Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3. Your program should make use of the sqrt() method. Math.sqrt(number).

Answers

Answer 1

Answer:

I am writing a JAVA program. Let me know if you want the program in some other programming language.

public class FourthRoot{ //class to calculate fourth root of 81

public static void main(String[] args) { //start of main() function body

   double square_root; //declares to hold the fourth root of 81

   double number=81; // number is assigned the value 81

/* calculates the fourth root of number using sqrt() method twice which means sqrt() of sqrt(). This is equivalent to pow(number,(0.25)) where pow is power function that computes the fourth root by raising the number 81 to the power of 0.25 which is 1/4 */

   square_root=Math.sqrt(Math.sqrt(number));

//displays the fourth root of 81 i.e. 3

     System.out.println("Fourth Root of 81 is "+ square_root); } }

Explanation:

The program is well explained in the comments given along with each statement of the program . Since it was the requirement of the program to user Math.sqrt() method so the fourth root of number= 81 is computed by taking the sqrt() of 81 twice which results in the fourth root of 81 which is 3.

So the first sqrt(81) is 9 and then the sqrt() of the result is taken again to get the fourth root of 81. So sqrt(9) gives 3. So the result of these two computations is stored in square_root variable and the last print statement displays this value of square_root i.e. the fourth root of number=81 which is 3.

Another way to implement the program is to first take sqrt(81) and store the result in a variable i.e. square_root. After this, again take the sqrt() of the result previously computed and display the final result.

public class FourthRoot{

   public static void main(String[] args) {

   double square_root;

   double number=81;

   square_root=Math.sqrt(number);

  System.out.println("Fourth Root of 81 is: "+ Math.sqrt(square_root)); } }

The program along with its output is attached in a screenshot.

Write, Compile And Test (show Your Test Runs!) Program That Calculates And Returns The Fourth Root Of

Related Questions

.Pretend you are ready to buy a new computer for personal use.First, take a look at ads from various magazines and newspapers and list terms you don’t quite understand. Look up these terms and give a brief written explanation. Decide what factors are important in your decision as to which computer to buy and list them. After you select the system you would like to buy, identify which terms refer to hardware and which refer to software.

Answers

Answer:

Brainly is not meant to give paragraph answers to large questions.

In a computer (desktop)

There are 8-9 main components to a PC

Motherboard

CPU

GPU (for gamers)

RAM

SSD

HDD

PSU

Cooling fans (for AMD processors stock fans are included)

Case (some fans included)

I personally build my computers (desktops) as its cheaper and I won't have to pay a build fee.

Your boss wants you to start making your own Ethernet cables to save the company money. What type of connectors will you need to order to make them?

Answers

Answer:

Bulk Ethernet Cable - Category 5e or CAT5e

Bulk RJ45 Crimpable Connectors for CAT-5e

Explanation:

CHALLENGE ACTIVITY |
6.2.2: Function call in expression.
Assign to maxSum the max of (numa, numB) PLUS the max of (numy, numz). Use just one statement. Hint: Call FindMax() twice in an expression.
1. #include
2. using namespace std; passed
3.
4. double FindMax(double numi,
5. double num2) { double maxVal; emos
6.
7. // Note: if-else statements need not be understood to complete this activity
8. if (numi > num2) { // if num1 is greater than num2,
9. maxVal = num1; // then num1 is the maxVal.
10.
11. All tests passed else
12. {maxVal = num2; // Otherwise, // num2 is the maxval.
13.
14.
15. return maxVal;
16. }
17.
18. int main() {
19. double numA;
20. double numB;
21. double numY;
22. double numz;

Answers

Answer:

maxSum = FindMax(numA, numB) + FindMax(numY, numZ);  

The maxSum is a double type variable which is assigned the maximum of the two variables numA numB PLUS the maximum of the two variables numY numZ using FindMax function. The FindMax() method is called twice in this statement one time to find the maximum of numA and numB and one time to find the maximum of numY numZ. When the FindMax() method is called by passing numA and numB as parameters to this method, then method finds if the value of numA is greater than that of numB or vice versa. When the FindMax() method is called by passing numY and numZ as parameters to this method, then method finds if the value of numY is greater than that of numZ or vice versa. The PLUS sign between the two method calls means that the resultant values returned by the FindMax() for both the calls are added and the result of addition is assigned to maxSum.

Explanation:

This is where the statement will fit in the program.

