Using the knowledge in computational language in C++ it is possible to write a code that write a function so that the given string s consisting of n characters returns any string
Writting in C++ code:#include <iostream>
#include <string>
using namespace std;
string solution(string &s)
{
//length of string
int n=s.size();
//index of string
int i=0;
while(i<n-1)
{
if(s[i]=='A')
{
if(s[i+1]=='B')
{
s=s.substr(0,i) + s.substr(i+2); i=0;
}
else
i++;
}
else if(s[i]=='B')
{
if(s[i+1]=='A')
{
s=s.substr(0,i) + s.substr(i+2); i=0;
}
else
i++;
}
else if(s[i]=='C')
{
if(s[i+1]=='D')
{
s=s.substr(0,i) + s.substr(i+2);
i=0;
}
else
i++;
}
else if(s[i]=='D')
{
if(s[i+1]=='C')
{
s=s.substr(0,i) + s.substr(i+2);
i=0;
} else
i++;
}
n=s.size();
}
return s;
}
int main() {
//Input string
string s="ACBDACBD";
solution(s);
//final output;
if(s=="")
cout<<"Empty String";
else
cout<<s;
return 0;
}
See more about C++ code at brainly.com/question/19705654
#SPJ1
Compare MAN, WAN, and LAN, and make a table having three columns.
Answer:
MAN :-)
MAN stands for metropolitan area network.It covers a larger area than LAN such as small towns, cities, etc. A MAN, also called the Metropolitan Area Network, is defined as the computer network that joins the metropolitan areas.The maintenance cost of MAN is difficult.WAN :-)
WAN stands for wide area network.It covers a large area than LAN as well as a MAN such as country/continent etc.A WAN, also called the Wide Area Network, is defined as a telecommunications network that extends over a large area.The maintenance cost of WAN is difficult.LAN :-)
LAN stands for local area network.It covers smaller areas such as colleges, schools, hospitals, and so on. LAN (Local Area Network) is defined as a computer network that is responsible for connecting local areas like schools, residents, universities, etc.The maintenance cost of LAN is easy.Hope its helpful :-)
If so, please mark me as brainlist :-)
How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private good or public good? Explain why.
XM Satellite Radio is known to be a kind of pay for service radio that tends to provides online radio services in the regions of the United States and Canada. Note that the XM Satellite often encrypt their satellite signals, and they have a receiver with assigned permission.
How does XM satellite radio work?XM Radio's is known to be a kind of a ground station that is often seen to passes or they transmits a signal in its two active GEO satellites.
Note that it is one that often bounce the signals back down to radio receivers that can be found on the ground.
Hence, the radio receivers are said to be programmed to be able to get receive and they can also unscramble the digital data signal, that has about or more than 170 channels of digital audio.
Therefore, XM Satellite Radio is known to be a kind of pay for service radio that tends to provides online radio services in the regions of the United States and Canada. Note that the XM Satellite often encrypt their satellite signals, and they have a receiver with assigned permission.
Learn more about satellite from
https://brainly.com/question/18496962
#SPJ1
Which of the following tiny computer apps is designed to be useful but could cause more harm than good?
BIOS
Macro
OS
Sys file
The following tiny computer app that is designed to be useful but could cause more harm than good is Sys file
What is a Sys file?This refers to the system file that is in operating systems and contains settings and variables that can make changes to the operating system.
Hence, we can see that if a user decides to tamper with the sys file on their operating system- either Microsoft DOS or Windows Operating Systems, this can lead to irreparable damages.
Read more about sys file here:
https://brainly.com/question/14364696
#SPJ1
Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their _____.
Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their Web browsers.
What is a Platform as a service PAAS?Platform as a service (PaaS) Software is known to be a kind of a hardware that gives an operating system on which a lot of developers can be able to make and also transmit solutions without the use of the underlying system software.
A web browser is known to be that which takes a person yo anywhere on the internet and it helps one to get back information.
