Question 6: Write pseudo-code for Parallel Algorithm. Give an example of parallel algorithm for merge sort on 2 CPUs/cores?

Answers

Answer 1

Pseudocode for a parallel algorithm is a high-level description of the algorithm's steps using a combination of natural language and programming constructs. For merge sort on 2 CPUs/cores, the algorithm can be parallelized by dividing the input array into two parts and assigning each part to a separate CPU/core for sorting.

After that, the sorted subarrays can be merged in parallel. This approach improves the efficiency of the merge sort algorithm by utilizing multiple processors to perform computations simultaneously. Pseudocode for the parallel merge sort algorithm on 2 CPUs/cores:

Divide the input array into two equal-sized subarrays.Assign each subarray to a separate CPU/core for sorting.In parallel, perform merge sort on each subarray recursively:If the subarray size is 1 or less, return the subarray.Split the subarray into two halves.Recursively sort the two halves in parallel.Merge the sorted halves to obtain a sorted subarray.Once both CPUs/cores have completed sorting their respective subarrays, merge the two sorted subarrays in parallel:Initialize an output array with the size of the combined subarrays.Compare the elements from the two sorted subarrays in parallel and place them in the output array in the correct order.Return the merged sorted array as the final result.By dividing the sorting and merging tasks among two CPUs/cores, the merge sort algorithm can achieve parallel execution, potentially reducing the overall sorting time.

Learn more about array here: https://brainly.com/question/31605219

#SPJ11


Related Questions

(c) Using the impulse-invariant design method, design a DT system to approximate the CT systems with the following transfer function at the sampling rate specified. 6 H(s) - f. - 20 Hz Determine: $+6

Answers

Since the order of the system is not specified in the question, I cannot determine the remaining coefficients without further information.

To design a discrete-time (DT) system using the impulse-invariant design method to approximate a continuous-time (CT) system, we need to follow these steps:

1. Obtain the transfer function of the continuous-time system, H(s), and the sampling rate, fs.

The given transfer function of the CT system is:
H(s) = 6 / (s - f)

where f is the cutoff frequency, and s represents the complex frequency variable.

2. Convert the CT transfer function to a discrete-time transfer function using the impulse-invariant design method.

The impulse-invariant design method equates the impulse response of the CT system to the discrete-time system. The continuous-time impulse response is given by h(t) = inverse Laplace transform of H(s).

To perform the impulse-invariant transformation, we replace s with (2/T)*((1 - z^(-1)) / (1 + z^(-1))), where T is the sampling period and z is the z-transform variable.

Let's perform the transformation:
H(z) = H(s) | s = (2/T)*((1 - z^(-1)) / (1 + z^(-1)))
    = (6 / ((2/T)*((1 - z^(-1)) / (1 + z^(-1)))) - f

3. Determine the appropriate sampling rate, fs.

Given in the problem statement, fs = 20 Hz.

4. Substitute the sampling rate into the discrete-time transfer function.

H(z) = (6 / ((2/T)*((1 - z^(-1)) / (1 + z^(-1)))) - f
    = (6 / ((2/20)*((1 - z^(-1)) / (1 + z^(-1)))) - f

Simplifying further, we have:
H(z) = (6*20 / (2*(1 - z^(-1)) / (1 + z^(-1)))) - f

5. Determine the coefficients of the discrete-time system.

Comparing the obtained transfer function with the general form of a discrete-time system transfer function:
H(z) = (b0 + b1*z^(-1) + b2*z^(-2) + ...)/(1 + a1*z^(-1) + a2*z^(-2) + ...)

We can equate the corresponding terms to obtain the coefficients:
b0 = 6*20 / (2*(1 - 1) / (1 + 1)) - f
b1 = 6*20 / (2*(1 - (-1)) / (1 + (-1)))
b2 = 6*20 / (2*(1 - (-1/2)) / (1 + (-1/2)))
...

However, since the order of the system is not specified in the question, I cannot determine the remaining coefficients without further information.

Please provide the desired order of the discrete-time system, and I will assist you in calculating the coefficients using the impulse-invariant design method.

To know more about function click-
https://brainly.com/question/29276636
#SPJ11

adapttheformulationforthecasewhen each lightpath should be assigned a primary and backup route, which are link disjoint and are assigned the same wavelength. Implement a Net2Plan algorithm that solves this formulation with JOM. The optimum solution is returned by updating the routes of the demands and assigning one protection segment to each, with the backup route.

Answers

To solve this problem, we need to implement a formulation in Net2Plan with JOM to find the optimum solution. In this case, we want to assign each lightpath a primary and backup route.

That are link disjoint and use the same wavelength. We can use the following steps to adapt the formulation:Step 1: Define the variablesLet V be the set of nodes and E be the set of links in the network. Let K be the set of lightpaths that need to be assigned primary and backup routes.

Let λ be the set of wavelengths available on each link. We define the following decision variables for each k ∈ K and λ ∈ λ:(i) xk,λ is a binary variable that takes the value 1 if lightpath k uses wavelength λ on its primary route, and 0 otherwise.

To know more about problem visit:

https://brainly.com/question/31611375

#SPJ11

Using c language write a sequential search function that search for an element in a float array recursively.

Answers

The sequential search algorithm is one of the simplest algorithms to search for an element in a one-dimensional array. It performs the search operation by scanning every element in the array until the target element is found.

#include  int search(float arr[], int n, float target, int index)

{ if (index >= n)

{ return -1; }

else if (arr [index] == target) { return index; }

else { return search(arr, n, target, index+1); } }

int main() { float arr[] = {1.5, 2.0, 3.7, 4.9, 5.1, 6.2};

int n = sizeof(arr) / sizeof(arr[0]);

float target = 5.1;

int index = 0;

int result = search(arr, n, target, index);

if (result == -1)

{ printf("The element is not found in the array.\n");

} else

{ printf("The element is found at index %d.\n", result);

}

return 0;

}

The search function checks if the index is greater than or equal to the size of the array. If it is, the function returns -1 to indicate that the target element is not found. If the target element is found at the current index, the function returns the index. the function calls itself recursively with the next index until the target element is found or the end of the array is reached.

To know more about one-dimensional array visit:-

https://brainly.com/question/3500703

#SPJ11

IN JAVA:
General explanation:
For your implementation you will perform 16 rounds. You will specify a 9 bit key. A 12-bit value is passed into a simplified DES algorithm and is immediately split into two 6-bit values. Since the ASCII system represents characters as 8-bit values we must pass 1½ ASCII characters into our system. Since there are no ½ characters we will process 3 characters (24 bits) at a time calling the system twice (12 bits each call.)
What to do:
Write a function that receives a sequence of ASCII characters (this can be a Java String object or an array of byte primitives, your choice), breaks it up into 3- character subsequences. Each 3-character subsequence is then split into two 12-bit values. Each 12-bit value will be split into two 6-bit values by your Simple DES system. The result will be the cipher (encrypted) or plain (decrypted) text depending on which "direction" you are processing. If the input data length is not a multiple of 3 you should pad it with null characters (0).
Demonstrate your system by encrypting and decrypting the following character strings:
• ABC
• ABCD
• ABCDE
• The cat sleeps on the tree.
For example, your code may look as such:
short key = 0b010101010
byte cipher[] = encrypt("ABC".getBytes(), key);
byte plain[] = decrypt(cipher, key);
for (byte b : plain) {
System.out.print(b + " ");
}
Do this for the 4 specified test strings.