#include <iostream>

using namespace std;

double FindMax(double num1, double num2) {

  double maxVal = 0.0;    

  if (num1 > num2) { // if num1 is greater than num2,

     maxVal = num1;  // then num1 is the maxVal.    }

  else {          

     maxVal = num2;  // num2 is the maxVal.   }

  return maxVal; }  

int main() {

  double numA;

  double numB;

  double numY;

  double numZ;

  double maxSum = 0.0;  

maxSum = FindMax(numA, numB) + FindMax(numY, numZ);  

  cout << "maxSum is: " << maxSum << endl;   }

Lets take an example to explain this. Lets assign values to the variables.

numA = 6.0

numB = 3.0

numY = 4.0

numZ = 9.0

maxSum =0.0

maxSum = FindMax(numA, numB) + FindMax(numY, numZ);  

FindMax(numA,numB) method call checks if numA>numB or numB>numA and returns the maximum of the two. Here numA>numB because 6.0 is greater than 3.0. So the method returns numA i.e. 6.0

FindMax(numY, numZ) method call checks if numY>numZ or numZ>numY and returns the maximum of the two. Here numZ>numY because 9.0 is greater than 4.0. So the method returns numZ i.e. 9.0

FindMax(numA, numB) + FindMax(numY, numZ) this adds the two values returned by the method FindMax for each call.

FindMax returned maxVal from numA and numB values which is numA i.e. 6.0.

FindMax returned maxVal from numY and numZ values which is numZ i.e. 9.0.

Adding these two values 9.0 + 6.0 = 15

So the complete statement  FindMax(numA, numB) + FindMax(numY, numZ) gives 15.0  as a result.

This result is assigned to maxSum. Hence

maxSum = 15

To see the output on the screen you can use the print statement as:

cout<<maxSum;

This will display 15

The code for function calling is coded below.

To assign the maximum sum of `(numA, numB)` plus the maximum of `(numY, numZ)` to the variable `maxSum` using just one statement, you can call the `FindMax()` function twice in an expression.

Here's the code:

maxSum = FindMax(numA, numB) + FindMax(numY, numZ);

This code calls the `FindMax()` function twice, once with the parameters `(numA, numB)` and again with the parameters `(numY, numZ)`.

It calculates the maximum of each pair of numbers using the `FindMax()` function and then adds the two maximum values together. The result is assigned to the `maxSum` variable.

Learn more about Function call here:

https://brainly.com/question/31798439

#SPJ6

Write code to create a list of numbers from 0 to 67 and assign that list to the variable nums. Do not hard code the list. Save & RunLoad HistoryShow CodeLens

Answers

Answer:

The program written in Python is as follows

nums = []

for i in range(0,68):

-->nums.append(i)

print(nums)

Explanation:

Please note that --> is used to denote indentation

The first line creates an empty list

nums = []

This line creates an iteration from 0 to 67, using iterating variable i

for i in range(0,68):

This line saves the current value of variable i into the empty list

nums.append(i)

At this point, the list has been completely filled with 0 to 67

This line prints the list

print(nums)

A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.) A. LCD power inverter B. AC adapter C. Battery D. Processor E. VGA card F. Motherboard G. Backlit keyboard H. Wireless antenna

Answers

Answer:

A. LCD power inverter

B. AC adapter

C. Battery

A service provider recently upgraded one of the storage clusters that houses non-confidential data for clients. The storage provider wants the hard drives back in working condition. Which of the following is the BEST method for sanitizing the data given the circumstances?

a. Hashing
b. Wiping
c. Purging
d. Degaussing

Answers

Answer:

c. Purging

Explanation:

Based on the information provided it can be said that the best method for sanitizing the data would be Purging. This is a process that permanently erases the data from a specific storage unit. Doing so prevents data from being recovered by an expert and also frees up storage and memory space to be used for other information. Since it is very inexpensive and provides the best overall results this would be the best option in this scenario.

Would these statements cause an error? Why or why not? int year = 2019; int yearNext = 2020; int & ref = year; & ref = yearNext;

Answers

Answer: YES

Explanation:

int year=2019;

int yearNext=2020;

 int &ref=year;

&ref=yearNext; {This line leads to error as references cannot be reassigned}

(//compilation error: lvalue required as left operand of assignment

) lvalue(&ref) is not something which can be assigned.

To get this better, here are the difference between pointers and reference variables

Pointers

Pointers can be incremented

Array can be formed with pointers

Pointers can be reassigned

Pointer can be declared as void  

Reference variable

References cannot be incremented

Array cannot be formed with references

References cannot be reassigned as references shares the address of the variable its assigned

References can never be void

Suppose you are provided with 2 strings to your program. Your task is to join the strings together so you get a single string with a space between the 2 original strings. This is a common case is coding and you will need to create your output by joining the inputs and adding the space in the middle.

# Input from the command line
import sys
string1 = sys.argv[1]
string2 = sys.argv[2]

Answers

Answer:

public class TestImport{

   public static void main(String[] args) {

       String string1 = args[1];

       String string2 = args[2];

       System.out.println(string1 +" " +string2);

   }

}

Explanation:

The solution here is to use string concatenation as has been used in this statement System.out.println(string1 +" " +string2);

When this code is run from the command line and passed atleast three command line arguments for index 0,1,2 respectively, the print statment will return the second string (that is index1) and the third argument(that is index2) with a space in-between the two string.

