In this assignment you are to write a Python program to read a CSV file consisting of U.S. state
information, then create and process the data in JSON format. Specific steps:
1. Read a CSV file of US state information, then create a dictionary with state abbreviation
as key and the associated value as a list: {abbrev: [state name, capital, population]}. For
example, the entry in the dictionary for Virginia would be : {‘VA’: [‘Virginia’, ‘Richmond’,
‘7078515’]}.
2. Create a JSON formatted file using that dictionary. Name the file ‘state_json.json’.
3. Visually inspect the file to ensure it's in JSON format.
4. Read the JSON file into your program and create a dictionary.
5. Search the dictionary to display the list of all state names whose population is greater
than 5,000,000.
Notes:
• The input file of U.S. state information will be provided with the assignment
• In processing that data you’ll need to read each line using READLINE, or all into one list
with READLINES
• Since the data is comma-separated you’ll have to use the string ‘split’ method to
separate the attributes (or fields) from each line and store each in a list.
• Remember that all the input data will arrive in your program as a character string. To
process the population data you’ll have to convert it to integer format.
• The input fields have some extraneous spaces that will have to be removed using the
string ‘strip’ method.
• As each line is read and split, add an entry for it to the dictionary as described above.
• Be sure to import ‘json’ and use the ‘dumps’ method to create the output string for
writing to the file.
• The visual inspection is for your benefit and won’t be reviewed or graded.
• Use the ‘loads’ method to process the read json file data into a Python data structure.
• Iterate through the dictionary and compare each state’s population to determine which
to display. Be sure you’ve stored the population in the dictionary as an integer so you
can do the comparison with 5,000,000.
(File with US states information)
state_CSV.txt
AL, Alabama, Montgomery, 4447100,
AK, Alaska, Juneau, 626932,
AZ, Arizona, Phoenix, 5130632,
AR, Arkansas, Little Rock, 2673400,
CA, California, Sacramento, 33871648,
CO, Colorado, Denver, 4301261,
CT, Connecticut, Hartford, 3405565,
DE, Delaware, Dover, 783600,
DC, District of Columbia, Washington, 572059,
FL, Florida, Tallahassee, 15982378,
GA, Georgia, Atlanta, 8186453,
HI, Hawaii, Honolulu, 211537,
ID, Idaho, Boise, 1293953,
IL, Illinois, Springfield, 12419293,
IN, Indiana, Indianapolis, 6080485,
IA, Iowa, Des Moines, 2926324,
KS, Kansas, Topeka, 2688418,
KY, Kentucky, Frankfort, 4041769,
LA, Louisiana, Baton Rouge, 4468976,
ME, Maine, Augusta, 1274923,
MD, Maryland, Annapolis, 5296486,
MA, Massachusetts, Boston, 6349097,
MI, Michigan, Lansing, 9938444,
MN, Minnesota, Saint Paul, 4919479,
MS, Mississippi, Jackson, 2844658,
MO, Missouri, Jefferson City, 5595211,
MT, Montana, Helena, 902195,
NE, Nebraska, Lincoln, 1711263,
NV, Nevada, Carson City, 1998257,
NH, New Hampshire, Concord, 1235786,
NJ, New Jersey, Trenton, 8414350,
NM, New Mexico, Santa Fe, 1819046,
NY, New York, Albany, 18976457,
NC, North Carolina, Raleigh, 8049313,
ND, North Dakota, Bismarck, 642200,
OH, Ohio, Columbus, 11353140,
OK, Oklahoma, Oklahoma City, 3450654,
OR, Oregon, Salem, 3421399,
PA, Pennsylvania, Harrisburg, 12281054,
RI, Rhode Island, Providence, 1048319,
SC, South Carolina, Columbia, 4012012,
SD, South Dakota, Pierre, 754844,
TN, Tennessee, Nashville, 5689283,
TX, Texas, Austin, 20851820,
UT, Utah, Salt Lake City, 2233169,
VT, Vermont, Montpelier, 608827,
VA, Virginia, Richmond, 7078515,
WA, Washington, Olympia, 5894121,
WV, West Virginia, Charleston, 1808344,
WI, Wisconsin, Madison, 5363675,
WY, Wyoming, Cheyenne, 493782

Answers

Answer 1

To complete this assignment using Python, csv, and json, follow these steps:

```

import json

# Step 1: Read the CSV file and create a dictionary with state abbreviation as key and the associated value as a list

state_dict = {}

with open('state_CSV.txt', 'r') as file:

   for line in file:

       fields = line.strip().split(',')

       state_dict[fields[0]] = [fields[1].strip(), fields[2].strip(), int(fields[3].strip())]

# Step 2: Create a JSON formatted file using the dictionary

with open('state_json.json', 'w') as file:

   json.dump(state_dict, file)

# Step 4: Read the JSON file into a dictionary

with open('state_json.json', 'r') as file:

   state_dict = json.load(file)

# Step 5: Search the dictionary to display the list of all state names whose population is greater than 5,000,000

population_threshold = 5000000

for state in state_dict.values():

   if state[2] > population_threshold:

       print(state[0])

```

After completing these steps, you will have read a CSV file containing US state information, created a JSON file with the data, read the JSON file back into your Python program, and displayed a list of state names with a population greater than 5,000,000.

Learn more about Python: https://brainly.com/question/26497128
#SPJ11


Related Questions

What is the datatype of z when the following statements are executed? x = ['1',2,3.0,'4', 5] y = tuple(x) z = x[3] print(z) list string tuple float

Answers

The data type of z is a string.

The code begins by populating a list x with five members of various data types. It then generates a tuple y from the list x. Finally, it assigns the fourth element of x (the string '4') to the variable z and prints it. Because the fourth element of x is a string, so is the value of z. As a result, the data type of z is a string.

It's worth noting that, despite the fact that the items of the list x have distinct data types, Python permits them to coexist in the same list. This is an important Python feature since it allows for more flexible data structures. However, when a value from the list is assigned to a variable, the variable takes on the data type of the item being assigned.

Learn more about data types:

https://brainly.com/question/179886

#SPJ11

How do you find the universal variable x?

Answers

The universal variable x corresponding to delta v of 60 degrees is 0.5616 DU^0.5/TU.

How to solve

To find the universal variable x corresponding to delta v of 60 degrees, we can use the following steps:

Calculate the specific mechanical energy (ε) using the given data:

ε = (Vo^2)/2 - μ/ro = (2^2)/2 - 1/1.41421 = 1.2929 DU/TU

where μ is the standard gravitational parameter and is equal to 1 DU^3/TU^2.

