What is your assessment of the IT Code of Conduct in the Main ICT Lab? Assume you are the IT Manager for the Main ICT lab, write a detailed Code of Conduct to be followed by students, Lecturers and other staff especially during this COVID period in the Lab.

Answers

Answer 1

The IT Manager for the Main ICT Lab, it is essential to establish a comprehensive Code of Conduct for students, lecturers, and staff, particularly during the COVID-19 period.

In light of the COVID-19 pandemic, the Code of Conduct for the Main ICT Lab should emphasize the importance of adhering to hygiene practices. This includes regular handwashing or sanitization, wearing masks, and maintaining social distancing while using lab facilities. Additionally, it should provide guidelines for the responsible use of shared equipment, ensuring proper sanitation before and after use.

To protect data security, the code should emphasize the importance of respecting privacy, not tampering with or accessing others' data without permission, and using licensed software and resources responsibly.

Furthermore, the Code of Conduct should promote responsible behavior, such as avoiding disruptive activities, maintaining a quiet and focused environment, and respecting the rights and space of others in the lab.

Overall, the Code of Conduct should aim to create a safe, healthy, and productive environment by addressing hygiene practices, equipment usage, data security, and responsible behavior, while considering the specific challenges posed by the COVID-19 pandemic.

Learn more about data security here:

https://brainly.com/question/30583418

#SPJ11


Related Questions

For this assignment, you will explore the use of blogs and wikis.
Directions
Part I:
Research the use of blogs and in your own words, discuss two uses of blogs. Research the use of wikis and in your own words, discuss two uses of wikis.

Answers

Blogs are a type of website or part of a website where an individual can post their writings, opinions, and other content to an audience online.

The two major uses of blogs are:1. Personal expression and development- By blogging, one can express themselves and their creativity to an online audience. This helps to enhance their personal development and improve their writing skills.2. Marketing and promotion- Blogs are often used as a marketing tool to promote a business or product. By posting articles and information on a blog, it can help build an audience and generate traffic to a business's website.

Wikis are websites that are editable by anyone, and are typically used for collaborative writing and editing. The two major uses of wikis are:1. Collaboration- Wikis are often used as a tool for collaboration on group projects, research, and other tasks. By allowing multiple people to contribute and edit content, it can help streamline the process and improve the end result.2. Knowledge management- Wikis can also be used to manage and share knowledge within an organization or community. By collecting information in one central location that can be easily accessed and edited, it can help improve productivity and reduce duplication of effort.

To know more about website visit:

https://brainly.com/question/32113821

#SPJ11

It seems that a subcrcnt in the negative impedance converter is the one that simulates negativity for a given floating impedance. Explain how the indicated subar- cuit operates.

Answers

Impedance in electrical engineering refers to the resistance to alternating current that a circuit's resistance and reactance are together present. Z stands for impedance, which is a statement of the resistance to alternating and/or direct electric current that an electronic component, circuit, or system offers. Resistance and reactance are two distinct scalar (one-dimensional) phenomena that make up the vector (two-dimensional) quantity known as impedance.

The three main components that makeup impedance are the inductor, capacitor, and resistor. It also provides information on the two forms of resistance that the input and output impedances, respectively, supply.

Learn more about the Impedance here:

https://brainly.com/question/30475674

#SPJ6

Justify the following fact, that is, demonstrate how it is done for the following fact with proper examples: "Huffman Encoding makes use of the Prefix codes to prevent Ambiguous Decoding."

Answers

Huffman Encoding utilizes prefix codes to ensure unambiguous decoding by assigning variable-length codes to symbols based on their frequencies, preventing confusion and allowing for efficient compression and decompression of data.

Huffman Encoding uses prefix codes to prevent ambiguous decoding. Prefix codes ensure that no code is a prefix of another code, which guarantees unambiguous decoding.

In Huffman Encoding, symbols with higher frequencies are assigned shorter codes, while symbols with lower frequencies are assigned longer codes. This variable-length code allocation allows for efficient compression.

When decoding, the prefix property of Huffman codes ensures that each bit encountered leads to a unique symbol. Ambiguity is avoided because no code can be mistaken for another code.

This property enables reliable retrieval of the original data from the compressed form. Overall, Huffman Encoding's utilization of prefix codes plays a crucial role in maintaining unambiguous decoding during compression and decompression processes.

Learn more about Huffman Encoding here:

https://brainly.com/question/32793231

#SPJ4

Flow in a rectangular channel that is 1.1 m wide with n=0.015 has depth y = 1 m at a particular location. The flow rate is 3 m²/s and the channel slope is 0.0015. 9. Determine the critical slope 10. Determine the normal depth Write your answer for Q9 for slope after multiplying by 1000, e.g. S, -0.0022 is written as 2.2 Question 9 2 pts Determine the critical slope, S. (write your answers for slope after multiplying by 1000) Question 10 Determine the normal depth 3 pts

Answers

The formula used for solving a rectangular channel for a critical slope is expressed as:

\[V_{\text{critical}} = \sqrt{gy}\]

Where:

- \(g\) is the acceleration due to gravity

- \(y\) is the depth

The formula used for calculating normal depth for a rectangular channel is expressed as:

\[Q = \frac{1.49}{n} \cdot A \cdot R^{2/3} \cdot S^{1/2}\]

Where:

- \(A\) is the cross-sectional area

- \(R\) is the hydraulic radius

- \(S\) is the slope

- \(Q\) is the flow rate

Given that the width of a rectangular channel is 1.1m, depth \(y = 1\)m, flow rate \(Q = 3\)m²/s, and channel slope \(S = 0.0015\), we can calculate the critical slope \(S_{\text{crit}}\) and the normal depth.

First, we find the critical slope \(S_{\text{crit}}\):

\[V_{\text{critical}} = \sqrt{gy} = \sqrt{9.81 \cdot 1} = 3.13 \text{m/s}\]

\(y = 1\)m and \(g = 9.81 \text{m/s²}\)

Now, we can use the formula for the critical slope:

\[S_{\text{crit}} = \frac{{V_{\text{critical}}^2}}{{gy}} = \frac{{3.13^2}}{{9.81 \cdot 1}} = 1\]

Therefore, the critical slope \(S_{\text{crit}}\) is 1.0 or 1000.

Next, we determine the normal depth of the rectangular channel. We know the flow rate \(Q\), width, and slope of the rectangular channel. We have to calculate the cross-sectional area and hydraulic radius of the channel by assuming the depth \(y =\) normal depth.

First, we find the cross-sectional area of the rectangular channel:

\[A = \frac{Q}{V} = \frac{3}{1.1} = 2.727 \text{m²}\]

Now, we find the hydraulic radius:

\[R = \frac{A}{Pp} = \frac{2 \cdot (1.1 + 1)}{4.2} = 0.53\text{m}\]

\(Pp\) is the wetted perimeter of the channel, given by \(2 \cdot (1.1 + y)\).