You are in a rectangular maze organized in the form of M N cells/locations. You are starting at the upper left corner (grid location: (1; 1)) and you want to go to the lower right corner (grid location: (M;N)). From any location, you can move either to the right or to the bottom, or go diagonal. I.e., from (i; j) you can move to (i; j + 1) or (i + 1; j) or to (i+1; j +1). Cost of moving right or down is 2, while the cost of moving diagonally is 3. The grid has several cells that contain diamonds of whose value lies between 1 and 10. I.e, if you land in such cells you earn an amount that is equal to the value of the diamond in the cell. Your objective is to go from the start corner to the destination corner. Your prot along a path is the total value of the diamonds you picked minus the sum of the all the costs incurred along the path. Your goal is to nd a path that maximizes the prot. Write a dynamic programming algorithm to address the problem. Your algorithm must take a 2-d array representing the maze as input and outputs the maximum possible prot. Your algorithm need not output the path that gives the maximum possible prot. First write the recurrence relation to capture the maximum prot, explain the correctness of the recurrence relation. Design an algorithm based on the recurrence relation. State and derive the time bound of the algorithm. Your algorithm should not use recursion

Answers

Answer:

Following are the description of the given points:

Explanation:

A) The Multiple greedy approaches could exist, which could be to reach for the closest emergency diamond, and yet clearly we are going to miss some very essential routes in that case. So, it can make every argument quickly, and seek to demonstrate a reference case for that.

B) An approach to the evolutionary algorithm and its users are going to just have states M x N. But each state (i, j) indicates the absolute difference between the amount of the selected diamond and the amounts of the costs incurred.

DP(i, j) = DimondVal(i, j) + max ((DP(i, j-1)-2), (DP(i-1,j-1)-3))

DP(i, j) is a description of the state.

DimondVal(i, j) is the diamond value at (i j), 0 if there is no diamond available.

This states must calculate the states of M N  and it involves continuous-time for each State to determine. Therefore the amount of time of such an algo is going to be O(MN).

Driving is expensive. Write a program with a car's miles/gallon (as float), gas dollars/gallon (as float), the number of miles to drive (as int) as input, compute the cost for the trip, and output the cost for the trip. Miles/gallon, dollars/gallon, and cost are to be printed using two decimal places. Note: if milespergallon, dollarspergallon, milestodrive, and trip_cost are the variables in the program then the output can be achieved using the print statement: print('Cost to drive {:d} miles at {:f} mpg at $ {:.2f}/gallon is: $ {:.2f}'.format(milestodrive, milespergallon, dollarspergallon, trip_cost)) Ex: If the input is: 21.34 3.15

Answers

Answer:

milespergallon = float(input())

dollarspergallon = float(input())

milestodrive = int(input())

trip_cost = milestodrive / milespergallon * dollarspergallon

print('Cost to drive {:d} miles at {:f} mpg at $ {:.2f}/gallon is: $ {:.2f}'.format(milestodrive, milespergallon, dollarspergallon, trip_cost))

Explanation:

Get the inputs from the user for milespergallon, dollarspergallon and milestodrive

Calculate the trip_cost, divide the milestodrive by milespergallon to get the amount of gallons used. Then, multiply the result by dollarspergallon.

Print the result as requested in the question

Answer:

def driving_cost(driven_miles, miles_per_gallon, dollars_per_gallon):

  gallon_used = driven_miles / miles_per_gallon

  cost = gallon_used * dollars_per_gallon  

  return cost  

miles_per_gallon = float(input(""))

dollars_per_gallon = float(input(""))

cost1 = driving_cost(10, miles_per_gallon, dollars_per_gallon)

cost2 = driving_cost(50, miles_per_gallon, dollars_per_gallon)

cost3 = driving_cost(400, miles_per_gallon, dollars_per_gallon)

print("%.2f" % cost1)

print("%.2f" % cost2)

print("%.2f" % cost3)

Explanation:

C++ PROGRAM THAT DOES THE FOLLOWING:
Problem You Need to Solve for This Lab:
You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should save the data back to the same data file when the program exits.
What Your Program Should Do:
Write an interactive text based menu interface (using a loop) that will allow the user to
 Enter information for a new song
 Display information for all the songs in the database with index for each song
 Remove a song by index
 Search for songs by a certain artist
 Search for songs by a certain album
 Quit

Answers

Answer:

I have updated answer in google

Explanation:

please chek it. I hope it will nice

I have tried looking for this answer everywhere, and I could not find the answer

I have a Windows 10 Laptop, with a 12GB RAM Card, okay? I also have my 1TB Disk Partitioned so that I have 3 Disks. 2 of them are my primary, both of those are 450GB apiece. The last one ([tex]Z:[/tex]) I named "RAM" and set that one to 100GB.