2. Calculate the semimajor axis (a) using the given data:

a = -μ/(2ε) = -1/(2*1.2929) = -0.3868 DU

3. Calculate the eccentricity (e) using the given data:

[tex]e = \sqrt{(1 - (p/a))} = \sqrt{(1 - (8/-0.3868))} = 1.6756[/tex]

4. Calculate the true anomaly (ν) corresponding to delta v of 60 degrees:

cos(ν) = -1/e * (1 - (p/ro)) = -1/1.6756 * (1 - (8/1.41421)) = -0.5026

ν = acos(-0.5026) = 120.36 degrees

5. Calculate the universal variable x using the following equation:

x = sqrt(μ) * (TU/2) * (cos(ν) + sqrt(e^2 - sin(ν)^2))/sqrt(1 + e)

x = sqrt(1) * (1/2) * (cos(120.36) + sqrt(1.6756^2 - sin(120.36)^2))/sqrt(1 + 1.6756) = 0.5616 DU^0.5/TU

Therefore, the universal variable x corresponding to delta v of 60 degrees is 0.5616 DU^0.5/TU.

Read more about universal variables here:

https://brainly.com/question/29607031

#SPJ1

YTHON Make a script file that includes example results as comments: Write a function to give the following output: (PS: \n, \t, and loops are not allowed) 1 1 1 1 1 1 1 1 1 1

Answers

Here's a Python script that includes the example results as comments:

```
# This script outputs 1 1 1 1 1 1 1 1 1 1
def print_ones():
   print("1 " * 10)

# Call the function to see the output
print_ones()
```

As you can see, I've added comments throughout the script to explain what each part of the code does. The example output is included as a comment, so you can see exactly what the script should output when it runs. The function `print_ones()` uses string concatenation to print the number "1" ten times, separated by a space. When the function is called, it prints the string to the console, resulting in the desired output.

Learn more about script here:

https://brainly.com/question/30338897

#SPJ11

a) Solve the following Recurrence Relation using Master's Theorem (6) 1) TR) =Tn/ 2) + n 2) T(n) = T(n-1) + T(3n/2) + n 3) T(n) = 4 T(n/2) + n' log n b) Calculate the Recurrence Relation for the recursive algorithm below: Algorithm: int Exp(int a, int n, int m) { if(n== 0 ) return 1; if (n == 1) return a; x = Exp ( a, n/2, m); if (even(n)) // even (n) returns 1 if ‘n’is even otherwise 0 return x? (mod m); else return r'a (mod m); }

Answers

a) Let's analyze the three recurrence relations using the Master's Theorem:

1) T(n) = T(n/2) + n
  According to Master's Theorem, we have a=1, b=2, and f(n)=n. Since log_b(a) = log_2(1) = 0 and f(n) = n^1, we are in Case 2. Therefore, the solution is T(n) = O(n*log(n)).

2) T(n) = T(n-1) + T(3n/2) + n
  The Master's Theorem does not apply to this relation because it doesn't have the form T(n) = aT(n/b) + f(n), where a, b, and f(n) follow the theorem's conditions.

3) T(n) = 4T(n/2) + n*log(n)
  Here, a=4, b=2, and f(n)=n*log(n). We have log_b(a) = log_2(4) = 2, and f(n) = n^2 * log(n). In this case, Master's Theorem does not apply because f(n) ≠ n^c for any constant c.

b) To find the recurrence relation for the given algorithm:

Algorithm int Exp(int a, int n, int m) performs exponentiation. It has two base cases: when n is 0 or 1. The algorithm divides the problem into two subproblems of size n/2 in each recursive call. Thus, the recurrence relation can be written as:

T(n) = T(n/2) + C

where C is a constant representing the time spent on operations other than the recursive call. Since this relation has the form T(n) = aT(n/b) + f(n), we can apply the Master's Theorem with a=1, b=2, and f(n)=C. The solution is T(n) = O(log(n)).

Learn more about Theorem here:

https://brainly.com/question/30066983

#SPJ11

Samples of two fluids are delivered to your lab, and you are assigned the task to analyze their rheological behavior. After you have completed your analysis, you determine that the fluids exhibit the following behaviors: · Fluid A (lard) is approximately Newtonian, with viscosity equal to 75,000 cP. Fluid B (mayonnaise) is a Bingham plastic, with yield stress t, 32 Pa and plastic viscosity (the slope of the shear stress-shear rate relationship) of 50 Pa s. Determine which fluid exhibits the higher shear stress at shear rate equal to 1 s. (Recall that 1 cP is equivalent to 101 Pa s.)

Answers

To determine which fluid exhibits the higher shear stress at a shear rate equal to 1 s, we need to calculate the shear stress for each fluid at this specific shear rate.

For Fluid A (lard), since it is approximately Newtonian, we can use the equation for shear stress in a Newtonian fluid, which is:

Shear stress = viscosity x shear rate

Plugging in the values given, we get:

Shear stress = 75,000 cP x (1 s / 101 Pa s) = 742.57 Pa

For Fluid B (mayonnaise), since it is a Bingham plastic, we need to use the Bingham plastic model to calculate the shear stress. The equation for shear stress in a Bingham plastic is:

Shear stress = yield stress + plastic viscosity x shear rate

Plugging in the values given, we get:

Shear stress = 32 Pa + 50 Pa s x 1 s = 82 Pa

Therefore, Fluid B (mayonnaise) exhibits higher shear stress at a shear rate equal to 1 s, with a shear stress of 82 Pa compared to Fluid A's (lard) shear stress of 742.57 Pa.

Learn more about fluid here:

https://brainly.com/question/21708739

#SPJ11

A degenerate binary tree will have the performance of what other data structure? o A hash table
o A linked list o An array with holes o A bipartite graph

Answers

A degenerate binary tree will have the performance of a linked list.

This is because a degenerate binary tree only has one child node per parent node, creating a linear structure similar to a linked list. As a result, searching, inserting, and deleting elements in a degenerate binary tree would have the same performance as a linked list. A linked list is a data structure used in computer programming to store and manipulate collections of data elements, such as integers, characters, or other objects. It consists of a sequence of nodes, each of which contains a data element and a reference or pointer to the next node in the list.

Learn more about linked list: https://brainly.com/question/20058133

#SPJ11

In Python, different classes may have methods of the same name. Functions can then call that function on any object which has that method defined in its class. O True even if the method is not inherited. O False; this is never allowed. True only if one class inherits that method from the other.

Answers

The statement "In Python, different classes may have methods of the same name. Functions can then call that function on any object which has that method defined in its class." is True, even if the method is not inherited.