Finally, we use the formula for normal depth to determine \(y\):

\[Q = \frac{1.49}{n} \cdot A \cdot R^{2/3} \cdot S^{1/2}\]

Given \(S = 0.0015\), \(A = 2.727\), \(R = 0.53\), and \(n = 0.015\), we solve for \(y\):

\[y = 0.31\text{m}\]

So, the normal depth of the rectangular channel is 0.31m.

To know more about slope visit:

https://brainly.com/question/3605446

#SPJ11

A total space of 2 m³ is available. You are asked to calculate the maximum energy that can be stored if the "energy storage systems" are the following fuels: LNG, LPG, diesel oil, kerosene, heating oil, methanol, bioethanol. Create a table showing all energies from higher to lower.

Answers

The maximum energy that can be stored in a given space for different energy storage systems can be calculated by comparing their energy densities and arranging them in a table from higher to lower energy density.

How can the maximum energy that can be stored in a given space be calculated for different energy storage systems?

To calculate the maximum energy that can be stored in a total space of 2 m³ for different energy storage systems such as LNG, LPG, diesel oil, kerosene, heating oil, methanol, and bioethanol, we need to consider their respective energy densities. Energy density refers to the amount of energy stored per unit volume.

By comparing the energy densities of these fuels, we can arrange them in a table from higher to lower energy density. The fuel with the highest energy density will have the maximum energy that can be stored in the given space.

Once the energy densities are known, the fuels can be ranked accordingly in the table. The fuel with the highest energy density will be placed at the top, followed by fuels with lower energy densities in descending order.

Calculating the actual energy values will require multiplying the energy density of each fuel by the available space (2 m³) to obtain the maximum energy that can be stored for each fuel.

Creating this table will provide a clear comparison of the maximum energy storage capacity for each fuel, allowing for informed decision-making based on energy density considerations.

Learn more about energy

brainly.com/question/1932868

#SPJ11

The following code set an edge-triggered interrupt to be which one of the following? GPIO PORTF_IS_R &= -0x20; GPIO PORTF_IBE_R &= -0x20; GPIO PORTF_IEV_R&= -0x20; Rising Edge Both Edge None of the above Falling Edge

Answers

The code is specifically setting the interrupt to be triggered on a falling edge, indicating that the edge-triggered interrupt is a Falling Edge.

The code GPIO_PORTF_IEV_R &= -0x20; sets an edge-triggered interrupt to be a Falling Edge.

In this code, GPIO_PORTF_IEV_R is the register used to configure the interrupt event. By performing a bitwise AND operation with -0x20, which is equivalent to binary 11100000, the code clears the corresponding bit 5 while leaving the other bits unchanged. This means that only the falling edge of the input signal will trigger the interrupt.

Therefore, the code is specifically setting the interrupt to be triggered on a falling edge, indicating that the edge-triggered interrupt is a Falling Edge.

learn more about code  here

https://brainly.com/question/32216925

#SPJ11

what would you expect to happen to the runoff ratio of water
once the the soils top layer wears away and only bare rock is left
and forests are cut

Answers

The runoff ratio of water is expected to increase significantly when the top layer of soil wears away, leaving only bare rock, and when forests are cut down.

When the top layer of soil wears away and only bare rock is left, the infiltration capacity of the land decreases significantly. Bare rock does not have the ability to absorb and retain water like soil does. As a result, rainfall and surface water will have a higher tendency to flow over the rock surface rather than being absorbed into the ground. This leads to an increase in surface runoff, as the water quickly runs off the impermeable surface without infiltrating into the ground. In addition, when forests are cut down, there is a loss of vegetation cover that plays a crucial role in regulating water movement. Forests act as natural sponges, with trees and plants intercepting rainfall and reducing the impact of raindrops on the soil. They also help to slow down the flow of water and promote infiltration through their root systems. Without the protective cover of forests, rainfall directly hits the exposed rock surface, increasing the amount of surface runoff.

Learn more about vegetation here:

https://brainly.com/question/32503863

#SPJ11

1. Recall that a verifier V for a language L C * is a deterministic TM such that for every αε Σ*: • If x e L, then there exists ce I* such that V accepts (x,c) • If x & L, then V rejects (x,c) for every ce * х Prove that the following definitions are equivalent to the aforementioned one (i.e. a language has a verifier iff it has a modified verifier): a (a) For every x € £*: • If x E L, then there exists ce £* such that V accepts (x,c) • If x & L, then V does not accept (x,c) for every ce !* (b) For every x E *: • If x E L, then there exists ce I* such that V accepts (x,c) • If x & L, then V rejects (x,c) for every ce £* • V always halts 7 ។

Answers

(a) For every x E *:• If x E L, then there exists ce E* such that V accepts (2, c)• If x & L, then V does not accept (x,c) for every ce £*For proving equivalence, we need to show two things:

1. For every verifier V, there exists a modified verifier V′ satisfying definition (a)

2. For every verifier V′ satisfying definition (a), there exists a verifier V satisfying the definition given in the problemLet us prove these in order:

Proof of 1: Let V be a verifier for L. We need to find a modified verifier V′ that satisfies definition

(a).We define V′ as follows:

V′ accepts (x,c) if and only if there exists a string w such that |w| ≤ |c|, V accepts (x,w), and c = wV′ rejects (x,c) otherwise.Now we show that V′ satisfies definition (a):

(i) Let x ∈ L. Then there exists a string c such that V accepts (x,c). Let w be such that |w| ≤ |c| and V accepts (x,w). Then V′ accepts (x,c) since V accepts (x,w) and c = w.

(ii) Let x ∉ L. We show that V′ does not accept (x,c) for every string c. Suppose, to the contrary, that there exists a string c such that V′ accepts (x,c).

(a).Proof of 2: Let V′ be a verifier satisfying definition (a). We need to find a verifier V satisfying the definition given in the problem.Let V be the following verifier:

V accepts (x,c) if and only if V′ accepts (x,c) and |c| ≤ p(n), where n is the length of x and p is some polynomial.

(a), there exists a string c′ such that V′ accepts (x,c′) and c = c′. Moreover, |c′| ≤ q(n), where q is some polynomial. Then |c| ≤ p(n) ≤ q(n) for sufficiently large n, so V accepts (x,c).