Hence, Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their Web browsers.
See full question below
Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.
Web browsers
Web avatars
smart cards
data gloves
Learn more about PaaS from
https://brainly.com/question/20600180
#SPJ1
Similar to Wi-Fi, ____ is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.
Similar to Wi-Fi, WiMAX is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.
What is WiMAX used for?WiMax is know to be a full worldwide interoperability that is said to be made just for microwave access and this is said to be a form of a communication technology that was set up for wireless delivering of high-speed Internet service to a lot of geographical areas.
Wi-Fi is also known to be a kind of a wireless technology that is often used to link up computers, tablets, and other devices to that of the internet.
Note that Wi-Fi is said to be a radio signal transmitted from a wireless router and as such, Similar to Wi-Fi, WiMAX is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.
Learn more about Wi-Fi from
https://brainly.com/question/13267315
#SPJ1
Kira would like to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization. What control would best meet her needs
The control that Kira would be needing in order to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization is the CASB
What is the SaaS solutions?
This is the term that is used to refer to what is called Software as a service. This is the service that allows for the connection of certain cloud based apps over the internet connection.
This service is known to work for the person that subscribes to it following the pay as you go way. It helps in certain services such as the emails, calendars and in certain office tools.
Hence we can conclude that the CASB is the control that Kira would be needing in order to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization
Read more on SaaS here: https://brainly.com/question/13615203
#SPJ1
True or False. You can call/execute a function in the body of a loop
You can call/execute a function in the body of a loop is a true statement.
Can you call a function in a loop?Yes, one can be able to call a function that is said to be inside from a loop as well. The function is known to be one that can be called each time the loop is said to have executes and it is one that will stop calling after the loop finishes.
When the loop body is executed it is called?A single execution of the loop body is known to be what we call an iteration. The loop is one that can makes three iterations.
Hence, You can call/execute a function in the body of a loop is a true statement.
Learn more about loop from
https://brainly.com/question/26568485
#SPJ1
What type of os must be installed on your machine to allow this type of action by another person?
Answer:
Im sure its called Single User OS
Which component is responsible for collecting and consolidating data from network devices that are being monitored with snmp?
Answer:
A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
The availability and accessibility of storage are critical concerns for enterprise computing. Traditional direct-attached disk deployments within individual servers can be a simple and inexpensive option for many enterprise applications, but the disks -- and the vital data those disks contain -- are tied to the physical server across a dedicated interface, such as SAS. Modern enterprise computing often demands a much higher level of organization, flexibility and control. These needs drove the evolution of the storage area network (SAN).
SAN technology addresses advanced enterprise storage demands by providing a separate, dedicated, highly scalable high-performance network designed to interconnect a multitude of servers to an array of storage devices. The storage can then be organized and managed as cohesive pools or tiers. A SAN enables an organization to treat storage as a single collective resource that can also be centrally replicated and protected, while additional technologies, such as data deduplication and RAID, can optimize storage capacity and vastly improve storage resilience -- compared to traditional direct-attached storage (DAS).
SAN architecture
A storage area network consists of a fabric layer, host layer and storage layer.
The cathode ray tube eventually was eventually used for what entertainment device?
[tex]\huge\underline{\underline{\boxed{\bm {Answer:}}}}[/tex]
[tex] \large\bm{Television}[/tex]
[tex]\huge\underline{\underline{\boxed{\bm {Explanation:}}}}[/tex]
The cathode ray tube can be said to be a vacuum tube which contains one or more electric guns. This tube produces images when an electron beam strikes a phosphorescent surface. This tube produces pictures as a form of video signals. The entertainment device, which the cathode ray tube was eventually used for since it produces pictures, is a television set.
in makecode arcade, which part of the interface can be used to answer questions about how a block functions?
in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.
What is the function about?In Blocks, Functions is known to be the element that one can find under the Advanced section.
Note that in finding functions in block, student can be be introduced to Simple functions.