In Python, different classes can have methods with the same name. Functions can call those methods on any object, as long as the method is defined in the object's class, regardless of whether the method is inherited or not. This is possible because Python supports polymorphism, which allows different classes to have methods with the same name but with different implementations. Python supports both inheritance and composition. If a method is defined in a class, any object created from that class will have that method. It doesn't matter if the method was inherited from a parent class or defined in the child class itself.
Therefore, the correct answer is: True even if the method is not inherited.

Learn more about Python: https://brainly.com/question/18521637

#SPJ11

The 3-kg slider A fits loosely in the smooth 45 degree slot in the disk, which rotates in a horizontal plane about its center O. If A is held in position by a cord secured to point D, determine the tension T in the cord for a constant rotational velocity 0

Answers

Since slider A fits loosely in the slot, it will experience a centrifugal force that will pull it outward as the disk rotates. This force is balanced by the tension T in the cord that holds it in place.

To determine the tension T, we need to analyze the forces acting on slider A. We can resolve the centrifugal force into its components: one along the slot, which balances the normal force from the slot, and the other perpendicular to the slot, which is balanced by the tension T.

Since the disk is rotating at a constant velocity, the net force acting on slider A must be zero. Therefore, we can equate the centrifugal force component perpendicular to the slot to the tension T:

T = m*A*omega^2*sin(theta)

where m is the mass of the slider, A is the distance of the slider from the center of the disk, omega is the angular velocity of the disk, and theta is the angle between the slot and the horizontal plane.

Note that the mass of the slider is given as 3 kg, and the distance A can be determined from the geometry of the problem. Once these values are known, we can solve for the tension T for a given rotational velocity omega.

Learn more about slot here:

https://brainly.com/question/14896128

#SPJ11

E10.15 The structural efficiency of foamed panels (Figure E10.11). Calculate the change in structural efficiency for both bending stiffness and strength when a solid flat panel of unit area and thickness t is foamed to give a foam panel of unit area and thickness h, at constant mass. The modulus E and strength Oy of foams scale with relative density p/Ps as 3/2 Eles and offe) Ofis where E, of and p are the modulus, strength and density of the foam and Es, ofs and pathose of the solid panel. Solid panel Foamed panel same mass and area Figure E10.11

Answers

The change in structural efficiency for both bending stiffness and strength when a solid flat panel of unit area and thickness t is foamed to give a foam panel of unit area and thickness h, at constant mass, can be calculated using (Offe*(p/Ps)^1/2)/(Ofs*(p/Ps)^1/2)

To calculate the change in structural efficiency for both bending stiffness and strength when a solid flat panel of unit area and thickness t is foamed to give a foam panel of unit area and thickness h, at constant mass, we need to use the given equation for the modulus E and strength Oy of foams which scale with relative density p/Ps as 3/2 Eles and offe) Ofis where E, of and p are the modulus, strength and density of the foam and Es, ofs and pathose of the solid panel.

First, let's consider the bending stiffness of the panels. The bending stiffness of a panel is proportional to its modulus of elasticity (E) and its moment of inertia (I). The moment of inertia is proportional to the thickness cubed (t^3) for a solid flat panel and (h^3) for a foamed panel. So, the bending stiffness of the solid flat panel is given by E*t^3 and the bending stiffness of the foamed panel is given by (3/2)*Eles*(p/Ps)*h^3.

Now, we can calculate the change in bending stiffness by dividing the bending stiffness of the foamed panel by the bending stiffness of the solid flat panel:

Change in bending stiffness = ((3/2)*Eles*(p/Ps)*h^3)/(E*t^3)

Next, let's consider the strength of the panels. The strength of a panel is proportional to its yield stress (Oy) and its cross-sectional area (A). The cross-sectional area is the same for both panels (unit area), so we only need to consider the yield stress. The yield stress is proportional to the relative density (p/Ps) to the power of 1/2 for both solid and foamed panels. So, the yield stress of the solid flat panel is given by Ofs*(p/Ps)^1/2 and the yield stress of the foamed panel is given by Offe*(p/Ps)^1/2.

Know more about structural efficiency here:

https://brainly.com/question/6610542

#SPJ11




.

true or false in facility location decision making, the factor-rating system is one of the least used general location techniques.

Answers

The given statement, "In facility location decision making, the factor-rating system is one of the least used general location techniques" is false because the factor-rating system is actually one of the most commonly used general location techniques in facility location decision making.

In facility location decision making, the factor-rating system is not one of the least used general location techniques. In fact, the factor-rating system is a popular and widely-used technique for evaluating and comparing alternative facility locations based on a set of factors, which can be both qualitative and quantitative. This system assists in making informed decisions by assigning weights and scores to each factor and calculating a total score for each potential location.

Learn more about factor-rating system at https://brainly.com/question/31194236

#SPJ11

before retracting the stabilizers, the wheel chocks should be moved slightly away from the tires as an extra precaution to prevent:

Answers

Before retracting the stabilizers of a vehicle, it is recommended to move the wheel chocks slightly away from the tires as an extra precaution to prevent the vehicle from rolling or moving.

Why is this important?

This is important because, even with the stabilizers retracted, the vehicle may still have some residual movement or instability that could cause it to roll or move unexpectedly.

By moving the wheel chocks away from the tires, the vehicle is further secured in place, reducing the risk of accidents or damage to property. It is important to always prioritize safety when operating any kind of vehicle or machinery.

Read more about stabilizers here:

https://brainly.com/question/25558588

#SPJ1

How to display data from database table in Java?

Answers

To display data from a database table in Java, you need to establish a connection to the database using JDBC (Java Database Connectivity) API. Once the connection is established, you can use SQL queries to retrieve data from the database tables.

To display the data, you can use a ResultSet object which represents a set of rows retrieved from the database. You can iterate through the ResultSet using a loop and print out the data using the appropriate methods such as getString(), getInt(), etc.

Here is an example code snippet that demonstrates how to display data from a database table in Java:

```
import java.sql.*;

public class DisplayData {
   public static void main(String[] args) throws SQLException {
       // Establish a connection to the database
       Connection connection = DriverManager.getConnection("jdbc:mysql://localhost:3306/mydatabase", "username", "password");

       // Create a SQL statement to retrieve data from the table
       Statement statement = connection.createStatement();
       ResultSet resultSet = statement.executeQuery("SELECT * FROM mytable");

       // Iterate through the result set and print out the data
       while (resultSet.next()) {
           String name = resultSet.getString("name");
           int age = resultSet.getInt("age");
           System.out.println("Name: " + name + ", Age: " + age);
       }

       // Close the resources
       resultSet.close();
       statement.close();
       connection.close();
   }
}
```

In this example, we establish a connection to the "mydatabase" database and retrieve data from the "mytable" table using a SQL query. We then iterate through the result set and print out the name and age of each row. Finally, we close the resources to release them.

