Write a functionvector merge(vector a, vector b)that merges two vectors, alternating elements from both vectors. If one vector isshorter than the other, then alternate as long as you can and then append the remaining elements from the longer vector. For example, if a is 1 4 9 16and b is9 7 4 9 11then merge returns the vector1 9 4 7 9 4 16 9 1118. Write a predicate function bool same_elements(vector a, vector b)that checks whether two vectors have the same elements in some order, with the same multiplicities. For example, 1 4 9 16 9 7 4 9 11 and 11 1 4 9 16 9 7 4 9 would be considered identical, but1 4 9 16 9 7 4 9 11 and 11 11 7 9 16 4 1 would not. You will probably need one or more helper functions.19. What is the difference between the size and capacity of a vector

Answers

Answer 1

Answer:

see explaination for code

Explanation:

CODE

#include <iostream>

#include <vector>

using namespace std;

vector<int> merge(vector<int> a, vector<int> b) {

vector<int> result;

int k = 0;

int i = 0, j = 0;

while (i < a.size() && j < b.size()) {

if (k % 2 == 0) {

result.push_back(a[i ++]);

} else {

result.push_back(b[j ++]);

}

k ++;

}

while (i < a.size()) {

result.push_back(a[i ++]);

}

while(j < b.size()) {

result.push_back(b[j ++]);

}

return result;

}

int main() {

vector<int> a{1, 4, 9, 16};

vector<int> b{9, 7, 4, 9, 11};

vector<int> result = merge(a, b);

for (int i=0; i<result.size(); i++) {

cout << result[i] << " ";

}

}


Related Questions

Create a program in Python that prompts the user to enter an integer number within the range of 1 to 10 inclusive. The program should display “correct input” if the input is within the given range else it should display “wrong input”.

Answers

Python Code with Explanation:

# create a function named func to implement the required logic

def func():

# get the input from the user and store it in a variable named number

   number = int(input("Please enter an integer between 1 to 10 inclusive\n"))

# if the input number is equal or greater than 1 and equal to 10 or less then the input is correct    

   if number>=1 and number<=10:

# print correct input

       return print("Correct input")

# else the input is wrong

   else:

# print wrong input

       return print("Wrong input")

# call the function func

func()

Output:

Test 1:

Please enter an integer between 1 to 10 inclusive

4

Correct input

Test 2:

Please enter an integer between 1 to 10 inclusive

0

Wrong input

Test 3:

Please enter an integer between 1 to 10 inclusive

11

Wrong input

Answer:

dont know if it works!

Explanation:

input=(input("enter number")

if input > 1

print("correct input")

if input <10

print("correct input")

else

print("wrong input")

write the steps to insert picture water mark​

Answers

Answer:

Is there a picture of the question?

Explanation:

4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations in their use on local machines, home networks, or small business networks? Where might customer data be stored? Discuss any legal issues in using these tools on home networks in the United States, which has anti-wiretap communications regulations. Who must know about the tools being used in your household?

Answers

Answer:

There are no limitation, policies or regulations that limit these tools for use on privately owned machines or home networks. In most businesses networks, intranets or internets the use of them is illegal if used for malicious intent. Penetration testing teams sign rules of engagement before using these tools.

Explanation:

There are no limitation, limitations, policies, or regulations in their use on local machines, privately owned machines or home networks, or small business networks.

In most businesses networks, intranets or internets the use of them is often and mostly illegal especially in a situation where they are been used for malicious intent.

Penetration testing teams would often or always make sure that they sign rules of engagement before using these tools.

A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be transmitted more securely. All the data is transmitted as four-digit integers. Your app should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the result of adding 7 to the digit and getting the remainder after dividing the new value by 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then display the encrypted integer. Write a separate app that inputs an encrypted four-digit integer and decrypts it (by reversing the encryption scheme) to form the original number. Use the format specifier D4 to display the encrypted value in case the number starts with a 0

Answers

Answer:

The output of the code:

Enter a 4 digit integer : 1 2 3 4

The decrypted number is : 0 1 8 9

The original number is : 1 2 3 4

Explanation:

Okay, the code will be written in Java(programming language) and the file must be saved as "Encryption.java."

Here is the code, you can just copy and paste the code;

import java.util.Scanner;

public class Encryption {

public static String encrypt(String number) {

int arr[] = new int[4];

for(int i=0;i<4;i++) {

char ch = number.charAt(i);

arr[i] = Character.getNumericValue(ch);

}

for(int i=0;i<4;i++) {

int temp = arr[i] ;

temp += 7 ;

temp = temp % 10 ;

arr[i] = temp ;

}

int temp = arr[0];

arr[0] = arr[2];

arr[2]= temp ;

temp = arr[1];

arr[1] =arr[3];

arr[3] = temp ;

int newNumber = 0 ;

for(int i=0;i<4;i++)

newNumber = newNumber * 10 + arr[i];

String output = Integer.toString(newNumber);

if(arr[0]==0)

output = "0"+output;

return output;

}

public static String decrypt(String number) {

int arr[] = new int[4];

for(int i=0;i<4;i++) {

char ch = number.charAt(i);

arr[i] = Character.getNumericValue(ch);

