;

   float exam1;

   float exam2;

};

///////////////////////////////////////////////////////////////////

Student create_student() {

   string name;

   cout<<"Name: ";

   cin>>name;

   float exam1;

   cout<<"Exam 1: ";

   cin>>exam1;

   

   float exam2;

   cout<<"Exam 2: ";

   cin>>exam2;

   

   Student s;

   s.name = name;

   s.exam1 = exam1;

   s.exam2 = exam2;

   return s;

}

///////////////////////////////////////////

Student* create_class(int n) {

   Student* arr = new Student[n];

   

   for (int i=0; i<n; i++) {

       cout<<"Student "<<i+1<<endl;

       arr[i] = create_student();

       cout<<endl;

   }

   

   return arr;

}

///////////////////////////////////////////

float calculate_score(Student s) {

   int final_score = 0;

   

   if (s.exam1 >= s.exam2) {

       final_score = (s.exam1 * 0.3) + (s.exam2 * 0.7);

   }

   else {

       final_score = (s.exam1 * 0.7) + (s.exam2 * 0.3);

   }

   

   return final_score;

}

///////////////////////////////////////////////////////////////////

int main() {

   Student* s;

   int n;

   ////////////////////////////////////

   cout<<"How many students? ";

   cin>>n;

   cout<<endl;

   s = create_class(n);

   ////////////////////////////////////

   for(int i=0; i<n; i++) {

       float final_score = calculate_score(s[i]);

       printf("Final score for Student %d %.2f", i+1, final_score);

       cout<<endl;

   }

   ////////////////////////////////////

   return 0;

}

In cell G8 in the Summary worksheet, insert a date function to calculate the number of years between 1/1/2018 in cell H2 and the last remodel date in the Last Remodel column (cell F8). Use relative and mixed references correctly. Copy the function to the range G9:G57. Unit 101 was last remodeled 13.75 years ago. Ensure that the function you use displays that result. g

Answers

Answer:

The cell G8 in the summary worksheet can be filled with the help of the date function (YEARFRAC) as follows:

The required formula to calculate the number of years between cell H2 and last remodel date in the Last Remodel column cell F8 is given as follows:

G8 =YEARFRAC($H$2,F8)

The above formula will return value 13.75 into the cell G8. The sample result is shown as follows in the images attached,

Write the class Calculator including: a function called addthat takes two parameters containing double values and returns their sum a function called subtractthat takes two parameters containing double values and returns their difference (subtract the second from the first) a function called multiply that takes two parameters containing double values and returns their product a function called divide that takes two parameters containing double values and returns the value of the first divided by the second. If the second number is a zero, do not divide, and return "You can't divide by zero!"

Answers

Answer:

public class Calculator {

       public double add(int a, int b){

       return a+b;

   }

   public double substract(int a, int b){

       return a-b;

   }

   public double multiply(int a, int b){

       return a*b;

   }

   public double divide(int a, int b){

       if(b>0){

           return a/b;

       }

       else{

           System.out.println("Cannot divide by zero");

       }

       return -1;

   }    

}

Explanation:

Using Java Programming Language, the class Calculator is created. There are no fields (Instance variables) and no constructors since these are not required by the question.Four methods (functions) are created:  add, substract, multiply and divide as specified in the question.Note the use of the if statement in the divide() to handle case of illegal division (by 0)

Discuss how the following pairs of scheduling criteria conflict in certain settings.a. CPU utilization (efficiency) and response timeb. Average turnaround time and maximum waiting timec. I/O device utilization and CPU utilization g

Answers

Answer:

CPU utilization (efficiency) and response timeb. Average turnaround time and maximum waiting timec. I/O device utilization and CPU utilization g

Explanation:

1. CPU utilization (efficiency) and response time

CPU utilization could be maximized by reducing the context switching. Context switching is the switching of one task by CPU by avoiding the conflict.  The context switching could be minimized by doing less context switching meanwhile the processing. When the context switching is minimum then the response time will be maximum.

