A computer science student completes a program and asks a classmate for feedback. The classmate suggests rewriting some of the code to include more procedural abstraction. Which of the following is NOT a benefit of procedural abstraction?
making the code run faster

Answers

Answer 1

Procedural abstraction does not make the code run faster. When we write code sections with variable parameters, we are using procedural abstraction.

What is Procedural abstraction ?When we write code sections with variable parameters, we are using procedural abstraction. The concept is that we have code that, depending on how its parameters are configured when it is called, can handle a range of different circumstances.Consider scenarios where we have code that is similar to other parts or follows a common pattern and see if there is a way we can convert them to calls to one procedure as a "bottom-up" method to introducing procedural abstraction. Thinking of the generalised operation we want to perform, writing code that uses calls to the procedure for this operation, and then writing code for the procedure are examples of a "top-down" approach.

To learn more about Procedural abstraction refer :

https://brainly.com/question/12974602

#SPJ4


Related Questions

Ciphers, such as the syctale cipher, that just change the order of the letters are know as ______________.

Answers

Ciphers, such as the scytale cipher, that just change the order of the letters are know as transposition cipher.

A transposition cipher in cryptography is a type of encryption that scrambles the locations of characters without altering the characters themselves. Transposition ciphers produce a ciphertext that is a permutation of the plaintext by rearranging the components of the plaintext (usually characters or groups of characters) in accordance with a regular method. They are distinct from substitution ciphers, which alter the actual plaintext units rather than only their positions. Although transposition and substitution processes differ from one another, they are frequently combined, as in old-fashioned ciphers like the ADFGVX cipher or sophisticated high-quality encryption techniques like the contemporary Advanced Encryption Standard (AES).

To know more about  transposition cipher, visit;

brainly.com/question/17310318

#SPJ4

What is the name of the 7-bit code used to represent up to 128 different characters, including upper and lower case and special characters, used to represent text in computers?.

Answers

The ASCII (American Standard Code for Information Interchange)  is the name of the 7-bit code used to represent up to 128 different characters, including upper and lower case and special characters, used to represent text in computers.

What is ASCII?

ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data on computers and  the Internet. Standard ASCII-encoded data has unique values ​​for 128 alphanumeric, numeric or special symbols and control codes.

ASCII encoding is based on the character encoding of telegraphic data. It was first published by the American National Standards Institute  as a computer science standard  in 1963. The characters of ASCII encoding include upper and lower case letters A-Z, digits 0-9 and basic punctuation marks. It also uses some non-printing controls that were originally intended for use with teletype printing terminals.

To learn more about ASCII, refer;

https://brainly.com/question/17147612

#SPJ4

for the following two questions, consider a system in which you have an unknown function, but you know that it has two discrete data points (-1,1) and (2,7).

Answers

y-intercept of the interpolation line is 3

Solution:

Given data points (-1,1) and (2,7)

x₁ = -1, y₁ = 1, x₂ = 2, y₂ = 7

Slope m = [tex]\frac{y_{2}-y_{1} }{x_{2} -x_{1} }[/tex] = [tex]\frac{7-1}{2-(-1)}[/tex] = 2

To find Y-intercept of the line, we use the formula y = mx + c

Let y = 7 and x = 2,

7 = 2 * 2 + c

7 - 4 = c

c = 3

y-intercept of the interpolation line would be 3

How to find slope of the line?

Pick two points on the line and determine their coordinates.Determine the difference in y-coordinates of these two points (vertical).Determine the difference in x-coordinates for these two points (horizontal).Divide the difference in y-coordinates by the difference in x-coordinates (rise/run or slope).

To know more about about slope of line, check out:

https://brainly.com/question/16949303

#SPJ4

the community garden grand opening was a success. in addition to the 55 donors food justice rock springs invited, 20 other prospects attended the event. now, tayen wants to know more about the donations that came in from new prospects compared to the original donors. which sql query can be used to calculate the percentage of contributions from prospects?

Answers

which sql query can be used to calculate the percentage of contributions from prospects?

SELECT

   (SUM(CASE WHEN donor_type = 'prospect' THEN contribution END) /

    SUM(CASE WHEN donor_type = 'donor' THEN contribution END)) * 100 AS pct_from_prospects

FROM donations;

How this query works?