Learn more about database here:

https://brainly.com/question/29412324

#SPJ11

a computer with a 16-bit wide data bus uses 1m 1 bit dynamic ram memory chips. what is the smallest memory (in bytes) that this computer can have? a: 1m b: 2m c: 4m d: 8m e: 16m

Answers

The smallest memory that this computer can have is 2m, which is the closest answer choice. The answer is (b) 2m.

To calculate this, we first need to convert the 1m 1-bit dynamic ram memory chips to bytes.

1m = 1,000,000 chips
1 chip = 1 bit
So, 1m chips = 1,000,000 bits

Since the computer has a 16-bit wide data bus, it can access 16 bits (or 2 bytes) of memory at a time.

Therefore, the total memory that the computer can access is:
1m chips x 1 bit per chip x 2 bytes per access = 2m bytes

Learn more about Ram memory: https://brainly.com/question/28483224

#SPJ11

How many edges does a full binary tree with 1000 internal vertices have?

Answers

A full binary tree with 1000 internal vertices has 2(1000) = 2000 edges.


A full binary tree is a binary tree in which each internal vertex has exactly two children, and each leaf node has no children. In a full binary tree, the number of leaf nodes (L) is one more than the number of internal vertices (I). Therefore, we have:

L = I + 1

Given that there are 1000 internal vertices, we can calculate the number of leaf nodes:

L = 1000 + 1
L = 1001

Now, we can find the total number of vertices (V) in the tree by adding the number of internal vertices and leaf nodes:

V = I + L
V = 1000 + 1001
V = 2001

Since a tree has one less edge than the total number of vertices, the number of edges (E) in the tree is:

E = V - 1
E = 2001 - 1
E = 2000

So, a full binary tree with 1000 internal vertices has 2000 edges.

Learn more about binary tree: https://brainly.com/question/16644287

#SPJ11

Find diameter of the pipe.

Answers

Where the above conditions are given, the pipe diameter is 1.351 meters.

What is the explanation for the above response?

To calculate the pipe diameter, we can use the Darcy-Weisbach equation:

f = (64 / Re)

where f is the friction factor, and Re is the Reynolds number:

Re = (ρ * V * D) / μ

where ρ is the density of water, V is the velocity of water, D is the diameter of the pipe, and μ is the viscosity of water.

The Darcy-Weisbach equation can be rewritten as:

hf = (f * L * V^2) / (2 * g * D)

where hf is the head loss due to friction, L is the length of the pipe, and g is the acceleration due to gravity.

We can assume that the head loss due to friction is small compared to the head difference between the two reservoirs. Therefore, we can neglect hf in our calculation.

The velocity of water is:

V = Q / A

where Q is the flow rate and A is the cross-sectional area of the pipe.

Therefore, we can write:

D = (4 * Q) / (π * V)

Substituting the values given in the problem, we get:

V = Q / A = 10 / (π * (D/2)^2)

Re = (ρ * V * D) / μ = (1000 * 10 * D) / (0.001002)

f = (64 / Re) = 64 / ((1000 * 10 * D) / (0.001002))

Now, we can solve for D by iteration or using a solver in a spreadsheet software:

D = 1.351 m (approximately)

Therefore, the pipe diameter is 1.351 meters.

Learn more about diameter at:

https://brainly.com/question/13624974

#SPJ1

QUESTION 4 Show the Relational Algebra AND Domain Relational Calculus formulas for each. This one may be a photo/scan of hand written answers if you have trouble entering the necessary symbols in an editor. A. Show a portfolio of the Flubs by a Professor B. Show a portfolio of all Flubs and Bounces (the Flubs bounced) by all of a Professor's Colleagues

Answers

The join operator (⨝) is then used to combine the tuples with the "Portfolio" relation. In the Domain of  Relational Calculus formula, the conditions check for both Flubs and Bounces by a Professor's colleagues.

To answer your question, I will first explain what Domain Relational Calculus and Relational Algebra are.

Domain Relational Calculus is a query language that uses mathematical expressions to retrieve data from a database. It uses variables, quantifiers, and logical operators to specify the conditions that must be met for a tuple to be selected.

Relational Algebra, on the other hand, is a procedural query language that operates on relations (tables) using a set of operators such as selection, projection, union, intersection, and join.

To show the formulas for the given questions:

A. To show a portfolio of the Flubs by a Professor, we can use the following formulas:

- Relational Algebra: πFlub(σProfessor='[Professor's name]'(Portfolio))

This formula uses the projection operator (π) to select only the Flub column from the Portfolio table. The selection operator (σ) is used to select only the rows where the Professor column matches the given professor's name.

- Domain Relational Calculus: { | ∃(Portfolio(, ) ∧  = '[Professor's name]')}

This formula reads as "Select all Flubs from the Portfolio where there exists a Professor whose name matches the given name." The symbol ∃ represents the existential quantifier, which means "there exists."

B. To show a portfolio of all Flubs and Bounces by all of a Professor's Colleagues, we can use the following formulas:

- Relational Algebra: πFlub, Bounce(σProfessor='[Professor's name]'(Portfolio)) ⋈Professor=ColleagueσProfessor='[Professor's name]'(Portfolio)

This formula uses the projection operator (π) to select the Flub and Bounce columns from the Portfolio table. The selection operator (σ) is used to select only the rows where the Professor column matches the given professor's name. The join operator (⋈) is used to combine this table with a table where the Professor column matches the Colleague column.

- Domain Relational Calculus: { | ∃(Portfolio(, ) ∧ Portfolio(, ) ∧  = '[Professor's name]' ∧  ≠ )}

This formula reads as "Select all Flubs and Bounces from the Portfolio where there exist Professors and Colleagues whose names match the given names and are different from each other." The symbol ≠ represents the "not equal" operator.

Learn more about Domain here:

https://brainly.com/question/28135761

#SPJ11

Which network protocol sends data without breaking the data into packets or performing error checking (essentially send and forget)? O IP O SMTP ОТСР O UDP

Answers

The network protocol that sends data without breaking the data into packets or performing error checking is UDP (User Datagram Protocol).

UDP is a network protocol that does not break data into packets or perform error checking. It is known as a "fire and forget" protocol because the sender does not wait for an acknowledgement that the data was received successfully. This can result in faster data transfer, but also increases the risk of data loss or errors. Unlike protocols like TCP, UDP does not establish a dedicated end-to-end connection before transferring data. Instead, it simply sends the data to the destination without confirming that it has been received or is error-free. This makes it a preferred choice for applications such as online gaming or video streaming that prioritize speed over reliability.