}

int temp = arr[0];

arr[0]=arr[2];

arr[2]=temp;

temp = arr[1];

arr[1]=arr[3];

arr[3]=temp;

for(int i=0;i<4;i++) {

int digit = arr[i];

switch(digit) {

case 0:

arr[i] = 3;

break;

case 1:

arr[i] = 4;

break;

case 2:

arr[i] = 5;

break;

case 3:

arr[i] = 6;

break;

case 4:

arr[i] = 7;

break;

case 5:

arr[i] = 8;

break;

case 6:

arr[i] = 9;

break;

case 7:

arr[i] = 0;

break;

case 8:

arr[i] = 1;

break;

case 9:

arr[i] = 2;

break;

}

}

int newNumber = 0 ;

for(int i=0;i<4;i++)

newNumber = newNumber * 10 + arr[i];

String output = Integer.toString(newNumber);

if(arr[0]==0)

output = "0"+output;

return output;

}

public static void main(String[] args) {

Scanner sc = new Scanner(System.in);

System.out.print("Enter a 4 digit integer:");

String number = sc.nextLine();

String encryptedNumber = encrypt(number);

System.out.println("The decrypted number is:"+encryptedNumber);

System.out.println("The original number is:"+decrypt(encryptedNumber));

}

}

#define DIRECTN 100
#define INDIRECT1 20
#define INDIRECT2 5
#define PTRBLOCKS 200

typedef struct {
filename[MAXFILELEN];
attributesType attributes; // file attributes
uint32 reference_count; // Number of hard links
uint64 size; // size of file
uint64 direct[DIRECTN]; // direct data blocks
uint64 indirect[INDIRECT1]; // single indirect blocks
uint64 indirect2[INDIRECT2]; // double indirect

} InodeType;

Single and double indirect inodes have the following structure:

typedef struct
{
uint64 block_ptr[PTRBLOCKS];
}
IndirectNodeType;

Required:
Assuming a block size of 0x1000 bytes, write pseudocode to return the block number associated with an offset of N bytes into the file.

Answers

Answer:

WOW! that does not look easy!

Explanation:

I wish i could help but i have no idea how to do that lol

You're asked to implement classes to manage personnels at a hospital. Create a class diagram that includes classes (and some variables and methods) that manage employees and patients in a hospital management program. Use interfaces and inheritance to create a hierarchy of all employees including doctors, nurses, and patients. Then, write the code outline of these classes. You don't have to implement any of the methods or a main method. Just add a simple comment or println statement describing what the method would do.

Answers

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to see the step by step explanation to the question above.

Double any element's value that is less than minValue. Ex: If minValue = 10, then dataPoints = {2, 12, 9, 20} becomes {4, 12, 18, 20}.
import java.util.Scanner;
public class StudentScores {
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
final int NUM_Points = 4;
int[] dataPoints = new int[NUM_POINTS];
int minValue;
int i;
minValue = scnr.nextInt();
for (i = 0; i < dataPoints.length; ++i) {
dataPoints[i] = scnr.nextInt();
}
/* Your solution goes here */
for (i = 0; i < dataPoints.length; ++i) {
System.out.print(dataPoints[i] + " ");
}
System.out.println();
}
}

Answers

Answer:

Following are the code to this question:

for(i=0;i<dataPoints.length;++i) //define loop to count array element  

{

if(dataPoints[i]<minValue) // define condition that checks array element is less then minValue

{

dataPoints[i] = dataPoints[i]*2; //double the value

}

}

Explanation:

Description of the code as follows:

In the given code, a for loop is declared, that uses a variable "i", which counts all array element, that is input by the user. Inside the loop and if block statement is used, that check array element value is less then "minValue", if this condition is true.  So, inside the loop, we multiply the value by 2.


(a) What is the difference between a compare validator and a range validator?

(b) When would you choose to use one versus the other?

Answers

Answer:

Check the explanation

Explanation:

a) A compare validator: A compare validator can be described as a particular method that is utilized to control and also enabled to perform different types of validation tasks. It is being used to carry out as well as to execute a correct data type that determines the entered value is proper value into a form field or not. For instance when in an application registration it makes use of the confirm password after the first-password.

(b) Whenever it is compulsory to determine if the value that has been entered is the correct value into the form field then the usage of compare validator will be needed whereas a range validator is used to confirm the entered value is in a specific range.

Explanation:

a) A compare validator: A compare validator can be described as a particular method that is utilized to control and also enabled to perform different types of validation tasks. It is being used to carry out as well as to execute a correct data type that determines the entered value is proper value into a form field or not. For instance when in an application registration it makes use of the confirm password after the first-password.

(b) Whenever it is compulsory to determine if the value that has been entered is the correct value into the form field then the usage of compare validator will be needed whereas a range validator is used to confirm the entered value is in a specific range.

