A classic puzzle is called the Tower of Hanoi. To solve the puzzle, you must move all of the rings from the peg on the left to the peg on the right. Sound easy? The trick is that all of the pieces are different sizes, and you aren’t allowed to put a larger piece on top of a smaller piece. Just like with the Traveling Salesman Problem that you were introduced to in this unit, the Tower of Hanoi is the kind of problem that a computer is good at solving. An algorithm really helps! But the Tower of Hanoi is still fun to work out on your own.

For this lab, you will use a virtual Tower of Hanoi to solve the puzzle.

Step 1
Solve the puzzle at least three times. Start with only three discs. You must also solve the 4-disc puzzle, and then challenge yourself with any number of discs greater than 4. (Change the number of discs by clicking the arrows in the top left corner of the game.)

Screenshot each of your solutions, showing the completed puzzle and the number of moves it took you to reach that point. It is okay if your number of moves are above the minimum number of moves listed.

Step 2
After you have solved the Tower of Hanoi at least three times, write an algorithm with clear, numbered steps that would guide another player through the steps of solving the puzzle.

Here is a clue to get you started: The first step should be: move the smallest ring to the middle peg.

Step 3
After you write the algorithm, write a few sentences reflecting on your experience: What was tricky about writing the algorithm? Did you find that having a written algorithm made it easier to solve the puzzle? Why or why not?

Step 4
Do some online research and discover another famous algorithm or coding puzzle to share. Write a brief summary of the puzzle, as well as what you find interesting about it. Include the link to the source where you found the puzzle.

Submit your screenshots, algorithm, reflections, and research as one document.

Answers

Answer 1

Answer:

We cant help with this

Explanation:

you need to use the game it talks about

Answer 2
Eat ur vegetables ahhhhhhhhhhhhhhh

Related Questions

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

When should a developer begin thinking about scalability?

during the design phase

when traffic increases by 25 percent

when the system is available to users

during testing

Answers

Answer:

read description:

Explanation:

You should think about scalability before the first line of code is written. You should think about scalability before the first line of code is written. This doesn't mean that you build out some massive infrastructure on the off chance your game might be a hit.

A developer should begin thinking about scalability during the design phase. The correct option is fourth one.

What is scalability?

This means one can afford to spend money on optimizing for scalability .One can't go from zero users to ten million overnight. If one keep an eye on the system's performance, one will have plenty of time to optimize when the time comes.

It needs to keep scalability in mind while writing the code. So, scalability before the first line of code is written.

Thus,  a developer should begin thinking about scalability during the design phase.

Learn more about scalability.

https://brainly.com/question/13260501

#SPJ2

why does my Chromebook keep on turning my new tabs into clever tabs?

why does my Chromebook keep on turning my new tabs into clever tabs?

Answers

Answer:

Ok, so it's not letting me submit a text response, so I'll attach an image of my answer.

Explanation:

why does my Chromebook keep on turning my new tabs into clever tabs?
Most likely this is because your School Administration has it set to automatically open certain tabs upon start up

What do the stapedius and gluteus maximus have in common?
this is a science question

Answers

Answer:

What do the stapedius and gluteus maximus have in common? They move the hips and thighs. They are attached to bones. They are the largest muscles.

Explanation:

Answer:

Explanation:

......lo siento, no sé esto

What do the Brainly points do? sorry im new here and i dont know how to internet rn .-.

also you get points for this i guess :)

Answers

Answer:

Hii, Welcome to brainly!

Explanation:

Basically, if you have points, you can ask your own questions. If you answer people's questions, you get points. You can also get leveled up by points. (or ranks) For example, Beginner is starts from 0 points and 0 brianliest. Then there's Helping Hand. You can get helping hand by having 100 points. Then there's Ambitious which starts off with 250 points. You can get Brainliest when you answer someone's question and they think you answered with the best answer. You also get points when you get Brainliest. One way to earn many points is by doing any challenges.  The first challenge is to answer 5 questions in 48 hours/2 days and you get 50 points. There's a lot to learn about brainly i didn't cover all of it but i hope this helps!

When you get points you can ask questions that aren’t already on the site and someone will answe them , you get points by answering other people questions

What is another name for 1000 bytes?
1. terabyte
2. gigabyte
3. kilobyte
4. megabyte

Answers

Another name for 1000 bytes is 1 kilobyte

Answer:

Another name for 1000 bytes is 1 kilobyte.

Option 3

Explanation:

Which of the following lines of code creates a division called answer?

A.


B.


C.


D.

