Advanced Sounds is engaging in a full upgrade of its Windows Server 2003 network to Windows Server 2008. The upgrade includes using Windows Server 2008 Active Directory. Advanced Sounds has pioneered many technological innovations and is very concerned about keeping its network and computer systems secure. Advanced Sounds Information Technology (IT) Department hires you to help them implement Windows Server 2008 Active Directory. Assume the following:
All email servers have been consolidated back in the New York City Complex.
Most all the other applications running on Windows Servers are distributed at all sixteen locations.
Each location at minimum has a file server, a print server and a local application server.
All locations have adequate Wide Area network connections with available capacity; 10 Mbps links
The New York location has enough network capacity to serve all 16 locations.
There are 500 people at the New Your City complex.
There are 200 people at the Quebec City location and 200 at the Montreal location.
There are 40-50 people at each outlet store.
Advanced Sounds IT Department has formed a small installation planning committee consisting of the IT server operations manager, two system programmers, the current Active Directory administrator, and you. After the first meeting they have asked you to prepare a small report to address the following questions:
A. What information is required as input to the initial installation involving Active Directory? a=
B. How many Active directory servers do you propose?
C. Where will the Active directory server(s) be located?

Answers

Answer 1

Answer:

cs

Explanation:


Related Questions

What is a digital security risks?

Answers

Answer:

A digital security risk is an action that could result in damage to a computer or similar device's hardware, software, data etc.

Which of the following statements about CASE is not true?CASE tools provide automated graphics facilities for producing charts.CASE tools reduce the need for end user participation in systems development.CASE tools have capabilities for validating design diagrams and specifications.CASE tools support collaboration among team members.CASE tools facilitate the creation of clear documentation

Answers

Answer:

CASE tools reduce the need for end user participation in systems development.

Explanation:

CASE is an acronym for Computer-aided Software Engineering and it comprises of software application tools that provide users with automated assistance for Software Development Life Cycle (planning, analysing, designing, testing, implementation and maintenance). The CASE tools helps software developers in reducing or cutting down of the cost and time of software development, as well as the enhancement of the software quality.

Some other benefits of using the CASE tools are;

- CASE tools provide automated graphics facilities for producing charts.

- CASE tools have capabilities for validating design diagrams and specifications.

- CASE tools support collaboration among team members.

- CASE tools facilitate the creation of clear documentation.

- CASE tools checks for consistency, syntax errors and completeness.

The CASE tools can be grouped as, requirement and structure analysis, software design, test-case and code generation, reverse engineering, and document production tools.

Examples of CASE tools are flowchart maker, visible analyst (VA), dreamweaver, net-beans, microsoft visio, adobe illustrator and photoshop etc.

It's inventiveness, uncertainty futuristic ideas typically deal with science and technology.what is it?

Answers

Answer:

Engineering and Science

Explanation:

Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private attributes int num_of_items which hold the number of items ordered. For example, if num_of_items is 5, then cost[0], cost[1], ..., cost[4] hold the cost of these 5 items. Implement the member function named total_cost which returns the total cost of this OrderList.

Answers

Answer:

OrderList.java

public class OrderList {    private double cost[];    private int num_of_items;        public OrderList(){        cost = new double[100];    }    public double total_cost(){        double total = 0;        for(int i=0; i < num_of_items; i++){            total += cost[i];        }        return total;    } }

Main.java

public class Main {    public static void main(String[] args) {        OrderList sample = new OrderList();        double totalCost = sample.total_cost();    } }

Explanation:

Firstly, define a class OrderList with two private attributes, cost and num_of_items (Line 1-3). In the constructor, initialize the cost attribute with a double type array with size 100. Next, create another method total_cost() to calculate the total cost of items (Line 9-15). To implement the total_cost member function, create an OrderList instance and use that instance to call the total_cost() and assign it to totalCost variable.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet capture, next generation.

(a) .packcng
(b) .paccapnextg
(c) .pcnextgen
(d) .pcapng

Answers

Answer:

Option (d) is correct

Explanation:

Previously saved capture files can be read using Wireshark. For this, select the File then open the menu. Then Wireshark will pop up the “File Open” dialog box.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a .pcapng extension, which stands for packet capture, next generation.

. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Today, a symmetric session key needs to be 100 bits long to be considered strong. How long will a symmetric session key have to be in 30 years to be considered strong?

Answers

Answer:

130 bits

Explanation:

If the length of a key = N bits

Total number of key combinations = [tex]\frac{2^{N} }{2}[/tex]

For a key length of 100, the total number of key combinations will be  [tex]\frac{2^{100} }{2} = 2^{99}[/tex] combinations. This is a whole lot and it almost seems impossible to be hacked.