Hence, in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.
Learn more about block functions from
https://brainly.com/question/17043948
#SPJ1
Answer:
The right side panel
Explanation:
On the right side panel you can see the various functions of specific block functions in MakeCode Arcade.
A data analyst uses _____ to decide which data is relevant to their analysis and which data types and variables are appropriate
Answer:
I believe that the answer is a database organization.
How could each of the two-proposed changes decrease the size of an mips assembly program? On the other hand, how could the proposed change increase the size of an mips assembly program?
Based on the question attached, the Number of bits that is needed to address a register is 7 bits.
3. How could the proposed change increase the size of an mips assembly program?The two-proposed changes decrease the size of an mips assembly program because a lot of complicated operations will need to be put in place or implemented in one instructions instead of numerous instructions due to the lowered register leaking issue. The program's size will be therefore be lowered as a result of this issue.
The proposed change will increase the size of an mips assembly program because The size of the instruction word will then be brought up or raised if the required bits are added to the opcode and that of the register fields, which will bring up the size of the programmed.
In the MIPS register file;
The Number of MIPS registers = 128
The Number of bits needed = log₂128
The Number of bits needed = 7 bits
So Increasing number bits for opcode will be = (6 + 2)
= 8
Therefore the answers to question one:
1. R-type instruction
Op-code = 6 bits
rs = 5 bits
rt = 5 bits
rd = 5 bits
shamt = 5 bits
funct = 6 bits
Hence, the size of the opcode field will be go up by two bits, to eight bits and the size of the rs ,rt, and rd fields is also go up to 7 bits.
For question 2 which is I-type instruction, there is:
Op-code = 6 bits
rs = 5 bits
rt = 5 bits
Immediate = 16 bits
Hence, The size of the opcode field will also go up by two bits, to eight bits and the size of the rs, rt fields will is also go up to 7 bits.
Therefore, Based on the question attached, the Number of bits that is needed to address a register is 7 bits.
Learn more about program from
https://brainly.com/question/14897427
#SPJ1
See full question below
Assume that we would like to expand the MIPS register file to 128 registers and expand the instruction set to contain four times as many instructions. 1. How this would this affect the size of each of the bit fields in the R-type instructions? 2. How this would this affect the size of each of the bit fields in the I-type instructions? 3. How could each of the two proposed changes decrease the size of an MIPS assembly program? On the other hand, how could the proposed change increase the size of an MIPS assembly program?
Write the code to call/execute the following function
void printInfo()
{
cout << "Jared" << endl;
cout << "ITP100" << endl;
cout << "TCC" << endl;
}
Answer:
write a main() function and call your function.
Explanation:
See picture. Executed at replit.
A__________ is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.
A blog is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.
What is a blog?A blog, in full is known as a Web log or a Weblog. This is known to be a kind of an online journal that is usually owns by people or firm and it is one where a person, group, or corporation usually shows a record of activities, thoughts, or their beliefs.
Note that the blog is said to be a web page that a person needs to update on a constant basis and a lot of times, brands do have blogs right on their websites, and this tends to make it easier for users to be able to see and engage with a lot of others with posts.
Therefore, A blog is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.
Learn more about website from
https://brainly.com/question/13171394
#SPJ1
How do you feel about what big data? What are the advantages and disadvantages? How has this new knowledge impacted how you use the internet and internet-connected tools?
B see that big data are very good and one should know that big data is a data that has a large variety, and comes in increasing volumes and with also a lot of velocity.
What are the advantages of big data?The Advantages are:
Reduce human work and effortIt saves time and effort It is good for personal safety and securityHence, B see that big data are very good and one should know that big data is a data that has a large variety, and comes in increasing volumes and with also a lot of velocity.
Learn more about big data from
https://brainly.com/question/17149764
#SPJ1
________ models assist top-level managers in long-range planning, such as stating company objectives or planning plant locations. group of answer choices strategic operational corporate tactical
Strategic models assist top-level managers in long-range planning, such as stating company objectives or planning plant locations.