Minimum context switching --------------------> Maximum CPU utilization

Minimum switching of the CPU bound tasks could maximize the CPU utilization

CPU utilization is very important for the performance of the multitasking. WE could perform the multi tasking if the CPU utilization is maximum, Memory is free and i/o devices are available for the usage.

2.Average turnaround time and maximum waiting time

Average turnaround time could be reduced by executing the shortest job first. By using the scheduling policy we make it possible that the short and less time taking task will be performed first by in this way the long run task has to wait a lot.

Shortest Job First--------------> Reduce the average turnaround time

SJF= Shortest job will be executed first

SJF= long job need to wait for the longer time which will increase the waiting time

3.I/O device utilization and CPU utilization

CPU utilization could be maximized by performing the CPU bound task first without doing the context switching.

CPU maximum utilization= Run long running CPU bound tasks without the context switching.

I/O devices utilization could be maximized by doing the I/O bound tasks as soon as they are ready to run by keeping the context of context switching as well.

maximum I/O utilization= Run I/O bound device first when they ready to run by keeping the context switching on the board

Part(a):

CPU Utilisation:

is associated with the context switching time. We know that context switching takes a certain amount of time. So if more context switching will be there, the CPU will spend most of its time doing the context switching which will reduce the overall CPU utilization. So in order to have better CPU utilization, context switching should be less. But reducing the context switching will increase the response time of the process as the CPU will be busy fulfilling the request which came earlier and the other processes will be in the waiting queue. So, increasing CPU utilization by reducing context switching can increase the response time.

Part(b): The Time interval from the time of submission of a process to the time of completion is known as turnaround time. In order to minimize the average turnaround time, we should try to execute those processes first which takes less amount of time to execute. So before going to the long-running tasks, we should try to complete the short-running tasks. But using this scheduling algorithm can cause starvation for long-running tasks as this algorithm will always try to execute those processes which are shortest and if the processes will be keep coming, long-running tasks will always be in the waiting queue. Time

Part(c): CPU utilization can be maximized if the CPU will spend less time doing the context switching. This can be done if we schedule long-running CPU-bound jobs first. So scheduler should always choose to schedule CPU-bound jobs first before scheduling and I/O bound jobs. Once the I/O bound jobs are ready to run, we should schedule these jobs in order to maximize the I/O device utilization.

Learn more about the topic of CPU utilization:

https://brainly.com/question/16557295

Write an x64 MASM program using ReadConsoleA and WriteConsoleA to prompt the user for their name. The program should then display the user's name surrounded by asterisks. Allow the name to be up to 30 characters long. Example (user input is boldface, and there are 28 asterisks on the top and bottom lines): What is your name?

Answers

Solution:

The following program will be run using Read Console A and Write Console A and it also displays the name of the user surrounded by asterisks

# include <iostream>

# include <cstring>

using namespace std;

int main(){

               char name[31];

               cout <<"What is your name? ";

               cin.getline(name,30,'\n');

               for(int i=1; i<=30 ; i++){

                               cout<<"*";

               }

               int spaces = 30 - strlen(name)-1;

               cout<<endl<<"*"<<name;

               for(int space=1; space<spaces; space++){

                               cout<<" ";

               }

               cout<<"*"<<endl;

               for(int i=1; i<=30 ; i++){

                               cout<<"*";

               }

              return 0

}

An x64 MASM program can prompt the user for their name and display it surrounded by asterisks using ReadConsoleA and WriteConsoleA. The program handles up to 30-character names and includes a formatted code example. Follow the outlined steps to implement the program.

x64 MASM Program to Prompt and Display User Name

Below is an example of an x64 MASM program using ReadConsoleA and WriteConsoleA to prompt the user for their name and display it surrounded by asterisks. The program allows for a name up to 30 characters long.

Step-by-Step Breakdown

Firstly, initialize the necessary libraries and define constants, such as buffer sizes and error codes.

Set up buffers for input and output operations. For this example, a 32-byte input buffer (30 characters + 2 for ' ') is used.

Prompt the user for their name using WriteConsoleA.

Capture input from the user using ReadConsoleA into the buffer.