Answers

Answer: ‎

Explanation:

i believe the answer is C

NO LINKS!! HELP!! ESSAY DUE TODAY!!!

NO LINKS!! HELP!! ESSAY DUE TODAY!!!

Answers

Answer:

To the "Am not 13"

Explanation:

Amy Bernstein wrote a story, which is titled "I'm Not Thirteen Yet." The story is told from the perspective of one of the characters, making it a personal narrative.  The story's author describes his personal experiences throughout the narrative. 'I had entered the world of teenagers, and I wasn't even one of them yet,' says the author, demonstrating that he is writing about his own experiences.

um ....................

ok 2 things please 1. i need one more question to add if u can come up with anything or what not and 2. please answer the following questions in the picture i need as many answer a s posable por favor nod nod thank youu

ok 2 things please 1. i need one more question to add if u can come up with anything or what not and

Answers

Answer:

5 siblings, 1 trip per month, 14 age, 12 hours of sleep,  2 hours games, 5 pairs of shoes owned

Explanation: i don't know if this is what u meant, but i hope this helps....

Siblings: 5 trips too the movies:0 age: 17 weight:217 time playing games:none how many pairs of shoes: 6

Match List

Match each term to its definition.

Put responses in the correct input to answer the question.

Correct answers:
1
a value that can be passed to a function
2
a group of instructions that can be used to organize a program or perform a repeated task
3
a value that can be passed from a function back to the calling part of a program

Match ListMatch each term to its definition.Put responses in the correct input to answer the question.Correct

Answers

Return Value - A value … part of a program
Parameter - A value … function
Function - A group

Answer:

parameter: a value that can be passed to a function

function: a group of instructions that can be used to organize a program or perform a repeated task

return value: a value that can be passed from a function back to the calling part of a program

Explanation:

Experts believe robots and AI will continue taking over many of the human jobs we know today. What changes should be made to K-12 education to ensure students are prepared for the future? What courses or skills should be added? WHat should be removed? Why?

Answers

Answer:

I think they should show one subject per month so students are more prepared

Answer: some changes that should be made are  dresscode , some courses should be more sports . Nothing should be removed because the kids in the future need to learn more .

Explanation:

ill give Brainliest!!!!! I REALLYYY NEED HELP
i have to do journals for computers, and its a free topic....... make a topic and give me a four sentence journal PLSSSS this question Worth 28 points too

Answers

Answer:

 Topic: Alexander the great

        Alexander was born in July 356 B.C. to Philip II and his wife, Queen Olympias.He was tutored by a philosopher named ‘Aristotle’,he taught Alexander about medicine, philosophy, morals, religion, logic, and art.His full name is ‘Alexander ||| of Macedon’.He died on June 323 B.C and people still don't know how he was killed.A lot of people say that he was killed by poison but nobody really has proof.But despite him being killed he was famous for being the King of Macedonia and conqueror of the Persian Empire. He was a great military leader in fact he is one of the BEST known

Topic: butterflies
I think butterflies are one of the most underrated bugs. Butterflies are some of the most beautiful bugs, their pretty patterns distinguish them. They have some pretty top notch comoflage and defense mechanisms too. They migrate which makes them pretty wonderful too. I think we should work harder to protect them, when cars are driving down the road during migration season, thousands of innocent butterflies get killed.

An example of how a merge code would appear in a letter would be _____.

Answers

Answer:

Space blank

Explanation:

It means the question needs you to answer the question

Answer:

An example of how a merge code would appear in a letter would be C i.e. /University_Name/. Explanation: Merge codes help speed up the method of making letters by inserting data into your letters.

Explanation:

I hope this helps

A friend of a friend needs a place to stay. He’s offered you $200 to camp out in your living room.
WHAT DO YOU WANT TO DO?

(A.)SAY YES

(B.)SAY NO

Answers

Answer:

A.

i wouldn't say no to that Who would?

Explanation:

The real question is, is how long does he want to stay?

Jackie is planning a birthday party for her little brother and is researching different trampoline parks. She receives a pop-up asking for her name, address, and date of birth so she can receive a special promotion from the trampoline park. What should Jackie do?

a
Ignore the request and not enter any personal information.

b
Provide only her name and date of birth.

c
Provide only her name and address.

d
Provide the requested information to receive the discount.

Answers

Answer:

a

Explanation:

sis is gonna get scammed

Answer:

a

Explanation:

You dont know who is getting your information and it is not someone you know. STRANGER DANGER!