What are strategic models?A strategic planning model is known to be a kind of a model that is known to explain how a firm takes its strategy and makes a plan to implement it to boast operations and rightly meet their goals.
What are the basic model of strategic management?This type of business model in strategic management is known to be called a macro-level plan that helps firms to be able to examine future changes based on Political, Economic, Social and that of Technological factor.
Hence, Strategic models assist top-level managers in long-range planning, such as stating company objectives or planning plant locations.
Learn more about Strategic models from
https://brainly.com/question/24448358
#SPJ1
______ ports provide high-definition video and audio, making it possible to use a computer as a video jukebox or an hd video recorder.
HDMI ports provide high-definition video and audio, making it possible to use a computer as a video jukebox or an hd video recorder.
What is a HDMI used for?HDMI is known to be the short form for High Definition Multimedia Interface. It is said to be the most commonly used HD signal that is often used in the act of moving of both high-definition audio and video via a single cable, from one device to any other kind.
What HDMI port is used for?The HDMI interface is known to be one that gives a port that ability to send high-resolution digital video, theatre-quality sound and others.
Hence, based on the definition, HDMI ports provide high-definition video and audio, making it possible to use a computer as a video jukebox or an HD video recorder.
Learn more about HDMI from
https://brainly.com/question/24637033
#SPJ1
Write a program that first reads a list of 5 integers from input. then, read another value from the input, and output all integers less than or equal to that last value
Answer:
integers = [int(i) for i in input().split()]
value = int(input())
for integer in integers:
--if integer <= value:
----print(integer)
Explanation:
We first read the five integers in a string. We can use the .split() method, which splits the string into separate parts on each space.
For example:
print(input())
>> "4 -5 2 3 12"
print(input().split())
>> ["4", "-5", "2", "3", "12"]
We cannot work with these numbers if they are strings, so we can turn them into integers using the int constructor. An easy way to do this is with list comprehension.
print([int(i) for i in input().split()]
>> [4, -5, 2, 3, 12]
Now that all the values in the list are integers, we can use a for loop to get each of the values and check whether they are less than or equal to the value.
Let's first get the value from the input.
integers = [int(i) for i in input().split()]
value = int(input())
print(value)
>> 4
Here, we have to pass the input through the int constructor to be able to compare it with the other integers. Let's now make a for loop to go through each integer and check if the integer is less than or equal to value.
for integer in integers:
--if integer <= value:
----print(integer)
The dashes are there to show indentation and are not part of the code.
The keyword __________ is required to declare a class.
a. public
b. private
c. class
d. all of the above
Answer: b. private
Explanation:
What windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?
The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.
Does Windows 10 possess local security policy?The Local Security Policy is known to be one that is often seen in Windows 10 and it is also known to be made up of information that is regarding the security of a local computer.
Note that If a person is trying to get into the Local Security Policy in Windows 10 Home, a person will receive an error report about it.
Therefore, The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.
Learn more about windows utility from
https://brainly.com/question/6058561
#SPJ1
structure that the house the electronic system specifications
Electrical systems, also called circuits or networks, are designed as mixtures of mainly three fundamental components: resistor, capacitor, and inductor. They are likewise defined by resistance, capacitance, and inductance—generally considered to be lumped-parameter effects.
What are the specifications of a circuit?
The specification can (and normally does) also set some of the physical parameters that the procedure must meet, such as size, weight, moisture resistance, temperature range, thermal output, vibration tolerance, and acceleration tolerance.
What is the electronic system?
An Electronic System is a physical interconnection of components, or parts, that gathers various parts of information together.
To learn more about Electrical systems, refer
https://brainly.com/question/24786034
#SPJ9
When network traffic is encrypted, it is invisible and its content and purpose are masked.
a. true
b. false
Answer:
true
Explanation:
encryption is when you scramble the contents of information
What do you think that private information like passwords pin number will be guarded or shared with the public? why?