The addition of  one bit to the length of the symmetric key in 1 year is sufficient to make the key strong, because even at double its speed, the processor can still not crack the number of combinations that will be formed.

Therefore, if a bit is added to the key length per year, after 30 years, the length of the symmetric session key will be 130 bits.

What is an accessory?
A.a security setting that controls the programs children can use
B.a tool that provides proof of identity in a computing environment
C.a set of programs and applications that help users with basic tasks
D.a set of gadgets and widgets that makes it easier to create shortcuts

Answers

Answer:

C

Explanation:

Accessories are in Microsoft windows, a set of programs and applications that help users with some basic tasks

Managers can use __ software to discuss financial performance with the help of slides and charts

Answers

Answer:

presentation

Explanation:

Software like Google Slides and Microsoft Powerpoint can be utilized to present financial performances through the use of slides and charts.

A number of LC-3 instructions have an "evaluate address" step in the instruction cycle, in which a 16-bit address is constructed and written to the Memory Address Register via the MARMUX. List all LC-3 instructions that write to the MAR during the evaluate address phase of the instruction cycle, with the Register Transfer description of each.

Answers

Answer: you want to list all LC structers

Explanation:

For this project, you have to write 3 functions. C++

1. remove_adjacent_digits. This takes in 2 arguments, a std::vector, and a std::vector of the same size. You need to return a std::vector, where each of the strings no longer has any digits that are equal to, one more, or one less, than the corresponding integer in the 2nd vector.

2. sort_by_internal_numbers. This takes in a single argument, a std::vector, and you need to return a std::vector, which is sorted as if only the digits of each string is used to make a number.

3. sort_by_length_2nd_last_digit. This takes in a std::vector>. It returns a vector of the same type as the input, which is sorted, first by the length of the string in the pair, and if they are the same length, then the second last digit of the int.

See the test cases for examples of each of the above functions.

You need to submit a single file called main.cpp that contains all these functions. You can (and should) write additional functions as well. There is no need for a main function.

No loops (for, while, etc) are allowed. You must use only STL algorithms for this project.

Answers

Find the given attachments

is brainly down? Cant search anything

Answers

You need to have WIFI

Pretend that your mother is a real estate agent and that she has decided to automate her daily tasks by using a laptop computer. Consider her potential hardware and software needs and create a hardware and software specification that describes them. The specification should be developed to help your mother buy her hardware and software on her own.

Answers

TJ life was the way to get

The specification should be developed to help your mother buy her hardware and software on her own is hardware.

Which is hardware?

Hardware refers back to the computer's tangible additives or shipping structures that shop and run the written commands furnished through the software program. The software program is the intangible a part of the tool that shall we the consumer have interaction with the hardware and command it to carry out unique tasks.

A few automatic software programs could ship messages, alert and notifications to the customer in addition to the owner.The pc need to be of respectable potential and processing pace three. Video calling software program to have interaction with the clients. Softwares like Excel to keep the information and all An running gadget of right here convenience 4.320 to 500 GB difficult drive three.2.2 GHz of processor. Long battery life Software: three GB RAM.

Read more about the hardware :

https://brainly.com/question/3273029

#SPJ2

Write a program that accepts any number of homework scores ranging in value from 0 through 10. Prompt the user for a new value if they enter an alphabetic character. Store the values in array. Calculate the average excluding the lowest and highest scores. Display the average as well as the highest and lowest score that were discarded.

Answers

Answer:

This program is written in C++

Note that the average is calculated without the highest and the least value.

Comments are used for explanatory purpose

See attachment for .cpp file.

Program starts here

#include<iostream>

using namespace std;

int main()

{

int num;

cout<<"Enter Number of Test [0-10]: ";

//cin>>num;

while(!(cin>>num) || num > 10|| num<0)

{

cout << "That was invalid. Enter a valid digit: "<<endl;

cin.clear(); // reset the failed input

cin.ignore(123,'\n');//Discard previous input

}

//Declare scores

int scores[num];

//Accept Input

for(int i =0;i<num;i++)

{

cout<<"Enter Test Score "<<(i+1)<<": ";

cin>>scores[i];

}

           //Determine highest

           int max = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] > max)

               {

                   max = scores[i];

               }

           }

           //Determine Lowest

           int least = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] < least)

               {

                   least = scores[i];

               }

           }

           int sum = 0;

           //Calculate total

           for(int i =0; i< num;i++)

           {

               sum += scores[i];

           }

           //Subtract highest and least values

           sum = sum - least - max;

           //Calculate average

           double average = sum / (num - 2);

           //Print Average

           cout<<"Average = "<<average<<endl;

           //Print Highest

           cout<<"Highest = "<<max<<endl;

           //Print Lowest

           cout<<"Lowest = "<<least;

return 0;  

}

For this assignment, you will create flowchart using Flowgorithm and Pseudocode for the following program example:
Hunter Cell Phone Company charges customer's a basic rate of $5 per month to send text messages. Additional rates apply as such:
The first 60 messages per month are included in the basic bill
An additional 10 cents is charged for each text message after the 60th message and up to 200 messages.
An additional 25 cents is charged for each text after the 200th message
Federal, state, and local taxes add a total of 12% to each billThe company wants a program that will accept customer's name and the number of text messages sent. The program should display the customer's name and the total end of the month bill before and after taxes are added.