Answers

Here we write a java program in which we will take a string as input, break it into 3- character subsequence and then finally give the result in which it will be either encrypted and decrypted accordingly.

public class SimpleDES {

   public static byte[] encrypt(byte[] plaintext, short key) {

       // Encryption logic

       // ...

   }

   public static byte[] decrypt(byte[] ciphertext, short key) {

       // Decryption logic

       // ...

   }

   public static void main(String[] args) {

       short key = 0b010101010;

       String[] testStrings = {"ABC", "ABCD", "ABCDE", "The cat sleeps on the tree."};

       for (String testString : testStrings) {

           // Padding the input string with null characters if necessary

           if (testString.length() % 3 != 0) {

               int paddingLength = 3 - (testString.length() % 3);

               testString += "\0".repeat(paddingLength);

           }

           byte[] plaintext = testString.getBytes();

           byte[] cipher = encrypt(plaintext, key);

           byte[] decrypted = decrypt(cipher, key);

           System.out.println("Original: " + testString);

           System.out.println("Cipher: " + new String(cipher));

           System.out.println("Decrypted: " + new String(decrypted));

           System.out.println();

       }

   }

}

In this program, we define a class called SimpleDES that contains two methods: encrypt and decrypt. These methods will implement the encryption and decryption logic using the Simplified DES algorithm.

In the main method, we initialize the 9-bit key and specify the test strings to be encrypted and decrypted. We iterate over each test string and check if it needs padding to ensure it has a length that is a multiple of 3.

For each test string, we convert it to a byte array (plaintext), and then call the encrypt method to encrypt the plaintext using the specified key. The resulting ciphertext is stored in the cipher array. We then call the decrypt method to decrypt the ciphertext back to plaintext using the same key, and store the decrypted text in the decrypted array.

Finally, we print the original test string, the cipher text, and the decrypted text to observe the encryption and decryption process for each test string.

Learn more about DES algorithm here:

brainly.com/question/30881545

#SPJ11

Write a function in Racket/Scheme language that takes a list as input, compares the neighboring elements in that list, and returns the same list in which only the non-repeating elements are present. For example, for the following input:
b a a a c c)
Your function should return :
(a b)

Answers

The function non-repeating in Racket/Scheme programming language takes a list as input, compares the neighboring elements in that list, and returns the same list in which only the non-repeating elements are present.

Here's the Racket/Scheme function that takes a list as input, compares the neighboring elements in that list, and returns the same list in which only the non-repeating elements are present.```#lang racket(define (non-repeating lst)(cond [(null? lst) '()] ; if the list is empty, return empty list[(null? (cdr lst)) lst] ; if there's only one element, return the list itself[(equal? (car lst) (cadr lst)) (non-repeating (cddr lst))] ; if the first and second elements are same, skip those elements and proceed with the rest of the list[else (cons (car lst) (non-repeating (cdr lst)))]))```
Explanation:The given Racket/Scheme function non-repeating takes a list lst as input.The function compares the neighboring elements in that list, and returns the same list in which only the non-repeating elements are present.If the given input list is empty, the function returns an empty list. If the given input list has only one element, the function returns the same list itself.If the first and second elements in the given input list are same, then skip those elements and proceed with the rest of the list.Otherwise, the function adds the first element of the given input list to the output list, and continues with the remaining elements of the input list until it reaches the end of the list. At the end, the function returns the output list as the final answer.The output list contains only the non-repeating elements of the input list.

To know more about programming language visit:

brainly.com/question/23959041

#SPJ11

in c language Design a HASHTABLE structure with Linked Lists¹. 2. (20 point) Define hash, insert and search functions for your HASH TABLE implementation. Part II 60 point 3. (30 point) Implement a functionality that dedicates one process (or thread) for inserting an item to HASHTABLE. 4. (30 point) Implement a functionality that dedicates one process (or thread) for searching an item in HASH TABLE. In order to simulate your processes, you can insert and search random values at a time. Bonus (20 point) Implement and simulate many searcher processes vs. one inserter process. Note that any searching operation can not be conducted during in- sertion process in order to be precise in the table, or vice versa.

Answers

A hash table structure with linked lists in C language can be implemented using a struct for the linked list node and the hash table itself, along with functions for hash calculation, insertion, and searching.

How can a hash function be used to calculate the index for inserting or searching elements in a hash table implemented with linked lists in C language?

In a hash table with linked lists implementation, the hash function calculates an index based on the key of the element being inserted or searched. The purpose of the hash function is to distribute the elements evenly across the hash table to achieve efficient insertion and retrieval operations.

The hash function typically performs some computations on the key, such as applying a mathematical formula or performing bitwise operations, to generate a hash value. This hash value is then mapped to an index in the hash table using a modulo operation or another mapping technique.

Once the index is determined, the insert function is responsible for adding the element to the linked list at the corresponding index in the hash table. If there is a collision, i.e., multiple elements mapping to the same index, the insert function typically handles it by either appending the element to the existing linked list or employing a collision resolution strategy such as chaining or open addressing.

On the other hand, the search function uses the hash function to calculate the index for a given key and then traverses the linked list at that index to find the desired element. If the element is found, the search function returns the element; otherwise, it indicates that the element is not present in the hash table.

By separating the insert and search functionalities into dedicated processes or threads, the program can simulate concurrent operations on the hash table. This can be useful for testing the performance and scalability of the hash table implementation in handling multiple concurrent insertions and searches.

Learn more about implemented

brainly.com/question/32093242

#SPJ11

An engineer wants to steer machinery via a serial communication line. He needs 16 different commands, hence he uses a genuine (normal) 4-bit binary code (called Code A). To make commands more easily distinguishable, he adds another 0 as most significant bit, hence turning his code into a 5-bit code. This code is called Code B. He tries to steer machinery. Due to communication errors it doesn't work. He decides to make up another code (which we call Code C): 1) Start from Code A 2) Duplicate all 0s, hence turning each 0 into 00 3) Triplicate all 1s, hence turning each 1 into 111 4) Add leading zeros until you have 12-bit (if needed) a) Does Code B have error detection capabilities or incomplete single error detection capabilities (meaning only some errors can be detected)? If incomplete: What would need to be changed to turn it into 5-bit error detection code? b) Does Code C have single error detection capabilities or incomplete single error detection capabilities (meaning only some errors can be detected)? If incomplete: What would need to be changed to turn it into same bitlength error detection code?

Answers

Code B has incomplete single error detection capabilities. Code B can detect only odd number of errors (either one or three), whereas even number of errors will go undetected.

To turn it into a 5-bit error detection code, a parity bit can be added to the end of the code. If the number of 1’s in the 5-bit code (excluding the parity bit) is even, the parity bit can be set to 0. If the number of 1’s in the 5-bit code is odd, the parity bit can be set to 1.

Thus, the resulting 6-bit code will have single error detection capabilities. Code C has single error detection capabilities. To turn it into same bit length error detection code, we can follow the below Duplicate all 0s, hence turning each 0 into 00.2) Duplicate all 1s, hence turning each 1 into 11.3 Add a parity bit to the end of the code.