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

Which of these represents information that is fact-based, measurable, and observable?

objective information
predictive information
subjective information
interpretive information

Answers

Answer: objective information

Objective information should be answer

QUICK 50 POINTS WILL GIVE BRAINLY!!!


Write pseudocode for getting a bowl of ice cream using at least four steps.

Answers

Answer:

1. grab a bowl spoon and ice cream

2. take your spoon and put a desired amount of ice cream

3. add topping if needed

4. clean up and enjoy!!

Explanation:

1: First get a bowl and spoon from your cabinet
2: Then open the freezer and grab the ice cream
3: If it is new, rip off the seal
4: Open the ice cream tub
5: Get a ice cream scooper
6: Wash it off and dry it
7: Scoop your ice cream and put it in your bowl
8: Optional: Add sprinkles (trust me it’s good)
9: And eat with your spoon :D

What is involved with individual user-testing?

You individually test every minor detail and aspect of your game, keeping a
running list of your individual observations and noting things you would like to
change.

You ship your game out to several hundred users and ask them to fill out a
reflection survey and send it back to you after they test your game.
You observe a user playing your game or prototype by them recording
themselves while playing remotely or, more ideally, you observe a user playing
your game in person.

You choose five professional gaming individuals to test your game and create a
reflective report regarding what they liked and didn't like.

Answers

Answer:

the middle one would make the most sense if not than it is the 3rd

Explanation:

The answer is: You ship your game out to several hundred users and ask them to fill out a reflection surgery and send it back to you after they test your game. The only risk is your game being leaked or incorrect data

Question: How do you file a complaint using a food restaurant? 100 POINTS WILL BE GIVEN INCLUDING BRAINLIEST

Answers

send it through the mail

Answer:  Be prepared to provide the following information:

1.Your Name, Address and Phone Number (your information will remain anonymous to the restaurant)

2.Name of restaurant

3.Location/address of the restaurant

4.Date of incident

5.Nature of complaint

If you suspect you became ill from this incident. You will need to give specific information about the suspected foods that made you sick, as well as when your symptoms began, and what they were. In addition, you will need to give a 3-day food eating history.

Explanation

Give three examples of ethical or legal issues that an IT professional may encounter and the negative consequences of these issues.

Answers

Answer:

1. Private Informations being leaked.
2. Hackers that hacks accounts.
3. Computer Viruses obtained by clicking spam messages.

Explanation:

1. They can turn down the leaked informations by logging to it, legally.
2. IT Professionals could hack the hacker, or outsmart them.
3. Some people can stop Computer Viruses, but IT Professionals can prevent it much better than them.

I hope that my answer helped you. Thank you, and good luck.

The three examples of ethical or legal issues that an IT professional may encounter are:

Privacy violationsCybersecurity breachesIntellectual property violations

What are the  negative consequences of the issues with IT professional?

In Privacy violations: IT professionals may be faced with ethical dilemmas related to the collection, use, and protection of personal data. If personal data is not handled responsibly, it can lead to privacy violations, loss of trust, and potential legal consequences.

In Cybersecurity breaches: IT professionals are responsible for protecting the security of systems and data, and failure to do so can result in cybersecurity breaches that can have serious consequences, such as data loss, financial damage, and reputational harm.

Therefore, in Intellectual property violations: IT professionals may be faced with ethical issues related to the use of copyrighted or patented materials. If these materials are used without permission, it can result in legal consequences and damage to the reputation of the IT professional and their organization.

Learn more about IT professional from

https://brainly.com/question/6947486

#SPJ1

aaaaaaaaaaaaaaaaplssssssssssssssssssssssssssssshelpppppppppppppppppppppppp

aaaaaaaaaaaaaaaaplssssssssssssssssssssssssssssshelpppppppppppppppppppppppp

Answers

Answer:

Voltage=50

Explanation:

V = I × R

V= I × 50

V = 50

V = Potential difference in volts

R = Resistance in ohms

I = Current in amps (amperes)

Voltage=50 I know cuz I. Got this correct also pls give branliest

Write two sentences but each one having either computer in it or technology in it. You can use a word more than once in a sentence and you can put the same word in more than one sentence.

Answers

Answer:

Sentences:

1.My computer has a virus

2.Technology may take over the world someday

Explanation:

1. My computer won’t turn on.


2. Technology nowadays is so high tech.

What does a loop statement do?

It causes a section of code to be repeated a certain number of times.

It causes a section of code to be executed one time only.

It causes a section of code to end.
It causes a section of code to be repeated infinitely.