Write Scheme functions to do the following. You are only allowed to use the functions introduced in our lecture notes and the helper functions written by yourself. (a) Return all rotations of a given list. For example, (rotate ’(a b c d e)) should return ((a b c d e) (b c d e a) (c d e a b) (d e a b c) (e a b c d)) (in some order). (b) Return a list containing all elements of a given list that satisfy a given predicate. For example, (filter (lambda (x) (< x 5)) ’(3 9 5 8 2 4 7)) should return (3 2 4).

Answers

Answer:

Check the explanation

Explanation:

solution a:

def Rotate(string) :

n = len(string)

temp = string + string

for i in range(n) :

for j in range(n) :

print(temp[i + j], end = "")

print()

string = ("abcde")

Rotate(string)

solution b:

nums = [3,9,5,8,2,4,7]

res = list(filter(lambda n : n < 5, nums))

print(res)

what should i name my slideshow if its about intellectual property, fair use, and copyright

Answers

Answer:

You should name it honest and sincere intention

Explanation:

That is a good name for what you are going to talk about in your slideshow.

4. Write an interface ObjectWithTwoParameters which has a method specification: double area (double d1, double d2) which returns the area of a particular object. Write three classes RectangleClass, TriangleClass, and CylinderClass which implement the interface you created. Also, write a demo class which creates objects of RectangleClass, TriangleClass, and CylinderClass and call the corresponding methods

Answers

Answer:

The java program for the given scenario is as follows.

import java.util.*;

//interface with method area

interface ObjectWithTwoParameters

{

double area (double d1, double d2);

}

class RectangleClass implements ObjectWithTwoParameters

{

//overriding area()

public double area (double d1, double d2)

{

return d1*d2;

}

}

class TriangleClass implements ObjectWithTwoParameters

{

//overriding area()

public double area (double d1, double d2)

{

return (d1*d2)/2;

}  

}

class CylinderClass implements ObjectWithTwoParameters

{

public double area (double d1, double d2)

{

return ( 2*3.14*d1*d1 + d2*(2*3.14*d1) );

}

}

public class Test

{

public static void main(String[] args)

{

//area displayed for all three shapes

ObjectWithTwoParameters r = new RectangleClass();

double arear = r.area(2, 3);

System.out.println("Area of rectangle: "+arear);

ObjectWithTwoParameters t = new TriangleClass();

double areat = t.area(4,5);

System.out.println("Area of triangle: "+areat);

ObjectWithTwoParameters c = new CylinderClass();

double areac = c.area(6,7);

System.out.println("Area of cylinder: "+areac);

}

}

OUTPUT

Area of rectangle: 6.0

Area of triangle: 10.0

Area of cylinder: 489.84

Explanation:

1. The program fulfils all the mentioned requirements.

2. The program contains one interface, ObjectWithTwoParameters, three classes which implement that interface, RectangleClass, TriangleClass and CylinderClass, and one demo class, Test, containing the main method.

3. The method in the interface has no access specifier.

4. The overridden methods in the three classes have public access specifier.

5. No additional variables have been declared.

6. The test class having the main() method is declared public.

7. The area of the rectangle, triangle and the cylinder have been computed as per the respective formulae.

8. The interface is similar to a class which can have only declarations of both, variables and methods. No method can be defined inside an interface.

9. The other classes use the methods of the interface by implementing the interface using the keyword, implements.

10. The object is created using the name of the interface as shown.

ObjectWithTwoParameters r = new RectangleClass();

"Write pseudocode that outputs the contents of parallel arrays. You do NOT have to write the entire program. The first array will hold phone numbers The second array will hold company names You do NOT need to load the arrays. Your code can assume they are already loaded with data. The arrays are named phone[ ] and company[ ] Output the phone number and associated company name for every entry in the array."

Answers

Answer:

Check the explanation

Explanation:

PSEUDO CODE:

for(int i=0,j=0;i<phone.length,j<company.length;i++,j++)

{

print(phone[i]," - ",company[j]);

}

this for loop will print each phone number associated with the company names.

Trace the complete execution of the MergeSort algorithm when called on the array of integers, numbers, below. Show the resulting sub-arrays formed after each call to merge by enclosing them in { }. For example, if you originally had an array of 5 elements, a = {5,2,8,3,7}, the first call to merge would result with: {2, 5} 8, 3, 7 ← Note after the first call to merge, two arrays of size 1 have been merged into the sorted subarray {2,5} and the values 2 and 5 are sorted in array a You are to do this trace for the array, numbers, below. Be sure to show the resulting sub-arrays after each call to MergeSort. int[] numbers = {23, 14, 3, 56, 17, 8, 42, 18, 5};

Answers

Answer:

public class Main {

public static void merge(int[] arr, int l, int m, int r) {

int n1 = m - l + 1;

int n2 = r - m;

int[] L = new int[n1];

int[] R = new int[n2];

for (int i = 0; i < n1; ++i)

L[i] = arr[l + i];

for (int j = 0; j < n2; ++j)

R[j] = arr[m + 1 + j];

int i = 0, j = 0;

int k = l;

while (i < n1 && j < n2) {

if (L[i] <= R[j]) {

arr[k] = L[i];

i++;

} else {

arr[k] = R[j];

j++;

}

k++;

}

while (i < n1) {

arr[k] = L[i];

i++;

k++;