To know more about capabilities visit:

https://brainly.com/question/15800506

#SPJ11

in C++ please 6.38LAB:Contact list A contact list is a place where you can store a specific contact with other associated information such as a phone number email address,birthday.etc.Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow.Word pairs consist of a name and a phone number (both strings separated by a comma.That list is followed by a name,and your program should output the phone number associated with that name Output 'None'if name is not found ExIf the input is 3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank the outputis 867-5309 Your program must define and call the following function.The return value of GetPhoneNumber is the phone number associated with the specific contact name string GetPhoneNumbervector nameVec, vector phoneNumberVec, string contactName) HintUse two vectors:One for the string namesand the other for the string phone numbers 30711020172403917 LAB ACTIVITY 6.38.1:LAB:Contact list 3/10 main.cpp #include 2 #include using namespace std; 4 /*Define yourfunctions here/ 6 int main 8 9/*Typeyourcodeheret/ 10 11 returne; 12 13

Answers

Below is an example of a C++ program that solves the given problem:

```cpp

#include <iostream>

#include <vector>

#include <string>

using namespace std;

// Function to retrieve the phone number associated with the contact name

string GetPhoneNumber(vector<string>& nameVec, vector<string>& phoneNumberVec, string contactName) {

   for (size_t i = 0; i < nameVec.size(); i++) {

       if (nameVec[i] == contactName) {

           return phoneNumberVec[i];

       }

   }

   return "None";

}

int main() {

   int N;

   cin >> N;

   vector<string> nameVec;

   vector<string> phoneNumberVec;

   // Read the word pairs and store them in the vectors

   for (int i = 0; i < N; i++) {

       string name, phoneNumber;

       cin >> name;

       cin.ignore(); // Ignore the comma

       cin >> phoneNumber;

       nameVec.push_back(name);

       phoneNumberVec.push_back(phoneNumber);

   }

   string contactName;

   cin >> contactName;

   // Call the GetPhoneNumber function to retrieve the phone number

   string phoneNumber = GetPhoneNumber(nameVec, phoneNumberVec, contactName);

   cout << phoneNumber << endl;

   return 0;

}

```

Explanation:

- The program starts by including the necessary header files and declaring the required namespaces.

- The `GetPhoneNumber` function takes three parameters: the vectors `nameVec` and `phoneNumberVec` containing the contact names and phone numbers, and the `contactName` string for which we need to find the associated phone number.

- In the `main` function, we first read the value of `N` to determine the number of word pairs to follow.

- Then, we create two empty vectors: `nameVec` and `phoneNumberVec` to store the contact names and phone numbers.

- Next, we read the word pairs using a loop and store them in the respective vectors.

- After that, we read the `contactName` for which we need to find the phone number.

- Finally, we call the `GetPhoneNumber` function with the given parameters and output the returned phone number.

To know more about C++ program visit:

https://brainly.com/question/7344518

#SPJ11

Please answer this more detailed
your ques Q1 - Parse a command string and start a process Write a C program named useless that is called like this: useless "command param1 param2 param3 ..." The code in useless replaces itself with

Answers

The code in the question intends to replace the current process with a new process. A command line input must be entered in order to execute the new process. In order to carry out this task, the C program must use a system call such as execvp to call a new process to carry out the inputted command line.

The program should be called with a command line argument that contains a string of a command followed by one or more parameters separated by spaces. The command string should be parsed into separate arguments to pass as arguments to the new process.

This can be accomplished using a tokenizer to divide the string into individual parts.

To know more about code visit:

https://brainly.com/question/15301012

#SPJ11

3. (12 pts) Write a context free grammar generating the language: {0²P1340³41P :p> 0,q>0}. Please check your solution by actually generating an example word from your grammar.

Answers

The Context Free Grammar (CFG) generating the language {0²P1340³41P :p> 0,q>0} is as follows:

S → 0S0S → 0P1P → 1P340P | ɛ

The first production rule S → 0S0 generates zero or more 0’s, with a non-negative count, on either side of the string S. The second rule S → 0P1 generates 0, followed by 1, and one or more instances of the string P.The third rule generates the string 1, followed by three 0’s, and any non-negative count of P.The fourth rule generates an empty string. This is necessary to ensure the grammar generates at least one word. Therefore, the language generated by this grammar will be

{0²P1340³4¹P: p>0, q>0}.

Let us check the correctness of the grammar by generating a word.

Suppose p = 2 and q = 3. Then the word generated by the grammar will be as follows:

S → 0S0 → 00P10 → 001340P110 → 001340134011P → 001340134000001340134000001340P → 001340134000001340134000001340

The above word belongs to the language generated by the CFG.

To know more about  Context Free Grammar (CFG) visit:

https://brainly.com/question/30764581

#SPJ11

5. Choose a business activity (ordering tickets for a concert,
buying a book online, and so on). Write down the sequence of steps
necessary for the transaction to be completed.

Answers

Let's consider the business activity of ordering tickets for a concert by using Internet

The sequence of steps necessary for the transaction to be completed typically involves the following:

1. Browsing and Selection: The customer visits a ticketing platform or website and browses through the available concerts or events. They select the specific concert for which they want to order tickets.

2. Ticket Quantity and Category: The customer chooses the quantity of tickets they wish to purchase and selects the desired category (e.g., general admission, VIP, seating section) if applicable.

3. Seat Selection: If the concert has assigned seating, the customer may be prompted to select their preferred seats from an interactive seating map. This step may not be applicable for events with general admission or standing areas.

4. Registration/Login: The customer may be required to register an account on the ticketing platform or log in to their existing account. This step helps in managing the order and providing necessary updates.

5. Payment Method The customer selects their preferred payment method, such as credit/debit card, digital wallet, or bank transfer.

6. Billing Information: The customer provides their billing information, including their name, address, and contact details. This information is used for verification and generating the invoice/receipt.

7. Review Order: The customer reviews the order details, including the concert information, ticket quantity, seat selection (if applicable), and total cost. They can make any necessary modifications or proceed to the next step.

8. Confirmation and Payment: The customer confirms the order and proceeds with the payment. The payment gateway securely processes the transaction, and the customer receives a confirmation of the successful payment.

9. Ticket Delivery After the payment is completed, the customer receives the tickets through their selected delivery method. This can include options like e-tickets sent via email, mobile ticketing, or physical tickets delivered by mail or pickup.

10. Order Summary: The customer receives an order summary or confirmation email that includes all relevant details of the transaction, including the concert/event, ticket details, payment information, and any additional instructions or terms.

It's important to note that the specific steps and their sequence may vary depending on the ticketing platform, event organizer, or ticketing policies. However, the general sequence mentioned above outlines the key steps involved in completing a ticket order for a concert.

To know more about Internet visit:

https://brainly.com/question/2780939

SPJ11

Assignment Now you have the skills to build a complex world. Go online and find any picture of Moorpark College or you can take your own picture of any location at Moorpark College. Build that picture in 3D ! Try to get as close as you can to that picture. Remember to keep it simple. Maybe take a picture of the library, or Moorpark College Highschool building. Or you can take a picture of your class (inside room) and just build that! Anything you want. Submit a zipped file that contains your exported world + a video created using screen-o-matic showing your world. What to submit Submit the following two items: Export your world and submit the zip file • Create a video and submit the video showing your world (10-40 second video). Tool to use We are going to be using Vectary for this module.