How do I turn the drive [tex]Z:[/tex] into strictly RAM?
I already did the Virtual Memory part of it, but I was wondering if I can make it strictly RAM so the system uses drive [tex]Z:[/tex] before using the RAM disk? If it is not possible, I'm sorry.

Answers

If my computer has 4 gigabytes of ram memory then I have 4e+9 bytes of memory.  I think-

Answer: That isn't a software problem, its a hardware problem. There is a difference between 12gb of ram versus 100 gb of HDD. Ram is temporary storage, you can not turn SSD or HDD storage into RAM. If you are a gamer, STEER AWAY FROM LAPTOPS, DO NOT BUY A GAMING LAPTOP. Either buy a DESKTOP (or build) or a console. They give more performance for the price and they are easily upgradable. Not many people can open up a laptop and put in more RAM because the hardware is incredibly small.

ZigBee is an 802.15.4 specification intended to be simpler to implement, and to operate at lower data rates over unlicensed frequency bands.

a. True
b. False

Answers

Answer:

True

Explanation:

Solution

ZigBee uses unlicensed frequency bands but operate at slower speed or data rates.

ZigBee: This communication is particular designed for control and sensor networks on IEEE 802.15.4 requirement for wireless personal area networks (WPANs), and it is a outcome from Zigbee alliance.

This communication level defines physical and  (MAC) which is refereed to as the Media Access Control layers to manage many devices at low-data rates.

The advantage of returning a structure type from a function when compared to returning a fundamental type is that

Answers

Answer:

The function can return multiple values and the function can return an object

Explanation:

The advantage of returning a structure type from a function when compared to returning a fundamental type is that the function can return multiple values and also the function can return an object

A function in a structure can be passed to a function from any other function or from the main function itself and the definition of a structure can be seen in the function where it is found

Megan was working on an image for a presentation. She had to edit the image to get the style she wanted. Below is the original picture and her final picture. Which best describes how she edited her picture? She cropped the blue background and added contrast corrections. She removed the complex blue background and added contrast corrections. She cropped the blue background and added artistic effects. She removed the complex blue background and added artistic effects.

Answers

Answer:

She removed the complex blue background and added artistic effects.

Explanation:

This is the best answer because both aspects are correct. If Megan were to "Crop" the backgrounds the shape would have changed and she would not have been able to get the whole background without cropping some of the flowers out. Therefore it is not A or C. The pictured change is most definitely artistic effects. So D is the best option.

Answer:

She removed the complex blue background and added artistic effects.

Explanation:

on edg

Do transformers have life insurance or car insurance? If you chose life insurance, are they even alive?

Answers

Answer:

Car insurance

Explanation:

they are machines with ai

Write a program that create Employee class with fields id,name and sal and create Employee object and store data and display that data.

Answers

Answer:

Here is the C++ program for Employee class with fields id,name and sal.

#include <iostream>  // to use input output functions

#include <string>  //to manipulate and use strings

using namespace std;   // to access objects like cin cout

class Employee {  //class Employee

private:  

/* the following data members are declared as private which means they can only be accessed by the functions within Employee class */

  string name;  //name field

  int id; //id field

  double sal;   //salary field

public:    

  Employee();  // constructor that initializes an object when it is created

/* setName, setID and setSalary are the mutators which are the methods used to change data members. This means they set the values of a private fields i.e. name, id and sal */

  void setName(string n)  //mutator for name field

     { name = n; }        

  void setId(int i)  //mutator for id field

     { id = i; }        

  void setSalary(double d)  //mutator for sal field

     { sal = d; }  

/* getName, getID and getSalary are the accessors which are the methods used to read data members. This means they get or access the values of a private fields i.e. name, id and sal */

  string getName()  //accessor for name field

     { return name; }        

  int getId()  //accessor for id field

     { return id; }        

  double getSalary()  //accessor for sal field

     { return sal; }  };  

Employee::Employee() {  //default constructor where the fields are initialized

  name = "";  // name field initialized

  id = 0;  // id field initialized to 0

  sal = 0;   }   // sal field initialized to 0

void display(Employee);  

// prototype of the method display() to display the data of Employee

int main() {  //start of the main() function body

  Employee emp;  //creates an object emp of Employee class

/*set the name field to Abc Xyz which means set the value of Employee class name field to Abc Xyz  through setName() method and object emp */

  emp.setName("Abc Xyz");  

/*set the id field to 1234 which means set the value of Employee class id field to 1234  through setId() method and object emp */

  emp.setId(1234);

/*set the sal field to 1000 which means set the value of Employee class sal field to 1000  through setSalary() method and object emp */

  emp.setSalary(1000);    

  display(emp);  }   //calls display() method to display the Employee data

void display(Employee e) {  // this method displays the data in the Employee //class object passed as a parameter.