Answers

Answer:

The pseudocode is as given below in the explanation while the flow diagram is attached herewith

Explanation:

The pseudocode is as follows

input cust_name, num_texts  

Set Main_bill=5 $;

if the num_texts is less than or equal to 60

Excess_Charge=0;

If the num_texts is greater than 60 and less than or equal to 200

num_text60200 =num_texts-60;

Excess_Charge=0.1*(num_text60200);

else If the num_texts is greater than 60

num_texts200 =num_texts-200;

Excess_Charge=0.25*(num_texts200)+0.1*(200-60);

Display cust_Name

Total_Bill=Main_bill+Excess_Charge;

Total_Bill_after_Tax=Total_Bill*1.12;

Mikayla wants to create a slide with a photograph of a car and the car horn sounding when a user clicks on the car. Which
feature should she use, and why?
a. She should use the Action feature because it allows a user to embed a hyperlink for an Internet video on the car.
b. She should use the Video from Website feature because it allows a user to embed a hyperlink for an Internet video on the car.
c. She should use the Action feature because it allows a user to place an image map with a hotspot on the car.
d. She should use the Video from Website feature because it allows a user to place an image map with a hotspot on the car.

Answers

Answer: A

Explanation: edge :)

Answer:

C

Explanation:

Assume passwords are selected from four character combinations of 26 lower case alphabetic characters. Assume an adversary is able to attempt passwords at a rate of 1 per second. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password

Answers

Answer:

Given:

Passwords are selected from 4 characters.

Character combinations are 26 lower case alphabetic characters.

Passwords attempts by adversary is at rate of 1 second.

To find:

Expected time to discover the correct password

Explanation:

Solution:

4 character combinations of 26 alphabetic characters at the rate of one attempt at every 1 second = 26 * 4 = 104

So 104 seconds is the time to discover the correct password. However this is the worst case scenario when adversary has to go through every possible combination. An average time or expected time to discover the correct password is:

13 * 4 = 52

You can also write it as 104 / 2 = 52 to discover the correct password. This is when at least half of the password attempts seem to be correct.

Write a calling statement for the following code segment in Java: public static int sum(int num1, int num2, String name) { int result = num1 + num2; System.out.println("Hi " + name + ", the two numbers you gave me are: " + num1 + " " + num2); return result; } Function Integer sum(Integer num1, Integer num2, String name) Integer result = num1 + num2 Display "Hi " + name + ", the two numbers you gave me are: ", num1, " ", num2 Return result End Function Write a calling statement to the function in Java or Pseudocode. You may use any value of appropriate data samples to demonstrate your understanding.

Answers

Answer:

Following are the calling of the given question

public static void main(String[] args) // main function

{

int store; // variable declaration

store = sum(32,15,"san"); // Calling of sum()

System.out.println(" TheValue returned by sum() : "+store); // display

}

Explanation:

Following are the description of the above statement

Here is the name of function is sum() In the sum() function definition there are 3 parameter in there signature i.e  two "int" type and 1 is "string" type .In the main function we declared the variable store i,e is used for storing the result of sum() it means it storing the result of value that is returning from the definition of sum() function .After that calling the function by there name and passing three parameter under it  sum(32,15,"san"); and store in the "store" variable.Finally print the value by using system.out.println ().

Given main(), define the Team class (in file Team.java). For class method getWinPercentage(), the formula is:teamWins / (teamWins + teamLosses)Note: Use casting to prevent integer division.Ex: If the input is:Ravens133 where Ravens is the team's name, 13 is number of team wins, and 3 is the number of team losses, the output is:Congratulations, Team Ravens has a winning average!If the input is Angels 80 82, the output is:Team Angels has a losing average.Here is class WinningTeam:import java.util.Scanner;public class WinningTeam {public static void main(String[] args) {Scanner scnr = new Scanner(System.in);Team team = new Team();String name = scnr.next();int wins = scnr.nextInt();int losses = scnr.nextInt();team.setTeamName(name);team.setTeamWins(wins);team.setTeamLosses(losses);if (team.getWinPercentage() >= 0.5) {System.out.println("Congratulations, Team " + team.getTeamName() +" has a winning average!");}else {System.out.println("Team " + team.getTeamName() +" has a losing average.");}}}