}

while (j < n2) {

arr[k] = R[j];

j++;

k++;

}

printArray(arr, l, r);

}

public static void sort(int[] arr, int l, int r) {

if (l < r) {

int m = (l + r) / 2;

sort(arr, l, m);

sort(arr, m + 1, r);

merge(arr, l, m, r);

}

}

static void printArray(int[] arr, int l, int r) {

System.out.print("{");

for (int i = l; i <= r; ++i)

System.out.print(arr[i] + " ");

System.out.println("}");

}

public static void main(String[] args) {

int[] arr = {23, 14, 3, 56, 17, 8, 42, 18, 5};

sort(arr, 0, arr.length - 1);

}

}

Explanation:

See answer

For dinner, a restaurant allows you to choose either Menu Option A: five appetizers and three main dishes or Menu Option B: three appetizers and four main dishes. There are six kinds of appetizer on the menu and five kinds of main dish.

How many ways are there to select your menu, if...

a. You may not select the same kind of appetizer or main dish more than once.
b. You may select the same kind of appetizer and/or main dish more than once.
c. You may select the same kind of appetizer or main dish more than once, but not for all your choices, For example in Menu Option A, it would be OK to select four portions of 'oysters' and one portion of 'pot stickers', but not to select all five portions of 'oysters'.)

In each case show which formula or method you used to derive the result.

Answers

Answer:

The formula used in this question is called the probability of combinations or combination formula.

Explanation:

Solution

Given that:

Formula applied is stated as follows:

nCr = no of ways to choose r objects from n objects

  = n!/(r!*(n-r)!)

The Data given :

Menu A : 5 appetizers and 3 main dishes

Menu B : 3 appetizers and 4 main dishes

Total appetizers - 6

Total main dishes - 5

Now,

Part A :

Total ways = No of ways to select menu A + no of ways to select menu B

          = (no of ways to select appetizers in A)*(no of ways to select main dish in A) + (no of ways to select appetizers in B)*(no of ways to select main dish in B)

          = 6C5*5C3 + 6C3*5C4

          = 6*10 + 20*5

          = 160

Part B :

Since, we can select the same number of appetizers/main dish again so the number of ways to select appetizers/main dishes will be = (total appetizers/main dishes)^(no of appetizers/main dishes to be selected)

Total ways = No of ways to select menu A + no of ways to select menu B  

          = (no of ways to select appetizers in A)*(no of ways to select main dish in A) + (no of ways to select appetizers in B)*(no of ways to select main dish in B)

          = (6^5)*(5^3) + (6^3)*(5^4)

          = 7776*125 + 216*625

          = 1107000

Part C :

No of ways to select same appetizers and main dish for all the options

= No of ways to select menu A + no of ways to select menu B  

= (no of ways to select appetizers in A)*(no of ways to select main dish in A) + (no of ways to select appetizers in B)*(no of ways to select main dish in B)

=(6*5) + (6*5)

= 60

Total ways = Part B - (same appetizers and main dish selected)      

= 1107000 - 60

= 1106940

Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bits memory address references given as word addresses. 0x03, 0xb4, 0x2b, 0x02, 0xbf, 0x58, 0xbe, 0x0e, 0xb5, 0x2c, 0xba, 0xfd For each of these references identify the binary word address, the tag, and the index given a direct mapped cache with 16 one-word blocks. Also list whether each reference is a hit or a miss, assuming the cache is initially empty.

Answers

Answer:

See explaination

Explanation:

please kindly see attachment for the step by step solution of the given problem.

The relationship between the temperature of a fluid (t, in seconds), temperature (T, in degrees Celsius), is dependent upon the initial temperature of the liquid (T0, in degrees Celsius), the ambient temperature of the surroundings (TA, in degrees Celsius) and the cooling constant (k, in hertz); the relationship is given by: ???? ???? ???????? ???? ???????????? ???? ???????????? ???????????????? Ask the user the following questions:  From a menu, choose fluid ABC, FGH, or MNO.  Enter the initial fluid temperature, in units of degrees Celsius.  Enter the time, in units of minutes.  Enter the ambient air temperature, in units of degrees Celsius. Enter the following data into the program. The vector contains the cooling constant (k, units of hertz) corresponding to the menu entries. K Values = [0.01, 0.03, 0.02] Create a formatted output statement for the user in the Command Window similar to the following. The decimal places must match. ABC has temp 83.2 degrees Celsius after 3 minutes. In

Answers

Answer:

See explaination

Explanation:

clc;

clear all;

close all;

x=input(' choose abc or fgh or mno:','s');

to=input('enter intial fluid temperature in celcius:');

t1=input('enter time in minutes:');

ta=input('enter ambient temperature in celcius:');

abc=1;

fgh=2;

mno=3;

if x==1

k=0.01;

elseif x==2

k=0.03;

else

k=0.02;

end

t=ta+((to-ta)*exp((-k)*t1));

X = sprintf('%s has temp %f degrees celcius after %d minutes.',x,t,t1);

disp(X);

Explain the following as used in Tally Accounting Software:
Journal entry
Accounting period
Chart of accounts
Posting
Business transactions​

Answers

business transactions

customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practicing presentation skills. As a salesperson what size hard disc would you recommend and why?

