Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds of a search range. The file should be read using the file.readlines() method. The input file contains a list of alphabetical, ten-letter strings, each on a separate line. Your program should output all strings from the list that are within that range (inclusive of the bounds). Ex: If the input is: input1.txt ammoniated millennium and the contents of input1.txt are: aspiration classified federation graduation millennium philosophy quadratics transcript wilderness zoologists the output is: aspiration classified federation graduation millennium

Answers

Answer 1

Answer:

Python code explained below

Explanation:

f = open(input())

#loading the file, which will serve as the input

s1 = input()  

s2 = input()

lines = f.readlines()

for line in lines:

   line = line.strip(

# strip() removes characters from both left and right

   if s1 <= line <= s2:  #setting the range

       print(line)

f.close()

#closing the file

Answer 2

```python

def main():

   # Read input file name and search range bounds

   file_name = input("Enter the name of the input file: ")

   lower_bound = input("Enter the lower bound of the search range: ")

   upper_bound = input("Enter the upper bound of the search range: ")

   # Open and read the contents of the input file

   with open(file_name, 'r') as file:

       lines = file.readlines()

   # Iterate over each line and check if it falls within the search range

   for line in lines:

       string = line.strip()  # Remove leading/trailing whitespace

       if lower_bound <= string <= upper_bound:

           print(string)

if __name__ == "__main__":

   main()

```

1. User Input:

  - The program prompts the user to enter the name of the input file (`file_name`) and the lower (`lower_bound`) and upper (`upper_bound`) bounds of the search range.

2. Reading the Input File:

  - It uses the `open()` function with the `'r'` mode to open the input file in read mode.

  - The `readlines()` method reads all lines from the file and stores them as a list of strings (`lines`).

3. Iterating Over Each Line:

  - It iterates through each line in the `lines` list using a `for` loop.

  - For each line, leading and trailing whitespace is removed using the `strip()` method to obtain the actual string (`string`).

4. Checking for Strings within the Range:

  - It compares each `string` with the `lower_bound` and `upper_bound` using the `<=` and `>=` operators to check if it falls within the specified range.

  - If a `string` is within the range (inclusive of the bounds), it is printed as output using the `print()` function.

5. Main Function:

  - The `main()` function is defined to encapsulate the main logic of the program.

  - It calls the `main()` function at the end to execute the program when it is run as a standalone script.

Overall, this program allows users to input a file name and search range, reads the contents of the input file, and outputs the strings that fall within the specified range.


Related Questions

Consider a satellite orbiting the earth. Its position above the earth is specified in polar coordinates. Find a model-view matrix that keeps the viewer looking at the earth. Such a matrix could be used to show the earth as it rotates.

Answers

Answer:

[1 0 0 0]

[0 1 0 0]

[0 0 1 -d]

[0 0 0 1]

Explanation:

What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret signals so network devices can communicate?

Answers

Answer:

The data-link layer

Explanation:

The physical layer and data-link layer are often confused a lot especially in terms of what they do in the TCP/IP 7 layer protocol. The physical layer as the name suggests represents the physical devices like the cables and the connectors that join or interconnect computers together. This layer is also responsible for sending the signals over to other connections of a network. The data-link, on the other hand, translates and interprets these sent binary signals so that network devices can communicate. This layer is responsible in adding mac addresses to data packets and encapsulating these packets into frames before being placed on the media for transmission. Since it resides in between the network layer and the physical layer, it connects the upper layers of the TCP/IP model to the physical layer.

How many bits does it take to store a 3-minute song using an audio encoding method that samples at the rate of 40,000 bits/second, has a bit depth of 16, and does not use compression

Answers

Answer:

115200000 bits

Explanation:

Given Data:

Total Time = 3 minute = 3 x 60 sec = 180 sec

Sampling rate = 40,000 bits / sample

Each sample contain bits = 16 bits /sample

Total bits of song = ?

Solution

Total bits of song = Total Time x Sampling rate x Each sample contain bits

                             = 180 sec x 40,000 bits / sec x 16 bits /sample

                             = 115200000 bits

                             =  115200000/8 bits

                             = 14400000 bytes

                             = 144 MB

There are total samples in one second are 40000. Total time of the song is 180 seconds and one sample contains 16 bits. so the total bits in the song are 144 MB.

Print "userNum1 is negative." if userNum1 is less than O. End with newline Convert userNum2 to 0 if userNum2 is greater than 8. Otherwise, print "userNum2 is less than or equal to 8.. End with newline. 1 public class UserNums 2public static void main (String args) int userNum1; int userNum2 userNumt - -1; userNum2 7; Your solution goes here / 10 System.out.printin("userNum2 is "userNum2);

Answers

Answer:

import java.util.Scanner;

public class num1 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter User name 1 and 2");

       int userNum1 = in.nextInt();

       int userNum2= in.nextInt();

       if(userNum1<0){

           System.out.println("userNum1 is negative.");

       }

       else if(userNum2>8){

           userNum2 =0;

       }

       else{

           System.out.println("userNum2 is less than or equal to 8..");

       }

   }

}

Explanation:

This is implemented in Java programming language

Using the scanner class, the user is prompted to enter two numbers

These are saved in the variable userNum1 and userNum2 respectively.

If, else if and else statements are then used according to the specifications given in the question.

Final answer:

The question involves implementing conditional logic in Java to check if one number is negative and to modify or print a message about another number based on its value. The solution includes an if-else structure to address the requirements and corrects any typos in the code provided by the student.

Explanation:

The logic needed to fulfill the requirements described in the question can be implemented within a Java program. Specifically, the provided code snippet appears to be in Java. Let's address each requirement one at a time, following a step-by-step approach based on the given code structure:

Check if userNum1 is negative and print the specified message, making sure to terminate the output with a newline.Determine if userNum2 is greater than 8, and if so, set its value to 0. Otherwise, print a message indicating that userNum2 is less than or equal to 8 followed by a newline.

Here is the corrected and completed code based on the requirements:

public class UserNums {
  public static void main (String[] args) {
     int userNum1;
     int userNum2;
     userNum1 = -1;
     userNum2 = 7;
     if (userNum1 < 0) {
        System.out.println("userNum1 is negative.");
     }
     if (userNum2 > 8) {
        userNum2 = 0;
     } else {
        System.out.println("userNum2 is less than or equal to 8.");
     }
     System.out.println("userNum2 is " + userNum2);
  }
}

Median of a sample If the distribution is given, as above, the median can be determined easily. In this problem we will learn how to approximate the median when the distribution is not given, but we are given samples that it generates. Similar to distributions, we can define the median of a set to be the set element m′ such that at least half the elements in the set are ≤m′ and at least half the numbers in the collection are ≥m′. If two set elements satisfy this condition, then the median is their average. For example, the median of [3,2,5,5,2,4,1,5,4,4] is 4 and the median of [2,1,5,3,3,5,4,2,4,5] is 3.5. To find the median of a P distribution via access only to samples it generates, we obtain ???? samples from P, caluclate their median ????????, and then repeat the process many times and determine the average of all the medians.