Answers

Answer:

Explanation:

public class Team {

   private String teamName;

   private int teamWins;

   private int teamLosses;

   public String getTeamName() {

       return teamName;

   }

   public void setTeamName(String teamName) {

       this.teamName = teamName;

   }

   public int getTeamWins() {

       return teamWins;

   }

   public void setTeamWins(int teamWins) {

       this.teamWins = teamWins;

   }

   public int getTeamLosses() {

       return teamLosses;

   }

   public void setTeamLosses(int teamLosses) {

       this.teamLosses = teamLosses;

   }

   public double getWinPercentage() {

       return teamWins / (double) (teamWins + teamLosses);

   }

}

Following are the Java program to define the Team class and calculate its  value:

Class Definition:

class Team //defining the class Team

{

   private String teamName;//defining String variable

   private int teamWins, teamLosses;//defining integer variable

   //defining the set method to set value the input value

   public void setTeamName(String teamName)//defining setTeamName method that takes one String parameter

   {

       this.teamName = teamName;//using this keyword that sets value in teamName

   }

   public void setTeamWins(int teamWins) //defining setTeamWins method that takes one integer parameter

   {

       this.teamWins = teamWins;//using this keyword that sets value in teamWins

   }

   public void setTeamLosses(int teamLosses)//defining setTeamLosses method that takes one integer parameter

   {

       this.teamLosses = teamLosses;//using this keyword that sets value in teamLosses

   }

   //defining the get method that returns the input value

   public String getTeamName() //defining getTeamName method

   {

       return teamName;//return teamName value

   }

   public int getTeamWins()  //defining getTeamWins method

   {

       return teamWins;//return teamWins value

   }

   public int getTeamLosses() //defining getTeamLosses method

   {

       return teamLosses;//return teamLosses value

   }

   public double getWinPercentage()//defining getWinPercentage method

   {              

       return ((teamWins * 1.0) / (teamWins + teamLosses));//using the return keyword that returns percentage value

   }      

}

Please find the complete code in the attached file and its output file in the attached file.

Class definition:

Defining the class "Team".Inside the class two integer variable "teamWins, teamLosses" and one string variable "teamName" is declared.In the next step, the get and set method is defined, in which the set method is used to set the value, and the get method is used to return the value.

Find out more about the Class here:

brainly.com/question/17001900

C++ Problem: In the bin packing problem, items of different weights (or sizes) must be packed into a finite number of bins each with the capacity C in a way that minimizes the number of bins used. The decision version of the bin packing problem (deciding if objects will fit into <= k bins) is NPcomplete. There is no known polynomial time algorithm to solve the optimization version of the bin packing problem. In this homework you will be examining three greedy approximation algorithms to solve the bin packing problem.

- First-Fit: Put each item as you come to it into the first (earliest opened) bin into which it fits. If there is no available bin then open a new bin.

- First-Fit-Decreasing: First sort the items in decreasing order by size, then use First-Fit on the resulting list.

- Best Fit: Place the items in the order in which they arrive. Place the next item into the bin which will leave the least room left over after the item is placed in the bin. If it does not fit in any bin, start a new bin.

Implement the algorithms in C++. Your program named bins.cpp should read in a text file named bin.txt with multiple test cases as explained below and output to the terminal the number of bins each algorithm calculated for each test case. Example bin.txt: The first line is the number of test cases, followed by the capacity of bins for that test case, the number of items and then the weight of each item. You can assume that the weight of an item does not exceed the capacity of a bin for that problem.

3

10

6

5 10 2 5 4 4

10

20

4 4 4 4 4 4 4 4 4 4 6 6 6 6 6 6 6 6 6 6

10

4

3 8 2 7

Sample output: Test Case 1 First Fit: 4, First Fit Decreasing: 3, Best Fit: 4

Test Case 2 First Fit: 15, First Fit Decreasing: 10, Best Fit: 15

Test Case 3 First Fit: 3, First Fit Decreasing: 2, Best Fit: 2

Answers

xekksksksksgBcjqixjdaj

Computers in a LAN are configured to use a symmetric key cipher within the LAN to avoid hardware address spoofing. This means that each computer share a different key with every other computer in the LAN. If there are 100 computers in this LAN, each computer must have at least:

a. 100 cipher keys
b. 99 cipher keys
c. 4950 cipher keys
d. 100000 cipher keys

Answers

Answer:

The correct answer is option (c) 4950 cipher keys

Explanation:

Solution

Given that:

From the given question we have that if there are 100 computers in a LAN, then each computer should have how many keys.