Answers

Explanation:

The most reliable hard drives are those whose most common size is 3.5 inches, their advantages are their storage capacity and their speed and a disadvantage is that they usually make more noise.

For greater speed, it is ideal to opt for two smaller hard disks, since large disks are slower, but are partitioned so that there are no problems with file loss.

For a person who needs to use content creation programs, it is ideal to opt for a hard drive that has reliability.

​User documentation _____. Group of answer choices ​allows users to prepare overall documentation, such as process descriptions and report layouts, early in the software development life cycle (SDLC) ​describes a system’s functions and how they are implemented ​contains all the information needed for users to process and distribute online and printed output ​consists of instructions and information to users who will interact with the system

Answers

Answer:

And user documentation consists of instructions and information to users who will interact with the system

Explanation:

user documentation will not allow user to prepare overall documentation because it is already prepared so not A.

user documentation does not need implementation, So not B.

user documentation may not be a printed one . So not C

And user documentation consists of instructions and information to users who will interact with the system, so D is the right option

Suppose that a program's data and executable code require 1,024 bytes of memory. A new section of code must be added; it will be used with various values 70 times during the execution of a program. When implemented as a macro, the macro code requires 73 bytes of memory. When implemented as a procedure, the procedure code requires 132 bytes (including parameter-passing, etc.), and each procedure call requires 7 bytes. How many bytes of memory will the entire program require if the new code is added as a procedure? 1,646

Answers

Answer:

The answer is 1646

Explanation:

The original code requires 1024 bytes and is called 70 times ,it requires 7 byte and its size is 132 bytes

1024 + (70*7) + 132 = 1024 + 490 +132

= 1646

Evaluati urmatoarele expresii


5+2*(x+4)/3, unde x are valoare 18


7/ 2*2+4*(5+7*3)>18


2<=x AND x<=7 , unde x are valoare 23


50 %10*5=


31250/ 5/5*2=

Answers

Answer:

A) 22 ⅓

B) 111>18

C) There is an error in the expression

D) 25

E) 62500

Question:

Evaluate the following expressions

A) 5 + 2 * (x + 4) / 3, where x has a value of 18

B) 7/2 * 2 + 4 * (5 + 7 * 3) & gt; 18

C) 2 <= x AND x<= 7, where x has value 23

D) 50% 10 * 5 =

F) 31250/5/5 * 2 =

Explanation:

A) 5 + 2 * (x + 4) / 3

x = 18

First we would insert the value of x

5 + 2 * (x + 4) / 3

5 + 2(18 + 8) / 3

Then we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.

= 5 + 2(26) / 3

= 5 + 52/3

= 5 + 17 ⅓

= 22 ⅓

B) 7/2 * 2 + 4 * (5 + 7 * 3) > 18

we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.

7/2 * 2 + 4 * (5 + 7 * 3) >18

= 7/2 × 2 + 4× (5 + 7 × 3)>18

= (7×2)/2 + 4× (5+21) >18

= 14/2 + 4(26) >18

= 7 + 104 >18

= 111>18

C) 2 <= x AND x<= 7, where x has value 23

There is an error in the expression

D) 50% of 10 * 5

we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.

The 'of' expression means multiplication

= 50% × 10×5

= 50% × 50

50% = 50/100

=50/100 × 50

= 1/2 × 50

= 25

F) 31250/5/5 * 2

The expression has no demarcation. Depending on how it is broken up, we would arrive at different answers. Let's consider:

31250/(5/5 × 2)

Apply BODMAS

= 31250/[5/(5 × 2)]

= 31250/(5/10)

= 31250/(1/2)

Multiply by the inverse of 1/2 = 2/1

= 31250 × (2/1)

= 62500

Use a vector to solve the following problem. Read in 20 numbers, each of which is between 10 and 100, inclusive. As each number is read, validate it and store it in the vector only if it isn't a duplicate of a number already read. After reading all the values, display only the unique values that the user entered. Begin with an empty vector and use its push_back function to add each unique value to the vector.

Answers

Answer:

The following are the program in the C++ Programming Language.

//header files

#include <iostream>

#include <vector>

//using namespace

using namespace std;

//define a function

int find(vector<int> &vec, int n)  

{

   //set the for loop

   for(int i = 0; i < vec.size(); ++i)  

   {

       //check the elements of v is in the num

       if(vec[i] == n)  

       {

           //then, return the values of i

          return i;

       }

   }

  return -1;

}

//define the main method

int main()  

{

   //declare a integer vector type variable

   vector<int> vec;

   //print message

   cout << "Enter numbers: ";

   //declare integer type variable

   int n;

   //set the for loop

   for(int i = 0; i < 20; ++i)  

   {

       //get input in the 'num' from the user

       cin >> n;

       //check the following conditions

       if(n >= 10 && n <= 100 && find(vec, n) == -1)  

       {

           //then, assign the values of 'num' in the vector

          vec.push_back(n);

       }

   }

   //print the message

   cout << "User entered: ";