(ii) Let x ∉ L. We show that V rejects (x,c) for every string c. Suppose, to the contrary, that there exists a string c such that V accepts (x,c). Then V′ accepts (x,c), so there exists a string c′ such that V′ accepts (x,c′) and c = c′. But |c′| ≤ p(n) and x ∉ L, which contradicts the fact that V′ satisfies definition

To know more about polynomial visit:

brainly.com/question/11536910

#SPJ4

With an indirect proof, prove the following theorem:
(p → q) ∧ (q → r) ∧ (p → (s ∧ t)) ∧ ((s ∧ t) → u) ∧ (u → ¬r) ⇒
¬p

Answers

It is true that (p → q) ∧ (q → r) ∧ (p → (s ∧ t)) ∧ ((s ∧ t) → u) ∧ (u → ¬r) ⇒ ¬p. QED.

Assume the antecedent is true.

We want to prove that ¬p is also true. We can prove this by showing that p leads to a contradiction.

Let us assume p is true. From (p → q) ∧ (q → r) and the assumption that p is true, it follows that q and r are true.

From (p → (s ∧ t)) and the assumption that p is true, it follows that s and t are both true.

From ((s ∧ t) → u) and the two earlier conclusions that s and t are both true, it follows that u is also true.

From (u → ¬r) and our earlier conclusion that u is true, it follows that ¬r is also true.

This is where the contradiction arises. From our earlier conclusion that r is true and now concluding that ¬r is also true, we have reached a contradiction.

By the law of non-contradiction, this is impossible, and thus it must necessarily be the case that p is false. Thus, the desired conclusion, ¬p, follows.

Therefore, it is true that (p → q) ∧ (q → r) ∧ (p → (s ∧ t)) ∧ ((s ∧ t) → u) ∧ (u → ¬r) ⇒ ¬p. QED.

Learn more about the resolution rule here:

https://brainly.com/question/30285975.

#SPJ4

Let's say you have a labeled dataset of 2000 emails and you are trying to classify them as spam or ham. Your model comes with the following outputs: Your model has predicted that out of these 2000 emails, 1500 are ham and 500 are spam of those 1500 emails predicted as ham, only 700 are actually labeled as ham of those 500 emails predicted as spam only 300 are actually labeled as spam What is the accuracy of your model? • Your choice: incorrect - 25% • Correct - 50% • Incorrect 75% • Incorrect - 80%

Answers

Given dataset consists of 2000 emails which are classified into 2 categories, spam or ham. The classification model's outputs suggest that 1500 emails are ham and 500 emails are spam. Among 1500 predicted ham emails, only 700 are labeled as ham. Similarly, among 500 predicted spam emails, only 300 are labeled as spam.

Accuracy is a performance metric that shows the proportion of correct classifications made by the model out of the total number of classifications made. It is defined as the ratio of the number of correct predictions made by the model to the total number of predictions made by the model.

So, the total number of correct predictions made by the model is 700 + 300 = 1000 (where 700 are true positives and 300 are true negatives).

The total number of predictions made by the model is 1500 + 500 = 2000 (where 1500 are predicted positives and 500 are predicted negatives).

The accuracy of the model can be calculated as follows:

Accuracy = (Total number of correct predictions) / (Total number of predictions)

Accuracy = 1000/2000Accuracy = 0.5 or 50%

The accuracy of the model is 50%. So, the correct option is "Correct - 50%".

To know more about classification visit :

https://brainly.com/question/645379

#SPJ11

What is the difference between independent and dependent demand items?

Answers

Independent demand items are end-user products with demand driven by customer preferences, while dependent demand items are components or materials required for production, with demand derived from the demand for finished products.

Independent demand items and dependent demand items are two concepts related to inventory management and forecasting.

Here's a breakdown of the differences between them:

Independent Demand Items:

Independent demand items are finished goods or end products that are directly demanded by customers.

They are typically sold to external customers or end-users. The demand for independent demand items is influenced by factors such as customer preferences, market trends, and sales forecasts.

Examples of independent demand items include individual products like laptops, smartphones, or cars.

Dependent Demand Items:

Dependent demand items are components, parts, or materials required to produce or assemble finished goods. The demand for dependent demand items is derived from the demand for the final product they are used in. The quantity of dependent demand items needed depends on the production plan and the bill of materials (BOM) for the final product.

Examples of dependent demand items include raw materials, sub-assemblies, and packaging materials.

Learn more about Independent demand and dependent demand click;

https://brainly.com/question/32434451

#SPJ4

This should be a fun little quest. You will create a doctor program called Eliza.
Eliza will be able to carry on a simple, albeit contrived, conversation with her patient.
Your first miniquest - Hisspify
I mean lispify.
You must implement:
string lispify(string s);
When I invoke this method, I will supply it a string parameter. You must accept this parameter by copy (not reference). Look it up or ask and understand before proceeding.
It must return a string which is identical to the one I gave you except that all s's in the string have been substituted by th's.

Answers

Here's how you can implement the lispify method in C++:```string lispify(string s){ string result = ""; for(int i = 0; i < s.length(); i++){ if(s[i] == 's') result += "th"; else result += s[i]; } return result;}```

The above implementation of the lispify method accepts a string parameter 's' by copy and returns a new string 'result', which is the same as the input string except that all s's have been replaced by th's.

We iterate through the input string character by character using a for loop. If the current character is an 's', we append "th" to the result string. Otherwise, we simply append the current character to the result string.

Learn more about program code at

https://brainly.com/question/31686520

#SPJ11

A beam with span of 12m has overhanging portions at both ends and is loaded with a uniform distribution of magnitude of 28 kN/m. Determine the deflection at the overhanging in mm whereas the given E is 200 GPa and I= 1x10^9mm^4.

Answers

The deflection at the overhanging portions of the beam is approximately 1.57 mm.

To calculate the deflection at the overhanging portions of the beam, we can use the formula for the deflection of a simply supported beam with a uniform load: δ = (5 * w * L^4) / (384 * E * I), Where δ is the deflection, w is the uniform load magnitude, L is the span of the beam, E is the modulus of elasticity, and I is the moment of inertia. Substituting the given values into the formula, we have: δ = (5 * 28 * 12^4) / (384 * 200 * 10^3 * 10^6), Simplifying the calculation further, we get: δ ≈ 1.57 mm. Therefore, the deflection at the overhanging portions of the beam is approximately 1.57 mm.

Learn more about deflection of the beam here:

https://brainly.com/question/31967662

#SPJ11

A. in QPSK Modulation, What is the relationship between the bit rate of the sequence generator output and the bit rate of the
odd and even bit streams
B. What type of signal are the PSKI and PSKQ signals?
C. How does the bandwidth of a QPSK signal compare to the bandwidth of a BPSK signal with a similar bit
rate? Explain your answer in regards to the width of the peaks, and the spectral
distribution of power
D. in QPSK demodulation, Why would an as an example a recovered signal have 3 or 4 voltage levels instead of 2 levels as you would expect for a
digital signal? Bonus: Why is the demodulator used in the experiment considered to be only one half of a
full QPSK demodulator?