This query uses a CASE statement to sum up the total contributions from donors and prospects separately, and then divides the total contributions from prospects by the total contributions from donors to compute the percentage of contributions from prospects.

The resulting percentage is then aliased as pct_from_prospects so that it can be easily accessed in the final result set.

You can modify this query to calculate the percentage of contributions from other groups, or to include additional criteria in the calculation, as needed. For example, you could filter the donations based on the date of the event or include additional columns in the result set.

To Know More About PL SQL, Check Out

https://brainly.com/question/14469511

#SPJ1

the decentralized nature of blockchain technology offers more comprehensive security for digital information than almost any other storage medium.

Answers

A blockchain is protected by advanced encryption to protect each transaction and exchange that occurs on the platform that's why it offers more comprehensive security for digital information than almost any other storage medium.

What is Blockchain?

A blockchain is a distributed database or ledger that is shared among computer network nodes. A blockchain, like a database, stores information electronically in digital format.

Blockchains are best known for their critical role in cryptocurrency systems like Bitcoin, where they keep a secure and decentralised record of transactions. The blockchain's innovation is that it ensures the fidelity and security of a data record and generates trust without the need for a trusted third party.

To learn more about Blockchain, visit: https://brainly.com/question/25700270

#SPJ4

according to the theoretical view, the visual system perceives meaningful information directly, without any intermediate steps to interpret it

Answers

Theoretically, the ecological visual system receives relevant information without the need for any intermediate steps of interpretation.

What does interpreting mean?

According to Webster's dictionary, the fundamental definition of interpretation is the "activity of explaining the meaning about something; the manner something is described or understood." The notion of interpretation in terms of language should be expanded to include converting a spoken or signed communication into another or spoken signed language while maintaining the register and sense of the material in the source language. It is the exchange of spoken or sign language between speakers of several languages. Not only must a language interpreter and sign language interpreter rapidly and accurately translate meaning.

To know more about Interpreting
https://brainly.com/question/4785718

#SPJ4

Sonja is a network engineer and has just installed a new device that she wants to manage through the network management station. Which of the following might best describe the database file provided by the vendor that she needs to load into the NMS in order to manage this device on the network with SNMP?
a. OID b. TRAP c. TTF d. MIB

Answers

The option that might best describe the database file provided by the vendor that she needs to load into the NMS in order to manage this device on the network with SNMP is  option a. OID.

What purpose do database files serve?

Data records or files containing information, including as sales transactions, customer information, financial data, and product information, are often aggregated and stored in computer databases. Any type of data can be stored, maintained, and accessed using databases.

Hence, A string of decimal integers called an object identifier (OID) uniquely identifies an object. These things are usually an attribute or an object class. You can supply the object class or attribute name added with -oid if you don't have an OID.

Learn more about OID from

https://brainly.com/question/29441658
#SPJ1

d) is the following a walk in the graph? is it a trail? is it a path? is it a circuit? is it a cycle? please answer all the questions for each of the following.i) ii) iii)

Answers

The following a walk in the graph is a cycle.A closed path is a cycle.

These cannot have any repetitions.

A cycle can only be created by traversing a graph in such a way that neither a vertex nor an edge are repeated, but rather the starting and ending vertex must match. Only multi-graphs require the listing of edges. A trail is a path without a constant edge. A walk with only one unique vertex is called a path. With the first vertex being u and the last vertex being v, a u, v-walk, u, v-trail, u, v-path is a walk, trail, and path, respectively. If u = v, both the u, v-walk and the u, v-trail are closed. A path is described in graph theory as an open walk in the graph which neither vertices may repeat. There is no repeating of edges.

Learn more about walk in the graph here:

https://brainly.com/question/9372637

#SPJ4

in addition to algol, what was the other early programming language used by aerospace engineering on mainframe computers?

Answers

In addition to algol, what was the other early programming language used by aerospace engineering on mainframe computers is FORTRAN.

What is Fortran?

FORTRAN was created for scientists and engineers and has since dominated this field. For the past 30 years, FORTRAN has been used for projects such as bridge and aeroplane structural design, factory automation control, storm drainage design, scientific data analysis, and so on.

Therefore, aside from algol, another early programming language utilised by aerospace engineers on mainframe computers was FORTRAN.

To learn more about Fortran, refer to the link:

https://brainly.com/question/1469457

#SPJ1

What can happen when a dictionary is used without knowing how do you use one?.