Answers

For this assignment, you will utilize Vectary, a 3D design tool, to construct a 3D representation of a location at Moorpark College.

Immersive environments refer to virtual or augmented reality settings that deeply engage the senses and create a realistic and interactive experience for users. These environments aim to transport individuals into a simulated world that can be visually and audibly captivating, and sometimes even haptic or olfactory. By leveraging advanced technologies such as 3D graphics, spatial sound, motion tracking, and interactive elements, immersive environments offer users a heightened sense of presence and enable them to interact with the virtual world in a more natural and intuitive manner. These environments find applications in various fields, including gaming, training simulations, education, architecture, healthcare, and entertainment, enhancing the user's engagement and facilitating new forms of storytelling and experiences.

Learn more about using immersive environments here:

https://brainly.com/question/28259691

#SPJ11

Where is a cookie stored? Question options: a. At the server side when an HTTP request is sent from a client to a server. b. At the client machine where the browser is executed. c. It is generated and not stored anywhere. d. None of the above.

Answers

Cookies can be used to personalize a user's experience, save preferences, and keep track of a user's activity on a website.

A cookie is stored at the client machine where the browser is executed. That is option (b). Explanation: A cookie is a small text file that stores data in a user's web browser. When a user accesses a website, the server sends a cookie to the user's device through the browser. The browser stores the cookie on the user's device, which can be retrieved by the server when the user visits the website again. A cookie is created when a website is accessed by a user. The data is saved in a small file that is sent to the user's browser, which then stores the file on the user's device, such as a computer, smartphone, or tablet. A cookie is stored on the user's device, usually on the hard drive, and can be retrieved by the server when the user visits the website again. Cookies can be used to personalize a user's experience, save preferences, and keep track of a user's activity on a website.

A cookie is stored on the client machine where the browser is executed.

To know more about browser visit:

brainly.com/question/19561587

#SPJ11

in cell d15, enter a formula using a counting function to count the number of cells in the billable? column (cells d2:d14) that are not blank.

Answers

In cell D15, enter the following formula: =COUNTA(D2:D14)

This formula will count the number of non-blank cells in the range D2:D14 and display the result in cell D15.

The COUNTA function is a counting function in Excel that counts the number of cells in a range that are not empty. By specifying the range D2:D14 as the argument for COUNTA, it will count all the cells in that range that have a value, regardless of the type of value (text, number, or formula). This includes cells with non-blank values.

By using the COUNTA function, you can accurately determine the number of cells in the "Billable?" column that are not blank. This can be useful for tracking and analyzing data where you need to know the count of non-blank cells in a specific column or range.

To know more about COUNTA function refer to:

https://brainly.com/question/30433639

#SPJ11

Which sorting algorithm could be implemented to be the most efficient in terms of both time complexity and space complexity at the same time, even in the worst case? Quick sort merge sort heap sort bubble sort

Answers

Merge sort is the sorting algorithm that can be implemented to be the most efficient in terms of both time complexity and space complexity, even in the worst case.

Merge sort is a popular sorting algorithm that follows the divide-and-conquer approach. It divides the unsorted list into smaller sublists, sorts them recursively, and then merges them to obtain a sorted list. The algorithm compares elements from both sublists and places them in the correct order during the merging process. It continues this process until the entire list is sorted. Merge sort has a time complexity of O(n log n) and is known for its stability and efficiency in sorting large datasets.

Learn more about Merge sort here:

https://brainly.com/question/13152286

#SPJ11

Description Study how I have done bigo1 and bigo2 programs and how the graph is produced. If you run them it will create relevant files. You can open the .csv files in excel and draw a line graph that will produce the same charts as I have shown in the experiment. Create a similar code for binarysearch. Take the 'binraysearch.py' and modify in such as way you will create ten different lists. These ten different list will have items in increasing numbers (10, 20, 50, 100, etc) Find a way create them with random generators. Once you have done them run the binary search on each of them and measure the time and create the csv file. Open it in excel sheet and draw chart out of the data. It should prove O(log n). Screen shot the chart and upload along with the code. = # This program runs a single for loop with a arithmetic statment inside the loop. # In order to generate a set of performances in time, this has a outerloop # which runs ten times. # n is set to 1 million so that the data can be in seconds. too less iterations # produces micro seconds or even lesser than that. # The time data is written into import time timedata open('timedatafororderofn.csv','w') # create a csv file. n = 1000000 sum 0 prod = 1 for t in range(1,11): # to run ten times to = time.process_time() # initial time for i in range (n*t): prod = prod * i t1 = time.process_time() # final time after the loop timedata.write(str(tl-t0)+'\n') # time difference is written into csv file. print(ti-to) timedata.close() = = = # Same as bigol.py. But here it is a nested list which will prove n to the power 2 import time timedata = open('timedatafororderofnsquared.csv', 'w') n = 1000 sum = 0 prod 1 for t in range(1,11): to = time.time ( ) for i in range (n*t): for j in range(n*t): prod = prod + i t1 = time.time() timedata.write(str(ti-to)+'\n') print(ti-to) timedata.close() def binarySearch(lst, key): low = 0 high = len(1st)-1 = = while high >= low: mid = (low + high) // 2 if key < lst[mid]: high = mid -1 elif key == lstīmid]: return mid else: low = mid +1 return -low-1 = listi = [2,34,56,75, 89,101,233, 455, 620] print (binarySearch(list1,233)) print (binarySearch (list1,56))

Answers

the question:In order to study how bigo1 and bigo2 programs work, and how the graph is produced, you can run the following codes:To run the binary search on each of the ten different lists and measure the time to create the csv file:To prove O(log n), you can create a csv file and draw a chart from the data in an Excel sheet.To modify the 'binarysearch.py' code to create ten different lists that have items in increasing numbers, do the following:Take the 'binarysearch.py' and modify it to create ten different lists.

Each of the ten different lists will have items in increasing numbers, such as 10, 20, 50, 100, and so on. You can create them with random generators. Once you have created them, run the binary search on each of them and measure the time it takes to create the csv file. To produce a graph, open the csv file in an Excel sheet, and draw the chart out of the data.

The code to produce a csv file from a single for loop with an arithmetic statement inside the loop is shown below:This code has an outer loop that runs ten times in order to generate a set of performances in time. The time data is written into a csv file, and n is set to 1 million so that the data can be in seconds. If the number of iterations is too low, then the range (n*t): for j in range(n*t): prod = prod + it1 = time.time() timedata.write(str(t1-to)+'\n') print(t1-to) timedata.close()```The code to modify the 'binarysearch.py' code is shown below:```def binarySearch(lst, key): low=0high=len(lst)-1 while high>=low: mid=(low+high)//2 if key

To know more about programs work visit:

brainly.com/question/32667748

#SPJ11

3. Assuming a 1-KB page size, what are the page numbers and offsets for the following address references (provided as decimal numbers). (25 pts) (a) 2377 (b) 20000 (c) 16385

Answers

Address (2377) has the page number 2 and offset 57.Address (20000) has the page number 19 and offset 160.Address (16385) has the page number 15 and offset 105.