Answers

QPSK modulation can be represented as two independent BPSK modulations, one for in-phase (I) and one for quadrature (Q). The bit rate of the sequence generator output is twice the bit rate of each of the odd and even bit streams.

What are the rest of the answers?

B. PSKI and PSKQ signals are binary phase shift keying modulated signals that are 90 degrees out of phase with each other.

The amplitudes are identical and the phase relationship between them is equal to the modulated data.

C. QPSK occupies half the bandwidth of BPSK.

This is because two bits are modulated in every symbol period in QPSK. The bandwidth of QPSK signal is equal to the bandwidth of the BPSK signal with the same bit rate but half the symbol rate. The spectral efficiency of QPSK is twice that of BPSK.

D. In QPSK demodulation, the signal is demodulated by mixing it with a replica of the carrier signal.

The output of this process has the signal components at the same frequency and 90 degrees out of phase with each other. If the carrier signal is not completely synchronized with the transmitted carrier, the output will have some distortion. The demodulated signal has 3 or 4 voltage levels instead of 2 levels as you would expect for a digital signal due to noise and other distortions.The demodulator used in the experiment is considered to be only one half of a full QPSK demodulator because it only extracts one of the two orthogonal components. The other component is not extracted.

To know more on demodulator visit:

https://brainly.com/question/29909958

#SPJ11

he following cross-sectional areas (m2) are calculated for centre line of a drain trench at 5 m interval; 2.5 2.7 1.8 3.5 3.7 2.9 2.8 1.6 1.1 V=d[(first+last)/2) + sum of rest cross-sectional areas] Trapezoidal formula The calculated volume in m3 of the material for the trench is; Select one: O a. 111.4 O b. 113.0 O c. 104.0 O d. 118.0 O e. 34.2 O f. None of the given answers

Answers

GCross-sectional areas (m2): 2.5, 2.7, 1.8, 3.5, 3.7, 2.9, 2.8, 1.6, 1.1Distance between each cross-sectional area= 5 mUsing the trapezoidal formula for the volume of the material for the trench.

we have;V = d[(first+last)/2) + sum of rest cross-sectional areas]d = distance between cross-sectional

areas= 5 m= (5/2)[(2.5+1.1) + (2.7+1.6) + (1.8+2.8) + (3.5+2.9) + (3.7)]V = 0.5(3.6+4.3+4.6+6.4+3.7)(5)= 111.4 m³

the answer is option (a) 111.4.

To know more about trapezoidal visit:

https://brainly.com/question/31380175

#SPJ11

Q3: Determine the angle of twist at \( \mathrm{D} \) and the stress profile for each section. Determine the ample of trist at o and the stress profile for ench section.

Answers

To determine the angle of twist at point D and the stress profile for each section, as well as the amplitude of twist at point O and the stress profile for each section, we need more information about the specific structure or system you are referring to. The angle of twist and stress distribution depend on the geometry, material properties, and loading conditions of the structure.

If you provide more details about the system or structure, such as its shape, material, boundary conditions, and applied loads, I would be able to assist you further in calculating the angle of twist and stress profiles.

Learn more about determine  https://brainly.com/question/30795016

#SPJ11

Choose the correct answer. (4 Points) 1) All the following are changeable in a transformer except: a) Voltage b) Frequency c) Current 2) One of the following represents the Balanced Excitation: a) D1-D2 b) B1-B2 c) D3-D4 3) The DC motor which has high resistance of windings a) Shunt b) Both c) Series جامعة الإسراء d) Turns d) All mentioned d) None of all

Answers

All the following are changeable in a transformer except: c) Current.

In a transformer, the voltage and frequency can be easily changed, but the current cannot be changed directly. Transformers operate based on the principle of electromagnetic induction, where a varying current in the primary winding creates a changing magnetic field, which in turn induces a voltage in the secondary winding.

The voltage ratio between the primary and secondary windings can be adjusted by changing the number of turns in each winding, allowing for voltage transformation. Additionally, the frequency can be changed by using different input power sources or by utilizing frequency converters.

However, the current in a transformer is determined by the load connected to the secondary winding and is not directly controllable. The transformer acts as a passive device that transfers power efficiently between the primary and secondary sides while maintaining the power balance based on the turns ratio.

Learn more about transformer

brainly.com/question/16971499

#SPJ11

We all know that currently, we are going through a pandemic period. Several measures are now taken so that we can overcome this period and resume our daily activities like we did earlier. Educational institutions are trying to resume all activities and they are doing their best to do it successfully.
We know that this disease is contagious and anyone affected comes in contact with another person, then he or she needs to stay in quarantine. Suppose an educational institution "X" has hired you to design a system known as an "Infected tracker". An infected tracker tries to figure out the region/number of surrounding people who can be affected by a single person. Then it prints the maximum region infected. Here you can consider Y being infected and N is not infected.
Your task is to find the maximum region with Y i.e. max people infected in a region so that strict measures can be taken in that region using DFS. Keep in mind that two people are said to be infected if two elements in the matrix are Y horizontally, vertically or diagonally.
==================================================================
Sample Input 1
N N N Y Y N N
N Y N N Y Y N
Y Y N Y N N Y
N N N N N Y N
Y Y N N N N N
N N N Y N N N
==================================================================
Sample Output
7
==================================================================
Explanation
Here you can see a region has 7 infected people so it is the maximum infected region.
Sample Input 2:
Y Y N N N
N Y Y N N
N N Y N N
Y N N N N
=======================================================
Sample Output
5
=======================================================
Explanation
Here you can see the first region has 5 infected people so it is the maximum infected region.