Now,

The number of computers available = 100

The number of keys used in  symmetric key cipher for N parties is given as follows:

= N(N-1)/2

= 100 * (100 -1)/2

= 50 * 99

= 4950 cipher keys

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

Answers

Answer: provided in the explanation section

Explanation:

The question says:

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

The Answer:

multi-segment executable file template. data segment ; add your data here! pkey db "press any key...$" ends stack segment dw 128 dup(0) ends code segment start: ; set segment registers: mov ax, data mov ds, ax mov es, ax ; add your code here mov cx,4 input: mov ah,1 int 21h push ax loop input mov dx,13d mov ah,2 int 21h mov dx,10d mov ah,2 int 21h mov cx,4 output: pop bx mov dl,bl mov ah,2 int 21h loop output exit: lea dx, pkey mov ah, 9 int 21h ; output string at ds:dx ; wait for any key....

mov ah, 1 int 21h mov ax, 4c00h ; exit to operating system. int 21h ends end start ;

set entry point and stop the assembler.

Cheers I hope this helps!!!

Bill downloaded an antivirus software from the Internet. Under the Uniform Commercial Code (UCC), the software is a: Select one: a. good. b. service. c. good-faith warranty. d. mixture of goods and services.

Answers

Answer:

a. good

Explanation:

According to the Uniform Commercial Code (UCC), It deals with all the contracts that also involves the sale of the goods,

Here goods include those things or items that are movable in a nature and also consist of manufactured goods that are specialized in nature

Therefore, as per the given situation, the bill downloaded an antivirus software so here the software is treated as a good

Which of the following are true of trademarks?
Check all of the boxes that apply.
They protect logos.
They protect fabric.
They show who the maker of the item is.
They can be registered with the government.

Answers

Answer:

A, C, D

They protect logos

They show who the maker of the item is.

They can be registered with the government

Explanation:

The following are true of trademarks:

They protect logos.  

They show who the maker of the item is.

They can be registered with the government.

A trademark is a type of intellectual property consisting of a recognizable sign, design, or expression which identifies products or services of a particular source from those of others.  A trademark exclusively identifies a product as belonging to a specific company and recognizes the company's ownership of the brand.

Trademarks protect logos, show who the maker of the item is and can be registered with the government.

Find out more on trademark at: https://brainly.com/question/11957410

a. A programmer wrote a software delay loop that counts the variable (unsigned int counter) from 0 up to 40,000 to create a small delay. If the user wishes to double the delay, can they simply increase the upperbound to 80,000?
b. If the code contains a delay loop and we noticed that no delay is being created at run-time. What should we suspect during debugging?

Answers

Answer:

Explanation:

The objective here is to determine if the programmer can simply increase the upperbound to 80,000.

Of course Yes, The programmer can simply increase the delay by doubling the upperbound by 80000. The representation can be illustrated as:

( int : i = 0;  i <  40,000; i ++ )

{

  // delay code

}

Which can be modified as:

( int : i = 0;  i <  80,000; i ++ )

{

  // delay code

}

b)  If the code contains a delay loop and we noticed that no delay is being created at run-time. What should we suspect during debugging?

Assuming there is no delay being created at the run-time,

The code is illustrated as:

For ( int : i = 0 ; i < 0 ; i ++ )

{

  // delay code which wont

  //execute since code delay is zero

}

we ought to check whether the loop is being satisfied or not.  At the Initial value of loop variable, is there any break or exit statement is being executed in between loop. Thus, the  aforementioned delay loop wont be executed since the loop wont be executed for any value of i.

In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and notification of appropriate individuals?
a. Full-interruption
b. Desk check
c. Simulation
d. Structured walk-through

Answers

Answer:Full-interruption--A

Explanation:  The Full-interruption is one of the major steps for  a Disaster Recovery Plan, DRP which ensures businesses are not disrupted by saving valuable resources during a disaster like a data breach from fire or flood.

Although expensive and very risky especially in its simulation of a disruption, this thorough  plan ensures that when a disaster occurs, the  operations are shut down at the primary site and are transferred to the recovery site allowing Individuals follow every procedure, ranging from the interruption of service to the restoration of data from backups, also with the notification of appropriate individuals.

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send emails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?

a. Prezi, G suite
b. G suite, Zoho
c. OpenOffice, G suite
d. Zoho, Apple iWork

Answers

Answer:

c. OpenOffice, G suite

Explanation:

The main advantage of OpenOffice is that it is free and obviously keeps your costs down. It has a lot of features that can help Paul (and really anyone else). It offers decent word processing, spreadsheets, databases and graphics, which can cover most, if not all, of Paul's needs.  