   //set the for loop

   for(int i = 0; i < vec.size(); ++i)  

   {

       //print the output

       cout << vec[i] << " ";

  }

  cout << "\n";

  return 0;  

}

Output:

Enter numbers: 14 18 96 75 23 65 47 12 58 74 76 92 34 32 65 48 46 28 75 56

User entered: 14 18 96 75 23 65 47 12 58 74 76 92 34 32 48 46 28 56

Explanation:

The following are the description of the program:

Firstly, set the required header files and required namespace.Define an integer data type function 'find()' and pass two arguments that is integer vector type argument 'vec' and integer data type argument 'n'.Then, set the for loop that iterates according to the size of the vector variable 'vec' inside the function, after that set the if conditional statement to check the following condition and return the variable 'i'.Define the main method that gets the input from the user then, check that the following inputs are greater than 10 and smaller than 100 then assign these variables in the vector type variable 'vec' and print all the elements.

A cloud provider is deploying a new SaaS product comprised of a cloud service. As part of the deployment, the cloud provider wants to publish a service level agreement (SLA) that provides an availability rating based on its estimated availability over the next 12 months. First, the cloud provider estimates that, based on historical data of the cloud environment, there is a 25% chance that the physical server hosting the cloud service will crash and that such a crash would take 2 days before the cloud service could be restored. It is further estimated that, over the course of a 12 month period, there will be various attacks on the cloud service, resulting in a total of 24 hours of downtime. Based on these estimates, what is the availability rating of the cloud service that should be published in the SLA?

Answers

Answer:

99.6

Explanation:

The cloud provider  provides the certain modules of the cloud service like infrastructure as a service , software as a service ,etc to other companies .The cloud provider implements a new SaaS service that includes a cloud platform also the cloud provider intends to disclose the Service Level Agreement that is score based on its approximate accessibility during the next 12 months.

The Cloud providers predict that, depending on past cloud system data, it is a 25 % risk that a physical server holding the cloud platform will fail therefore such a failure will require 2 days to recover the cloud service so 99.6 is the Cloud storage accessibility ranking, to be released in the SLA.

Suppose you are given a text file. Design a Python3 program to encrypt/decrypt that text file as follows:
If the character is an upper case character then shift that character forward, s characters forward in the alphabet.
If the character is a lower case character then shift that character backwards, s characters backwards in the alphabet.
If the character is a numeric character then shift that character also backwards, s characters backwards in the 1-digit numbers set {0,1,2,3,4,5,6,7,8,9}.
You must design two functions; one to encrypt. The other one is to decrypt. All white space and punctuation marks must be ignored(cannot be changed). If you reach Z, or A, the shifting may continue as a cycle(A comes after Z, Z comes before A). Both files (original text file and the encrypted text file) must be stored in the working directory of Python.
An example;
Let s=1 and the text file:
11300Hello World
Then encoded text file;
002991dkkn Xnqke

Answers

Answer:

Explanation:

Please find attachment for the Python program

A user has called the company help desk to inform them that their Wi-Fi enabled mobile device has been stolen. A support ticket has been escalated to the appropriate team based on the corporate security policy. The security administrator has decided to pursue a device wipe based on corporate security policy. However, they are unable to wipe the device using the installed MDM solution. What is one reason that may cause this to happen?

Answers

Answer:

The software can't locate the device

Explanation:

The device wasn't properly setup in order for the software to locate it.

Create a Binary Expressions Tree Class and create a menu driven programyour program should be able to read multiple expressions from a file and create expression trees for each expression, one at a timethe expression in the file must be in "math" notation, for example x+y*a/b.display the preorder traversal of a binary tree as a sequence of strings each separated by a tabdisplay the postorder traversal of a binary tree in the same form as aboveWrite a function to display the inorder traversal of a binary tree and place a (before each subtree and a )after each subtree. Don’t display anything for an empty subtree. For example, the expression tree should would be represented as ( (x) + ( ( (y)*(a) )/(b) ) )

Answers

Answer:

Explanation:

Program:

#include<iostream>

#include <bits/stdc++.h>

using namespace std;

//check for operator

bool isOperator(char c)

{

switch(c)

{

case '+': case '-': case '/': case '*': case '^':

return true;

}

return false;

}

//Converter class

class Converter

{

private:

string str;

public:

//constructor

Converter(string s):str(s){}

//convert from infix to postfix expression

string toPostFix(string str)

{

stack <char> as;

int i, pre1, pre2;

string result="";

as.push('(');

str = str + ")";

for (i = 0; i < str.size(); i++)

{

char ch = str[i];

if(ch==' ') continue;

if (ch == '(')

as.push(ch);

else if (ch == ')')

{

while (as.size() != 0 && as.top() != '('){

result = result + as.top() + " ";

as.pop();

}

as.pop();

}

else if(isOperator(ch))

{

while (as.size() != 0 && as.top() != '(')

{

pre1 = precedence(ch);

pre2 = precedence(as.top());

if (pre2 >= pre1){

result = result + as.top() + " ";

as.pop();

}

else break;

}

as.push(ch);

}

else

{

result = result + ch;