Exercise 2

Write a function sample_median(n,P) that generates n random values using distribution P and returns the median of the collected sample.

Hint: Use function random.choice() to sample data from P and median() to find the median of the samples

* Sample run *

print(sample_median(10,[0.1 0.2 0.1 0.3 0.1 0.2]))
print(sample_median(10,[0.1 0.2 0.1 0.3 0.1 0.2]))
print(sample_median(5,P=[0.3,0.7])
print(sample_median(5,P=[0.3,0.7])
* Expected Output *

4.5
4.0
2.0
1.0
Exercise 4

In this exercise, we explore the relationship between the distribution median mm, the sample median with ????n samples, and ????[????????]E[Mn],the expected value of ????????Mn.

Write a function average_sample_median(n,P), that return the average ????????Mn of 1000 samples of size n sampled from the distribution P.

* Sample run *

print(average_sample_median(10,[0.2,0.1,0.15,0.15,0.2,0.2]))
print(average_sample_median(10,[0.3,0.4,0.3]))
print(average_sample_median(10,P=[0.99,0.01])
* Expected Output *

3.7855
2.004
1
----------------------------------------------------------------------

Question a:

In exercise 2,

Which of the following is a possible output of sample_median(n, [0.12,0.04,0.12,0.12,0.2,0.16,0.16,0.08]) for any n?

3

9

7

4

Question b:

In exercise 4,

what value does average_sample_median(100,[0.12, 0.04, 0.12, 0.12, 0.2, 0.16, 0.16, 0.08]) return?

Answers

Answer:

def sample_median(n,P):

return np.median(np.random.choice(np.arange(1,len(P)+1),n,p=P))

Explanation:

See attached picture.

Assume the following JavaScript program was interpreted using static-scoping rules. What value of x is displayed in function sub1? Under dynamic-scoping rules, what value of x is displayed in function sub1? var x; function sub1() { document.write("x = " + x + ""); } function sub2() { var x; x = 10; sub1(); } x = 5; sub2();

Answers

Answer:

The value of x in both scope can be described as follows:

i) Static scope:

x=  5

ii) Dynamic scope:

x=10

Explanation:

The static scoping  is also known as an arrangement, which is used in several language, that defines the variable scope like the variable could be labelled inside the source that it is specified.

i) program:

function sub1()  //defining function sub1

{

  print("x = " + x + ""); //print value

}

function sub2()//defining function sub2

{

   var x; //defining variable x

   x = 10; //assign value in variable x

   sub1();  //caling the function sub1

}

x = 5; //assign the value in variable x

sub2(); //call the function sub2

In Dynamic scoping, this model is don't see, it is a syntactic mode that provides the framework, which is used in several program. It doesn't care how well the code has been written but where it runs.  

ii) Program:

var x //defining variable x

function sub1()  //defining a function sub1

{

print("x = " + x + ""); //print the value of x

}

x = 10; // assign a value in variable x

sub2(); // call the function sub2

function sub2() //defining function sub2

{

var x; //defining variable x

x = 5; // assign value in x

sub1();//call the function sub1

}

In this exercise we have to use the knowledge in computer language to write a code in JAVA, like this:

the code can be found in the attached image

to make it simpler we have that the code will be given by:

The first code will be:

unction

sub1 ()    //defining function sub1

{

 print ("x = " + x + ""); //print value}

function

sub2 ()    //defining function sub2

{

 var x;   //defining variable x

 x = 10;   //assign value in variable x

 sub1 ();   //caling the function sub1

}

x = 5;

The secound code will be:

var x    //defining variable x

 function

sub1 ()    //defining a function sub1

{

 print ("x = " + x + ""); //print the value of x

}

x = 10;    // assign a value in variable x

sub2 ();   // call the function sub2

function

sub2 ()    //defining function sub2

{

 var x;   //defining variable x

 x = 5;   // assign value in x

 sub1 ();   //call the function sub1

}

See more about JAVA at brainly.com/question/2266606

Alice and Bob agree upon using Lamport one-time password algorithm with an original password PO, a counter 6, and a hash function h. What will be the third password generated by this algorithm and used by Alice and Bob? a.PO b.Oh3(p0) c.h(h(h(h(po)))) d.h(h(h(po)) e.h(h(po))

Answers

Answer:

The correct answer to the following question will be Option C (h(h(h(h(po))))).

Explanation:

As we recognize, the individual and device generate a linearly modified password that used a hash feature at the Lamport one-time code or password.

hn(x) = h(hn-1(x)) hn-1(x) = h(hn-2(x)) ........ h2(x) = h(h(x)) h1x = h(x)

Suppose that Bob and Alice accept an initial P0 password as well as a counter 6.

The counter would be 6-1 that is 5 throughout the next step, as well as the password should be h5(P0). Which implies the third code created over the next step would be h4(P0).

So, Option C is the right answer.

Consider each of the following possible recovery strategies and discuss the merits and drawback of each one with your classmates, specifically focusing on their appropriateness for limited, average, and substantial budget:  Weekly full server backups with daily incremental backups  Daily full server backups  Daily full server backups with hourly incremental backups  Redundant array of independent (or inexpensive) disks (RAID) storage devices with periodic full backups  Storage area network (SAN) devices for multiple servers  Replicated databases and folders on high-availability alternate servers

Answers

Answer:

The advantages and disadvantages of recovery strategies are described.

Explanation:

1. Weekly full server backups with daily incremental backups: It is recommended to run full copies periodically for example weekly and between copy and full copy make incremental or differential copies. Daily full server backups: It is not recommended to make copies on the same server where the information is located. Disadvantage larger storage space.

2. Daily full server backups with hourly incremental backups: Less storage space than full or differential copy. Minor copy window. Disadvantage - if any dependent copy fails, the copy cannot be restored.

3. Redundant array of independent (or inexpensive) disks (RAID) storage devices with periodic full backups: RAID allows you to store the same data redundantly (in multiple paces) in a balanced way to improve overall performance. RAID disk drives are used frequently on servers but aren't generally necessary for personal computers.