Given:1-KB page size.

Using the page size, we can calculate the number of bits required for page number and offset as follows:

$$ \begin{aligned} &\text{Page number bits} = \log_2(\text{Page size}) \\ &\text{Offset bits} = \text{Address bits} - \text{Page number bits} \end{aligned} $$

Here, Address bits are not given, which means we can assume it is 16. Hence, Page size is 1 KB, which means 210 bytes. Hence,

Page number bits = log2 (210)

= 10 bits

Offset bits = 16 - 10

= 6 bits

(a) 2377

The page number is obtained by dividing the address by the page size, i.e., 210.

The page number is 2377 / 210 = 2

The offset is obtained by taking the remainder, i.e.,2377 mod 210 = 57

Therefore, the physical address is (2, 57).

Hence, 2377 has the page number 2 and offset 57.

(b) 20000The page number is obtained by dividing the address by the page size, i.e., 210.

The page number is 20000 / 210 = 19

The offset is obtained by taking the remainder, i.e.,20000 mod 210 = 160

Therefore, the physical address is (19, 160).

Hence, 20000 has the page number 19 and offset 160.

(c) 16385The page number is obtained by dividing the address by the page size, i.e., 210.

The page number is 16385 / 210 = 15

The offset is obtained by taking the remainder, i.e.,16385 mod 210 = 105

Therefore, the physical address is (15, 105).

Hence, 16385 has the page number 15 and offset 105.

Conclusion: Address (2377) has the page number 2 and offset 57.Address (20000) has the page number 19 and offset 160.Address (16385) has the page number 15 and offset 105.

To know more about offset visit

https://brainly.com/question/11635708

#SPJ11

For address 16385, the page number is 16, and the offset is 1.

To determine the page numbers and offsets for the given address references, we need to consider the page size of 1 KB (kilobyte), which means each page contains 1024 bytes.

Let's calculate the page numbers and offsets for each address reference:

(a) Address 2377:
- Page number: 2377 / 1024 = 2 (integer division)
- Offset: 2377 % 1024 = 329

So, for address 2377, the page number is 2, and the offset is 329.

(b) Address 20000:
- Page number: 20000 / 1024 = 19 (integer division)
- Offset: 20000 % 1024 = 704

For address 20000, the page number is 19, and the offset is 704.

(c) Address 16385:
- Page number: 16385 / 1024 = 16 (integer division)
- Offset: 16385 % 1024 = 1

Thus, for address 16385, the page number is 16, and the offset is 1.

To summarize:
(a) Address 2377: Page number = 2, Offset = 329
(b) Address 20000: Page number = 19, Offset = 704
(c) Address 16385: Page number = 16, Offset = 1.

To know more about offset click-
https://brainly.com/question/32314594
#SPJ11

In C language, read into the struct any file given by the input,
for this example we will use . Where the output look
like this...
----------------OUTPUT-------------------------
Joseph 25

Answers

The input file contains:Joseph 25Output: The output will be:Joseph 25Note:

To read from a file into a structure in the C language, the following approach can be used:

First, a structure is created with the necessary fields. Let's suppose the structure contains two fields: `char name[20]` and `int age`. Next, a file pointer is created with the file path passed as input.

Then the file is opened using `fopen()` function. After that, using `fscanf()` function, the values are read into the respective fields of the structure.

Finally, the values are displayed using `printf()` function.

Here is the code snippet for your reference:

#include struct Person {char name[20];int age;};int main() {FILE *fp;struct Person p;fp = fopen("file.txt", "r");if(fp == NULL) {printf("Unable to open file\n");return 0;}fscanf(fp, "%s %d", p.name, &p.age);printf("%s %d", p.name, p.age);fclose(fp);return 0;}Input:

The input file contains:Joseph 25Output: The output will be:Joseph 25Note:

The above code will read a file named file.txt. You can replace it with the name of your input file.

To know more about C language, visit:

https://brainly.com/question/30101710

#SPJ11

5.Construct a 4-to-16-line decoder with five 2-to-4-line decoders with enable En. If En = 1, the decoder is enable. If En = 0, decoder is disabled. Use block diagram of decoder with enable in your design. (15 5})

Answers

The given task states that a 4-to-16-line decoder with five 2-to-4-line decoders with enable En is to be constructed. Here, if En=1, the decoder is enable, and if En=0, the decoder is disabled.

In a 4-to-16-line decoder, there are 4 input lines (A3, A2, A1, A0) and 16 output lines (Y15, Y14, ... Y1, Y0). For each input combination, only one output line is enabled and the rest are disabled.So, for the given task, we will require 5, 2-to-4-line decoders, each with an enable input. Each 2-to-4-line decoder will have two inputs (A1, A0) and four outputs (Y3, Y2, Y1, Y0).The given block diagram represents a 2-to-4-line decoder with enable input.

Therefore, the circuit of the required 4-to-16-line decoder with five 2-to-4-line decoders with enable En can be constructed as follows: Here, A3, A2, A1, and A0 are the input lines of the 4-to-16-line decoder. These four input lines are fed to the enable input of each of the five 2-to-4-line decoders as shown in the figure.Now, when En=1, the decoder is enabled. So, the output of the corresponding 2-to-4-line decoder will be activated based on the input combination. And when En=0, the decoder will be disabled, so none of the outputs will be activated or function.

To know more about decoders visit:

https://brainly.com/question/31064511

#SPJ11

Please hurry thanks a lot!
What do Prim's algorithm and Kruskal's algorithm do after they take a graph? a. Find the average weight of the edges b. Create a shortest path from the graph c. Construct a minimum spanning tree d. Re

Answers

The answer is option C:

Construct a minimum spanning tree.

Prim's algorithm and Kruskal's algorithm are algorithms used to find a minimum spanning tree (MST) for a weighted undirected graph.

They work by adding edges to the MST one at a time while ensuring that the MST remains a tree and the total weight of the edges is minimized.

The answer is option C:

Construct a minimum spanning tree.

Both Prim's algorithm and Kruskal's algorithm are greedy algorithms that start with a single vertex and add edges to the MST one at a time.

Prim's algorithm adds edges to the MST that have the lowest weight among all edges connecting the MST to a vertex outside the MST, while Kruskal's algorithm adds edges to the MST that have the lowest weight among all edges in the graph that do not create a cycle when added to the MST.

Both algorithms terminate when all vertices are included in the MST, resulting in a minimum spanning tree.

The time complexity of both algorithms is O(E log V), where E is the number of edges and V is the number of vertices in the graph.

To know more about spanning tree, visit:

https://brainly.com/question/13148966

#SPJ11

3. solving for dominant strategies and the nash equilibrium suppose hakeem and alexandra are playing a game that requires both to simultaneously choose an action: up or down. the payoff matrix that follows shows the earnings of each person as a function of both of their choices. for example, the upper-right cell shows that if hakeem chooses up and alexandra chooses down, hakeem will receive a payoff of 6 and alexandra will receive a payoff of 8. alexandra up down hakeem up 4, 6 6, 8 down 7, 5 3, 7 in this game, the only dominant strategy is for to choose . the outcome reflecting the unique nash equilibrium in this game is as follows: hakeem chooses and alexandra chooses .