Answers

Learning to use the dictionary promotes lifelong learning habits. It teaches students the basics for using a thesaurus, encyclopedia, periodical, writing style guide, recipe book and more. The dictionary lists words alphabetically and groups them together using guide words.

TRUE/FALSE. when using the histogram function in data analysis in excel. the frequency reflects the count of values that are greater than the previous bin and the bin number to the left of the frequency.

Answers

Answer:

True

Explanation:

I thinj its true but im 70% sure mate.

Thank me Later if im right.

Tadano

28.1. why is it that software organizations often struggle when they embark on an effort to improve local software process

Answers

Software organization often struggles when they embark on an effort to improve local software process because they have little more than ad hoc.

What is a software organization?

An organizational tool is a program or app designed to improve your daily task performance. You may come across a variety of tools, such as project management software, note-taking systems, notebooks, and day planners.

Therefore, because they have little more than ad hoc resources, software organizations frequently suffer when attempting to improve local software processes.

To learn more about software organization, refer to the link:

https://brainly.com/question/14483430

#SPJ1

During a recent penetration test, it was discovered that your company's wireless network can be reached from the parking lot. The Chief Security Officer has submitted a change request to your network engineering team to solve this issue because he wants to ensure that the wireless network is only accessible from within the building. Based on these requirements, which of the following settings should be changed to ensure the wireless signal doesn't extend beyond the interior of your building while maintaining a high level of availability to your users?Options are :Power levelChannelFrequencyEncryption

Answers

The wireless signal doesn't extend beyond the interior of your building while maintaining a high level of availability to your users Power level.

For wireless signal network access, WPA2 permits the use of a preshared key. anti-malware network-based. By monitoring all traffic to and from a dispersed target platform, the network-based anti-malware can keep the system secure. A modulator-demodulator, often known as a modem, is a piece of hardware used in computers that changes data from one format to another so that it may be transmitted over an analog media, such the phone or radio. Another recommended method for securing wireless networks is to use a VPN. It is more challenging for someone to eavesdrop on a connection while using a VPN since it encrypts all communication between a device and the VPN server. Information that is exchanged between wireless routers and wireless devices is encrypted using Wi-Fi Protected Access (WPA), WPA2, and WPA3. Firewalls, antivirus, and antispyware programs are all crucial tools for preventing assaults on your laptop.

Learn more about wireless signal here:

https://brainly.com/question/28894430

#SPJ4

the form that was created to prevent fraud, where a hacker provides a new routing number for the transfer of funds and then highjacks those funds, is called the:

Answers

The form that was created to prevent fraud, where a hacker provides a new routing number for the transfer of funds and then highjacks those funds, is called the: Wire Fraud and Electronic Funds Transfer Advisory (WFA).

What is a skimming fraud?

A skimming fraud can be defined as a type of fraud that involves a criminal (hacker) illegally capturing the credit card information of a cardholder without the holder's knowledge, so as to perform unauthorized transactions with it in the future.

Under the fraud triangle, there are three (3) main elements that helps any accounting fraud to occur and these include the following:

IncentiveOpportunityRationalization

In Cyber security, Wire Fraud and Electronic Funds Transfer Advisory (WFA) is a form (document) that was designed and developed to prevent wire fraud in an escrow, thereby, protecting consumer's funds from a hacker.

Read more on fraud here: brainly.com/question/28541466

#SPJ1

does this record contain a certificate? what is the certificate length? what is the frame length? does the certificate fit into a single ethernet frame? include screenshots to show them.

Answers

There is no certificate, it is in another record. It does fit into a single Ethernet frame.

What is a Ethernet frame?

The Ethernet frame is primarily responsible for the correct rulemaking and successful transmission of data packets when transmitting data over Ethernet. The frame essentially transports data sent over Ethernet. Depending on the size of the data to be transported, an Ethernet frame can range from 64 bytes to 1,518 bytes.

Devices in an Ethernet network share data via packets. They include the Ethernet frame, which is divided into several data sets, among other things. These records are made up of binary code that contains vital information like addresses, control information, payload data, and checksums.

Ethernet frames are structured differently depending on the Ethernet standard and may contain more or fewer data fields depending on the network protocol.