Format the name display by surrounding it with asterisks, and use WriteConsoleA again to display the formatted output.

MASM Code Example

Here is a sample x64 MASM code snippet to achieve the described functionality:

INCLUDE Irvine64.inc

.DATA

   prompt BYTE "What is your name?", 0

   buffer BYTE 32 DUP(0)

   output BYTE 64 DUP(0)

.CODE

main PROC

   ; Display the prompt

   mov rdx, OFFSET prompt

   call WriteConsoleA

   ; Read user input

   mov rdx, OFFSET buffer

   mov rcx, 32

   call ReadConsoleA

   ; Prepare the output string

   mov rdx, OFFSET buffer

   call StripCrLf  ; Remove the trailing CR+LF

   mov rbx, OFFSET buffer

   mov rcx, OFFSET output

   call FormatOutput ; Surround input with asterisks

   ; Display the formatted name

   mov rdx, OFFSET output

   call WriteConsoleA

   exit

main ENDP

END main

The above code includes steps to prompt the user, read their input, and display it within a decorative format. Modify the logic within the FormatOutput function to suit the exact formatting needs.

Which of the following problems is least likely to be solved through grid computing? Financial risk modeling Gene analysis Linear problems Parallel problems Manufacturing simulation

Answers

Answer:

Linear problems

Explanation:Grid computing is the term used in Information technology, Computer programming and Computer networks to describe the interconnection of different Computer resources in order to achieve certain specified goal. GRID COMPUTING ALLOWS COMPUTER RESOURCES TO WOK AS A SINGLE UNIT.

Grid computing can be used to solve various issues connected with the use of Computer resources such as Financial risk modelling,Gene analysis etc but least likely to be used to solve Linear problems.

1.What is the ITIL? A.A set of process-oriented best practices B.A group of metrics that govern the program C.Focuses on value delivery D.All of the above

Answers

Information Technology Infrastructure Library (ITIL) is

A set of process-oriented best practicesA group of metrics that govern the programFocuses on value delivery

Option D- All of the above

Explanation:

The process ITIL can be defined as a set of well-defined practices for the IT service management which takes concerns on aligning the IT services based on the requirements of the business.

This describes the tasks, procedures, checklists and processes that are specifically not for organization or technology but can be adapted by the business entity towards the delivering-value, strategy or handling a lower competency level.

ITIL process was developed around as a process model-based view of managing and controling the operations of the organization which is credited to W. Edwards Deming and his plan-do-chec-act (PDCA) cycle.

Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept confidential in an effort to safeguard the company’s competitive advantage in the marketplace. Fullsoft recently experienced a malware attack; as a result, proprietary information was leaked. The company is now in the process of recovering from this breach.

You are a security professional who reports into Fullsoft’s infrastructure operations team. The chief technology officer (CTO) asks you and your colleagues to participate in a team meeting to discuss the incident and its potential impact on the company.

Tasks

1. Prepare for the meeting by deliberating on the following questions:

What circumstances may have allowed this incident to occur, or could allow a similar incident to occur in the future?

What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar incidents that have occurred in other organizations?

What potential outcomes should the company anticipate as a result of the malware attack and possible exposure of intellectual property?

Which countermeasures would you recommend the company implement to detect current vulnerabilities, respond to the effects of this and other successful attacks, and prevent future incidents?

2. Write an outline of key points related to the questions above that the team should discuss at the meeting.

Self-Assessment Checklist

I created an outline that describes key points the team should discuss at the meeting. My outline describes:

Circumstances that may have allowed the malware infection to occur, or could allow a similar incident to occur in the future

Insights about risks, threats, and/or vulnerabilities from reports of similar incidents that have occurred in other organizations

Potential outcomes of a malware attack and exposure of confidential information

Countermeasures the company should implement

Answers

Answer:

1. This event can occur because:

exchanging file folders utilizing USB transmission of false ant viruses fake codec emails through your app browsing infected websites installing infected software etc.

2.