4. Replicated databases and folders on high-availability alternate servers: Easy recovery. You have all the data copied.

4. Write an interactive program CountOddDigits that accepts an integer as its inputs and prints the number of even-valued digits in that number. An even-valued digit is either 1, 3, 5, 7, or 9. For example, the number 8546587 has four even digits (the two 5s, and a 7). So the program CountOddDigits(8546587) should return "The number of Odd Digits in 8546587 is 3".

Answers

Answer:

Program :

number=int(input("Enter the number: "))#take the input from the user.

number1=number

count=0#take a variable for count.

while(number>0):#loop which check every number to be odd or not.

   value=number%10 #it is used to take the every number from integer value.

   number=int(number/10)#it is used to cut the number which is in the use.

   if(value%2!=0):#It is used to check the number to be odd.

       count=count+1#It is used to increase the value.

print("The number of Odd Digits in "+str(number1)+" is "+str(count))#It is used to print the count value of odd digit.

Output:

If the user inputs is '1234567890', it will prints "5".If the user inputs is "8546587", it will prints "3".

Explanation:

The above program is in python language, which takes the integer value from the user.Then The number will be distributed into many individual units with the help of a while loop.The while loop runs when the number is greater than 0.There is a two operation, one is used to take the number by the help of modulo operator because it gives the remainder.The second operation is used to divide the number to let the number 0.

Write a while loop that prints userNum divided by 4 (integer division) until reaching 2. Follow each number by a space. Example output for userNum = 160:

40 10 2

Note: These activities may test code with different test values. This activity will perform four tests, with userNum = 160, then with userNum = 8, then with userNum = 0, then with userNum = -1. See "How to Use zyBooks".

Also note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds, and report "Programend never reached." The system doesn't print the test case that caused the reported message.

#include
using namespace std;

int main() {
int userNum;

cin >> userNum;

/* Your solution goes here */

cout << endl;

return 0;
}

Answers

Final answer:

The solution requires creating a while loop in C++ that divides a number by 4 using integer division and prints each result until the number is less than or equal to 2.

Explanation:

To write a while loop in C++ that prints userNum divided by 4 until reaching 2, you can follow the given instructions to modify the provided code snippet. The loop should include integer division and check the condition if the current userNum is greater than 2. Here's the complete detailed code inside the main function:

#include
using namespace std;

int main() {
 int userNum;
 cin >> userNum;
 while (userNum > 2) { // Loop continues as long as userNum is greater than 2
   userNum = userNum / 4; // Integer division by 4
   cout << userNum << " "; // Printing the result followed by a space
 }
 cout << endl;
 return 0;
}

This loop will continue to execute, reducing userNum with integer division by 4, until userNum becomes less than or equal to 2. After the loop, the program will print a newline character and terminate.

Final answer:

A while loop in C++ is used to perform integer division of a user input by 4 until the value drops below or equal to 2, only printing values above 2.

Explanation:

You have been asked to write a while loop in C++ that continues to print the variable userNum divided by 4, using integer division, until the result reaches 2. Below is an example code snippet that accomplishes this task:

#include
using namespace std;
int main() {
   int userNum;
   cin >> userNum;
   while (userNum > 2) {
       userNum = userNum / 4;
       if (userNum < 2) {
           break;
       }
       cout << userNum << " ";
   }
   cout << endl;
   return 0;
}

Please note that the loop includes a check to prevent printing numbers less than 2 and ends the loop using a break statement if userNum becomes less than 2 after the division.

Write a program that does the following: 1. Uses a menu system 2. Creates an array with 25 rows and an unknow number of columns 3. You can assume that the row index represents one individual student 4. Each column represents an exam score for that individual student (the number of exams will vary by student) 5. Enter at least 10 students along with a varying number of exam scores for each different student. 6. Display the Average for all exams by each Student Id 7. Display the Average for each exam by Exam Number 8. Display the class average 9. Everything needs to be a written in Static Method 10. Do not forget your design tool The menu system will have an option to input grades for the next student. Once pressed the user will then enter how many exams that student has taken. The program will then ask the user to enter each of those exam scores. Menu will have an option to display the exam average by student. Menu will have an option to display the exam average by exam. Menu will have an option to display the current class average for all exams.

Answers

Answer:

import java.util.Scanner;

/**

*

* @author pc

*/

public class JaggedARrayAssignment {

private static int students[][] = new int[25][];//create a jagged array having 25 rows and unknown columns

public static void menu()

{

int index=0;//intitalize number of students to zero intially

Scanner sc=new Scanner(System.in);// create scanner for taking input from user

int choice;//choice

int maxExams=0;//maximum number of exams taken by any student

do

{

//print the menu

System.out.println("1-Input grades for next student");

System.out.println("2-Display the exam Average by student");

System.out.println("3-Display the exam Average by exam");

System.out.println("4-Display the current class average for all exams");

System.out.println("5-Exit");

choice=sc.nextInt();

//if choice is 1

if(choice==1)

{//ask how many xams

System.out.println("Please enter how many exams this student has taken?");

int noOfExams=sc.nextInt();//take input

students[index]=new int[noOfExams];//intialize array index by no of exams

System.out.println("Please enter the each of those exam scores one by one");//enter scores

if(maxExams<noOfExams)//if this noofexams is greater then update maxexams

maxExams=noOfExams;

//take scores from user

for(int i=0;i<noOfExams;i++)

{

students[index][i]=sc.nextInt();

}

index++;//increase index

}

else if(choice==2)

{

//calculate avregage by student and print it

System.out.println("*** Average by Student Id ***");

System.out.println("Student Id\tAverage Score");

for(int i=0;i<index;i++)

{

System.out.print((i+1)+"\t");//print student id

int sum=0;

//calculate sum

for(int j=0;j<students[i].length;j++)

{

sum=sum+students[i][j];

}

double avg=sum*1.0/students[i].length;//find average

System.out.printf("%.2f",avg);//print average by precison of two

System.out.println();

}

}

else if(choice==3)

{//caculate averag eby exams and print it

System.out.println("*** Average by Exam Number ***");

System.out.println("Exam Number\tAverage Score");

for(int i=0;i<maxExams;i++)

{

int sum=0,total=0;

for(int j=0;j<index;j++)

{

if(students[j].length>=i+1)

{

total++;

sum=sum+students[j][i];

}

}

double avg=sum*1.0/total;

System.out.print((i+1)+"\t");

System.out.printf("%.2f",avg);

System.out.println();

}

}

else if(choice ==4)

{//find iverall average

int sumtotal=0;

for(int i=0;i<index;i++)

{

int sum=0;

for(int j=0;j<students[i].length;j++)

{

sum=sum+students[i][j];

}

double avg=sum*1.0/students[i].length;

sumtotal+=avg;

}

double avgTotal=sumtotal*1.0/index;

System.out.println("Current class Average for all exams - "+avgTotal);

}

}while(choice!=5);

}

public static void main(String[] args) {

menu();

}

}

Define an iterative function named alternate_i; it is passed two linked lists (ll1 and ll2) as arguments. It returns a reference to the front of a linked list that alternates the LNs from ll1 and ll2,

Answers

Answer:

answer is attached

The problem requires the definition of an iterative function called alternate_i that takes two linked lists, ll1 and ll2, as arguments. This function should return a reference to the front of a linked list that alternates the elements from ll1 and ll2.