To know more about Ethernet frame, visit: https://brainly.com/question/16825911

#SPJ4

approximately how much bandwidth does a unicast audio flow use? (4-ch, 24-bit, 48khz, 1msec latency).

Answers

Approximately 6Mbps bandwidth a Unicast audio flow uses, (with the provided information i.e. 4-ch, 24-bit, 48khz, 1 msec latency).

Unicast flows are point-to-point flows from a single transmitter to a single receiver. Unicast flows typically contain up to 4 channels of audio or 1 channel of video. Each channel of Unicast flows can vary between 4 and 64 according to the latency setting of the device. Bandwidth usage of a typical Unicast audio flow is about 6 Mbps.

Unicast audio flow is a better option for over-the-top (OTT) delivery to public viewers it is because it provides a more personalized experience.

You can leran more about bandwidth at

https://brainly.com/question/12908568

#SPJ4

An object-based DO/S provides process management through the use of client/server processes synchronized and linked together through messages and ports, also known as channels or pipes. (t/f)
False

Answers

In essence, a process is a program in action. A process's execution ought to proceed sequentially. An entity that addresses the crucial unit of work to be carried out in the system is referred to as a process.

What distributed operating system in process management?

A fundamental kind of operating system is a distributed operating system (DOS). To support numerous real-time applications and users, distributed systems employ numerous central processors.

Therefore, Jobs for data processing are therefore divided among the processors. Through a single communication channel, it links various computers.

Learn more about process management here:

https://brainly.com/question/869693

#SPJ1

In DevOps and container orchestration, non-hardware items such as the operating system and libraries and security policies are documented within the orchestration tool, implemented into the desired environment, and are called what?
Infrastructure as code

Answers

In DevOps as well as container orchestration, non hardware items such as operating system and libraries or security policies are well documented within the orchestration tool, implemented in the desired environment and thus are called a development environment.

What is DevOps?

DevOps is the set of cultural philosophy, practices and tools that improves a organization's ability of delivering applications and services at the high velocity: evolving and improving all products at a faster rate than the traditional software development process and in the infrastructure management process. This speed also allows organizations to better serve their customers and users and compete well in the market.

How DevOps Works?

In a DevOps model, development and operations teams are no longer "silos". These are the two teams that occasionally merge to form a single team in which each engineer works across the entire application lifecycle, from development and testing to deployment and operations, and develops a more diverse set of skills that are not limited to a single function.

To learn more about DevOps, visit: https://brainly.com/question/28135867

#SPJ4

Complete the function FindLastIndex() that takes one string parameter and one character parameter. The function returns the index of the last character in the string that is not equal to the character parameter. If no such character is found, the function returns -1.
Ex: If the input is tbbdn b, then the output is:
4
#include
using namespace std;
int FindLastIndex(string inputString, char x) {
/* Your code goes here */
}
int main() {
string inString;
char x;
int result;
cin >> inString;
cin >> x;
result = FindLastIndex(inString, x);
cout << result << endl;
return 0;
}

Answers

Using the codes in computational language in C++ it is possible to write a code that complete the function FindLastIndex() that takes one string parameter and one character parameter.

Writting the code:

#include <iostream>

using namespace std;

int FindLastIndex(string inputString, char x)

{

 // running a for loop that iterates the inputString from the last index and comes down to the 0th index. We are iterating from the last index because we want to find the last character such that it is not equal to x. So iterating the string from last makes more sense because we will find the value faster as compared to searching from the front to get that last value.

 for (int i = inputString.length() - 1; i >= 0; i--) {

   // if current character not equals the character x then return the index

   if (inputString[i] != x) {

     return i;

   }

 }

 // if the above loop didn't return an index, then all the characters are same in the string, hence return -1

 return -1;

}

int main()

{

 string inString;

 char x;

 int result;

 cin >> inString;

 cin >> x;

 result = FindLastIndex(inString, x);

 cout << result << endl;

 return 0;

See more about C++ at brainly.com/question/29225072

#SPJ1

In addition to information about disciplinary and enforcement action taken against a mortgage loan originator, the NMLS may also make available for public access: A mortgage loan originator's home address.

Answers

False.

A mortgage loan originator's home address, the number of loans originated by a loan originator and former clients of the mortgage loan originator are not for public access.