The worst that will happen with such an event is:

key-logger: program capable of capturing and recording keystrokes from users. Backdoor: Tool secret to circumvent desktop workstation encryption programs. Zombie: internet-connected device which has been hacked. Denial-of-service attack (DOS attack): effort to unavail a computer resource

3.  

It robs private information including email accounts, phone numbers, credit card numbers, etc. This removes the files, or changes them. Tries to steal the identification numbers for the device and uses our machines as relays.

4.

Use up-to-date antivirus that constantly analyzes your system's actions. Create a great malware scanner to evaluate the actions of the software to detect changes through using sandbox testing hash algorithm methods. Change your passwords often. Should not open any unwanted attachments to e-mail. Watch out for pop-up windows which ask you to download something (such as anti-virus software) when you just browse the internet. Maintain up-to-date program. Newer systems auto-update. Firewall: program that inspects transiting network traffic and refuses or permits transit based on a set of guidelines.

5.

Key points outline:

malware circumstances. Insights on risks and/or vulnerabilities. Possible consequences, and possible intellectual property publicity. Anti-vulnerability countermeasure

1. (15%) Consider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file a, and Bob and Cyndy can read it. Bob owns the file b, and Cyndy can read and write the file b, but Alice can only read it. Cyndy owns the file c, but neither Alice and Bob can read or write it. If a user owns a file, he/she can also execute the file.(a) Create the ACM (access control matrix) of the system.(b) Show the ACL of the ACM and the CL of the ACM.(c) Cyndy gives Alice permission to read c, and Alice removes Bob's ability to read a. Show the ACM after these changes.

Answers

Answer:

answered in Image and explanation is given below.

Explanation:

CL is euqal to user permission on every file

ACL is equal to how permissions are defined for one life for example File a, read, write, execute.

1. Rectangle Area The area of a rectangle is calculated according to the following formula: Area=Width×LengthArea=Width×Length Design a function that accepts a rectangle’s width and length as arguments and returns the rectangle’s area. Use the function in a program that prompts the user to enter the rectangle’s width and length, and then displays the rectangle’s area.

Answers

Answer:

The method is given below.

double area(double w, double l)

{

   double area = w*l;

   return area;

}

Explanation:

The cpp program using the above method is given below.

#include <iostream>

using namespace std;

double area(double w, double l)

{

   double area = w*l;

   

   return area;

}

int main() {

   

   // variables to hold parameters of the rectangle

   double width;

   double length;

   

   // user asked to enter parameters of the rectangle

   cout<<"Enter the width of the rectangle: ";

   cin>>width;

   

   cout<<"Enter the length of the rectangle: ";

   cin>>length;

   

   // area of the rectangle returned by area() and displayed

   cout<<"The area of the rectangle is "<<area(width, length)<<endl;

   

   return 0;

}

OUTPUT

Enter the width of the rectangle: 12

Enter the length of the rectangle: 8.9

The area of the rectangle is 106.8

The program includes the following.

1. The area() method takes two double parameters as argument of the rectangle.

2. The area() method computes the area using the arguments and returns this value.

3. The area() method has return type of double.

4. The area() method has a double variable, area, which holds the product of the arguments.

5. The main() method has return type of integer and returns an integer value. This is done to assure successful execution of the program.

6. Inside main(), two double variables are declared.

7. User is prompted to enter the parameters of the rectangle which are stored in these variables.

8. The user input is passed to the area() method as parameters.

9. This method returns the computed value of the area of the rectangle.

10. The area is displayed to the console. A new line is inserted at the end of the output.

11. All the variables are declared with double datatype to accommodate both decimal and non-decimal values.

12. All the code is written inside the respective method. No classes are used.

Which part of the operating system enables you to interact with the device? Question 9 options: The graphical user interface The utilities The platform The software as a service

Answers

Answer: The graphical user interface

Explanation:

The graphical user interface (GUI) is a form of user interface that allows user of a device interacts with it through graphical icons or cursors, text based commands or audio commands. The functionality of a GUI is a consequence of the direct manipulation of its graphical elements. Specialized GUIs that allows for speech based commands are called natural user interfaces.

Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicating the number of integers that follow. For coding simplicity, follow each output integer by a space, including the last one. Assume that the list will always contain fewer than 20 integers.