The problem requires the definition of an iterative function called alternate_i that takes two linked lists, ll1 and ll2, as arguments. This function should return a reference to the front of a linked list that alternates the elements from ll1 and ll2.

To solve this problem, you can create a new linked list and iterate through both ll1 and ll2 simultaneously, adding elements alternately. If either linked list becomes empty, you can append the remaining elements from the other linked list.

Here is a possible implementation:

def alternate_i(ll1, ll2):
   result = None
   current = None
   
   while ll1 is not None and ll2 is not None:
       if result is None:
           result = current = LN(ll1.value)
       else:
           current.next = LN(ll1.value)
           current = current.next
       
       current.next = LN(ll2.value)
       current = current.next
       
       ll1 = ll1.next
       ll2 = ll2.next
   
   if ll1 is not None:
       current.next = ll1
   elif ll2 is not None:
       current.next = ll2
   
   return resultThe Question is:Define an iterative function named alternate_i;it is passed two linked lists (ll1 and ll2) as arguments. It returns a reference to the front of a linked list that alternates the LNs from ll1 and ll2, starting with ll1;if either linked list becomes empty, the rest of the LNs come from the other linked list. So, all LNs in ll1 and ll2 appear in the returned result (in the same relative order, possibly separated by values from the other linked list).The original linked lists are mutated by this function (the .nexts are changed; create no new LN objects).For example, if we defined a = list_to_ll(['a', 'b', 'c',]) and b = list_to_ll([1,2,3,4,5]) alternate_i(a,b) returns a->1->b->2->c->3->4->5->None and alternate_i(b,a) returns 1->a->2->b->3- >c->4->5->None. You may not create/use any Python data structures in your code: use linked list processing only. Change only .next attributes (not .value attributes).class LN:def __init__(self,value,next=None):self.value = valueself.next = nextdef list_to_ll(l):if l == []:return Nonefront = rear = LN(l[0])for v in l[1:]:rear.next = LN(v)rear = rear.nextreturn frontdef str_ll(ll):answer = ''while ll != None:answer += str(ll.value)+'->'ll = ll.nextreturn answer + 'None'

Define a function SetBirth, with int parameters monthVal and dayVal, that returns a struct of type BirthMonthDay. The function should assign BirthMonthDay's data member month with monthVal and day with dayVal.

#include

typedef struct BirthMonthDay_struct {
int month;
int day;
} BirthMonthDay;

/* Your solution goes here */

int main(void) {
BirthMonthDay studentBirthday;
int month;
int day;

scanf("%d %d", &month, &day);
studentBirthday = SetBirth(month, day);
printf("The student was born on %d/%d.\n", studentBirthday.month, studentBirthday.day);

return 0;
}

Answers

Answer:

The method definition to this question can be described as follows:

Method definition:

BirthMonthDay SetBirth(int monthVal, int dayVal) //defining method SetBirth

{

BirthMonthDay type; //defining structure type variable  

type.month = monthVal; //holding value

type.day = dayVal;//holding value

return type; //retrun value

}

Explanation:

Definition of the method can be described as follows:

In the above method definition a structure type method "SetBirth" is defined, that accepts two integer parameter, that is "monthVal and dayVal". This method uses typedef for declaring the structure type method. Inside the method, a structure type variable that is "type" is declared, which holds the method parameter value and uses the return keyword to return its value.

Answer: DateOfBirth SetBirth (int monthVal, int dayVal){

DateOfBirth tempVal;

int numMonths = monthVal;

int numDays = dayVal;

tempVal.numMonths = numMonths;

tempVal.numDays = numDays;

return tempVal;

Explanation:

8.10 LAB: Convert to binary - functions Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x % 2 (remainder is either 0 or 1) x

Answers

Final answer:

The question requires creating a program to convert a positive integer to its binary representation using division by 2 and logging the remainders. This is related to the general mathematical concept of expressions involving bases, exponents, and logarithms.

Explanation:

The question involves writing a program to convert a positive integer into its binary equivalent. The algorithm includes repeatedly dividing the number by 2 and recording the remainder at each step, which will be either 1 or 0, until the number is reduced to 0. The remainders form the binary representation when read in reverse.

In general mathematical terms, any base b raised to a power n can be written as bn = en ln b, which can further be understood as equivalent to 10n.log10 b. This demonstrates the relationship between logarithms and exponential forms, which is a fundamental concept in converting numbers between different bases.

Write a function to check for balancing { and } in C programming language. (Assume that the entire program to be checked is given as a null-terminated string).

Answers

Answer:

Balanced

Explanation:

// CPP program to check for balanced parenthesis.  

#include<bits/stdc++.h>  

using namespace std;  

 

// function to check if paranthesis are balanced  

bool areParanthesisBalanced(string expr)  

{  

   stack<char> s;  

   char x;  

 

   // Traversing the Expression  

   for (int i=0; i<expr.length(); i++)  

   {  

       if (expr[i]=='('||expr[i]=='['||expr[i]=='{')  

       {  

           // Push the element in the stack  

           s.push(expr[i]);  

           continue;  

       }  

 

       // IF current current character is not opening  

       // bracket, then it must be closing. So stack  

       // cannot be empty at this point.  

       if (s.empty())  

          return false;  

 

       switch (expr[i])  

       {  

       case ')':  

 

           // Store the top element in a  

           x = s.top();  

           s.pop();  

           if (x=='{' || x=='[')  

               return false;  

           break;  

 

       case '}':  

 

           // Store the top element in b  

           x = s.top();  

           s.pop();  

           if (x=='(' || x=='[')  

               return false;  

           break;  

 

       case ']':  

 

           // Store the top element in c  

           x = s.top();  

           s.pop();  

           if (x =='(' || x == '{')  

               return false;  

           break;  

       }  

   }  

 

   // Check Empty Stack  

   return (s.empty());  

}  

 

// Driver program to test above function  

int main()  

{  

   string expr = "{()}[]";  

 

   if (areParanthesisBalanced(expr))  

       cout << "Balanced";  

   else

       cout << "Not Balanced";  

   return 0;  

}

Give a linear-time algorithm to sort the ratios of n given pairs of integers between 1 and n. I.e., we need to sort, within O(n) time, n pairs of the form (ai , bi) where 1 ≤ ai ≤ n and 1 ≤ bi ≤ n using the sort key ai bi . Prove both run-time and correctness.