Information by NMLS for public access:

Information or material held by the NMLS (Nationwide Multistate Licensing System and Registry) relating to the employment history and/or disciplinary and enforcement actions taken against a mortgage loan originator is not protected by confidentiality laws. Information/material of the mortgage loan originator's employment history is available for public access.

A state licensing agency granting someone a license to act as a mortgage loan originator. Subsequent to the granting of the license, the agency received a supplemental criminal history report which indicated that he/she had been convicted of a money laundering charge in another state. Then the state licensing agency may enter a temporary order requiring a person to cease doing business under a license if it determines that the license was erroneously issued.

To know more about Mortgage loan originators, click on:

https://brainly.com/question/28079837

#SPJ4

Define a constructor as indicated. Sample output for below program:
Year: 0, VIN: -1Year: 2009, VIN: 444555666
Using C++ language

Answers

In C++, a constructor is a special 'MEMBER FUNCTION' with the same name as its class that is used to initialize some valid values to an object's data members. It is run automatically whenever a class object is created.

What is Constructor?

In C++, a constructor is a special method that is called automatically when an object is created. In general, it is used to initialize the data members of new objects. In C++, the constructor has the same name as the class or structure. Constructor is always called when an object is created. It constructs the values, i.e. provides data for the object, hence the name constructors.

Because constructors do not have a return value, they do not have a return type.

To know more about Constructor, visit: https://brainly.com/question/27727622

#SPJ4

you are hired as a network administrator to monitor an organization's network status on an ongoing basis and to make changes to best meet the needs of your network's users. one feedback that you have received from the network engineer of the firm is that one of the modems is repeatedly power cycling to reset network activity. which of the following kpis will help you in getting a better understanding of the situation?

Answers

In order to identify port conflicts, the Netstat.exe program offers a switch that can show the process identification (PID) that is connected to each connection.

The Internet is referred to as a network of networks since it is a global network of computers that can communicate with one another thanks to telephone and cable connections. We can send and receive files using the straightforward transfer technique known as TFTP (Trivial File Transfer Protocol). Because authentication and data encryption are not possible, TFTP is utilized when the file's dependability is known, and no security is needed when sending or receiving the file. we should use a Cat 7 to complete this operation because it is compliant with the TIA/EIA 568 standard for twisted-pair cables.

Learn more about protocol here-

https://brainly.com/question/27581708

#SPJ4

given a merge-sorting algorithm being implemented and runs on a six-processor parallel computer system, describe the corresponding analytical time complexity

Answers

On a parallel computer system with six processors, a merge-sorting method has an analytical time complexity of O(n log n).

Describe merge sort.

A sorting algorithm called merge sort employs the divide and conquer method. A list of items is broken down into smaller sublists, and then those sublists are sorted and merged back together to create a single sorted list. A recursive algorithm is used by the "Merge Sort" to produce its results. The divide-and-conquer algorithm divides a large problem into more manageable, smaller chunks that yet resemble the original problem. The main problem is subsequently resolved by recursively resolving these subproblems and combining their solutions.

To know more about Merge sort
https://brainly.com/question/13152286
#SPJ4

one of the one-way functions used in public key cryptography is integer multiplication/factorization. multiplying two integers is easy, but factoring is hard. the number 2081941 is the product of two primes.
What is the smaller of the two primes?
What is the largest of the two primes?

Answers

Here Smaller of the two primes is 1039 and Larger of the two primes is 1433 when one of the one-way functions used in public key cryptography is integer multiplication/factorization.

What is Cryptography?

Cryptography is a method of protecting information and communications by using codes and encryption to ensure that only those who are intended to read and process the information can do so.

Cryptography is a term used in computer science to describe secure information and communication techniques that use mathematical concepts and a set of rule-based calculations known as algorithms to transform messages in difficult-to-decipher ways. These deterministic algorithms are used for cryptographic key generation, digital signing, data privacy protection, internet browsing, and confidential communications like credit card transactions and email.

To learn more about cryptography/encryption, visit: https://brainly.com/question/9979590

#SPJ4

which interface uses usb or a low-speed, serial connection through a roll-over cable, to manage network devices?

Answers

Console ports are an interface for controlling network devices that connects via USB or a slow, serial connection over a roll-over cable.

What is a USB?