/*displays the name of the Employee . This name is read or accessed through accessor method getName() and object e of Employee class */

  cout << "Name: " << e.getName() << endl;  

/*displays the id of the Employee . This id is read or accessed by accessor method getId() and object e */

  cout << "ID: " << e.getId() << endl;

/*displays the salary of the Employee . This sal field is read or accessed by accessor method getSalary() and object e */

  cout << "Salary: " << e.getSalary() << endl;  }

Explanation:

The program is well explained in the comments mentioned with each statement of the program.

The program has a class Employee which has private data members id, name and sal, a simple default constructor Employee(), mutatator methods setName, setId and setSalary to set the fields, acccessor method getName, getId and getSalary to get the fields values.

A function display( ) is used to display the Employee data i.e. name id and salary of Employee.

main() has an object emp of Employee class in order to use data fields and access functions defined in Employee class.

The output of the program is:

Name: Abc Xyz                                                                                                      

ID: 1234                                                                                                                  

Salary: 1000

The program and its output are attached.

The main path of the Internet along which data travels the fastest is known as the Internet ________. Group of answer choices

Answers

Answer:

Internet backbone

Explanation:

The internet backbone is made up of multiple networks from multiple users. It is the central data route between interconnected computer networks and core routers of the Internet on the large scale. This backbone does not have a unique central control or policies, and is hosted by big government, research and academic institutes, commercial organisations etc. Although it is governed by the principle of settlement-free peering, in which providers privately negotiate interconnection agreements, moves have been made to ensure that no particular internet backbone provider grows too large as to dominate the backbone market.

Makers of tablet computers continually work within narrow constraints on cost, power consumption, weight, and battery life. Describe what you feel would be the perfect tablet computer. How large would the screen be? Would you rather have a longer-lasting battery, even if it means having a heavier unit? How heavy would be too heavy? Would you rather have low cost or fast performance Should the battery be consumer-replaceable?

Answers

Answer:

In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.

In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.

What will be the typical runtime of a tablet?

The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets.

The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets. It might go a week or longer between charges if you only use the tablet once or twice each day.

Many people find that charging merely 80% is ineffective. Your phone won't function if you fully charge it and then use it in a single day. The 40-80% rule applies if, like me, your daily usage is limited to 25–50%.

The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets.                          

Therefore, In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.

Learn more about battery on:

https://brainly.com/question/19225854

#SPJ2

Write a program that displays the values in the list numbers in ascendingorder sorted by the sum of their digits.

Answers

Answer:

Here is the Python program.

def DigitList(number):  

   return sum(map(int, str(number)))  

 

list = [18, 23, 35, 43, 51]  

ascendList = sorted(list, key = DigitList)  

print(ascendList)

Explanation:

The method DigitList() takes value of numbers of the list as parameter. So this parameter is basically the element of the list. return sum(map(int, str(number)))  statement in the DigitList() method consists of three methods i.e. str(), map() and sum(). First the str() method converts each element of the list to string. Then the map() function is used which converts every element of list to another list. That list will now contain digits as its elements. In short each number is converted to the string by str() and then the digit characters of each string number is mapped to integers. Now these digits are passed to sum() function which returns the sum. For example we have two numbers 12 and 31 in the list so each digit is 1 2 and 3 1 are added to get the sum 3 and 4. So now the list would have 3 4 as elements.

Now list = [18, 23, 35, 43, 51] is a list of 5 numbers. ascendList = sorted(list, key = DigitList)  statement has a sorted() method which takes two arguments i.e. the above list and a key which is equal to the DigitList which means that the list is sorted out using key=DigitList. DigitList simply converts each number of list to a another list with its digits as elements and then returns the sum of the digits. Now using DigitList method as key the element of the list = [18, 23, 35, 43, 51] are sorted using sorted() method. print(ascendList) statement prints the resultant list with values in the list in ascending order sorted by the sum of their digits.

So for the above list [18, 23, 35, 43, 51] the sum of each number is 9 ,5, 8, 7, 6 and then list is sorted according to the sum values in ascending order. So 5 is the smallest, then comes 6, 7, 8 and 9. So 5 is the sum of the number 23, 6 is the sum of 51, 7 is the sum of 43, 8 is the sum of 35 and 9 is the sum of 18. So now after sorting these numbers according to their sum the output list is:

[23, 51, 43, 35, 18]                                                                                                          

What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation?

Answers

Answer:

Linked lists and arrays are both linear data structures but while an array is a collection of items that can be accessed randomly, a linked list can be accessed sequentially.