Learn more about network protocols: https://brainly.com/question/28811877
#SPJ11

What value will be stored in the variable "a" after the following statements: a. int a = 8 / 5; b. float a = 8 / 5; c. float a = 8.0 / 5.0;

Answers

The suitable answers to the above questions for the variable "a" would be a.) 1, b.) 1, and c.) 1.6

In the first statement,

the variable "a" is an integer and the expression 8 / 5 is an integer division. Therefore, the quotient will be rounded down to the nearest integer, which is 1.

Therefore, the value of "a" will be 1.

In the second statement,

the variable "a" is a float, but the expression 8 / 5 is still an integer division. However, since the result is stored in a float, the value will be automatically converted to a float.

Therefore, the value of "a" will be 1.0.

In the third statement,

both 8.0 and 5.0 are floats, so the expression 8.0 / 5.0 is a floating-point division. Therefore, the quotient will be a float, which is 1.6.

Therefore, the value of "a" will be 1.6, which will be automatically converted to a float.

Learn more about floating-point numbers:

https://brainly.com/question/30255747

#SPJ11

2. ASCE-Penman-Monteith equation and its calculation. Use the ASCE standardized PM equation to estimate grass reference ET in mm/day: 0.408A( R, -G)+Ym99zU2(es – ea) ET, = Given: A+y(1+CqU2) Rn = 300 W m 2 G=0.1 x Rn Wind speed at 2 m height is 3 m s-1 Psychrometric constant is 0.065 kPa °C-1 Mean air temperature, T, is 29 °C Relative Humidity, RH, is 20%

Answers

The ASCE-Penman-Monteith equation is used to estimate grass reference evapotranspiration (ET₀) in mm/day. The equation is as follows:

ET₀ = 0.408Δ(Rn - G) + γ(900/(T+273))U₂(es - ea) / (Δ + γ(1 + 0.34U₂))

Given the provided data:

Rn = 300 W/m²
G = 0.1 x Rn = 30 W/m²
U₂ = 3 m/s
γ = 0.065 kPa/°C
T = 29 °C
RH = 20%

First, calculate the saturation vapor pressure (es) and actual vapor pressure (ea):

es = 0.6108 * exp((17.27 * T) / (T + 237.3)) = 4.25 kPa
ea = (RH * es) / 100 = 0.20 * 4.25 = 0.85 kPa

Now, calculate the slope of the saturation vapor pressure curve (Δ):

Δ = (4098 * es) / (T + 237.3)² = (4098 * 4.25) / (29 + 237.3)² = 0.13 kPa/°C

Finally, plug in the values into the ASCE-Penman-Monteith equation:

ET₀ = (0.408 * 0.13 * (300 - 30)) + (0.065 * (900 / (29 + 273)) * 3 * (4.25 - 0.85)) / (0.13 + 0.065 * (1 + 0.34 * 3)) = 7.94 mm/day

Therefore, the grass reference evapotranspiration (ET₀) is estimated to be 7.94 mm/day using the ASCE standardized Penman-Monteith equation and the provided data.

Learn more about equation here:

https://brainly.com/question/10413253

#SPJ11

list a reason that caused an it project to fail and what could have been done to prevent it

Answers

One reason that can cause an IT project to fail is poor communication among team members. Miscommunication can lead to misunderstandings, delays, and errors in the project.

To prevent this, regular meetings should be held to update everyone on the progress of the project and any changes that need to be made. Clear and concise communication channels should also be established to ensure that everyone is on the same page.

Additionally, having a project manager who is skilled in communication and team coordination can greatly reduce the risk of communication breakdowns.

Learn more about project here:

https://brainly.com/question/29564005

#SPJ11

UrToy's market share doubled after it embedded artificial intelligence into its exclusive line of smart teddy bears. This is an example of the company's ________.Group of answer choices
efficiency
reliability
conformity
effectiveness

Answers

In this scenario, UrToy's market share doubled after it embedded artificial intelligence into its exclusive line of smart teddy bears. This is an example of the company's effectiveness. Option d is correct answer.

The example given is related to the company's effectiveness. By embedding artificial intelligence into its exclusive line of smart teddy bears, UrToy was able to increase its market share, which is a measure of how effective the company's products and strategies are in meeting its goals. Therefore, the correct answer is d) effectiveness.

You can learn more about artificial intelligence at

https://brainly.com/question/25523571

#SPJ11

8–32. determine the smallest force p that must be applied to begin moving the 150-lb uniform crate. the coefficent of static friction between the crate and the floor is μs=0.5μs=0.5.

Answers

We can plug the values into the formula: P = 0.5 * 150 2415 lbs-ft/s^2. So, the smallest force P required to begin moving the crate is 75 lbs.

To determine the smallest force required to begin moving the 150-lb uniform crate, we need to use the formula:

F = μs * N

where F is the force required to start moving the crate, μs is the coefficient of static friction between the crate and the floor, and N is the normal force acting on the crate.

To begin, we need to calculate the normal force acting on the crate. This can be found by multiplying the weight of the crate by the acceleration due to gravity:

N = m * g
N = 150 lbs * 32.2 ft/s^2
N = 4830 lbs-ft/s^2

Next, we can plug in the values for μs and N into the formula for force:

F = μs * N
F = 0.5 * 4830 lbs-ft/s^2
F = 2415 lbs-ft/s^2

Therefore, the smallest force required to begin moving the 150-lb uniform crate is 2415 lbs-ft/s^2.

Learn more about force here:

https://brainly.com/question/13191643

#SPJ11

need quick help. Definitely will give thumbs Up. : )
Which 2 versions are unsafe when multi-threaded (*)? (4 points each) because of variable(s) __________________ And _______________________ because of variable(s) __________________ Which version is similar to call-by-name? (8 points) _____________________________________________________________
(*) In a multi-threaded application, you can have multiple function calls active at the exact same time. So, static and global variables are potentially dangerous. If the static or global variables have different values for different callers, they may get incorrect answers. We use semaphores to keep the callers synchronized.
#include
#include
static int sum1(int argc, char *argv[]) {
//TBD
}
static int sum1_square(int argc, char *argv[]) {
//TBD
}
static int sum1_cube(int argc, char *argv[]) {
//TBD
}
int main(int argc, char *argv[]) {
//TBD
//printf("Sum1=%d Sum2=%d Sum3=%d\n", x, y, z);
return 0;
}
.................................
#include
#include
static int x; // Sum
static int y; // Sum squares
static int z; // Sum cubes
static void sum2(int argc, char *argv[]) {
//TBD
}
int main(int argc, char *argv[]) {
//TBD
printf("Sum1=%d Sum2=%d Sum3=%d\n", x, y, z);
return 0;
}
...........................
#include
#include
typedef struct {
int x; // Sum
int y; // Sum squares
int z; // Sum cubes
} sum_t;
static sum_t *sum3(int argc, char *argv[]) {
static sum_t sum;
//TBD
return ∑
}
int main(int argc, char *argv[]) {
sum_t *m;
//TBD
printf("Sum1=%d Sum2=%d Sum3=%d\n", m->x, m->y, m->z);
return 0;
}
...................................
#include
#include
typedef struct {
int x; // Sum
int y; // Sum squares
int z; // Sum cubes
} sum_t;
static void sum4(int argc, char *argv[], sum_t *sum) {
//TBD
}
int main(int argc, char *argv[]) {
sum_t m;
//TBD
printf("Sum1=%d Sum2=%d Sum3=%d\n", m.x, m.y, m.z);
return 0;
}
...................................
#include
#include
typedef struct {
int x; // Sum
int y; // Sum squares
int z; // Sum cubes
} sum_t;
static sum_t *sum5(int argc, char *argv[]) {
sum_t *sum = (sum_t *) malloc(sizeof(sum_t));
//TBD
return sum;
}
int main(int argc, char *argv[]) {
//TBD
//printf("Sum1=%d Sum2=%d Sum3=%d\n", m->x, m->y, m->z);
return 0;
}
.............................
#include
#include
static void sum6(int argc, char *argv[], int *x, int *y, int *z) {
//TBD
}
int main(int argc, char *argv[]) {
int x, y, z;
//TBD
printf("Sum1=%d Sum2=%d Sum3=%d\n", x, y, z);
return 0;
}
...............................
#include
#include
#define sum7(argc, argv, x, y, z) \
x = 0; \
y = 0; \
z = 0; \
int i; \
TBD
//}
int main(int argc, char *argv[]) {
int x, y, z;
//TBD
printf("Sum1=%d Sum2=%d Sum3=%d\n", x, y, z);
return 0;
}
...........................
#include
#include
// sums[0] is sum, [1] is sum squares, [2] is sum cubes
static void sum8(int argc, char *argv[], int *sums) {
//TBD
}
int main(int argc, char *argv[]) {
int sums[3]; // sums[0] is sum, [1] is sum squares, [2] is sum cubes
//TBD
printf("Sum1=%d Sum2=%d Sum3=%d\n", sums[0], sums[1], sums[2]);
return 0;
}

Answers

The two versions that are unsafe when multi-threaded are:

1. Version 2 - This version uses global variables x, y, and z for storing the sum, sum of squares, and sum of cubes, respectively. This makes it unsafe in a multi-threaded environment as multiple function calls can access and modify these variables simultaneously, leading to incorrect results.

2. Version 3 - This version uses a static variable 'sum' of type sum_t inside the sum3 function, which stores the sum, sum of squares, and sum of cubes. As the variable is static, it is shared across multiple function calls, making it unsafe in a multi-threaded environment.

The version that is similar to call-by-name is Version 7. It uses a macro (sum7) to perform the calculations, and the variables x, y, and z are passed as arguments, which are directly replaced by the corresponding expressions during the macro expansion.

Learn more about unsafe here:

https://brainly.com/question/21226478

#SPJ11

An indicator light that is controlled by a programmable controller is failing to energize. The first place to start in troubleshooting the problem would be at the A. PLC program. B. indicator light itself. C. power supply, D. control station.

Answers

Option A. The first place to start in troubleshooting the problem would be at the PLC program.

An industrial computer control system called a PROGRAMMABLE LOGIC CONTROLLER (PLC) continually analyses the status of input devices and decides how to regulate the state of output devices based on a unique programme.

The first place to start in troubleshooting the problem of the failing indicator light that is controlled by a programmable controller would be at the A. PLC program. It is important to check the program to ensure that the controller is sending the correct signal to activate the indicator light. If the program is found to be correct, then the troubleshooting process can move on to checking the indicator light itself, the power supply, and the control station.

Learn more about "controller " at: https://brainly.com/question/28446569

#SPJ11

convenience recepticals that are installed in bedrooms in a house aew required to be protected by a(n) blank

Answers

Convenience receptacles installed in bedrooms in a house are required to be protected by a GFCI to ensure the safety of the occupants of the house.

Convenience receptacles, which are commonly known as electrical outlets, are typically installed in bedrooms to provide a convenient source of power for various electronic devices such as smartphones, laptops, and lamps. However, these receptacles must be protected by a Ground Fault Circuit Interrupter (GFCI) to ensure the safety of the occupants of the house.A GFCI is a device that can detect any imbalances in the electrical current flowing through the outlet, which could be caused by a fault or a short circuit. When it detects such an imbalance, the GFCI interrupts the flow of electricity to the outlet, thereby preventing any electrical shocks or fires that could occur.The National Electrical Code (NEC) mandates that all electrical outlets in bedrooms and other areas of a house must be protected by a GFCI. This requirement is aimed at ensuring the safety of the occupants of the house, especially children, who may be at a higher risk of electrical shocks.

For such more question on GFCI

https://brainly.com/question/30852574

#SPJ11

A frictionless piston-cylinder device contains 10 kg of water at 20 C at atmospheric pressure. An external force F is then applied on the piston until the pressure inside the cylinder increases to 100 atm. Assuming the coefficient of compressibility of water remains unchanged during the compression; estimate the energy needed to compress the water isothermally.

Answers

The energy needed to compress the water is approximately 252.6 J.To estimate the energy needed to compress the water isothermally, we need to use the equation for isothermal compression:

W = nRT ln(V2/V1)

Where W is the work done, n is the number of moles, R is the gas constant, T is the temperature, V1 is the initial volume, and V2 is the final volume.

In this case, we can assume that the water behaves like an ideal gas and use the ideal gas law to calculate the initial volume:

PV = nRT

Solving for V, we get:

V1 = (nRT)/P

Since the water is at atmospheric pressure and 20 C, we can use the density of water to calculate the number of moles:

density = mass/volume

mass = 10 kg

volume = mass/density = 10 kg/(1000 kg/m^3) = 0.01 m^3

n = volume/molar volume = 0.01 m^3/(0.018 kg/mol) = 0.556 mol

Substituting into the equation for V1, we get:

V1 = (0.556 mol x 8.31 J/mol-K x 293 K)/101325 Pa = 0.0128 m^3

To calculate the final volume, we can use the equation for the volume of a cylinder:

V2 = pi*r^2*h

Assuming the piston has a diameter of 10 cm, the radius is 0.05 m. The height can be calculated from the change in pressure:

deltaP = P2 - P1 = 100 atm - 1 atm = 99 atm

deltaV/V = -1/kappa * deltaP/P

where kappa is the coefficient of compressibility of water.