Answers

Hakeem and Alexandra must simultaneously choose between two actions: up or down. The payoff matrix shows the earnings of each player based on their choices. By analyzing the matrix, we can determine the dominant strategies and the Nash equilibrium.

What is the outcome reflecting the unique Nash equilibrium in the given game?

For instance, if Hakeem chooses up and Alexandra chooses down, Hakeem earns 6 and Alexandra earns 8. By analyzing the matrix, we can determine the dominant strategies and the Nash equilibrium.

In this game, the only dominant strategy is for Alexandra to choose down. Regardless of Hakeem's choice, Alexandra's payoff is always higher when she chooses down.

The unique Nash equilibrium is when Hakeem chooses up and Alexandra chooses down. At this equilibrium point, neither player has an incentive to change their strategy unilaterally, as both are maximizing their payoffs given the other player's choice.

Therefore, the outcome reflecting the unique Nash equilibrium in this game is Hakeem chooses up and Alexandra chooses down.

Learn more about matrix

brainly.com/question/29132693

#SPJ11

Who will win this Adwords auction
Who will win this Adwords auction? SARA KYLIE KENDY PAUL MAX BID 2 1 3 5 QUALITY SCORE MEDIUM LOW HIGH MEDIUM EXTENSIONS IMPACT HIGH HIGH HIGH MEDIUM

Answers

Kendy will win the adwords aution from what we have in the data here

Why will Kendy win the auction

Go ogle uses an ad ranking system to determine the positioning of your ads in relation to others, which is influenced by factors such as the bid amount, quality score, and extensions impact. The bid represents how much you are willing to pay for a click on your ad.

The quality score, on the other hand, is Go ogle's assessment of the quality and relevance of your keywords and PPC ads. It involves factors such as click-through rate (CTR), ad relevance, and landing page experience. The higher the quality score, the better your ads will be positioned and the less you might need to bid.

The impact from extensions also affects ad rank. Ad extensions are features that enhance your ad with additional information, creating more reasons for people to choose your business. These can include additional links from your site, phone numbers, or location details. High extension impact means your ad extensions are expected to improve your performance significantly.

In the given example, even though Kendy's bid is lower than Paul's, Kendy's ad could potentially rank higher due to his high quality score and high extensions impact. This highlights the importance of not just the bid amount but also the quality of the ad and the strategic use of ad extensions in the Go ogle ad ranking system.

Read mroe on Adwords auction here https://brainly.com/question/3446360

#SPJ4

In which of the following cases will K-Means probably perform best (you can select multiple answers When the clusters are well-separated e When the clusters are very close to each other When the clusters have non-spherical shapes When we select K carefully le g. based on cluster validation

Answers

K-Means is likely to perform best when the clusters are well-separated, when the clusters are very close to each other but still distinguishable, and when K is selected carefully based on cluster validation techniques. However, K-Means may not perform well when the clusters have non-spherical shapes.

It is one of the simplest and most popular clustering algorithms that work well when the data points are spherical or near-spherical shapes and when the clusters are well-separated. It can perform well in the following cases:

When the clusters are well-separated. When the clusters have spherical or near-spherical shapes. When we select K carefully, e.g., based on cluster validation.In the case of close clusters, K-means may not perform well because its algorithm relies on a random centroid initialization process that can cause the algorithm to converge to a sub-optimal local minimum.

Additionally, when the clusters have non-spherical shapes, K-means may not work well since the algorithm is designed to minimize the sum of squared distances between each point and the centroid of its assigned cluster. This can lead to a bias towards clusters with similar sizes and spherical shapes. Therefore, K-means may not work well with such datasets.

As the question is not clear and incomplete, the complete question is "In which of the following cases will the K-Means algorithm likely perform best? (Select all that apply) When the clusters are well-separated, When the clusters are very close to each other, When the clusters have non-spherical shapes, When we select K carefully, e.g., based on cluster validation."

You can learn more about clustering algorithms at: brainly.com/question/32529106

#SPJ11

Text written on a PDA screen or tablet PC, for example, can be converted into ______________.
Select one:
a.pictures
b.digital text
c.voice.

Answers

Step 1:

Text written on a PDA screen or tablet PC can be converted into digital text.

Step 2 (Explanation):

Text written on a PDA screen or tablet PC can be converted into digital text. This means that the text can be recognized and processed as electronic data, allowing for further manipulation, storage, and sharing.

When you write or input text on a PDA screen or tablet PC using a stylus or virtual keyboard, the device captures the input as digital information. The device's operating system or software then processes the captured text and converts it into a digital format, typically using character recognition algorithms or input methods.

Converting text into digital form enables various functionalities and applications. For instance, digital text can be stored in memory, edited, searched, and shared electronically. It allows for easy integration with other digital systems, such as email, messaging apps, word processors, or databases.

Digital text also enables accessibility features, such as screen readers for visually impaired individuals. It can be further processed using natural language processing techniques, enabling tasks like language translation, sentiment analysis, or text-to-speech conversion.

Learn more about : Processing techniques

brainly.com/question/2857786

#SPJ11

Question 2 (35 marks) Design a reinforcement learning agent for packets distribution to queueing lines. - Objective: avoid queue length >70% buffer. - Agent has ability to measure queue length of all lines and distribute traffic to line. - There are priority line and two general queueing lines. - The priory line always serves highest priority to important packets. However, when the line is empty (free of queue), it may help the other two lines. For the design, give the representation of the following - State(s) (3 marks) - Action(s) (3 marks) - Event(s) (3 marks) - Rule(s) (3 marks) - Reward (3 marks) Also state the Q-value representation (5 marks) For the RL - List all possible states (3 marks) - List all possible actions (3 marks) - List all possible events (3 marks) - List all rules (3 marks) - Describe reward (3 marks)

Answers

In designing a reinforcement learning agent for packet distribution to queueing lines, the following are the representations:

State(s):

1. The current queue length of each line

2. The number of packets in the buffer

3. Whether the priority line is empty or not

Action(s):

1. The number of packets to be distributed to each line

2. Whether the priority line should help the other two lines

Event(s):

1. A new packet arrives

2. A packet is removed from the queue

3. A line becomes empty or full

Rule(s):

1. If the priority line is not empty, it should be given the highest priority.

2. If the priority line is empty, it can help the other two lines.

3. The agent should aim to avoid a queue length >70% buffer.

Reward:

1. +1 for each packet successfully delivered to a line

2. -1 for each packet dropped due to a full queue

Q-value representation:

The Q-value represents the expected reward for each action taken in each state. For this problem, the Q-value is a matrix with the following dimensions:

- Rows: each possible state

- Columns: each possible action

List of all possible states:

1. [0,0,0] - all queues are empty

2. [10,10,10] - all queues are full

3. [5,3,4] - queues have varying lengths

List of all possible actions:

1. [1,1,1] - distribute one packet to each line

2. [2,1,0] - distribute two packets to the first line, one packet to the second line, and none to the third line

List of all possible events:

1. A new packet arrives

2. A packet is removed from the queue

3. A line becomes empty or full

List of all rules:

1. Always prioritize the priority line if it is not empty.

2. If the priority line is empty, distribute packets evenly among the three lines.

3. If a line is full, do not send any more packets to that line.

Description of reward:

1. +1 reward for each packet delivered to a line

2. -1 reward for each packet dropped due to a full queue.