Answers

Answer:

12

Explanation:

The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have the same birthday? It is possible to determine the answer to this question via simulation. Using the starting template provided to you, complete the function called calc birthday probability that takes as input n and returns the probability that two or more of the n people will have the same birthday. To do this, the function should create a list of size n and generate n birthdays in the range 1 to 365 randomly, inclusive of the end-points 1 and 365. It should then check to see if any of the n birthdays are identical. The function should perform this experiment 106 times and calculate the fraction of time during which two or more people had the same birthday. The function will be called as follows from your main program:

IN PYTHON PLEASE

import random

def calc_birthday_probability (num_people):

random.seed (2020) # Don't change this value

num_trials = 1000

probability = 0
""" FIXME: Complete this function to return the probability of two or more people in the room having the same birthday. """

return probability

Answers

Answer:

He had a nearly 71% chance that 2 or more of us would share a birthday.

Explanation:

This program will output a right triangle based on user-specified height triangleHeight and symbol triangleChar.
(1) The given program outputs a fixed-height triangle using a * character. Modify the given program to output a right triangle that instead uses the user-specified triangleChar character.
(2) Modify the program to use a nested loop to output a right triangle of height triangleHeight. The first line will have one user-specified character, such as % or *. Each subsequent line will have one additional user-specified character until the number in the triangle's base reaches triangleHeight. Output a space after each user-specified character, including a line's last user-specified character.
Example output for triangleChar = % and triangleHeight = 5:
Enter a character: %
Enter triangle height: 5

%
% %
% % %
% % % %
% % % % %

#include
usingnamespacestd;
intmain()
{
char triangleChar='-';
inttriangleHeight=0;
cout<<"Enter a character: "< cin>>triangleChar;

cout<<"Enter triangle height: "<>triangleHeight;
cout<<"@"<<" "< cout<<"@"<<" "<<"@"<<" "< cout<<"@"<<" "<<"@"<<" "<<"@"<<" "<
return0;
}

Answers

Answer:

The above program is not correct, the correct program in c++ langauge is as follows:

#include <iostream>//header file.

using namespace std; //package name.

int main() //main function.

{

  char char_input;//variable to take charater.

  int size,i,j;//variable to take size.

  cout<<"Enter the size and charter to print the traingle: ";//user message.

  cin>>size>>char_input; //take input from the user.

  for(i=0;i<size;i++)//first for loop.

  {

     for(j=0;j<=i;j++)//second for loop to print the series.

       cout<<char_input<<" ";//print the charater.

     cout<<"\n";//change the line.

  }

  return 0; //returned statement.

}

Output:

If the user inputs 5 for the size and '%' for the charater, then it will prints the above series example.

Explanation:

The above program is written in C++ language, in which there are two for loop which prints the series.The first for loop runs n time, where n is the size given by the user.The second loop is run for every iteration value of the first for loop.For example, if the first for loop runs for the 2 times, then the second for loop runs 1 time for the first iteration of the first loop and 2 times for the second iteration of the first loop.

A Layer 2 firewall is also called a(n) _____. Group of answer choices

packet-filtering router
bastion host
packet-filtering bridge
application-level gateway
circuit-level gateway

Answers

Answer:

packet-filtering bridge

Explanation:

A Layer 2 transparent firewall operates on bridged packets and is enabled on a pair of locally-switched Ethernet ports. Embedded IP packets forwarded through these ports are inspected similar to normal IP packets in a routing network.

Write a program that determines the commission for a sales person's weekly sales. The program will first ask for a sales person's name and then for sales for each day of the week (M-Su)! Then the total will be printed along with the commission. The commission is set at 10%.

Answers

Answer:

# The user is prompt to enter name

name = str(input("Enter the name: "))

# the user is prompt to enter monday sale

mon = int(input("Enter Monday sales: "))

# the user is prompt to enter tuesday sale

tue = int(input("Enter Tuesday sales: "))

# the user is prompt to enter wednesday sales

wed = int(input("Enter Wednesday sales: "))

# the user is prompt to enter thursday sales

thurs = int(input("Enter Thursday sales: "))

# the user is prompt to enter friday sales

fri = int(input("Enter Friday sales: "))

# the user is prompt to enter saturday sales

sat = int(input("Enter Saturday sales: "))

# the user is prompt to enter sunday sales

sun = int(input("Enter Sunday sales: "))

# the total is calculated

total = mon + tue + wed + thurs + fri + sat + sun

# the commission is calculated

commission = (10 * total) / 100

# the total is displayed

print(name, "your total is: ", total)

# the commission is displayed

print(name, "your commission is: ", commission)

Explanation:

The program is written in Python. And the program is well-commented.

Answer:

Find the python script below. Copy and paste directly into your python interpreter. Attached is  also the formatting

Explanation:

def check_number(a):    

   flag = True

   try:

       int(a)

   except ValueError:

       try:

           float(a)

       except ValueError:

           flag = False

           print("wrong input!")

           

   return(flag)

print("Welcome To Weekly Commission Calculator")

name = input("Input your name please and press enter:  ")

check = False

while(check==False):

   day1 = input ("Enter the sales for day 1 and press enter: ")

   check = check_number(day1)  

   continue

check = False

while(check==False):

   day2 = input ("Enter the sales for day 2 and press enter: ")

   check = check_number(day2)  

   continue

check = False

while(check==False):

   day3 = input ("Enter the sales for day 3 and press enter: ")

   check = check_number(day3)  

   continue

check = False

while(check==False):

   day4 = input ("Enter the sales for day 4 and press enter: ")

   check = check_number(day4)  

   continue

check = False

while(check==False):

   day5 = input ("Enter the sales for day 5 and press enter: ")

   check = check_number(day5)  

   continue

check = False

while(check==False):

   day6 = input ("Enter the sales for day 6 and press enter: ")

   check = check_number(day6)  

   continue

check = False

while(check==False):

   day7 = input ("Enter the sales for day 7 and press enter: ")

   check = check_number(day7)  

   continue

Total_sales = float(day1)+float(day2)+float(day3)+float(day4)+float(day5)+float(day6)+float(day7)

#rate = 10%  

rate = 0.1

#commission = rate * Total sales

Commission = rate * Total_sales

print("Total sales is " ,Total_sales)

#print("%s is %d years old." % (name, age))

print("Total sales for %s is $%d and the commission is $%e." % (name, Total_sales,Commission))

Write a function in MATLAB called MYCURVEFIT that determines the y value of a best fit polynomial equation based on a single input, an x value. Predict the y value by fitting a 3rd order polynominal y=f(x) to the data points shown below. The input will be a single x value in the range of 0 to 20. The output should be a single y value obtained by evaluating the best fit third order polynomial at x.