Answers

```python

def dfs(mat, visited, r, c, cnt):

   visited[r][c] = True

   cnt[0] += 1

   rows, cols = len(mat), len(mat[0])

   

   if r > 0 and mat[r-1][c] == 'Y' and not visited[r-1][c]:

       dfs(mat, visited, r-1, c, cnt)

   if r < rows-1 and mat[r+1][c] == 'Y' and not visited[r+1][c]:

       dfs(mat, visited, r+1, c, cnt)

   if c > 0 and mat[r][c-1] == 'Y' and not visited[r][c-1]:

       dfs(mat, visited, r, c-1, cnt)

   if c < cols-1 and mat[r][c+1] == 'Y' and not visited[r][c+1]:

       dfs(mat, visited, r, c+1, cnt)

   if r > 0 and c > 0 and mat[r-1][c-1] == 'Y' and not visited[r-1][c-1]:

       dfs(mat, visited, r-1, c-1, cnt)

   if r > 0 and c < cols-1 and mat[r-1][c+1] == 'Y' and not visited[r-1][c+1]:

       dfs(mat, visited, r-1, c+1, cnt)

   if r < rows-1 and c > 0 and mat[r+1][c-1] == 'Y' and not visited[r+1][c-1]:

       dfs(mat, visited, r+1, c-1, cnt)

   if r < rows-1 and c < cols-1 and mat[r+1][c+1] == 'Y' and not visited[r+1][c+1]:

       dfs(mat, visited, r+1, c+1, cnt)

Please note that in order to execute this program, you need to provide the input for the matrix through standard input or modify it to use fixed values.

To know more about matrix visit:

https://brainly.com/question/29132693

#SPJ11

An object of mass 70 kg is dropped from a rest position
at a height of 500 m at t=0. The velocity of free fall (v) as a
function of time (t) is governed by the ODE
dv/dt=g-(c/m)*v
where g = 9.81 m/s^2

Answers

The velocity of free fall (v) as a function of time (t) is governed by the ordinary differential equation (ODE): dv/dt = g - (c/m) * v, where g = 9.81 m/s².

In this equation, g represents the acceleration due to gravity (9.81 m/s²), c represents the drag coefficient, m represents the mass of the object (70 kg), v represents the velocity, and t represents time. The equation describes the change in velocity over time, taking into account the gravitational force acting on the object and the air resistance opposing its motion.

The term (c/m) * v represents the effect of air resistance, where c is the drag coefficient and m is the mass of the object. As the object falls, the air resistance increases proportionally to the velocity, resulting in a decrease in acceleration. Eventually, when the drag force equals the gravitational force, the object reaches its terminal velocity, where the net force becomes zero and the object falls at a constant speed.

To know more about gravitational force, visit:

https://brainly.com/question/32609171

#SPJ11

* This creates the mailbox and the producer and consumer threads. */ import java.util.*; public class Factory { public Factory { // first create the message buffer Channel mailbox = new Message Queue(): // now create the producer and consumer threads Thread producer Thread = new Thread(new Producer(mailBox); Thread consumerThread = new Thread(new Consumer(mailBox)); producerThread.starto: consumerThread.start(): } public static void main(String args[]) { Factory server = new Factoryo: } FCIT KAU } ** * This is the producer thread for the bounded buffer problem. import java.util.*; class Producer implements Runnable { public Producer(Channel m) { mbox = m; } public void run { Date message while (true) { Sleep Utilities.napo; message = new Date: System.out.println("Producer produced " + message); // produce an item & enter it into the buffer mbox.send(message); } private Channel mbox; } * This is the consumer thread for the bounded buffer problem. import java.util."; class Consumer implements Runnable { public Consumer(Channel m) { mbox=m; } public void run) { Date message: while (true) { Sleep Utilities.napo: // consume an item from the buffer System.out.println("Consumer wants to consume."); message = (Date)mbox.receive(); if (message != null) System.out.println("Consumer consumed " + message); } } private Channel mbox; } ** * An interface for a message passing scheme. public interface Channel { * Send a message to the channel. * It is possible that this method may or may not block. public abstract void send(Object message); * * * Receive a message from the channel * It is possible that this method may or may not block. * public abstract Object received: } ** * This program implements the bounded buffer using message passing. * Note that this solutions is NOT thread-safe. A thread safe solution can be developed using Java synchronization which is discussed in Chapter 6. import java.util. Vector, public class MessageQueue implements Channel { private Vector queue; public MessageQueue { queue = new VectorO; } */ * This implements a non-blocking send public void send(Object item) { queue.addElement(item); } * * This implements a non-blocking receive public Object receive0 { if (queue.size() ==0) retum null; else retum queue.remove(0); } } * Utilities for causing a thread to sleep. *Note, we should be handling interrupted exceptions * but choose not to do so for code clarity. public class SleepUtilities { * Nap between zero and NAP_TIME seconds. * public static void nap( { nap(NAP TIME); } /** Nap between zero and duration seconds. * public static void nap(int duration) { int sleeptime = (int) (NAP_TIME * Math.random(); try { Thread.sleep(sleeptime*1000); } catch (InterruptedException e) {} } private static final int NAP_TIME = 5; }

Answers

Message passing is a vital concept in concurrency. A message channel, sometimes known as a communication channel, is an entity that enables two or more parties to exchange messages.

They can be used to pass data between threads, as well as between applications running on different machines. The factory class creates the mailbox and producer and consumer threads. The message queue is created first, followed by the creation of the producer and consumer threads. The producer thread creates a date message and enters it into the message buffer when it runs. The consumer thread consumes the message from the buffer when it runs.

A message-passing scheme is represented by an interface in Java. The send and receive methods are non-blocking, which means they will not block. The bounded buffer, which employs message passing, is implemented in this programme. This method is not thread-safe since it employs non-blocking code. A more secure solution can be implemented using Java synchronization. Sleep Utilities provides the utility methods required for causing a thread to sleep. The nap method allows you to sleep for a random length of time between zero and NAP_TIME seconds. The nap method allows you to sleep for a random length of time between zero and the provided duration. SleepUtilities doesn't handle interrupted exceptions, but it can do so for code clarity.

To know more about communication visit:

https://brainly.com/question/29811467

#SPJ11

A 150mm thick subbase layer is to be stabilised with roadcrete. The roadcrete is to be spread by mass at 2.5%. The maximum layer density is 1910 kg/m3 and the specified minimum density is 93% mod AASHTO. How many sacks will be required per m2, if one sack weighs 50 kg? Clearly show all your calculations. (6) 4.2 Design a double seal surfacing for a newly constructed rural road. (15) Use the following design input: • Aggregates: 19/9.5mm double seal: ALD of 10 and 6 mm respectively. • Binder:80/100 pen bitumen (applied hot) • Ball penetration: 1.9 mm on average, texture depth is 0.6 mm on average. • Road is on flat terrain. • Traffic count: 180 trucks per day and 1650 light vehicles per day • Design a lean seal with a texture depth of 0.7 mm and use pre-coated chips for the second application. • The road is in a moderate climatic region Note: Use the newest seal design guide: TRH3 (2007) is attached. 4.3 Name three types of binder commonly used in seal construction.