}

}

while(as.size() != 0 && as.top() != '(') {

result += as.top() + " ";

as.pop();

}

return result;

}

//return the precedence of an operator

int precedence(char ch)

{

int choice = 0;

switch (ch) {

case '+':

choice = 0;

break;

case '-':

choice = 0;

break;

case '*':

choice = 1;

break;

case '/':

choice = 1;

break;

case '^':

choice = 2;

default:

choice = -999;

}

return choice;

}

};

//Node class

class Node

{

public:

string element;

Node *leftChild;

Node *rightChild;

//constructors

Node (string s):element(s),leftChild(nullptr),rightChild(nullptr) {}

Node (string s, Node* l, Node* r):element(s),leftChild(l),rightChild(r) {}

};

//ExpressionTree class

class ExpressionTree

{

public:

//expression tree construction

Node* covert(string postfix)

{

stack <Node*> stk;

Node *t = nullptr;

for(int i=0; i<postfix.size(); i++)

{

if(postfix[i]==' ') continue;

string s(1, postfix[i]);

t = new Node(s);

if(!isOperator(postfix[i]))

{

stk.push(t);

}

else

{

Node *r = nullptr, *l = nullptr;

if(!stk.empty()){

r = stk.top();

stk.pop();

}

if(!stk.empty()){

l = stk.top();

stk.pop();

}

t->leftChild = l;

t->rightChild = r;

stk.push(t);

}

}

return stk.top();

}

//inorder traversal

void infix(Node *root)

{

if(root!=nullptr)

{

cout<< "(";

infix(root->leftChild);

cout<<root->element;

infix(root->rightChild);

cout<<")";

}

}

//postorder traversal

void postfix(Node *root)

{

if(root!=nullptr)

{

postfix(root->leftChild);

postfix(root->rightChild);

cout << root->element << " ";

}

}

//preorder traversal

void prefix(Node *root)

{

if(root!=nullptr)

{

cout<< root->element << " ";

prefix(root->leftChild);

prefix(root->rightChild);

}

}

};

//main method

int main()

{

string infix;

cout<<"Enter the expression: ";

cin >> infix;

Converter conv(infix);

string postfix = conv.toPostFix(infix);

cout<<"Postfix Expression: " << postfix<<endl;

if(postfix == "")

{

cout<<"Invalid expression";

return 1;

}

ExpressionTree etree;

Node *root = etree.covert(postfix);

cout<<"Infix: ";

etree.infix(root);

cout<<endl;

cout<<"Prefix: ";

etree.prefix(root);

cout<<endl;

cout<< "Postfix: ";

etree.postfix(root);

cout<<endl;

return 0;

}

Perform a Google search, using the Google hacking keywords to locate a page that has the word passwd (note the spelling) on the page but has the phrase "Index of" in the title. First, what was your search term. Second, what is the first URL in your list of results. Third, what exactly would you use this search to find?

Answers

Answer:

Following are the step to this question:

i) search "intitle passwd" in google search engine.

ii) Open first link of the page.

iii) use commands to access data.  

Explanation:

Google Hacking operates as follows of web engines like google and yahoo to find web pages and sensitive information, that are insecure. It builds on the idea that web pages index a large number of public pages and files and make their discovery easy to create the correct query.

In which, we search the above-given keyword, that will provide many links. In these links we select the first one and open it, it will provide an index, and search in this we use the search command in the database.

An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel iframe that directs all website visitors to a webpage of his choosing that then installs malware on the visitors' computers. The attacker did this explicitly because he knows that US policymakers frequent the website. This would be an example of a ___________ attack.

Answers

Answer:

Water holing is the correct answer to this question.

Explanation:

Waterholing:-

It is a kind of attack in which the attacker detects the sites that the targets of the group frequently access and then afflicts the sites with the ransomware. Which afflicts selected representatives of the target group.

The watering hole assault is a data breach wherein the individual attempts to infiltrate a particular demographic of end-users by harming sites reported to be visited by team members. The aim is to compromise a specific target data and gain network access at the perpetrator's place of work.

Write a program named RectangleArea to calculate the area of a rectangle with a length of 15.8 and a width of 7.9. The program should have two classes, one is the RectangleArea holding the Main(), and the other one is Rectangle. The Rectangle class has three members: a property of length, a property of width, and a method with a name of CalArea() to calculate the area. You can invoke the auto-provided constructor or write a self-defined constructor to initialize the rectangle. Calculate and display the area of the rectangle by first initialize an object named myRectangle and then calculate its area using the CalArea() method.

Answers

Answer:

public class RectangleArea {

   public static void main(String[] args) {

       Rectangle myRectangle = new Rectangle(15.8, 7.9);

       double calArea = myRectangle.calcArea(15.8, 7.9);

       System.out.println("The area is "+ calArea);

   }

}

class Rectangle{

   private double length;

   private double width;

   //Defined Constructor

   public Rectangle(double length, double width) {

       this.length = length;

       this.width = width;

   }

   public double calcArea(double len, double wi){

       return len* wi;

   }

}

Explanation:

This is solved with Java programming languageStart by creating both classes RectangleArea and and RectangleSInce both classes are in the same file, only one can be publicClass Rectangle contains the three members are decribed by the questionprivate double length, private double width and the method calcArea(). It also has a sefl-declared constructor.In the class RectangleArea, an object of Rectangle is created and initialized.The method calcArea is called using the created object and the value is printed.