A sparse matrix contains very few non-zero elements. For example;

_                        _

|  0   0   3  0  6    |

|   0   5   0  0  4   |

|   2   0   0  0  0   |

|_ 0   0   0  0  0 _|

In the implementation of a sparse matrix, the following are some of the pros and cons of using a linked list over an array;

PROS

i.  Linked lists are dynamic in nature and are readily flexible - they can expand and contract without having to allocate and/or de-allocated memory compared to an array where an initial size might need to be set and controlled almost manually. This makes it easy to store and remove elements from the sparse matrix.

ii. No memory wastage. Since the size of a linked list can grow or shrink at run time, there's no memory wastage as it adjusts depending on the number of items it wants to store. This is in contrast with arrays where you might have unallocated slots. Also, because the zeros of the sparse matrix need not be stored when using linked lists, memory is greatly conserved.

CONS

i. One of the biggest cons of linked lists is the difficulty in traversing items. With arrays, this is just of an order of 0(1) since the only requirement is the index of the item. With linked lists, traversal is sequential which means slow access time.

ii. Storage is another bottle neck when using linked lists in sparse matrix implementation. Each node item in a linked list contains other information that needs to be stored alongside the value such as the pointer to the next or previous item.

g Write a C program that prompts the user for a string of, up to 50, characters and numbers. It can accept white spaces and tabs and end with a return. The program should keep track of the number of different vowels (a,e, i, o, u) and the number of digits (0, 1, 2, 3, 4, 5, 6, 7, 8,9). The program should output the number of occurrences of each vowel and the number of occurrences of all digits.

Answers

Answer:

Following are the code to this question:

#include <stdio.h> //defining header file

#include <string.h>//defining header file

int main()//defining main method

{

char name[50]; //defining character variable

int A=0,E=0,I=0,O=0,U=0,value=0,i,l; //defining integer variables

printf("Enter string value: ");//print message

gets(name);//input value by gets method

l=strlen(name);//defining l variable to store string length

for(i=0; i<50; i++) //defining loop to count vowels value

{

if(name[i] == 'A' || name[i] == 'a') //defining if condition count A value A++;//increment value by 1

else if(name[i] == 'E' || name[i] == 'e')//defining else if condition count E value

E++;//increment value by 1

else if(name[i] == 'I' || name[i] == 'i') //defining else if condition count I value

I++;//increment value by 1

else if(name[i] == 'O' || name[i]== 'o') //defining else if condition count O value

O++;//increment value by 1

else if(name[i] == 'U' || name[i] == 'u')//defining else if condition count U value

U++;//increment value by 1

else if(name[i]>= '0' && name[i] <= '9')//defining else if condition count digits value

value++;//increment value by 1 }

printf("A: %d\n",A);//print A value

printf("E: %d\n",E); //print E value

printf("I: %d\n",I);//print I value

printf("O: %d\n",O);//print O value

printf("U: %d\n",U);//print U value

printf("value: %d",value);//print digits value

return 0;

}

Output:

please find the attachment.

Explanation:

In the above code, a char array "name" and integer variables "A, E, I, O, U, i, value and l" declared, in which name array store 50 character value, which uses the gets function to take string value.after input value strlen method is used to store the length of the input string in l variable.In the next step, for loop is declared that uses multiple conditional statements to counts vowels and the values of the digits,if it is more then one it increments its value and at the last print method is used to print its count's value.

What's the value of this Python expression? ((10 >= 5*2) and (10 <= 5*2))

Answers

Answer:

1 (true)

Explanation:

10 == 10 is valid=> 10 >= 10 is valid => 10 >=(5*2) is valid

10 == 10 is valid=> 10 <= 10 is valid => 10 <=(5*2) is valid

=>  ((10 >= 5*2) and (10 <= 5*2)) is valid => Return 1 or True

What will be the tokens in the following statement? StringTokenizer strToken = new StringTokenizer("January 1, 2008", ", ", true);

Answers

Answer:

The tokens are:

January

space

1

,

space

2008

Explanation:

StringTokenizer class is basically used to break a string into tokens. The string consists of numbers, letters, quotation marks commas etc,

For example if the string is "My name is ABC" then StringTokenizer will break this string to following tokens:

My

name

is

ABC

So in the above example, the string is "January 1, 2008". It contains January with a space, then 1, then a comma, then 2008

The last comma and true in the statement do not belong to the string. They are the parameters of the StringTokenizer constructor i.e.

StringTokenizer(String str, String delim, boolean flag)

So according to the above constructor str= "January 1, 2008"

String delim is ,

boolean flag = true

So  the StringTokenizer strToken = new StringTokenizer("January 1, 2008", ", ", true); statement has:

a string January 1, 2008

a delim comma with a space (, ) which is used to tokenize  the string "January 1, 2008".

boolean flag set to true which means the delim i.e. (, ) is also considered to be a token in the string. This means the comma and space are considered to be tokens in the given string January 1, 2008.

Hence the output is January space 1 comma space 2008.

Check the attached image to see the output of the following statement.

What is the name of the provision of services based around hardware virtualization?

Answers

Explanation:

Hardware virtualization refers to the creation of virtual (as opposed to concrete) versions of computers and operating systems. ... Hardware virtualization has many advantages because controlling virtual machines is much easier than controlling a physical server.