X=0:0.5:20

Y=[14,16,18,22,28,35,50,68,90,117,154,200,248,309,378,455,550,654,770,900,1044,1200,1378,1560,...
1778,2004,2250,2500,2800,3100,3434,3786,4158,4555,4978,5424,5900,6401,6930,7474,8074]

You need to copy and paste the data above into your function

Answers

Solution:

The following will be used:

clc% clears screen

clear all% clears history

close all% closes all files

format long

MY CURVEFIT(7)

function y = MYCURVEFIT(x)

X = 0:0.5:20;

Y = [14, 16, 18, 22, 28, 35, 50, 68, 90, 117, 154, 200, 248, 309, 378, 455, 550, 654, 770, 900, 1044, 1200, 1378, 1560, 1778, 2004, 2250, 2500, 2800, 3100, 3434, 3786, 4158, 4555, 4978, 5424, 5900, 6401, 6930, 7474, 8074];

C = polyfit (X,Y,3);

y = polyval (C,x);

end

You have enabled IPv6 on two of your routers, but on the interfaces you have not assigned IPv6 addresses yet. You are surprised to learn that these two machines are exchanging information over those interfaces. How is this possible?a. Due to anycast addressingb. Due to ICMPv6c. Due to the NATv6 capabilityd. Due to the link-local IPv6 addresses

Answers

Answer:

You have enabled IPv6 on two of your routers, but on the interfaces you have not assigned IPv6 addresses yet. You are surprised to learn that these two machines are exchanging information over those interfaces. How is this possible?

a. Due to anycast addressing

b. Due to ICMPv6

c. Due to the NATv6 capability

d. Due to the link-local IPv6 addresses

The correct answer is D. Due to the link-local addresses

Explanation:

LINK-LOCAL ADDRESS

Link-local addresses are addresses that can be used for unicast communications on a confined LAN segment.  The requirement with these addresses is that they are only locally-significant (i.e., restricted to a single LAN broadcast domain) and are never used to source or receive communications across a layer-3 gateway.

Typically, link-local IPv6 addresses have “FE80” as the hexadecimal representation of the first 10 bits of the 128-bit IPv6 address, then the least-significant 64-bits of the address are the Interface Identifier (IID).  Depending on the IID algorithm the node’s operating system is using, the IID may use either modified EUI-64 with SLAAC, the privacy addressing method (RFC 4941)), or the newly published Stable SLAAC IID method(RFC 8064).

When a host boots up, it automatically assigns an FE80::/10 IPv6 address to its interface.  You can see the format of the link-local address below. It starts with FE80 and is followed by 54 bits of zeros. Lastly, the final 64-bits provide the unique Interface Identifier.

FE80:0000:0000:0000:abcd:abcd:abcd:abcd

Link-local IPv6 addresses are present on every interface of IPv6-enabled host and router.  They are vital for LAN-based Neighbor Discovery communication.  After the host has gone through the Duplicate Address Detection (DAD) process ensuring that its link-local address (and associated IID) is unique on the LAN segment, it then proceeds to sending an ICMPv6 Router Solicitation (RS) message sourced from that address.

IPv6 nodes send NS messages so that the link-layer address of a specific neighbor can be found. There are three operations in which this message is used:

▪   For detecting duplicate address

▪   Verification of neighbor reachability

▪   Layer 3 to Layer 2 address resolution (for ARP replacement)  ARP is not included in IPv6 as a protocol but rather the same functionality is integrated into ICMP as part of neighbor discovery. NA message is the response to an NS message.  From the figure the enabling of interaction or communication between neighbor discoveries between two IPv6 hosts can be clearly seen.

Create a program called InsertionSort.java that implements the Insertion Sort algorithm. The program should be able to do the following:
-accepts two command line parameters, the first one is an integer specifying how many strings to be sorted, and the second one is the path to a text file containing the values of these strings, one per line.
-reads the strings from the text file into an array of strings. sorts the strings using InsertionSort, and then print out a sorted version of those input strings with one string per line.
The implementation should follow the given pseudo code/algorithm description.

Answers

Answer:

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

public class InsertionSort {

   public static void insertionSort(String[] array) {

       int n = array.length;

       for (int i = 1; i < n; i++)

       {

           String temp = array[i];

           int j = i - 1;

           while (j >= 0 && temp.compareTo(array[j]) < 0)

           {

               array[j + 1] = array[j];

               j--;

           }

           array[j+1] = temp;

       }

   }

   public static void main(String[] args) {

       if (args.length == 2) {

           int n = Integer.parseInt(args[0]);

           File file = new File(args[1]);

           try {

               Scanner fin = new Scanner(file);

               String[] strings = new String[n];

               for (int i = 0; i < n; i++) {

                   strings[i] = fin.nextLine();

               }

               insertionSort(strings);

               for (int i = 0; i < n; i++) {

                   System.out.println(strings[i]);

               }

               fin.close();

           } catch (FileNotFoundException e) {

               System.out.println(file.getAbsolutePath() + " is not found!");

           }

       } else {

           System.out.println("Please provide n and filename as command line arguments");

       }

   }

}

Explanation:

In a ring-based system, procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5,6,9). In which ring(s) must p execute for the following to happen?

Answers

Complete Question:

Consider Multics procedures p and q. Procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5, 6) and its call bracket is (6, 9). Assume that q's access control list gives p full (read, write, append, and execute) rights to q. In which ring(s) must p execute for the following to happen?

A) p can invoke q, but a ring-crossing fault occurs.

B) p can invoke q provided that a valid gate is used as an entry point.

C) p cannot invoke q.

D) p can invoke q without any ring-crossing fault occurring, but not necessarily through a valid gate

Answer:

If we suppose the access bracket as (a, b) and call bracket as (b, c), for q we have (a, b) = (5, 6) and (b, c) = (6, 9). Let the ring be denoted by r.

A) p can invoke q, but a ring-crossing fault occurs.

p must execute in rings where r < a., in r < 5, p must execute.

B) p can invoke q provided that a valid gate is used as an entry point.

p must execute in the rings between 6 and 9. r must be between a and b.

C) p cannot invoke q.

When r > c, then p cannot invoke q. That means, for this condition to happen p must execute in rings > 9

D) p can invoke q without any ring-crossing fault occurring, but not necessarily through a valid gate

When r is between a and b then the condition can be satisfied. That means p must execute in rings between 5 and 6.