D-H public key exchange Please calculate the key for both Alice and Bob.
Alice Public area Bob
Alice and Bob publicly agree to make
N = 50, P = 41
Alice chooses her Bob
picks his
Private # A = 19 private #
B= ?
------------------------------------------------------------------------------------------------------------------------------------------
I am on Alice site, I choose my private # A = 19.
You are on Bob site, you pick up the private B, B and N should have no common factor, except 1.
(Suggest to choose B as a prime #) Please calculate all the steps, and find the key made by Alice and Bob.
The ppt file of D-H cryptography is uploaded. You can follow the steps listed in the ppt file.
Show all steps.

Answers

Answer:

See explaination

Explanation:

Please kindly check attachment for the step by step solution of the given problem.

Other Questions
A group of similar cells that perform the same function is called a (an)a. organ.b. organ system.c. tissue. d. tendon. Using the graphing function on your calculator, find the solution to the systemof equations shown below.2y - 4x = 6y-2x = 7A. No solutionB. More than 1 solutionC. x = 4, y = -2D. x= -1, y = 1 Jasmine wrote that 4+2.6=3. Use the drop-down menus to explain why 3 is incorrect. Q8.(10 points) a)When you cough,the radius of your trachea (windpipe) decreases,affecting the speed of the air in the trachea. If 0 r is the normal radius of the trachea, the relationship between the speed S of the air and the radius r of the trachea during a cough is given by a function of the form 2 0 S r ar r r ( ) ( ) = , where a is positive constant. Find the radius r for which the speed of the air is greatest Math question down below A 25ft ladder is propped against a storeroom. The angle the ladder forms is 50. How far up the storeroom does the ladder reach? Translate to English Brandon emmne son chiot sur son lit. Le chiot s'endort rapidement. Brandon s'endort rapidement aussi. Les deux dorment et ils sont contents. 5 heures du matin, le chiot fait du bruit et Brandon se rveille.Brandon regarde son chiot. Son chiot fait du bruit mais il ne se rveille pas.Le chiot fait du bruit et il dort. Brandon regarde son chiot et il est trs content. Il continue le regarder pendant 10 minutes et puis il s'endortencore une fois. 7 heures du matin, le chiot fait du bruit encore une fois.Le chiot se rveille et Brandon se rveille aussi. Brandon regarde son chiotet il voit que le lit est mouill! Quel problme! Brandon saute du lit et ildit, horrifi: - Oh l l! Le chiot a fait pipi au lit. >> Which ordered pair in the form (x,y) is a solution of this equation?7x-5y=28A) (-3,-2) B) (-2,-3) C) (0,4)D) (4,0) 30.Oriole, Inc. leased equipment from Tower Company under a 4-year lease requiring equal annual payments of $254,152, with the first payment due at lease inception. The lease does not transfer ownership, nor is there a bargain purchase option. The equipment has a 4 year useful life and no salvage value. Oriole, Inc.s incremental borrowing rate is 11% and the rate implicit in the lease (which is known by Oriole, Inc.) is 9%. Assuming that this lease is properly classified as a finance lease, what is the amount of Lease Liability reduction recorded in first year after the lease inception? In the past, scientists were not interested in ancient weather records. Many of the records were thought to beincorrect. Some were impossible to understand. But lately, some scientists are changing their minds. They arenow looking more closely at the records. They are looking for significant changes in weather patterns. Scientistscall these records "weather diaries." These diaries have been kept for many years all around the world.Now, the diaries are___A.usefulB.largeC.emptyD.scarce why was the enlightenment a secular movement Write 7/20 as a percent.By what factor should you multiply the denominator and numerator? The commander of the United Nations forces in Korea wasa.Thomas Dewey.b.Dwight D. Eisenhower.c.Strom Thurmond.d.Douglas MacArthur. Fill in the right form of the verbs. 1. I _____never______(see) an elephant. 2. My cousin _______(live) in the USA. 3. We will go for a walk when we ________(finish) our lessons. 4. When I came to my friends place he _______(work) in the garden. 5. Listen. Somebody ______(play) the piano so beautifully. 6. My parents ______(buy) me a new bike next month. 7. We _____(have) a wonderful time in the mountains last summer. 8. If we go to the village, I _____(go) fishing. 9. Diana ________(wash) the fruits before she made the salad. va rog rapid!!!! DAU 15 PUNCTE, POATE SI COROANA Que es el Golfo percico? What do you see as the biggest benefits to using social media? How does it enhance your life? The suffixes -ed, -ee, -ing, and -ment can be added to the end of the word commit.For which of the following do you not need to double the final consonant before adding the suffix?commit + -ingcommit + -eecommit + -mentcommit + -ed Question In the LINK!!!!!!!!!!!!!!!!!!!! Question 24......................................................... During WWII over 50 million people would die and 1/2 of those people were