USB was created to standardize the connection of peripherals to desktop computers, allowing for power and communication. On a variety of devices, it has largely taken the place of interfaces like serial ports and parallel ports. The Universal Serial Bus (USB) is an industrial standard that specifies cables, connections, and protocols for interfacing (connecting, communicating, and providing power to) computers, peripherals, and other computers. There are 14 different connection types for USB gear, with USB-C being the newest and only one that isn't currently deprecated.

To know more about USB
https://brainly.com/question/27800037
#SPJ4

A data analyst uses the sum function to add together numbers from a spreadsheet. However, after getting a zero result, they realize the numbers are actually text. What function can they use to convert the text to a numeric value?.

Answers

Since the data analyst uses the sum function to add together numbers from a spreadsheet. The function that can be use to convert the text to a numeric value is VALUE.

What in Excel is the value function?

A text string that represents a number is changed into a number. Excel's VALUE function calculates the value of text that represents a number. $5, for instance, is a textual representation of a number. The result of applying the VALUE formula to this data is 5, so. So, it is clear how this function allows us to obtain the numerical value that is represented in Excel by text.

Hence, A controlled dynamical system's value function, when started at the time-t state variable x(t)=x, represents the system's optimal payoff over the interval [t, t1].

Learn more about data analyst  from

https://brainly.com/question/29352258
#SPJ1

which is used to create databases that have more complicated types of data, such as images, audio, and video

Answers

Answer:

NoSQL

Explanation:

________ is the smallest short-range wireless network that is designed to be embedded in mobile devices such as cell phones and credit cards as a payment system, such as mobile wallets.

Answers

Near-field communications (NFC) is the smallest short-range wireless network, such as mobile wallets, is meant to be incorporated in mobile devices such as cell phones and credit cards as a payment system.

What is the Near-field communications (NFC)?

Near-field communication is defined as a collection of communication protocols that allows two electronic devices to communicate across a distance of 4 cm or less.

NFC provides a low-speed connection via a simple setup that may be utilized to launch more sophisticated wireless connections. It is the smallest short-range wireless network.

Therefore, it is Near-field communications (NFC).

Learn more about the communications, refer to:

https://brainly.com/question/22558440

#SPJ1

Savannah manages multiple wireless networks within her company's warehouse to ensure that certain devices are isolated and segmented off from each other. A junior technician has just added a new device to the network but cannot seem to get it to communicate with the other devices. Which of the following is the most likely reason that it cannot communicate with these devices?
a. RF attenuation b. improper antenna placement c. incorrect SSID d. encryption protocol mismatch

Answers

The most likely reason that the new device cannot communicate with the other devices is (Option C) an incorrect SSID. This is because the SSID is the name of the wireless network, and if the new device is using a different SSID than the other devices, then it won't be able to communicate with them.

Which is the most likely reason that it cannot communicate with these devices?

C. Incorrect SSID

Savannah is responsible for managing multiple wireless networks within her company's warehouse to ensure that certain devices are isolated and segmented off from each other. Recently, a junior technician has added a new device to the network, but has been unable to get it to communicate with the other devices. The most likely reason for this lack of communication is an incorrect SSID, or Service Set Identifier.

An SSID is a unique identifier that is used to identify and differentiate a particular wireless network from other networks. Each device on the network must be configured with the same SSID as the other devices in order to be able to communicate with them. If the SSID of the new device is not set correctly, it will not be able to communicate with the other devices on the network.

Learn more about Wireless network: https://brainly.com/question/25633298

#SPJ4

If Karel is facing North and the code turnLeft(); turnLeft();runs, which direction is Karel facing now?answer choicesNorthSouthEastWest

Answers

Karel is now facing East, when the code turnLeft(); turnLeft();runs.

What is the importance of code?

Coding, in its most basic form, is the process of giving instructions to a computer by typing commands that must be carried out sequentially. Our digital universe runs on code. Education to code has been compared to studying a foreign language, or perhaps a family of foreign languages.

As a result, coders serve as the digital age's architects and constructors. Every website, mobile application, computer software, calculator, and even microwave depends on code to function.

To learn more about code, use the link given
https://brainly.com/question/28338824
#SPJ4

Answer:

South

Explanation:

Imagine the compass rose, with north at the top (and going clockwise) east, south, and west. If he starts facing east and turns left, he will be faceing north. If he turns left again, he will be facing west, and if he turns left a thrid time, he will be facing south.

So, the answer is south.