Google's G Suite also offers cheap plan's that can satisfy Paul's needs regarding emails, CRM features and cloud storage. Even though it is not free, Paul would probably need only the most basic plan at just $6 per month.

The productivity suite Paul should consider is OpenOffice. Therefore, the correct answer is option C.

The primary benefit of OpenOffice is that it is cost free, which obviously lowers your expenses. Paul can benefit mostly from its many features. The majority if not all of Paul's demand may be met by its decent word processing, spreadsheets, databases, and graphical features.  

Therefore, the correct answer is option C.

Learn more about the OpenOffice here:

https://brainly.com/question/4463790.

#SPJ6

Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, construct the heap data structure from the array A above. Represent your heap in the array A as well as using a binary tree. Clearly show all the steps c) Show how heap sort work in the heap you have constructed in part (b) above. Clearly show all the step in the heap sort

Answers

Answer:

Sorted Array A { } = { 1, 4, 23, 32, 34, 34, 67, 78, 89, 100 }

Explanation:

Binary tree is drawn given that the binary tree do not follow both minimum heap and maximum heap property, therefore, it is not a heap.

See attached picture.

Write a class called Triangle that can be used to represent a triangle. It should include the following methods that return boolean values indicating if the particular property holds: a. isRight (a right triangle) b. isScalene (no two sides are the same length) c. isIsosceles (exactly two sides are the same length) d. isEquilateral (all three sides are the same length).

Answers

Answer:

Explanation:

import java.io.*;

class Triangle

{

  private double side1, side2, side3; // the length of the sides of

                                       // the triangle.

  //---------------------------------------------------------------

  // constructor

  //

  // input : the length of the three sides of the triangle.

  //---------------------------------------------------------------

  public Triangle(double side1, double side2, double side3)

  {

      this.side1 = side1;

      this.side2 = side2;

      this.side3 = side3;

  }

  //---------------------------------------------------------------

  // isRight

  //

  // returns : true if and only if this triangle is a right triangle.

  //---------------------------------------------------------------

  boolean isRight()

  {

      double square1 = side1*side1;

      double square2 = side2*side2;

      double square3 = side3*side3;

      if ((square1 == square2 + square3) ||

          (square2 == square1 + square3) ||

          (square3 == square1 + square2))

          return true;

      else

          return false;

  }

  // isValid

  // returns : true if and only if this triangle is a valid triangle.

  boolean isValid()

  {

      if ((side1 + side2 < side3) ||

          (side1 + side3 < side2) ||

          (side2 + side3 < side1))

          return false;

      else

          return true;

  }

  // isEquilateral

  //

  // returns : true if and only if all three sides of this triangle

  // are of the same length.

  boolean isEquilateral()

  {

      if (side1 == side2 && side2 == side3)

          return true;

      else

          return false;

  }

  // isIsosceles

  //

  // returns : true if and only if exactly two sides of this triangle

  // has the same length.

  boolean isIsosceles()

  {

      if ((side1 == side2 && side2 != side3) ||

          (side1 == side3 && side2 != side3) ||

          (side2 == side3 && side1 != side3))

          return true;

      else

          return false;

  }

  // isIsosceles

  // returns : true if and only if exactly no two sides of this

  // triangle has the same length.

  boolean isScalene()

  {

      if (side1 == side2 || side2 == side3 || side1 == side3)

          return false;

      else

          return true;

  }

}

//-------------------------------------------------------------------

// class Application

//

// This class is the main class of this application. It prompts

// the user for input to construct a triangle, then prints out

// the special properties of the triangle.

//-------------------------------------------------------------------

public class Application

{

  //---------------------------------------------------------------

  // getInput

  //

  // input : stdin - BufferedReader to read input from

  //         msg - message to prompt the user with

  // returns : a double value input by user, guranteed to be

  //           greater than zero.

  //---------------------------------------------------------------

  private static double getInput(BufferedReader stdin, String msg)

      throws IOException

  {

      System.out.print(msg);

      double input = Double.valueOf(stdin.readLine()).doubleValue();

      while (input <= 0) {

          System.out.println("ERROR : length of the side of triangle must " +

              "be a positive number.");

          System.out.print(msg);

          input = Double.valueOf(stdin.readLine()).doubleValue();

      }

      return input;

  }

  //---------------------------------------------------------------

  // printProperties

  //

  // input : triangle - a Triangle object

  // print out the properties of this triangle.

  //---------------------------------------------------------------

  private static void printProperties(Triangle triangle)

  {

      // We first check if this is a valid triangle. If not

      // we simply returns.

      if (!triangle.isValid()) {

          System.out.println("This is not a valid triangle.");

          return;

      }

      // Check for right/equilateral/isosceles/scalene triangles

      // Note that a triangle can be both right triangle and isosceles

      // or both right triangle and scalene.