The name of the provision of services based around hardware visualization is called cloud computing

The cloud hypervisor is the software that is made use of during hardware visualization. The hypervisor does the function of managing hardware resources involving the customer and the service provider.

The work of hypervisor is that it manages the physical hardware resource which is shared between the customer and the provider.

Read more on https://brainly.com/question/13088836?referrer=searchResults

#Write a function called random_marks. random_marks should #take three parameters, all integers. It should return a #string. # #The first parameter represents how many apostrophes should #be in the string. The second parameter represents how many #quotation marks should be in the string. The third #parameter represents how many apostrophe-quotation mark #pairs should be in the string. # #For example, random_marks(3, 2, 3) would return this #string: #'''""'"'"'" # #Note that there are three apostrophes, then two quotation #marks, then three '" pairs. #Add your function here!

Answers

Answer:

def random_marks(apostrophe, quotation, apostrophe_quotation):

   return "'"*apostrophe + "\""*quotation + "'\""*apostrophe_quotation

   

print(random_marks(3, 2, 3))

Explanation:

Create a function called random_marks that takes apostrophe, quotation, and apostrophe_quotation as parameters. Inside the function, return apostrophe sign times apostrophe plus quotation mark times quotation plus apostrophe sign quotation mark times apostrophe_quotation.

Note that plus sign (+) is used to concatenate strings. Also, if you multiply a string with a number, you get that number of strings ("#"*3 gives ###).

Then, call the function with given parameters and print

Convert the following numbers from decimal to binary, assuming unsigned binary representation:________.
A) 35
B) 3
C) 27
D) 16

Answers

Answer:

Binary representations of following are:

A) 35 = 100011

B) 3 = 11

C) 27 = 11011

D) 16 = 10000

Explanation:

The method to generate the binary number from a decimal is :

Keep on dividing the number by 2 and keep on tracking the remainder

And the quotient is again divided and remainder is tracked so that the number is completely divided.

And then write the binary digits from bottom to top.

Please have a look at the method in below examples:

A) 35

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 35 & 1 \\ 2 & 17 & 1 \\ 2 & 8 & 0 \\ 2 & 4 & 0 \\ 2 & 2 & 0 \\ 2 & 1 & 1\end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary number is 100011

B) 3

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 3 & 1 \\ 2 & 1 & 1 \\ \end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary equivalent is 11.

C) 27

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 27 & 1 \\ 2 & 13 & 1 \\ 2 & 6 & 0 \\ 2 & 3 & 1 \\ 2 & 1 & 1 \end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary equivalent is 11011.

D) 16

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 16 & 0 \\ 2 & 8 & 0 \\ 2 & 4 & 0 \\ 2 & 2 & 0 \\ 2 & 1 & 1 \\\end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary equivalent is 10000.

Answers are:

Binary representations of following are:

A) 35 = 100011

B) 3 = 11

C) 27 = 11011

D) 16 = 10000

When preparing a photo for a magazine, a graphic designer would most likely need to use a program such as Microsoft Excel to keep track of magazine sales. Microsoft Word to write an article about the photo. Adobe Photoshop to manipulate the photo. Autodesk Maya to create 3-D images that match the photo.

Answers

Answer:

Adobe Photoshop To Manipulate The Photo.

Explanation:

BLACKPINKS new album is amazing OMG I LOVE Lovesick Girls!!!

Explain why an organization's firewall should block incoming packets the destination address of which is the organization's broadcast address?

Answers

Answer:

The classification including its given topic has always been outlined in section through below justifications.

Explanation:

Whenever an application running seems to have the destination as either the destination network of the organization, it must use the sophisticated instruments. This would also pressure each host mostly on infrastructure to collect the traffic coming as well as processing the message. Increases system should perhaps be restricted because it will not significantly impact channel or device productivity.Therefore, the firewall of a standard operating organization will block certain traffic with IP addresses as destination host of the organization.Another thing to remember here seems to be that transmitted destination details are usually indicators of an intruder using only a target computer as something of a transmitter. An assailant utilizing a broadcasting channel can trigger the transmitter to occur on a different machine.  

4.Three years ago your company bought a new RAID 5 array. All the disks in the RAID were brand new, all manufactured within a month of each other. Today one disk has failed in this RAID. How many disks do you replace

Answers

Answer:

one disk

Explanation:

RAID 5:is an  independent disks configuration of redundant array that utilizes disk striping in addition to parity. Data and parity bits are striped uniformly across the entire the disks configuration, so that no any single disk can create a bottleneck.  

"Today one disk has failed in this RAID. How many disks do you replace"

Since RAID 5 guard against data through implementation of stripping of both data and parity bits, the failed disk can be replaced to restore the company's RAID 5 array fully back into service.