The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.
Why should you use passwords to protect private information?Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.
Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.
Therefore one need to or one should maintain the use of a strong passwords for all accounts that are present on your computer.
Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.
Learn more about passwords from
https://brainly.com/question/17174600
#SPJ1
In a partially filled array, the number of slots in the array that are not currently used is the?
Answer:
Can you please explain more
Explanation:
1.1 give five (5) reasons why modeling is an important part of system analysis and design
Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.
What is Modeling?In computation, modeling refers to the action of taking into account all variables that produce a given outcome and then predict it in a virtual environment.
Modeling is fundamental in system design because enables the prediction of the behavior of diverse variables simultaneously.
In conclusion, Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.
Learn more about modeling here:
https://brainly.com/question/17994947
#SPJ1
What is the lowest grade of utp that is rated for 100 mbps transmission?
The lowest grade of UTP that is rated for 100 Mbps transmission is option A. CAT-5. CAT-5 was the first UTP standard ratified for 100 Mbps transmissions. Before that, CAT-3 was popular but only supported 10 Mbps. CAT-5e, CAT-6, and CAT-6a all support at least 1 Gbps and came after CAT-5.
Category 5 cable (CAT- 5) is a twisted pair cable for computer networks. Since 2001, the variant commonly in use is the Category 5e specification (Cat 5e). The cable standard provides performance of up to 100 MHz and is suitable for most varieties of Ethernet over twisted pair up to 2.5GBASE-T but more commonly runs at 1000BASE-T (Gigabit Ethernet) speeds.
What is UTP?Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). There are five types of UTP cables -- identified with the prefix CAT, as in category -- each supporting a different amount of bandwidth.
Therefore, the correct answer is as given above
learn more about CAT-5: https://brainly.com/question/28122297
#SPJ1
The complete question goes thus:
What is the lowest grade of UTP that is rated for 100 Mbps transmission?
A. CAT-5
B. CAT-5e
C. CAT-6
D. CAT-6a
Iris has completed a graphic design project for a client. what should iris obtain from the client in order to display the work in her portfolio? iris must get a from the client that gives her permission to display the work in her portfolio.
This stands very vague and usually relies on the laws of the country in which you exist working.
What is portfolio?A portfolio stands for a group of financial assets like stocks, bonds, commodities, cash, and cash equivalents, including closed-end funds and exchange-traded funds (ETFs). People commonly believe that stocks, bonds, and cash include the core of a portfolio. The term itself comes from the Italian phrase for a case organized to carry loose papers (portfolio), but don't think of a portfolio as a physical container. Rather, it's an conceptual way to guide to groups of investment assets.
This stands very vague and usually relies on the laws of the country in which you exist working. In some cases, Iris would need approval from the client to display the work. In other cases, Iris would not require anything because she exists as the original creator of the content. This mostly depends on the laws of the country and whether or not a specific contract existed formed between Iris and the client, expressing if the content rights were transferred or not.
To learn more about portfolio refer to:
https://brainly.com/question/20707078
#SPJ4
Answer:i dont see no answer
Explanation:
Tab
are the lines that appear in front of tabbed text.
a) headers
b) underlines
c) leaders
d) indicators
Answer:
tab leaders are the lines that appear in front of tabbed text
In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of?
Mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of memory and screen size.
What is mobile application?A mobile app is known to be a kind of a software application that was made specifically for its use in terms of small, wireless computing machines.
It includes, smartphones and tablets, instead of desktop or laptop computers.
Note that Mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of memory and screen size as this was said to be a major setback for it.
Learn more about mobile applications from
https://brainly.com/question/917245
#SPJ1
See full question below
In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of
Select one:
a. memory and screen size.
b. screen size and keyboard functionality.
c. processing speed and graphics capabilities.
d. storage capacity and processing speed.