     

      if (triangle.isRight())

          System.out.println("This is a right triangle.");

      if (triangle.isEquilateral())

          System.out.println("This is an equilateral triangle.");

      else if (triangle.isIsosceles())

          System.out.println("This is an isosceles triangle.");

      else

          // we do not need to call isScalene here because a triangle

          // is either equilateral/isosceles or scalene.

          System.out.println("This is an scalene triangle.");

  }

  // main

  // Get the length of the sides of a triangle from user, then

  // print out the properties of the triangle.

  public static void main(String args[]) throws IOException

  {

      BufferedReader stdin = new BufferedReader

          (new InputStreamReader(System.in));

      double side1 = getInput(stdin,

          "What is the length of the first side of your triangle? ");

      double side2 = getInput(stdin,

          "What is the length of the second side of your triangle? ");

      double side3 = getInput(stdin,

          "What is the length of the third side of your triangle? ");

      System.out.print("Pondering...\n");

      printProperties(new Triangle(side1, side2, side3));

  }

}

Consider the following skeletal C-like program:
void fun1(void); /* prototype */
void fun2(void); /* prototype */
void fun3(void); /* prototype */
void main() {
int a, b, c;
. . .
}
void fun1(void) {
int b, c, d;
. . .
}
void fun2(void) {
int c, d, e;
. . .
}
void fun3(void) {
int d, e, f;
. . .
}
Given the following calling sequences and assuming that dynamic scoping is used, what variables are visible during execution of the last function called? Include with each visible variable the name of the function in which it was defined
a. main calls funl; funl calls fun2; fun2 calls fun3
b. main calls fun1; fun1 calls fun3
c. main calls fun2; fun2 calls fun3; fun3 calls funl
d. main calls fun1; funl calls fun3; fun3 calls fun2.

Answers

Answer:

In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.

Explanation:

a. main calls fun1; fun1 calls fun2; fun2 calls fun3

Solution:

Visible Variable:  d, e, f         Defined in: fun3Visible Variable: c                  Defined in: fun2 ( the variables d and e of fun2 are not visible)Visible Variable: b                  Defined in: fun1 ( c and d of func1 are hidden)Visible Variable: a                  Defined in: main (b,c are hidden)

b. main calls fun1; fun1 calls fun3

Solution:

Visible Variable:  d, e, f          Defined in: fun3 Visible Variable:  b, c              Defined in: fun1 (d not visible)Visible Variable:  a                 Defined in: main ( b and c not visible)

c. main calls fun2; fun2 calls fun3; fun3 calls fun1

Solution:

Visible Variable:  b, c, d         Defined in: fun1 Visible Variable:  e, f              Defined in: fun3 ( d not visible)Visible Variable:  a                 Defined in: main ( b and c not visible)

Here variables c, d and e of fun2 are not visible .

d. main calls fun1; fun1 calls fun3; fun3 calls fun2

Solution:

Visible Variable: c, d, e        Defined in: fun2Visible Variable:  f                Defined in: fun3 ( d and e not visible)Visible Variable:  b              Defined in: fun1 ( c and d not visible)Visible Variable: a                Defined in: main ( b and c not visible)

Write a program that takes in an integer in the range 10 to 100 as input. Your program should countdown from that number to 0, printing
the count each of each iteration After ten numbers have been printed to the screen, you should start a newline. The program should stop
looping at 0 and not output that value
I would suggest using a counter to cổunt how many items have been printed out and then after 10 items, print a new line character and
then reset the counter.
important: Your output should use %3d" for exact spacing and a space before and after each number that is output with newlines in order
to test correctly. In C please

Answers

Answer:

The program written in C language is as follows

#include<stdio.h>

int main()

{

//Declare digit

int digit;

//Prompt user for input

printf("Enter any integer: [10 - 100]: ");

scanf("%d", &digit);

//Check if digit is within range 10 to 100

while(digit<10 || digit >100)

{

printf("Enter any integer: [10 - 100]: ");

scanf("%d", &digit);

}

//Initialize counter to 0

int counter = 0;

for(int i=digit;i>0;i--)