Answers

To determine the number of sacks required per square meter for the roadcrete subbase layer, we need to calculate the mass of roadcrete per square meter based on the given specifications. Approximately 0.143 sacks will be required per square meter.

Given:

Subbase layer thickness (h): 150 mm

Roadcrete spread rate: 2.5% by mass

Maximum layer density: 1910 kg/m³

Specified minimum density: 93% mod AASHTO

Weight of one sack: 50 kg

1. Convert the subbase layer thickness to meters:

Thickness (h) = 150 mm = 150/1000 = 0.15 m

2. Calculate the maximum compacted density:

Maximum compacted density = Maximum layer density = 1910 kg/m³

3. Calculate the specified minimum density:

Specified minimum density = 93% of mod AASHTO = 0.93 x Maximum layer density

4. Calculate the mass of roadcrete per square meter:

Mass of roadcrete = Thickness (h) x Maximum compacted density x Roadcrete spread rate

Mass of roadcrete = 0.15 m x 1910 kg/m³ x 0.025

Mass of roadcrete = 7.1625 kg

5. Calculate the number of sacks required per square meter:

Number of sacks = Mass of roadcrete / Weight of one sack

Number of sacks = 7.1625 kg / 50 kg

Number of sacks = 0.14325 sacks

To know more about Subbase layer visit-

https://brainly.com/question/32538168?referrer=searchResults

#SPJ11

A step-down chopper has input DC voltage of 24V, switching frequency 100Hz and ON-time of 5m second. The converter is connected to R=1Ω and L=10mH and the system operating in continuous conduction mode. Determine the maximum, minimum, average and RMS load currents.

Answers

The average, maximum, minimum, and RMS load currents are 12A, 15A, 9A, and 12A, respectively.

How to find the attribute load currents ?

A step-down chopper, also known as a buck converter, is a DC-to-DC power converter that steps down voltage (while stepping up current) from its input (supply) to its output (load).

Determine the Duty Cycle (D):

D = Ton / T

= Ton * f

= 5ms * 100Hz

= 0.5 (note: 5ms = 0.005s)

Determine the Average Output Voltage (Vout):

Vout = D * Vin = 0.5 * 24V

= 12V

Calculate the Average Load Current (Iavg):

Iavg = Vout / R

= 12V / 1Ω

= 12A

Calculate ΔI:

ΔI = (24V-12V) * 0.5 * (1/100Hz) / 10mH

= 6A

Calculate the Maximum and Minimum Load Currents:

Imax = Iavg + (ΔI/2)

= 12A + (6A/2)

= 15A

Imin = Iavg - (ΔI/2)

= 12A - (6A/2)

= 9A

Calculate the RMS Load Current (Irms):

Irms = Iavg = 12A

Find out more on load current at https://brainly.com/question/14562756

#SPJ4

Please fix I keep getting this when I run it in the cygwin terminal
/usr/lib/gcc/x86_64-pc-cygwin/7.4.0/../../../../x86_64-pc-cygwin/bin/ld: /usr/lib/gcc/x86_64-pc-cygwin/7.4.0/../../../../lib/libcygwin.a(libcmain.o): in function `main':
/usr/src/debug/cygwin-3.1.7-1/winsup/cygwin/lib/libcmain.c:37: undefined reference to `WinMain'
/usr/src/debug/cygwin-3.1.7-1/winsup/cygwin/lib/libcmain.c:37:(.text.startup+0x82): relocation truncated to fit: R_X86_64_PC32 against undefined symbol `WinMain'
collect2: error: ld returned 1 exit status
#include
#include "work4_support.h"
extern unsigned int result;
extern unsigned int first;
extern unsigned int second;
void printBinary(unsigned int x)
{
char i;
char index;
int mask;
if(x >= SIXTEENBITMAX)
{
mask = TWENTYFOURBITMASK;
index = BITSLARGE;
}
else if(x >= MAXSMALL);
{
}
void russMult(unsigned int x, unsigned int y)
{
}
char promptUser()
{
}
void banner(void)
{
printf("Banner\n");
}
}

Answers

The error message "undefined reference to `WinMain'" occurs because the linker, ld.exe, expects to find a WinMain function and can’t find it. Therefore, the application terminates with an error. When creating a graphical application using the Win32 API in Visual C++, you must define a WinMain function as the main entry point.

Fixing the error "undefined reference to `WinMain'"The issue arises because the WinMain function is defined in the Windows API library, which is not included by default in Cygwin.The problem can be resolved by adding -mwindows to the command line when linking the application.

Here is the revised code snippet to solve the issue:```#include #include "work4_support.h"extern unsigned int result;extern unsigned int first;extern unsigned int second;void printBinary(unsigned int x) {char i;char index;int mask;if (x >= SIXTEENBITMAX) {mask = TWENTYFOURBITMASK;index = BITSLARGE;} else if (x >= MAXSMALL);{}void russMult(unsigned int x, unsigned int y) {}char promptUser() {}void banner(void) {printf("Banner\n");}int WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nShowCmd){MessageBox(NULL,"Hello world!", "My program", NULL);return 0;}```

The error message "undefined reference to `WinMain'" is a common problem when building an executable with Cygwin. The problem is solved by adding the -mwindows option when linking the executable.

Learn more about program code at

https://brainly.com/question/33357240

#SPJ11

A direct-mapped cache unit for a machine that uses 32-bit addresses is designed to have 512 lines, each storing 32 words of data. Select how the bits of an address would be used in resolving cache references. A> O tag bits 31-23 line bits 24 - 7 offset bits 6-0 B> O tag bits 31-16 line bits 15 - 7 offset bits 6-0 C> O tag bits 31-15 line bits 14 - 8 offset bits 7-0 D> O tag bits 31 - 16 line bits 15 - 5 offset bits 4 - 0

Answers

For the given direct-mapped cache unit with 512 lines, each storing 32 words of data, the bits of an address are used as follows: tag bits 31-16, line bits 15-7, and offset bits 6-0 (Option B).

The correct option for how the bits of an address would be used in resolving cache references in a direct-mapped cache unit with 512 lines, each storing 32 words of data, is:

Option B: Tag bits 31-16, Line bits 15-7, Offset bits 6-0.

In a direct-mapped cache, each memory block is mapped to a specific line in the cache. The number of lines in the cache determines the number of unique memory blocks that can be stored. In this case, there are 512 lines available.

To determine which line in the cache a memory block should be stored or retrieved from, the line bits are used. In option B, the line bits are represented by bits 15-7 of the address. These 9 bits allow for 512 unique combinations, corresponding to the 512 lines in the cache.

The offset bits are used to determine the specific word within a cache line. Since each line stores 32 words of data, 5 bits are required to represent the offset. In option B, the offset bits are represented by bits 6-0 of the address.

The tag bits are used to identify which memory block is stored in a specific line of the cache. In this case, since the cache size is 512 lines and each line stores 32 words, the remaining bits of the address (bits 31-16) are used as tag bits.

Learn more about address here:

https://brainly.com/question/30038929

#SPJ11

A jet of water 25 mm in diameter and flowing at a rate of 80 liters per second hits a vertical wall normally at close range. What is the force exerted by the jet of water?
Select one:
a. 18,600 N
b. 12,906 N
c. 15,504 N
d. 13,038 N

Answers

Introduction:The force is one of the physical quantities that play an important role in the world of physics. When an object interacts with another object, it exerts a force. It's important to calculate the force so that the object doesn't move.