Answers

Answer:

The program to this question can be described as follows:

Program:

#include<stdio.h> //defining header file

int main() //defining main method

{

const int total_number= 20; //defining integer constant variable

int a[total_number],i; //defining integer array and variable  

printf("Enter total number, that you want to insert in list: "); //message  

scanf("%d",&a[0]); //input value by user

printf("Input list: "); //message

for(i=1;i<=a[0];i++) // loop for input value

{

scanf("%d",&a[i]); //input value by user

}

printf("List in reverse order:\n");

for(i=a[0];i>0;i--) //loop for print list in reverse order

{

printf("%d ",a[i]); //print value

}

return 0;

}

Output:

Enter total number, that you want to insert in list: 5

Input list: 6

4

2

8

1

List in reverse order:

1 8 2 4 6  

Explanation:

In the above C language program, three integer variable "total_number, a[], and i " is declared, in which total_number is a constant variable, that holds value 20, which is passed in an array, in array first element we input the total number of the list.

In the next step, an array variable is used, that uses for loop to input number in list.  Then another for loop is declared that prints the array value in its reverse order, with a white space.

Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds of a search range. The file should be read using the file.readlines() method. The input file contains a list of alphabetical, ten-letter strings, each on a separate line. Your program should output all strings from the list that are within that range (inclusive of the bounds). Ex: If the input is: input1.txt ammoniated millennium and the contents of input1.txt are: aspiration classified federation graduation millennium philosophy quadratics transcript wilderness zoologists the output is: aspiration classified federation graduation millennium

Answers

Answer:

Python code explained below

Explanation:

f = open(input())

#loading the file, which will serve as the input

s1 = input()  

s2 = input()

lines = f.readlines()

for line in lines:

   line = line.strip(

# strip() removes characters from both left and right

   if s1 <= line <= s2:  #setting the range

       print(line)

f.close()

#closing the file

```python

def main():

   # Read input file name and search range bounds

   file_name = input("Enter the name of the input file: ")

   lower_bound = input("Enter the lower bound of the search range: ")

   upper_bound = input("Enter the upper bound of the search range: ")

   # Open and read the contents of the input file

   with open(file_name, 'r') as file:

       lines = file.readlines()

   # Iterate over each line and check if it falls within the search range

   for line in lines:

       string = line.strip()  # Remove leading/trailing whitespace

       if lower_bound <= string <= upper_bound:

           print(string)

if __name__ == "__main__":

   main()

```

1. User Input:

  - The program prompts the user to enter the name of the input file (`file_name`) and the lower (`lower_bound`) and upper (`upper_bound`) bounds of the search range.

2. Reading the Input File:

  - It uses the `open()` function with the `'r'` mode to open the input file in read mode.

  - The `readlines()` method reads all lines from the file and stores them as a list of strings (`lines`).

3. Iterating Over Each Line:

  - It iterates through each line in the `lines` list using a `for` loop.

  - For each line, leading and trailing whitespace is removed using the `strip()` method to obtain the actual string (`string`).

4. Checking for Strings within the Range:

  - It compares each `string` with the `lower_bound` and `upper_bound` using the `<=` and `>=` operators to check if it falls within the specified range.

  - If a `string` is within the range (inclusive of the bounds), it is printed as output using the `print()` function.

5. Main Function:

  - The `main()` function is defined to encapsulate the main logic of the program.

  - It calls the `main()` function at the end to execute the program when it is run as a standalone script.

Overall, this program allows users to input a file name and search range, reads the contents of the input file, and outputs the strings that fall within the specified range.

We are asked to design a database management system for all information related to a real-estate company which has several branches throughout the United States. The first step is to organize the information given about company. We have collected the following data:

Each branch has a unique branch number. It allocated staff, which includes one Manager. Also, each branch has a list of available houses to rent/sell.

The manager is responsible for the day-to-day running of a given branch.

Each staff has a unique staff number, name, position, salary, and branch number.

Each house has a unique house number, address, rent cost, sell value, status, branch number.