Assuming a kappa value of 4.5 x 10^-10 Pa^-1, we get:

deltaV/V = -1/(4.5 x 10^-10 Pa^-1) x (99 atm x 101325 Pa/atm)/(1 atm x 101325 Pa/atm) = -2.2 x 10^-5

deltaV = -deltaV/V x V1 = 2.8 x 10^-7 m^3

Substituting into the equation for V2, we get:

V2 = pi x (0.05 m)^2 x (0.0128 m + 2.8 x 10^-7 m) = 1.63 x 10^-3 m^3

Now we can calculate the work done:

W = nRT ln(V2/V1) = 0.556 mol x 8.31 J/mol-K x 293 K x ln(1.63 x 10^-3 m^3/0.0128 m^3) = -252.6 J

Since the work done is negative, we need to supply energy to compress the water isothermally. Therefore, the energy needed to compress the water is approximately 252.6 J.

Learn more about isothermal here:

https://brainly.com/question/30036683

#SPJ11

Consider the following Mobile IP network: 150-users/sq. mile, FA covers a square region of 10 sq. miles, the average velocity is 10 miles/hour, and the binding lifetime is 2 minutes. If the binding lifetime is not reset when a mobile host registers due to movement, what is the percent of registrations due to mobility?.

Answers

Approximately 1.67% of registrations are due to mobility in this Mobile IP network

Based on the given information, we can calculate the number of users in the coverage area of FA as follows:

Number of users = 150-users/sq. mile x 10 sq. miles = 1500 users

Now, we need to find out the percentage of registrations due to mobility. Since the average velocity of the mobile hosts is 10 miles/hour, in 2 minutes (i.e., the binding lifetime), a mobile host can travel a maximum distance of:

Distance = Velocity x Time = 10 miles/hour x 2/60 hours = 1/3 mile

Therefore, if a mobile host moves more than 1/3 mile away from the FA's coverage area within the binding lifetime, it will need to re-register with the FA. Assuming a uniform distribution of mobility across the coverage area, we can estimate the number of registrations due to mobility as follows:

Number of registrations due to mobility = (Coverage area / Maximum distance a mobile host can travel in binding lifetime) x Number of users

= (10 sq. miles / (1/3) mile) x 1500 users

= 45000 registrations

The total number of registrations can be estimated as follows:

Total number of registrations = (Number of users) x (Registration rate)

Since the binding lifetime is 2 minutes, the registration rate can be calculated as:

Registration rate = (1 / Binding lifetime) = (1 / 2 minutes) = 30 registrations/minute

Therefore, the total number of registrations can be estimated as:

Total number of registrations = 1500 users x 30 registrations/minute x 60 minutes/hour = 2,700,000 registrations

Finally, we can calculate the percentage of registrations due to mobility as follows:

Percentage of registrations due to mobility = (Number of registrations due to mobility / Total number of registrations) x 100

= (45000 / 2,700,000) x 100

= 1.67%

Know more about Mobile IP network here;

https://brainly.com/question/30399477

#SPJ11

what happens to a program if that cache is too small to hold its working set

Answers

If the cache is too small to hold a program's working set, it will result in a higher number of cache misses.

Cache misses occur when the CPU attempts to access data that is not already stored in the cache and must be retrieved from main memory, a significantly slower procedure. This lengthens the program's execution time and degrades its performance.

As a result, the application will spend more time waiting for data to be retrieved from the main memory, thereby slowing down overall performance.

The size and organization of the cache are crucial elements in determining its efficacy, and it is necessary to ensure that the cache is adequately sized to retain the working set of a program in order to avoid cache misses and enhance speed.

Learn more about Cache Misses:

https://brainly.com/question/23878862

#SPJ11

What is the phase sequence of each of the following sets of voltages? a) va = 137 cos (wt + 63°) V, Ub 137 cos (wt - 57°) V, uc 137 cos (wt + 183°) V. b) va = 820 cos (wt - 36°) V, Vp = 820 cos (wt + 84°) V, Vc = 820 sin (wt - 66°) V.

Answers

The phase sequence in electronics is defined as the order in which the voltages reach their positive maximum values. To determine the phase sequence of each set of voltages, we need to compare the relative phase angles between each pair of voltages.

(a) For the voltage set va = 137 cos (wt + 63°) V, ub = 137 cos (wt - 57°) V, uc = 137 cos (wt + 183°) V:

The phase angle between va and ub is:

φab = (-57°) - (63°) = -120°

The phase angle between ub and uc is:

φbc = (183°) - (-57°) = 240°

The phase angle between uc and va is:

φca = (63°) - (183°) = -120°

Since the phase angle between va and ub is negative, and the phase angles between each pair of voltages are all 120° apart, the phase sequence is negative sequence.

(b) For the voltage set va = 820 cos (wt - 36°) V, vp = 820 cos (wt + 84°) V, vc = 820 sin (wt - 66°) V:

The phase angle between va and vp is:

φap = (84°) - (-36°) = 120°

The phase angle between vp and vc is:

φpc = (-66°) - (84°) = -150°

The phase angle between vc and va is:

φca = (-36°) - (-66°) = 30°

Since the phase angle between va and vp is positive and the phase angle between vc and va is also positive, the phase sequence is positive sequence.

Learn more about electronics: https://brainly.com/question/28630529
#SPJ11

Write a function named flipLines that accepts an input stream and an output stream as parameters. The input stream represents an input file. Your function writes to the output stream the same file's contents with successive pairs of lines reversed in order. For example, if the input file contains the following text: Twas brillig and the slithy toves did gyre and gible in the wabe. All mimsey were the borogroves, and the mome raths outgrabe. "Beware the Jabberwock, my son, the jaws that bite, the claws that catch, Beware the JubJub bird and shun the frumious bandersnatch." The program should print the first pair of lines in reverse order, then the second pair in reverse order, then the third pair in reverse order, and so on. Therefore your function should produce the following output to the output stream: did gyre and gimble in the wabe. Twas brillig and the slithy toves and the mome raths outgrabe. All mimsey were the borogroves, "Beware the Jabberwock, my son, Beware the JubJub bird and shun the jaws that bite, the claws that catch, the frumious bandersnatch." Notice that a line can be blank, as in the third pair. Also notice that an input file can have an odd number of lines, as in the one above, in which case the last line is printed in its original position. You may not make any assumptions about how many lines are in the input stream

Answers

Python code for the flipLines function that accepts the input file stream and output stream, and reverses the successive pairs of lines:

```python
def flipLines(input_stream, output_stream):
   lines = input_stream.readlines()

   for i in range(0, len(lines), 2):
       if i + 1 < len(lines):
           output_stream.write(lines[i + 1])
           output_stream.write(lines[i])
       else:
           output_stream.write(lines[i])

   input_stream.close()
   output_stream.close()
```

The step-by step procedure to write a function named flipLines that accepts an input stream and an output stream as parameters, and reverses successive pairs of lines:

1. Define the function with input_stream and output_stream as parameters.
2. Create a list to store the lines from the input stream.
3. Read the lines from the input_stream and store them in the list.
4. Iterate through the list of lines with a step of 2 (to process pairs of lines).
5. For each pair of lines, write the second line followed by the first line to the output_stream. Handle cases where there is an odd number of lines by writing the last line in its original position.
6. Close the input and output streams.