In the world of physics, water is one of the key elements. The water can also exert a force, as we'll see in this article. Furthermore, we'll examine how to calculate the force exerted by the water. The problem statement is given below.

Problem: A jet of water 25 mm in diameter and flowing at a rate of 80 liters per second hits a vertical wall normally at close range. What is the force exerted by the jet of water? Solution: Given data is: Diameter of the water jet, d = 25 mm Flow rate, Q = 80 liters per second Therefore.

To know more about quantities visit:

https://brainly.com/question/14581760

#SPJ11

Consider the undo and redo operations or forward and back operations on a browser. While it is likely more obvious that operations to undo or pages to go back to may be stored using a stack, what is the behaviour of the redo or page forward operations? How is it related to being a stack? Are there times at which the redo or forward operations stored in the stack are cleared 2. Which of the following are valid and complete reverse Polish expressions? The operators + and * represent the standard binary addition and multiplication operations, respectively. 1 2 + * 4 5 * 6 + + 1 2 3+* 4 5 * ++ 12 + 3 * 4 5 * 6+ 3. Evaluate the following expressions that are written using reverse Polish notation: 1 2 3+ * 4 5 * 6++ 1 2 3+* 4 5 * + 6+ 1 2 + 3 * 4 5 * 6 + +

Answers

1. Undo and Redo OperationsIn undo and redo operations or forward and back operations on a browser, it is most likely more evident that operations to undo or pages to go back to can be stored using a stack.

The undo operation is generally accomplished by removing an item from the top of the stack, whereas the redo operation is usually done by adding an item to the top of the stack. The redo or page forward operations stored in the stack are cleared at any moment when a new operation is added to the stack. A redo operation is defined as an action that is used to restore a previous state. A redo operation re-establishes the most recent undo operation that has been undone. A redo operation is usually the opposite of an undo operation since it reverses the undo operation.

2. Valid Reverse Polish Expressions

The following are the valid reverse Polish expressions:

1. 1 2 + * 4 5 * 6 + +2. 1 2 3+* 4 5 * ++3. 12 + 3 * 4 5 * 6+ 3.

Evaluation of the Reverse Polish Expressions

The following are the evaluations of the reverse Polish expressions:

1. 1 2 3+ * 4 5 * 6++= (1(2+3)*4*5)+6= (1(5)*4*5)+6= 1012. 1 2 3+* 4 5 * + 6+= ((1*(2+3))*4)+5+6= (5*4)+5+6= 3123. 1 2 + 3 * 4 5 * 6 + += ((1+2)*3*4*5)+6= (3*60)+6= 186

To know more about browser visit:

https://brainly.com/question/19561587

#SPJ11

4. An equipment costs P 10,000 with a salvage value of P 500 at the end of 10 years. Calculate the annual depreciation by: (a) straight-line method (b) sinking fund method at 4% interest.

Answers

(a) Straight-Line Method:

To calculate the annual depreciation using the straight-line method, we need to determine the depreciable amount and divide it by the useful life of the equipment.

Depreciable amount = Cost of equipment - Salvage value

Depreciable amount = P 10,000 - P 500

Depreciable amount = P 9,500

Annual Depreciation = Depreciable amount / Useful life

Annual Depreciation = P 9,500 / 10 years

Annual Depreciation = P 950

Using the straight-line method, the annual depreciation for the equipment is P 950.

(b) Sinking Fund Method at 4% Interest:

The sinking fund method involves accumulating funds over the useful life of the equipment to cover its replacement cost. In this case, we'll calculate the annual deposit required in a sinking fund at a 4% interest rate to reach the replacement cost of P 10,000.

Annual Deposit = (Replacement Cost - Salvage Value) / Sinking fund factor

Sinking fund factor = (1 - (1 + interest rate)^(-useful life)) / interest rate

Sinking fund factor = (1 - (1 + 0.04)^(-10)) / 0.04

Sinking fund factor ≈ 7.3601

Annual Deposit = (P 10,000 - P 500) / 7.3601

Annual Deposit ≈ P 1,311.94

Using the sinking fund method at a 4% interest rate, the annual deposit required is approximately P 1,311.94, which represents the annual depreciation for the equipment.

Learn more about Straight-Line Method here:

https://brainly.com/question/30243743

#SPJ11

Assume that we want to send a datagram of 1492 Bytes including IP header) over a network with MTU of 100 bytes. What is the number of data that will traverse the network (Assume that IP headers have no options fields.) 6 1 07
25

Answers

The number of data packets that will traverse the network is 19.

To calculate the number of data packets that will traverse the network, we need to consider the Maximum Transmission Unit (MTU) and the size of the datagram, including the IP header.

Given:

MTU = 100 bytes

Datagram size (including IP header) = 1492 bytes

First, we need to determine the size of the payload (data) in each packet by subtracting the IP header size from the MTU:

Payload size = MTU - IP header size

Since the IP header size is not specified, we'll assume a standard IPv4 header size of 20 bytes.

Payload size = 100 bytes - 20 bytes (IP header) = 80 bytes

Next, we calculate the number of packets required to transmit the entire datagram:

Number of packets = ceil(Datagram size / Payload size)

Number of packets = ceil(1492 bytes / 80 bytes) = ceil(18.65) ≈ 19

Therefore, the number of data packets that will traverse the network is 19.

To know more about Maximum Transmission Unit (MTU) click here:

https://brainly.com/question/30296055

#SPJ11

A very popular category of applications is one that use sensors and send data to other system where data is processed. Based on your knowledge of such system, which ones do you think have to be most accurate?
Select one:
a.
Heat monitoring system in a fabric manufacturing plant
b.
Auto-pilot system in a modern car
c.
none of these is critical
d.
Auto insulin injection system for diabetic patients

Answers

Based  on the given options, option d)Auto insulin injection system for diabetic patients has most accurate application.Sensors are being used everywhere today to gather data and provide it to other systems.

Since it deals with injecting insulin into a patient, any kind of error can be life-threatening. This system must have sensors that are incredibly accurate to ensure that the insulin dose is precise and appropriate for the patient.

Although an auto-pilot system must be accurate enough to navigate a car through different kinds of terrains and in different weather conditions, it doesn't have to be as precise as an insulin injection system because if there is an error, the consequences will not be as severe.

However, the consequences of an error in such a system won't be as severe as that of an insulin injection system.

To know more about everywhere visit:

https://brainly.com/question/29786505

#SPJ11

A stack data structure, when implemented by a programmer as done in the modules as a LIFO data structure, has the following property (only one correct choice): [Assume there are several items remaining in the stack when considering these options.] It allows the client to pop () the earliest, i.e. first, push () ed item (the oldest item in the stack). It allows the client to pop () any item off the stack, based on the parameter the client passes to pop ). It allows the client to pop () the most recently push () ed item (the newest item in the stack).

Answers

The property that a stack data structure, when implemented by a programmer as done in the modules as a LIFO data structure, has is that it allows the client to pop () the most recently push () ed item (the newest item in the stack).