Reinforcement Learning (RL) is an AI technique that involves an agent learning to make decisions in an environment, with the aim of maximizing a cumulative reward.

Learn more about Reinforcement Learning: https://brainly.com/question/29769020

#SPJ11

An individual residing within the eu contacts your organization, requesting that their data be destroyed. what should you do in this instance?

Answers

If an individual residing within the EU contacts your organization, requesting that their data be destroyed, your organization must comply with the General Data Protection Regulation (GDPR) by deleting the data.

What does it comply with?

To comply with GDPR, you should follow these steps:

Inform the requester: The individual's data will be removed from all systems and records upon receipt of their request.

Verification of the request: Verify the identity of the requester to ensure that the data belongs to them, and the data to be deleted are accurate.

Gather all data: Collect all data of the individual from all systems, databases, or third-party applications used by the organization.

Delete the data: Once the data has been verified, delete it from the systems, databases, and third-party applications.

Useful note: If the data subject's personal data is published online, the organization should take reasonable measures to delete the data from public access.

To know more on database visit:

https://brainly.com/question/6447559

#SPJ11

Problem #2: Machine Code Convert the following MIPS assembly instructions into machine code. Express your final answer as an 8-digit hexadecimal number. a) and $t2, $s3, $s4 b) sw $t3, 0x30($t0) c) bne $t2, $s1, OxOC (Note: The number 0x0C is the numbers of instructions to skip, not bytes)

Answers

MIPS Assembly language instructions and machine codeIn MIPS Assembly language, there are different types of instructions. These include R-type, I-type, J-type, and Pseudo instructions. The R-type instructions are used for register-register operations. I-type instructions operate on data located in memory.

J-type instructions specify a jump target address. The Pseudo-instructions are not part of the MIPS instruction set. They are used for the convenience of the programmer.Let's convert the following MIPS Assembly instructions into machine code.a) and [tex]$t2, $s3, $s4[/tex]To convert this instruction into machine code, we have to use the following format: OP rs rt rd shamt functThe opcode (OP) is used to specify the instruction type. The rs field specifies the first source register, rt is the second source register, rd is the destination register, shamt is the shift amount, and funct is the function code.

To convert this instruction into machine code, we need to use the following format: OP rs rt immediateFor the bne instruction, the opcode is 5. The source register is [tex]$t2[/tex] (which is 10), and the destination register is [tex]$s1[/tex] (which is 17). The immediate field is the number of instructions to skip, which is 12 (0x0C in hexadecimal). Thus, the machine code for the instruction is:

[tex]0x1549000CTherefore, the final answers are: 0x008B4824, 0xAD480030, and 0x1549000C[/tex].

To know more about machine code visit :

https://brainly.com/question/17041216

#SPJ11

Which of the following is correct regarding to advantage of B tree over B+ tree? O A. We can put frequently accessed keys closer to the root node to expedite the search OB. B tree range search is faster than B+ tree OCB tree deletion is faster than B+ tree since we don't need to put tombstones after removing keys O D. We can put frequently used keys closer to the leaf node to expedite the search

Answers

We can put frequently used keys closer to the leaf node to expedite the search is correct regarding to advantage of B tree over B+ tree.

This is option A

When it comes to the advantage of B tree over B+ tree, the fact that we can put frequently used keys closer to the leaf node to expedite the search is correct. B-tree is more general than B+-tree. The B+-tree is a variant of the B-tree.

B-tree stores data at internal nodes as well as leaf nodes. While the B+-tree just stores data at the leaf nodes. The B-tree can be used for both range searches and exact matches. When compared to B+-tree, B-tree is more robust. B-tree is used in many systems where the data file is much larger than the available memory.

So, the correct answer is A

Learn more about internal nodes at https://brainly.com/question/32679988

#SPJ11

CPU scheduling is the basis of_multiprogrammed operating
systems____.

Answers

CPU scheduling is the basis of multiprogrammed operating systems. Multiprogramming operating systems are designed to provide a way of executing multiple programs at once, and CPU scheduling is the method used to achieve this. It is the act of distributing the CPU’s time among different programs that are competing for its attention.

There are several different algorithms that can be used for CPU scheduling, including First-Come-First-Serve, Shortest-Job-First, Priority Scheduling, and Round-Robin Scheduling. Each algorithm has its own strengths and weaknesses and is designed for specific types of systems.

The goal of CPU scheduling is to minimize the amount of idle time that the CPU has while still providing a reasonable response time to each program. By doing this, multiprogrammed operating systems can achieve higher levels of efficiency and throughput.

There are a number of factors that can affect CPU scheduling, including the number of processes running, the priority of each process, and the characteristics of the CPU itself. In order to optimize CPU scheduling, it is important to understand these factors and choose the appropriate scheduling algorithm for each situation.

Overall, CPU scheduling is a critical component of multiprogrammed operating systems and plays a key role in their efficiency and effectiveness.

To know more about Multiprogramming operating systems visit :

https://brainly.com/question/32319300

#SPJ11

Write the Scheme function for the question below, in
Haskell.:
(DEFINE (doit n)
(IF (= n 0)
0
(+ n (doit (- n 1)))
))

Answers

Here's the equivalent implementation of the Scheme function (doit n) in Haskell:

doit :: Int -> Int

doit 0 = 0

doit n = n + doit (n - 1)

In Haskell, we define the function doit using pattern matching. When the input n is 0, the function returns 0. For any other value of n, it recursively calls itself with n - 1 and adds n to the result.

In Haskell, the doit function is defined using pattern matching, which allows different cases to be handled based on the input value. When n is 0, the function matches this pattern and returns 0 as the base case. For any other value of n, the function proceeds to the next pattern, recursively calling itself with n - 1 and adding n to the result. This recursive call continues until n reaches 0, at which point the base case is triggered and the recursion stops. The function utilizes the concept of recursion to calculate the sum of numbers from n down to 0, providing a straightforward and concise implementation in Haskell.

You can test the function by calling doit with different integer values, like doit 5 or doit 10, to see the expected output.