Learn more about function: https://brainly.com/question/29334036
#SPJ11

Other Questions
Give Given the purchase of a house ($243, 950). What are the monthly payments for the loan to be poed off in a 25 year perfad. and The interest rate as 7.4%. What's the answer ? The lowest-intensity sound that is still audible has an intensity of approximately I= 10^-12 W/m^2. Consider a jet that flies at an altitude of 6,500 m. Estimate the smallest the sound power output of the airplane engine could be so that it could still be heard on the ground. Different things are important to you at different stages in life. For example, for a high school student, having a car may be the number one priority. As you get older your priorities change. Believe it or not, at some point in your life, you are going to want to think about retirement!In Unit 6, the insurance unit, you learned about managing the risk of and insuring for the different stages of life. Now, we are looking at how to fund (invest for) similar stages of life. Just like with insurance, different types of considerations need to be made at each stage of life when you are investing.After the successful completion of this assignment, you will be able to say:I can describe the importance of estate planning and funding requirements for different stages of life.I can explain the regulation of investments to protect consumers and investors.I can compare and contrast long term retirement investments. You are allowed only two completed attempts for this lesson. This activity will count for 30% of your grade in this unit. inclusion of restrictions in a bond contract leads toMultiple Choicehigher agency costs.higher bankruptcy costs.higher interest costs.lower agency costs. find the 8-bit twos complements for the following integers. a.23 b.67 c.4 d.115 What is the necessary condition on the path length difference between two waves that interfere as follows? (a) constructively m; m = 0, 1, 2, ...m; m = 1, 3, 5, ...(m + 1/2); m = 0, 1, 2, ...(m + 1/2); m = 1, 3, 5, ...(m + 1/4); m = 0, 1, 2, ...(m + 1/4); m = 1, 3, 5, ...(b) destructively m; m = 0, 1, 2, ...m; m = 1, 3, 5, ...(m + 1/2); m = 0, 1, 2, ...(m + 1/2); m = 1, 3, 5, ...(m + 1/4); m = 0, 1, 2, ...(m + 1/4); m = 1, 3, 5, ... what are all values of p for which the series n=1[infinity](1)n 11np will converge?A. 11 only C. p>0 D. p According to Machiavelli, why do men have less scruple [hesitation/reluctance] in offending one who is beloved than one who is feared? Exposure to different endocrine disruptors causes effects that are greater than the sum of the individual effects of each endocrine disruptor. This is an example of which type of effect?a. antagonisticb. permissivec. synergistic alexander industries owns a warehouse that it is not currently using. it could sell the warehouse for $300,000 or use the warehouse in a new project. should alexander industries include the value of the warehouse as part of the initial investment in the new project or treat the value of the warehouse as a sunk cost? Question 5Examine sample D.There is a prominent sedimentary structure to be seen in this sample. Identify this primary sedimentary structure.a) raindrop impressionsb) graded bed(s)c) current ripple marks (also called "asymmetrical ripple marks")d) cross-beddinge) bimodal cross-beddingf) mudcrack(s) (also called dessication cracks)g) salt cast(s) (preserved cubic shapes of halite crystals, now formed from sedimentary rock)h) flute(s)i) flute cast(s)j) fossil plant roots (trace fossils)k) animal burrows (trace fossils)l) animal tracks, trackways, and trails (trace fossils)m) body fossils (once-living tissue or skeletal material) true or false a glycal is a saturated sugar with a c1-c2 double bond. Classify each of the following reactions as a precipitation, acid-base neutralization, or oxidation-reduction. Drag the appropriate items to their respective bins. Reset Help P.(s) +6C1,(&)-4PC1,(1) FeBra(aq) + Li, Cos(aq) + FeCo,(s) + 2L Br(aq) 2HCN (aq) +Ca(OH)2(aq) + Ca(CN)2(aq) + 2H2O(1) Precipitation Oxidation-reduction Acid-base neutralization Values for different things are best compared visually by a:__________ Explain how the concepts of risk control and quality are related within the project management discipline. How do the two knowledge areas impact one another? Explain the work in these two areas from a stategic perspective. a health insurance policy pays 75 percent of physical therapy costs after a deductible of $460. in contrast, an hmo charges $28 per visit for physical therapy. how much would a person save with the hmo if he or she had 10 physical therapy sessions costing $115 each? What effect did the soviet policy of glasnost have on the communist countries in eastern europe? A firm has sales of $4,680, costs of $2,480, Interest paid of $163, and depreciation of $461. The tax rate is 35 percent. What is the cash coverage ratio? Multiple Choice a) 1757 times b) 13.50 times c) 9.11 times d) 628 times Youve been asked to design the next-generation air traffic control system (ATCS). The ATCS is a complex hardware-software system, with many different sub-systems. The ATCS must work with different types of aeroplanes (speed, size etc.), sensing infrastructure (Radar, lidar, sonar etc), manage communication with pilots, inter alia. Sub-systems could be responsible for (i) managing landings and take-offs; (ii) another ground traffic management, etc. Lets focus on managing air traffic landing. Two critical functional requirements are communication and "early detection warning" capability. Identify at least one more?Some non-functional properties that you must consider include:(1) high-availability (> 99.9999% up time);(2) High-performance (i.e., must support up to 1000 landings per hour)(3) Fault tolerance (i.e. successfully respond to hardware failure, or incorrect radar readings).Identify at least one more?This question has 5 sub-questions.(A) Describe the context (external environment) for this air traffic landing sub-system and discuss its requirements.(B) Develop a Use Case for a typical successful landing of an aeroplane.(C) Flesh out an architecture for your system that supports this use case.(D) Also develop a sequence diagram of a successful landing, and,(E) state diagram of the air traffic landing system. next, we need to choose our straps. click through the 5 strap tabs to find out more about the strap options. one thing i should point out is that some straps only work with certain backpack shapes. which two backpack characteristics are affected when you change the straps?