A stack data structure is a list of elements arranged in such a way that the addition of new items and the removal of existing ones is only done from one end of the list called the top. It means that the item that was added first will be removed last. This property is called Last-In-First-Out (LIFO).When a client calls the pop () operation, the most recently pushed item in the stack will be removed and returned by the operation.

The client cannot choose to remove any other item except the one that was last pushed on the stack. Therefore, the correct answer is that it allows the client to pop () the most recently push () ed item (the newest item in the stack).

To know more about programmer visit:

https://brainly.com/question/20812449

#SPJ11

Other Questions
Explain which scan process is more intrusive to the target host,SYN or TCP KOI needs a new system to keep track of vaccination status for students. You need to create anapplication to allow Admin to enter Student IDs and then add as many vaccinations records as needed.In this first question, you will need to create a class with the following details.- The program will create a VRecord class to include vID, StudentID and vName as the fields.- This class should have a Constructor to create the VRecord object with 3 parameters- This class should have a method to allow checking if a specific student has had a specific vaccine(using student ID and vaccine Name as paramters) and it should return true or false.- The tester class will create 5-7 different VRecord objects and store them in a list.- The tester class will print these VRecords in a tabular format on the screen The heat capacity, (dU/dT) for a two level-system with an energy splitting k between the upper and lower states is given by(dU/dT) = kB (/T)e^/T / (1+e^/T) Write a complete Fortran main program and a module to evaluate (dU/dT). The main program will read in all the values on the right-hand side of the equation au and prints out the value of (dU/dT). The formula must be evaluated in the module using a suitable subprogram. Use comment lines in the source code to describe your strategy to test the program. Test your program rigorously using suitable data. AlgorithimsApply the master method (I need detailed steps, stating whichcase, values of , etc). [3 marks]T(n)=T(2n/3)+1T(n) =3T(n/4)+ n *lognT(n)= 9T(n/3)+n 2. How does the online free software or app make profit? (3 points) An incomplete fracture or cracking of the bone without actual separation of the parts. Common in children.A) ComminutedB) SpiralC) Greenstick Does every taxpayer have a cestui que trust account? In covalent bonds, atoms give up electrons atoms accept electrons atoms share electrons electrons are always shared equally electrons cannot be shared equally the use of a cause and effect fishbone ishikawa diagram is most appropiate when the nature carbon is an element that is found in all living organisms, so the cycling of carbon through these organisms is essential to sustaining all life. which process is one way that a living organism is involved in the movement of carbon around the earth? Grade distribution is as follows: O Correct Code: 25 points. o Programming style (comments and variable names): 5 points wwx --*9 Write a program that transforms numbers 1, 2, 3, . 12 into the corresponding month names January, February, March, December. In your solution, make a long string "January February March...", in which you add spaces such that each month name has the same length. Then concatenate the characters of the month that you want. Before printing the month use the strip method to remove trailing spaces. Note: Use the material Covered in Chapter 2. Don't use if statements. Here is a sample dialog; the user input is in bold: Please enter an integer number representing a month (between 1 and 12): 7 Your month is July. Find the average value have of the function h on the given interval. h(u)=ln(u)/u,[1,3] "Innovate" company keeps records of its casual employees' names and hours worked in one week in a text file "name_hours.txt. 1. Write function write_to_file(n) that takes a number of employees as a parameter, and in a try-except block opens file "name_hours.txt" for writing. In a loop, for each employee, it will read a name and hours worked from the user (keyboard), and write into the file, separated by a comma and space. The function will raise exceptions if the file could not be open, or if hours cannot be converted to a number. The text file for n=4 will look like this: John, 45 Karen, 36 Ling, 42 2 Write function show_records(filename) that 1. reads records from the file 2 displays names and hours as a table with the title row 3 finds and displays the name and hours of a person who worked the longest hours this week. in the main part ask the user to enter the number of employees and call the functions above. "Innovate" company keeps records of its casual employees' names and hours worked in one week in a text file "name_hours.txt". 1. Write function write_to_file(n) that takes a number of employees as a parameter, and in a try-except block opens file "name_hours.txt" for writing. In a loop, for each employee, it will read a name and hours worked from the user (keyboard), and write into the file, separated by a comma and space. The function will raise exceptions if the file could not be open, or if hours cannot be converted to a number. The text file for n = 4 will look like this: John, 45 Karen, 36 Sam, 48 Ling, 42 2. Write function show_records(filename) that 1. reads records from the file 2. displays names and hours as a table with the title row 3. finds and displays the name and hours of a person who worked the longest hours this week. In the main part ask the user to enter the number of employees and call the functions above. Select all of the following assumptions of the Hardy-Weinburg equilibrium. Natural selection does not operate Migration introduces new alleles Genetic drift does not occur Natural selection contributes to the next generation Migration does not introduce new alleles Mating is random Population size is infinite Mating is not random Population size is finite Construct an AVL tree by inserting the list [7,5, 3, 9,8,4,6,2] successively, starting with the empty tree. Draw the tree step by step and mark the rotations between each step when necessary. a reaction has a theoretical yield of 50.6 g . when the reaction is carried out, 33.1 g of the product is obtained. Needs to be done and make sure its 100% correct plsi post it before and the answer giving didnt relate to the question at allpls make sure its correct as its really importantb) Consider the following ARM Assembly language code snippet: SUB r0,ri, r2 CMP r0, r4 BNE Multi ADD r4, r3, #16 STR r4, [r7] B Exit Multi MUL r8, r9, r10 ADD r8, r8, #4 STR r0, [18] Exit Re-write the code above to improve code density using predicated execution. In your answer booklet comment each line of assembly to highlight your design decisions Execute the following code and show the contents of the registers: LDI R16,$03 LDI R17,$10 HERE: AND R16, R17 BREQ HERE ADD R16,17 Express the number as a ratio of integers:2.730 = 2.730730730... Q32. Which tubes are collected forHematology, Glucose, and Chemistry?Put in the correct order of draw.Select one:O a. Lavender, Grey, SSTO b. Light blue, SST, GreyO c. SST, Lavender, GreyO d. Yellow, SST, GreyO e. SST, Grey, Lavender