The statue of a house indicates whether it is available for rent/sell. The branch number indicate which branch of the real-estate company can rent/sell the house.

A Customer has SSN, name, contract number, house number.

Each Contract has a unique contract number, type, date, branch number, and customer number.

If the type of a contract is rent, it will have a deposit, and rent cost, and lengths of contract. The length of a rent contract can be six months, one year or 2 years but costumers can extend their contract by signing a new contract.

Each contract extension has a unique extension number, the original contract number, and discount value.

If the contract type is "sell", it will have sell value.

Customers can issue a contract termination request. Each termination request has a unique request number, customer number, and termination cost.

Draw an ER diagram for this database. Make sure to indicate primary keys, cardinality constraints, weak entities (if any), and participation constraints. List any assumptions you make in the process. Hint: You may need an ISA hierarchy somewhere.

Translate the ER diagram in #1 into relational database tables (i.e. give the SQL DDL statements). Make sure that the translation captures key constraints (primary keys and foreign keys if applicable) and participation constraints in the ER diagram. Identify constraints, if any, that you are not able to capture.

Answers

Answer:

Below is the extended ER diagram of the given scenario. It has 6 main entities connected via 5 relationship .IS A hierarchy is used to Contract and its sub classes Rent and Sell. Each entity has certain set of attributes and primary key is shown using underlined attribute.

Cardinality is shown using crow's feet notation.