To learn more about Haskell, click here: brainly.com/question/33367304

#SPJ11

Other Questions
User-controlled input and output response can also be used to record data. Now, let's consider the Body Mass Index (BMI), where BMI = 703 (weight / height2). Units for this question will be in pounds and inches. a) Using the input function, ask the user for their name, call this variable name. b) Using the input function, ask the user for their weight (lb), call this variable weight. c) Using the input function, ask the user for their height (inches), call this variable height. Calculate the BMI, call this variable BMI. d) e) Using the datetime() function find today's date. Call this variable date. Hint: use the datestr() function to convert the date to a string. f) Using fprintf, print out all of the values in the format below. Note that the statement should be displayed on five separate lines and units must be displayed when applicable. Weight, height, and BMI should have a 0.1 accuracy in the fprintf statement. Date: date Name: name Weight: weight [lb] Height: height [inches] BMI: BMI In the concept, "fire bullets, then cannonballs," bullets represent __________ while cannonball represent ___________ Scenario of the problem:the users should login to a portal with their unique id/username and password and they should be able to browse and schedule the their preffered online exam and checkout though online payment gateway, the portal will hold exam types and exam schedules as available, when the schedule time comes, the portal should provide a link to initiate online examing experience guided by a proctor. In this exercise you will formulate a hypothesis, prepare a plan of your study (including statistical testing) and justify it, including the potential limitations of it.Consider the topic of the survey that Rate your experience of using Zoom for online learning or teaching. Choose from range 0 to 10There are 268 students who have selected the range from 0-10, where mostly it comes between 6-10 selected rangeImagine you are asked to develop this research area further.Complete the following:1. Propose a hypothesis. It should be something you can realistically test using one or more of thestatistical tests covered in this course. It can concern any topic or natural phenomena which relates in some way to the survey topic (max. 50 words).2. Write down the null hypothesis (max. 50 words).3. Write down the independent and dependent variables as well as at least three confounding variables (max. 50 words).4. Imagine you had a budget of up to 1000AUD (in addition to up to 100 hours of your time to conduct the study). Explain what data you will collect to investigate this hypothesis and how you would obtain the data in a practical fashion (max. 100 words).5. What statistical tests do you expect to conduct to test the hypothesis. Please explain the circumstances in which you would conduct each test (max. 150 words).6. What are the limitations of your study? Write a paragraph that explains these limitations as well aspotential future investigations you might conduct (max. 200 words). who was hannibal and what did he accomplish in the second punic war? who is best known for his peaceful english countryside scenes, often making preliminary sketches outdoors? Use Final Exam.java as your starting point Implement the five subroutines, as described in the comments. HINT: It might be easier to start at the bottom and work your way up. import java.util.Arrays; public class FinalExam { // main() // // Creates an array of five random doubles between and 10. 1/ Prints the array to standard output (HINT: use Arrays.toString(). // Sorts the array using the selectionSort() function below. // [2] Prints the sorted array to standard output. // Erase this line and put your main() subroutine here. 1111 // selectionSort) // // input : an array of doubles "a". // [1] output: an array of doubles "a". // // [6] Uses the functions fromTo(), indexOfMax(), and swap() to execute a // Selection Sort, in which the largest element is repeatedly moved to 1/ the end of the array, and the largest index under consideration is // reduced by one. // // HINT: You may consult section 7.4.4 in our textbook, but do not simply // copy the code from that section. Your implementation of selectionsort // must call the functions fromTo(), indexOfMax(), and swap() to receive // points. // Erase this line and put your selectionSort() subroutine here. // fromTo // // input : two integers "m" and "n", and an array of doubles "a". // output: an array of doubles "b". // Gets an array that starts at a[m] and stops at a[n), and also // includes all of the elements in between (in their original order). // In other words, this function returns the input array "a", but only // from index "m" up to (and including) index "n". // // HINT: The length of the output array "b" is n - m + 1. // Erase this line and put your fromTo() subroutine here. // indexOfMax) // input : an array of doubles. output: an integer. // //Returns the INDEX of the maximal element of an array. // Erase this line and put your indexOfMax() subroutine here. // swap // input : two integers "m" and "n", and an array of doubles "a". // [10] output: an array of doubles "a". // // [4] Interchanges the elements a[m] and a[n), so that a[m] is where a[n] used to be, and a[n] is where a[m] used to be. // // HINT: You will need to define a temporary variable in order to // interchange the two elements of the array. // Erase this line and put your swap() subroutine here. } Extract sentences with word '/CUNY' of 'School_Name' column in df DataFrame import pandas as pd import re as re df = pd.DataFrame({ 'Student_ID": ['1234','1122', '2121', '4543', '2321'], 'DOB': ['11/01/2001','12/01/2002','04/06/2001','10/01/2001','11/09/1999'], }) 'School_Name': ['Baruch College/CUNY', 'Rutgers University', 'Queens College/CUNY', 'Stanford University', 'City College - CUNY'] print("Original DataFrame:") #CODE TO DO -- print the DataFrame def pick_sentence(str1, word): #CODE TO DO -- Extract return result #CODE TO DO -- Apply the Extract to the DataFrame print("\nSentense has word '/CUNY":") #CODE TO DO -- print the DataFrame Construct a DFA that recognizes { w | w in {0, 1}* and w contains an odd number of 1s or exactly three Os}. Computer Graphics QuestionNO CODE REQUIRED - SOLVE BY HANDFind the image of the triangle ABC with vertices A = (2, 3, 7), B = (2, 3, 9),and C = (5, 4, 8) by rotation 45 degree about x, y, and z axis. Prepare a Simulink simulation file such that the robot takes two input torques T and T2 and gives the outputs {xe, xe, xe}, {Ye Ye Ye}, {0,0,01} and {02, 02, 02}. Show the block diagram(s) in your report and submit the necessary simulation files. Give constant torque references of T = P Nm and T = P Nm and simulate the system. Show the plots of 0 (t), 0 (t), xe (t) and ye(t) as a result of a 3 second long simulation. The simulation should start from a configuration where the manipulator is horizontal (i.e. 0(0) = 0 rad and 0 (0) = 0 rad). Prepare a suitable dynamic plotting algorithm to show the behavior of the robot and submit the necessary plotter file Which two integers is square root of 84 between? find all critical points of the given plane autonomous system. (enter your answers as a comma-separated list.) x' = 5x2 3y y' = x y (1 point) find y as a function of x if y(4)8y 16y=0, y(0)=9, y(0)=13, y(0)=16, y(0)=0. y(x) (NP-completeness, 15pt) Call a Boolean formula trivial if it is either always true, or always false. For example, p ^p is trivial (always false), as is p V p (always true), and there are examples of trivial formulas with any number of variables. Your goal in this problem is to show that testing whether a given formula is not trivial is NP- complete. For example p v a is not trivial, since it can be made both true and false. a) Show that the non-triviality problem lies in NP. Explain what the certificate c is (include an example, e.g. for p V a), and describe how you verify the certificate. b) Show that the problem is NP-hard. Hint: what's the most likely problem to reduce from? The reduction is not hard. 1. Download Titanic dataset, import into your database (Createnew database "titanic"), replace all nulls with''." what are possible results of asking for an itemized medical bill? Do the following (Data structure)*Note that the provided files is dll.h and ANDDON'T COPY IT FROM CHEGG ITS WRONG ANSWER!!Ex2. Remove negativesWrite the DLList member function DLListrmv_ 1.Draw the flowchart representing the following pseudo-code.RepeatRead distance_from_targetRead angle_to_targetif distance_from_target larger than 40if angle_to_target is larger than 0if angle_to_target is less than 20Turn_Right(50)elseTurn_Right(100)elseif angle_to_target is larger than -20Turn_Left(50)elseTurn_Left(100)Move_Forward2.Write the pseudo-code of Q1 using C++ language supposing that you have the following variables and functions already defined:A1: the distance from targetA2: the angle to targetMOVEFORWARD: to move forwardTURN(VAL): to turn right or left. If the parameter is positive it turns to the right, else to the left. Write a program which asks the user to enter a number in the range of 1 and 7. The program should then output the day of the week. For example, if a user enters 1 the program should output sunday, if the user enters a 2, then it should output Monday and so on.Please type out answer in c++. Thanks