{

 printf("%3d", i); //Print individual digit

 counter++;

 if(counter == 10) //Check if printed digit is up to 10

 {

  printf("\n"); //If yes, print a new line

  counter=0; //And reset counter to 0

 }

}

}

Explanation:

int digit; ->This line declares digit as type int

printf("Enter any integer: [10 - 100]: "); -> This line prompts user for input

scanf("%d", &digit);-> The input us saved in digit

while(digit<10 || digit >100) {

printf("Enter any integer: [10 - 100]: ");

scanf("%d", &digit); }

->The above lines checks if input number is between 10 and 100

int counter = 0; -> Declare and set a counter variable to 0

for(int i=digit;i>0;i--){ -> Iterate from user input to 0

printf("%3d", i); -> This line prints individual digits with 3 line spacing

counter++; -> This line increments counter by 1

if(counter == 10){-> This line checks if printed digit is up to 10

printf("\n"); -> If yes, a new line is printed

counter=0;} -> Reset counter to 0

} - > End of iteration

Other Questions
An eddy current separator is to separate aluminum product from an input streamshredded MSW. The feed rate to the separator is 2,500 kg/hr. The feed is known to contain174 kg of aluminum and 2,326 kg of reject. After operating for 1 hour, a total of 256 kg ofmaterials is collected in the product stream. On close inspection, it is found that 140 kg ofproduct is aluminum. Estimate the % recovery of aluminum product and the % purity of thealuminum produc Thorley Inc. is considering a project that has the following cash flow data. What is the project's IRR? Note that a project's projected IRR can be less than the WACC or negative, in both cases it will be rejected. Year 0 1 2 3 4 5 Cash flows -$1,100 $325 $325 $325 $325 $325 a. 15.18% b. 14.59% c. 11.24% d. 13.43% e. 16.20% Let f(x) = x2 - 1 and g(x) = 2x - 3. Find the new function and write it in simplest formf+ga.-x + 2x - 2b. x2 - 2x + 2x + 2x - 4d. 2x3 - 3x2 - 2x + 3Please select the best answer from the choices providedABD Will mark Brainliest If correct!!Which of the following is a function of an audio programmer?A. to manage the audio teamB. to compose musical score for the gameC. to create the game sound effectsD. to integrate sound and music into the game Help ASAP plz will give brainliest!!! A textile manufacturer has historically found an average of 0.1 flaws per square meter of cloth. Let X be the number of flaws in a bolt of 2000 square meters of cloth. How is X distributed A pump empties the pool at the rate of 1,000 gal every 4 hours. how long does it take to pump out 20,000 gallons? If you want to increase the length of the side of a square by 30%, what fraction can be used as themultiplier to find the length of the new side? Which Scientist did The scientific revolution end with and what is he known for? Find the volume of a cone with the radius of 14, and a height of 9. (Hint:the volume of a cone is 1/3*b*h where the "b" is the area of the base ofthe cone or a circle). DO NOT ROUND!!!!! USE 3.14 for PI!!!* How does a speaker's use of fallacious reasoning affect a speech? Select ALL correct answers. Question 6 options: It provides accurate support when addressing counterclaims. It contributes to the logic of a speaker's message. It damages the speaker's credibility. It weakens the validity of the arguments and claims. Please hurry 25 points The passage states that "rising ocean temperatures also affect the ecosystems in the coral reef, throwing off the delicate balance that allows so many species to coexist." Explain how rising ocean temperatures, pollution, or human interference could throw the ecosystems of the Great Barrier Reef off balance. Support your answer with evidence from the passage Here's your chance to put all your knowledge about safer and risky sexual practices to work, by devising your own sexual safety plan. Start planning how to lead a healthy sexual life. List some of your goals for your life, your values and limitations regarding sexual activity and relationships, and steps you will take to achieve those goals while preserving your values and limitations. Find the value of (3 + 4) to make the perfect shade of orange cake frosting, Mya needs 8 drops of yellow food coloring for every 12 drops of red food coloring. If she adds 32 drops of yellow food coloring to her frosting, how many drops of red food coloring should she add? *Hedgehogs are nocturnal and hibernate during the winter. Which of thefollowing is NOT true?A)Hedgehogs eat insects and worms - they are herbivoresB)Their metabolic rate drops in winterC)They are nocturnal as many insects are active at nightD)They hibernate as food is scarce in winter Will give BRAINLIEST....Can i have some tips on using watercolour over a shading pls. No silly answers,thankyou Read the passage below and answer the question that follows. Audrey planned to move from Iowa to Arizona. En route, she was offered a job in Colorado, which she accepted. She now lives in Denver, Colorado, and works for an athletic apparel design company. This is an example of __________. A. step migration B. forced migration C. a cyclic movement D. an intervening opportunity Please select the best answer from the choices provided. A B C D Lincoln's attitude about the freeing of the slaves (abolition)O A.was mainly negative throughout the warO B.was mainly positive throughout the warO c. became less favorable as the war continuedODbecame increasingly favorable as the war continued Which type of reaction is described by the following equation Na2O (s) + 2CO2 (g) + H2) (g) Produces 2 NaHCO3 (s)