Explanation:

Answer:

A.Rings 0 through 4

B. Rings 7 through 9

C.Ring number greater than 9

D.Riing 5 or 6

Explanation

(a)p can invoke q, but a ring-crossing fault occurs. R< a1 for access permitted but ring crossing fault occurs. Therefore, go through - rings 0 through 4.

(b)p can invoke q provided a valid gate is used as an entry point.

A2 < r <= a3 for access allowed if make through a valid gate. Therefore, go through - rings 7 through 9.

(c)p cannot invoke q.

a3 < r for all access denied. Hence, proceed through - ring with number greater than 9.

(d)p can invoke q without any ring-crossing fault occurring, but not through a valid gate.proceed through – ring 5 or 6.

2. Given the following list, write a snippet of code that would print the individual elements of the list using the indexes of the elements. my_list = [‘Rain fell from blue sky’, ’while I was having coffee,’, ‘procrastinating’]

Answers

Answer:

my_list = ["Rain fell from blue sky", "while I was having coffee,", "procrastinating"]

print(my_list[0])

print(my_list[1])

print(my_list[2])

Explanation:

Using Python Programming language:

Since the given list contains three string elements, the indexes are from 0-2

The print function can then be used to print elements are specific indexes as given above

Write a C program that inputs four strings that represent integers, converts the string to integers, sums the values and prints the total of the four.

Answers

The C program is an illustration of integers, converts the string to integers, sums the values, and prints the total of the four.

What is a coding program?

A coding program is a sort of software that is used just for codings, such as Java, C, C#, C++ Python, and many more. A coding program is an executable form of program that is built on programmers' and machine tools' intelligence.

As per the question, Here is a C program that inputs four strings that represent integers, converts the string to integers, sums the values, and prints the total of the four:

#include <stdio.h>

#include <stdlib.h>

int main()

{

char str1[10], str2[10], str3[10], str4[10];

int num1, num2, num3, num4, sum;

// Input four strings

printf("Enter the first number: ");

scanf("%s", str1);

printf("Enter the second number: ");

scanf("%s", str2);

printf("Enter the third number: ");

scanf("%s", str3);

printf("Enter the fourth number: ");

scanf("%s", str4);

// Convert strings to integers

num1 = atoi(str1);

num2 = atoi(str2);

num3 = atoi(str3);

num4 = atoi(str4);

// Calculate sum

sum = num1 + num2 + num3 + num4;

// Print sum

printf("The sum is: %d\n", sum);

return 0;

}

Learn more about the programming language here:

https://brainly.com/question/7344518

#SPJ5

Write a public static method called getPIDs that has a parameter of type Map called nameToPID (keys are student names and values are student PIDs). It should return a HashSet containing all PIDs in nameToPID.

Answers

Answer:

Java program is explained below

Explanation:

import java.util.HashSet;

import java.util.Map;

import java.util.TreeMap;

public class TruckRace1 {

   public static HashSet<String> getPIDs (Map<String,String>nameToPID ){

       HashSet<String> pidSet = new HashSet<>();

       for(String ids: nameToPID.values()){

           pidSet.add(ids);

       }

       return pidSet;

   }

   public static void main(String[] args) {

       Map<String,String> pids = new TreeMap<>();

       pids.put("John","123");

       pids.put("Jason","124");

       pids.put("Peter","125");

       pids.put("Alice","126");

       pids.put("Peny","129");

       HashSet<String> ids = getPIDs(pids);

       for(String id:ids){

           System.out.println(id);

       }

   }

}

The following data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm is used: A B ESC C ESC FLAG FLAG D. What is the output after stuffing?

Answers

Byte-stuffing is applied to the data stream 'A B ESC C ESC FLAG FLAG D', resulting in the stuffed output 'A B ESC ESC C ESC ESC ESC FLAG ESC FLAG ESC FLAG D'.

The question is about byte-stuffing which is a technique used in data transmission to distinguish data from control information. In byte-stuffing, special bytes like ESC (escape) and FLAG are inserted into the data stream to encode occurrences of these bytes in the data. Considering the data fragment 'A B ESC C ESC FLAG FLAG D' and assuming ESC is used to escape control bytes, and FLAG is a control byte, the output after stuffing would be 'A B ESC ESC C ESC ESC ESC FLAG ESC FLAG ESC FLAG D'. This ensures that the receiver can differentiate between actual data and control bytes.

When you need to discipline employees, it is important to discipline different employees differently for the same policy violation in order to prevent them from becoming complacent. It is necessary to work independently from the human resources department and create your own procedures.

Answers

Answer: False

Explanation:

Employees should be discipline same way for same policy violations. This will give the employees the impression that no one was cheated or given preferential treatment. Everyone gets same stroke for same offence. The human resources department can't be do away with. They are the ones in charge of employees.

Final answer:

Disciplining employees should be consistent and fair, in line with established company policies and procedures in collaboration with the human resources department. Formal sanctions are part of disciplinary actions, while maintaining open communication and problem-solving focus. It is also critical to handle serious infractions with urgency and proper protocol.

Explanation:

Disciplining Employees and Workplace Policies

When it comes to disciplining employees, consistency and fairness are key principles. It is a misconception that disciplining different employees differently for the same policy violation prevents complacency; instead, it may create perceptions of unfairness and preferential treatment, which can demoralize staff and lead to bigger issues within the workplace. All disciplinary actions should adhere to the established procedures, working in concert with the human resources department, to ensure that the actions are legally defensible and align with company values and policies.

Employees must understand the expectations set for them and the potential consequences of failing to meet those standards. Formal sanctions such as termination or suspension are tools that can be used to enforce norms and deter rule-breaking behavior. Additionally, it is crucial to focus on problem-solving and open communication when addressing issues; this encourages a culture of accountability and improvement. Demonstrating respect for authority and offering exceptional customer service are behaviors that should be modeled and encouraged within the workplace.

It is also important to recognize the impact of personal relationships in small groups, where informal checks and balances often operate alongside formal mechanisms to regulate behavior. Nonetheless, serious infractions that endanger others, such as workplace violence, need immediate attention and should be handled with the appropriate urgency and procedure, often involving supervisors or security personnel.

Write a C function namedliquid()that is to accept an integer number and theaddresses of the variablesgallons,quarts,pints, andcups. The passed integer rep-resents thetotalnumber of cups, and the function is to determine the number of gal-lons, quarts, pints, and cups in the passed value. Using the passed addresses, the functionshould directly alter the respective variables in the calling function. Use the relationshipsof 2 cups to a pint, 4 cups to a quart, and 16 cups to a gallon.