Other Questions
The freezing point of water in degrees Celsius is [ Select ] __________. The freezing point of water in degrees Fahrenheit is [ Select ] __________. The freezing point of water in Kelvin is [ Select ] __________. (Use whole numerals/numbers for all choices no letters or symbols) "A few graves in the cemetery were marked with crumbling tombstones; newer ones were outlined with brightly colored glass and broken Coca-Cola bottles. Lighting rods guarding some graves denoted dead who rested uneasily; stumps of burned-out candles stood at the heads of infant graves." In the excerpt above, what best describes the way in which the author is using a semicolon? The fair comes to town, and Alex and his father go to the archery range. His father agreed to let him have ten arrows. For each arrow that hit the target, Alex got two more arrows. At the end, Alex had used a total of 40 arrows. How many arrows hit a target in all? Shiatsu is a type of massage that promotes relaxation through _________, which uses pressure on various points of the body to release blocked energy. Solve the quadratic equation x2 + 14x = 51 by completing the square.Question 3 options:A) x = 17, x = 3B) x = 17, x = 3C) x = 3, x = 17D) x = 3, x = 17 The following transactions and events occurred during the year. Assuming that this company uses the indirect method to report cash provided by operating activities, indicate where each item would appear on its statement of cash flows by placing an X in the appropriate column.Statement of Cash Flow Noncash Investing & Financing Activities Not Reported on Statement or in NotesOperating Activities Investing Activities Financing Activitiesa. Declared and paid a cash dividend b. Recorded depreciation expense c. Paid cash to settle long-term note payable d. Prepaid expenses increased in the year e. Accounts receivable decreased in the year f. Purchased land by issuing common stock g. Inventory increased in the year h. Sold equipment for cash, yielding a loss i. Accounts payable decreased in the year j. Income taxes payable increased in the year Question 3 of 102 PointsWhich of the following best describes how the Federal Reserve Bank helpsbanks during a bank run?A. The Federal Reserve Bank acts as an insurance company thatpays customers if their bank fails.B. The Federal Reserve Bank regulates exchanges to prevent thedemand for withdrawals from rising above the required reserveratio.C. The Federal Reserve Bank has the power to take over a privatebank if customers demand too many withdrawals.D. The Federal Reserve Bank can provide a short-term loan to banksto prevent them from running out of money.SUBMIT *DIFFICULT QUESTION, LAST QUESTION HELP* How did the death of Chinese leader Hu Yaobang in 1989 lead to the protests in Tiananmen Square? a.) As a reform leader, Hu Yaobang had tried to transform China's government into a democracy with free and open elections. b.) Activists in the democratic movement in China occupied Tiananmen Square to mourn Hu Yaobang's death and demand more reforms. c.) Students came out to demonstrate against the assassination of Hu Yaobang and demand that his killer be brought to justice. d.) Students in China were hesitant to trust any communist leader, and Hu Yaobang's treachery was the final straw that led to revolt. Cules tres culturas han influido la cultura de Puerto Rico? Find the value of this expression if x = -7.X2 +7/xEnter the correct answer. The average daily rainfall for the past week in the town of Hope Cove is normally distributed, with a mean rainfall of 2.1 inches and a standard deviation of 0.2 inches. If the distribution is normal, what percent of data lies between 1.9 inches and 2.3 inches of rainfall? a) 95% b) 99.7% c) 34% d) 68% Please answer this correctly without making mistakes What is the value of x in the equation 4x +8y=40, when y=0,8? Differentiate x^(-3)/3-2x^2-x^(-1) women perform better than men when they are put in leadership positions. write to against the motion Robyn saves up $204 and spends $32.50 on books. She wants to purchase more books from a sale where they cost $8.15 each. Which equation represents the situation? A. 204x=8.15+32.5 B. 8.15x+32.5=204 C. 8.15+32.5x=204 D. 32.5x=2048.15 II. Edit the following passage. There is an error in each line. Write the incorrect word and the correction. incorrect correction 1. Wander along the streets of NewYork city, (a)__________ __________ my daughters and me stop at shoe stores wherever (b) __________ __________ we happens to be. This is their choice. These, who (c)___________ __________ as little girl, teetered around the house (d)___________ __________ balance like cranes in my mothers high heels. (e)___________ __________ I sits on the bench and wait while they try on (f)___________ __________ shoe on shoe readjusting their position (g)___________ __________ in a mirror , eyes downcast considering their feet. (h)___________ __________ 2. Music therapy use music to improve the patients (a) __________ __________ health. It is used with individuals of all ages. It helps in (b)___________ __________ curing a variety of medical problems as substance abuse and (c) ___________ __________ aging. It is also used to improve in learning and reduces stress. (d)___________ __________ Help me pls I need help Which HTML tag is formatted correctly? This is a heading This is a heading This is a title This is a paragraph SOMEONE PLZZZ HELP ME WITH THIS QUESTION!! I'd be immensely grateful :/