Other Questions
Write a function addOddMinusEven that takes two integers indicating the starting point and the end point. Then calculate the sum of all the odd integers minus the sum of all even integers between the two points. The calculation includes the starting point but excludes the end point. You can always assume the starting point is smaller than the end point. Show it four ways15+18=33 If a rectangle has a length of 10 centimeters and a width of 6 centimeters, what is the area? A)16 cm2 B)32 cm2 Eliminate C)60 cm2 D)64 cm2 1. In order to get more female customers, a new clothing store offers free gourmet coffee and pastry to its customers. The average daily revenue over the past five-week period has been $1,080 with a standard deviation of $260. Use this sample information to construct a 95% confidence interval for the average daily revenue. The store manager believes that the coffee and pastry strategy would lead to an average daily revenue of $1,200. Is the manager correct based on the 95% confidence interval? Interestingly, even though hemophilia in the royal families began in England, they were actually the only one of these four families to NOT be affected by it. If Alice's daughter Alix had accepted a marriage proposal from George V, this may have changed history greatly. If we were to rewrite history, pairing Alix and George V together, what is the probability any of their offspring would have hemophilia? What happens when the management of an organisation gets weakened? (a) Organisation progresses (b) Production increases (c) Profit increases (d) Organisation faces heavy loss Question 13 pls. Brainliest for the first answer A country's overall level of interest rates should have an impact on the financial account of the BOP. Relatively low real interest rates should normally stimulate an outflow of capital seeking higher interest rates in other country currencies.a.True.b. False. What change in volume results if 60 mL of a gas is cooled from 33 C to 5 C? Which describes the effect of militarism in the years leading up to World War I?European nations joined the League of Nations.African colonies revolted against their European rulers.Countries built large armies and stockpiled powerful weapons. How many subsets does the set {Apple, Banana} have? 2 3 4 5 6 Bonds often pay a coupon twice a year. For the valuation of bonds that make semiannual payments, the number of periods doubles, whereas the amount of cash flow decreases by half. Using the values of cash flows and number of periods, the valuation model is adjusted accordingly. Assume that a $1,000,000 par value, semiannual coupon US Treasury note with three years to maturity has a coupon rate of 3%. The yield to maturity (YTM) of the bond is 7.70%. Using this information and ignoring the other costs involved, calculate the value of the Treasury note: The process for converting present values into future values is called compounding. This process requires knowledge of the values of three of four time-value-of-money variables. Which of the following is not one of these variables?a. The trend between the present and future values of an investment b. The interest rate (I) that could be earned by deposited funds c. The duration of the deposit (N) d. The present value (PV) of the amount deposited In this assignment, you will model the game of Bulgarian Solitaire. The game starts with 45 cards. (They need not be playing cards. Unmarked index cards work just as well.) Randomly divide them into some number of piles of random size. For example, you might start with piles of size 20, 5, 1, 9, and 10. In each round, you take one card from each pile, forming a new pile with these cards. For example, the sample starting configuration would be transformed into piles of size 19, 4, 8, 10, and 5. The solitaire is over when the piles have size 1, 2, 3, 4, 5, 6, 7, 8, and 9, in some order. (It can be shown that you always end up with such a configuration.)In your program, produce a random starting configuration and print it. Then keep applying the solitaire step and print the result. Stop when the solitaire final configuration is reached.Use the following class as your main class:import java.util.ArrayList;import java.util.Random;public class BulgarianSolitaire{ private ArrayList piles; /** Sets up the game randomly with some number of piles of random size. The pile sizes add up to 45. */ public void setupRandomly() { . . . } /** This method can be used to set up a pile with a known (non-random) configuration for testing. @param pileSizes an array of numbers whose sum is 45 */ public void setup(int[] pileSizes) { piles = new ArrayList(); for (int s : pileSizes) piles.add(s); } public String getPiles() { return piles.toString(); } /** Play the game. */ public void play() { while (!isDone()) { System.out.println(getPiles()); playRound(); } System.out.println(getPiles()); } /** Play one round of the game. */ public void playRound() { . . . } /** Checks whether the game is done. @return true when the piles have size 1, 2, 3, 4, 5, 6, 7, 8, and 9, in some order. */ public boolean isDone() { . . . }}Sample run:13 4 6 6 10 66 12 3 5 5 9 57 5 11 2 4 4 8 48 6 4 10 1 3 3 7 39 7 5 3 9 2 2 6 29 8 6 4 2 8 1 1 5 110 8 7 5 3 1 7 48 9 7 6 4 2 6 38 7 8 6 5 3 1 5 29 7 6 7 5 4 2 4 19 8 6 5 6 4 3 1 39 8 7 5 4 5 3 2 29 8 7 6 4 3 4 2 1 1.9 8 7 6 4 5 3 2 19 8 7 6 5 3 4 2 19 8 7 6 5 4 2 3 19 8 7 6 5 4 3 1 29 8 7 6 5 4 3 2 1Number of iterations: 52 What is the long-term impact of the Korean War on North and South Korea?A. North Korea has invaded other countries, and South Korea has beenpeaceful.OB. North Korea has grown isolated, while South Korea's economy has grown.OC. North Korea was a Nationalist country, while South Korea is a Communistcountry.0D. North Korea was allied with the French, while South Korea allied withGermany. Describe the effect of foreshortening and explain how this technique works A thick oak wall (rho = 545 kg/m3 , Cp = 2385 J/kgK, and k = 0.17 W/mK) initially at 25C is suddenly exposed to combustion products at 800C. Determine the time of exposure necessary for the surface to reach the ignition temperature of 400C, assuming the convection heat transfer coefficient between the wall and the products to be 20 W/m2 K. At that time, what is the temperature 1 cm below the surface? (Note: use an appropriate equation for the semi-infinite wall case; compare equations 18.20 and 18.21 in the text). Which of Kaufman's organizational values calls for a strong president, governor, or mayor and strong department heads, all who adhere to a hierarchical organization that responds to the chief's policy priorities?1) Neutral competence2) Representativeness3) Executive leadership4) Equilibrium In circle D, angle ADC measures (7x + 2). Arc AC measures (8x - 8). Circle D is shown. Points A, B, and C are on the circle. Point C is on the opposite side of points A and C. LInes are drawn from point A to point B, from point B to point C, from point C to point D, and from point D to point A. Angle A D C measures (7 x + 2) degrees. Arc A C measures (8 x minus 8) degrees. What is the measure of Angle A B C ? 36 43 72 144 What is the expansionary fiscal policy of the government?A. when the governments expenditure exceeds its revenueB. when the governments revenue exceeds its expenditureC. when the government increases the interest rateD. when the government decreases the interest rate