Also I took the test, south is the correct answer

Other Questions
Which one of the following is the correct number of senators in the USA?. what would be a valid argument for not immediately removing power from a machine when an incident is discovered? entsK-12X Y7 218 249 27Function B1016420Function B10Which statement best compares the rate of change of the two functions? (1 point)The rate of change of both functions is 2.The rate of change of both functions is 3.O The rate of change of function A is greater than the rate of change of function B.O The rate of change of function B is greater than the rate of change of function A A researcher uses several procedures to separate a rock sample into different chemicals. A mass of 50 grams of one chemical is produced. If this chemical cannot be separated into other chemicals, then it is best described as. Which is an example of using a new medium to interpret the work?. Has NATO been a success?. Consider a system made up of 5 sub-systems A, B, C, D, and E that are in thermal contact with each other and isolated from the surroundings. The sub-systems were all initially at different temperatures, but after a redistribution of heat among these sub-systems, thermal equilibrium was established and all sub-systems had the same temperature. The following is a description of the heat flow with respect to sub-systems A, B, C and D:Sub-system A lost 7 kJ of heatSub-system B gained 4 kJ of heatSub-system C lost 1 kJ of heatSub-system D gained 3 kJ of heatWhat happened to sub-system E? In this assignment we will create a sorting program that provides the user with a large assortment of sorting methods and options. The user should be able to choose from a menu to select which Sort they would like to use.For each Sort, be sure to sort four arrays (*see note below), and list the time it took to sort each of the four arrays either in milliseconds or nanoseconds.For each sorting algorithm, write a brief description of how the sort works, and be sure to note the time complexity. You can include both in the code as comments.The user should be able to choose from the following sort algorithms (Be sure to implement all). If you use any other resource (including online) you need to cite the source in your code.Bogo Sort **Selection SortInsertion SortBubble SortQuick SortShell SortMerge SortGnome SortCocktail SortRadix Sort** One more Sort of your choice***Note: For the assignment, you will need to create several arrays of integers of the following sizes {20,100, 500, 1000}. Fill the values of these arrays with random values between the number 0 and 999. You may need to reinitialize these arrays if the user decides to run another sort. You may also need values of 1000 to 9999 if you want to use Radix from the in-class example. item20 2.5 points time remaining 56 minutes 53 seconds00:56:53 ebookitem 20 time remaining 56 minutes 53 seconds00:56:53 which of the following statements is correct? multiple choice a company is required to withhold various employee taxes from amounts paid independent contractors. the accountant who performs the independent audit for a company is an employee of the company. all employees must be paid no more than the minimum wage rate set by the fair labor standards act. disability benefits for the worker and the worker's dependents are provided by the federal insurance contributions act. Which Windows application allows you to access basic PC settings and controls?. 14) refer to the table. what is the average time a customer spends waiting in line and being served? a) 0.23 b) 2.33 c) 0.33 d) 1.63 e) 0.70 if a firm can lower production costs by sharing a resource among one or more of its products, it benefits from . An insurance company selected samples of clients under 18 years of age and over 18 and recorded the number of accidents they had in the previous year. The results are shown below. Under Age of 18 = 500 Number of accidents = 1 80 We are interested in determining if the accident proportions differ between the two age groups. Over Age of 18 m=600 Number of accidents-150 17. Refer to Exhibit 10-11 and let pu represent the proportion under and po the proportion over the age of 18. The null hypothesis is a. pu-po S0 d, pu-po-o 18. if you had to capture the main idea of the farewell address as a whole, what would that main idea be in one or two sentences? the per and tim proteins accumulate during the day until they cause sleepiness. what prevents them from continuing to accumulate at night? susan is three years older than shirley. their ages total 59 years. how old is shirley Which of the following is a list of each management position, who occupies it, how long that person will likely stay in the job, and who is qualified as a replacement?A replacement chart Let L represent the number of workers hired by a firm, and let Q represent that firm's quantity of output. Assume two points on the firm's production function are (L = 12, Q = 122) and (L = 13, Q = 132). Then the marginal product of the 13th worker isa.) 8 units of output.b.) 10 units of output.c.) 122 units of output.d.) 132 units of output.b.) 10 units of output. What are the similarities and differences between the trial court and appellate courts?. make a list of events that led to the american colonists declaring independence from england. be sure to include what the event was (the specifics of the event) and the impact it had on the road to independence.