Answers

Answer:

#include <stdio.h>

#include <math.h>

void liquid(int ,int*,int*,int*,int*);

int main()

{

int num1, gallons, quarts, pints, cups;  

printf("Enter the number of cups:");

scanf("%2d",&num1);  

liquid(num1, &gallons, &quarts, &pints, &cups);  

return 0;

}  

void liquid(int x, int *gallons, int *quarts, int *pints, int *cups)

{

static int y;

y = x;  

if (y >= 16)

{

*gallons = (y / 16);

printf("The number of gallons is %3d\n", *gallons);

}

if (y - (*gallons * 16) >= 4)

{

*quarts = ((y - (*gallons * 16)) / 4);

printf("The number of quarts is %3d\n", *quarts);

}

if ((y - (*gallons * 16) - (*quarts * 4)) >= 2)

{

*pints = ((y - (*gallons * 16) - (*quarts * 4)) / 2);

printf("The number of pints is %3d\n", *pints);

}

if ((y - (*gallons * 16) - (*quarts * 4) - (*pints *2)) < 2 || y == 0)

{

*cups = (y - (*gallons * 16) - (*quarts * 4) - (*pints *2));

printf("The number of cups is %3d\n", *cups);

}

return;

}

Other Questions
Find a. If necessary, round your answer to the nearest hundredth. Sorry the picture was upside down. :( What is the resistance of a copper wire 200 ft long and 0.016'' in diameter (T= 20C)? A car accelerates uniformly from rest and reaches a speed of 21.5 m/s in 11.4 s. The diameter of a tire is 66.5 cm. Find the number of revolutions the tire makes during this motion, assuming no slipping. Answer in units of rev. You hold a diversified portfolio consisting of a $10,000 investment in each of 15 different common stocks (i.e., your total investment is $150,000). The portfolio beta is equal to 1.2 . You have decided to sell one of your stocks which has a beta equal to 1.4 for $10,000. You plan to use the proceeds to purchase another stock which has a beta equal to 1.3 . What will be the beta of the new portfolio? Show your answer to 2 decimal places. Question 6Darwin realized that Malthus ideas about human population growth applied even more to other organisms, such as ____. a. tigers are overpopulating the earth. b. mammals carefully raise one or two young per year. c. insect populations grow unchecked each year. d. cockroaches produce millions of eggs but only a few survive. A restaurant is considering adding fresh brook trout to itsmenu. Customers would have the choice of catching theirown trout from a simulated mountain stream or simply ask-ing the waiter to net the trout for them. Operating thestream would require $11,925 in fixed costs per year.Variable costs are estimated to be $6.80 per trout. The firmwants to break even if 900 trout dinners are sold per year. What should be the price of the new item? g according to the American Lung Association, 7% of the population has lung disease. Of those having lung disease, 90% are smokers; and of those not having lung disease, 25% are smokers. What is the probability that a smoker has lung disease? During the current year, Merkley Company disposed of three different assets. On January 1 of the current year, prior to the disposal of the assets, the accounts reflected the following:Asset Original Cost Residual Value Estimated Life Accumulated Depreciation (straight line)Machine A $21,000 $3,000 8 years $15,750 (7 years)Machine B 50,000 4,000 10 years 36,800 (8years)MachineC 85,000 5,000 15 years 64,000 (12 years)The machines were disposed of during the current year in the following ways:a. Machine A: Sold on January 1 for $5,000 cash.b. Machine B: Sold on December 31 for $10,500; received cash, $2,500, and an $8,000 interest-bearing (12 percent) note receivable due at the end of 12 months.c. Machine C: On January 1, this machine suffered irreparable damage from an accident. On January 10, a salvage company removed the machine at no cost.Prepare journal entries for the above transactions. We engage in a number of signal detection tasks on a daily basis. What is a signal detection task you frequently encounter? Do you find that you respond differently in this task depending on your internal state, such as when you feel hungry or fatigued? what developments in science intellectual affairs and the arts in the late nineteenth and early twentieth centures opened the way to a modern consciousness and how did this consciousness differ from earlier worldviews In the Hazelwood v. Kuhlmeier case, the Supreme Court ruled that censorship in a public school newspaper was acceptable "so long as their actions are reasonably related to legitimate pedagogical (educational) concerns." Judging from this ruling, the likely complaint of the students and editors who wrote for the newspaper was that which right was being violated? Which of the following characteristics is characteristic of type 2 transitional B lymphocytes? Because of the way the Texas Constitution of 1876 was written, _____ in Texas has more influence on how the state is governed than in other parts of the United States where lawmaking authorities have the staff, time, and resources to be more specific and involved in state government. Whats the opposite?a. Running 150 feet east.b.jumping down 10 steps.c.Pouring 8 gallons into a fish tank. How does the distance the Earth is from the Sun affect its orbit? Assume Oliver wants to earn a return of 10.50% and is offered the opportunity to purchase a $1,000 par value bond that pays a 8.75% coupon rate (distributed semiannually) with three years remaining to maturity. The following formula can be used to compute the bonds intrinsic value:Intrinsic ValueIntrinsic Value = A/(1+C)^1+A/(1+C)^2+A/(1+C)^3+A/(1+C)^4+A/(1+C)^5+A/(1+C)^6+B/(1+C)^6Based on this equation and the data, it is _______ (unreasonable/reasonable) to expect that Olivers potential bond investment is currently exhibiting an intrinsic value less than $1,000.Now, consider the situation in which Oliver wants to earn a return of 11.75%, but the bond being considered for purchase offers a coupon rate of 8.75%. Again, assume that the bond pays semiannual interest payments and has three years to maturity. If you round the bonds intrinsic value to the nearest whole dollar, then its intrinsic value of _______ (rounded to the nearest whole dollar) is _______ (equal to/greater than/less than) its par value, so that the bond is ______ (trading at premium/par/discount). Which nation was a member of the triple alliance Suppose the price of a bag of frozen chicken nuggets decreases from $6.50 to $5.75 and, as a result, the quantity of bags demanded increases from 600 to 800. Using the midpoint method, the price elasticity of demand for frozen chicken nuggets in the given price range is:_______. a. 0.35 b. 0.43 c. 2.33 d. 2.89 what did the prophets warn the kingdoms about, and did they listen? explain the vineyard or potter analogy to summarize their messagesi need this fast A decrease of one unit in the pH scale above represents a tenfold increase in the hydrogen ion concentration of a solution. For example, a solution having a pH of 4 is 10 times more acidic than a solution with a pH of 5. If acid precipitation rain changes the pH of a pond from 7.5 to 6.5, the level of hydrogen ion has changed by a factor of ________A) 2.0B) 10C) 13.0D) 100E) 0.01