Answers

Answer:

It causes a section of code to be repeated infinitely

Answer:

It causes a section of code to be repeated a certain number of times.

Explanation:

(Will give brainliest) How does the new technology concept work?

Answers

Answer:Technology has completely changed the way companies collaborate. Technology has helped us connect with people anywhere and at any time. This increased collaboration has brought a high level of flexibility in communication that allows employees, co-workers, and managers to connect with each other easily

Explanation:

gogle is great my friend (yes i spelllled it wrong. it wouldnt let me put the word)

technology concepts as framed by three areas of study being physical products, human processes and environmental systems which include concepts such as: structures, materials, mechanisms, power and energy, control, systems, functions, aesthetics and ergonomics.

Hope this helps!

1. What do you think is the most important event in the history of the internet? What event has had the biggest impact on your daily life?

Answers

Answer:

The biggest event in internet history was YuTubers punching each other in the face. Months of hype came to a peak Saturday for the self-declared “biggest event in internet history” a boxing match between two YuTube celebrities in Manchester, England.

Explanation:

There is no particular event but the whole journey till now which shaped my personality. Every person even if they are the worst has something good in them.

The establishment of the ‘ARPANET’ (an early version of the internet) used in the USA in 1969 as a means of communication between various research institutions.

The impact it has had:
Developed into the globally used Internet which is now integrated into modern society and is seen as an essential for good quality of life.

Which file type is typically used to save Microsoft Word files? Group of answer choices DOC MPEG PDF XLSX

Answers

Answer:

DOC

Explanation:

It's the common file used.

Hi there!

The answer is “PDF”.

When sending an email and adding an attachment it’s usually labeled as a “PDF”. Whenever saving an image to your computer it’s also considered a PDF.

When the prompt function is used in JavaScript, _____ appears.

A.
an error message

B.
a pop-up box

C.
a data warning

D.
a password request

Answers

Answer:

B

Explanation:

instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog

A pop up box to let you know the Java script is there and active

What is the best definition of dialect? will pay give me your cash app

a way of speaking that makes the actors’ lines easier to hear
a way of speaking that is specific to a certain group or location
a method of acting that relies on an actor’s own experiences
a method of acting that helps the audience follow the plot

Answers

In my opinion i think the best definition of dialect would be “a way of speaking that is specific to a certain group or location”:)
Specific group or urgent matter

You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced some major errors and decide that it would be better to go back to yesterday’s work and start from there. Which of these will be most helpful to you?

Track Changes

Permissions

Macros

Manage Document

Answers

Answer:

I think it is manage document.

Explanation:

managing helps us to organize things and write things with ease.

Answer:

Manage Document

Explanation:

Other Questions
ACME incorporated can purchase component Q from 3 potential suppliers. Supplier A charges a fee of $6.50 per component. Supplier B charges $1700 per order plus $2.00 per component ordered. Supplier C charges $3.00 per component, and requires the buyer to pay for at least 450 components (even if the order size is less than 450). 4. What is the full range of order sizes where each supplier is optimal? 5. ACME decided to buy 500 units of component Q from supplier A. How much money could the company have saved if it purchased the 500 units from supplier B instead of supplier A? 6. Next week supplier B will be running a 15% off special. What equation represents the new Total Cost for supplier B during the sale? what function might butterfly wings that look like leaves have witch expression an be placed on the right side of the equal sign to form an equation 5 + 2/3 ? K12 6 grade christian theology popularized the practice of allegory in the medieval age. True/False The molecules in a sample of solid so2 are attracted to each other by a combination of? Question 5 (1 point)|8|= hose fills a hot tub at a rate of 4.09 gallons per minute. How many hours will it take to fill a 250-gallon hot tub? A kite is staked to the ground and blowing in the wind. It currently has a string let out to a length of 100 meters. The string makes an angle of elevation of 39 with the ground. To the nearest tenth of a meter, determine the altitude (height) of the kite. ike pages from a book, this sample pulls apart in thin sheets of a dark see through black layers. Due to its nature of see through dark sheets the geologist has determine this to not be a metallic material opting more for virtuous appearance. the risk of contracting some illness can be avoided by ? Open the code8-3_anim.css file. Several keyframe animations have already been created for you. Add a keyframe animation named spinCube that contains the following frames:At 0% apply the transform property with the rotateX() function set to 24deg and the rotateY() function set to 40deg.At 50% change the value of the rotateX() function to 204deg and the rotateY() function to 220degAt 100%, change the value of the rotateX() function to 384 and the rotateY() function to 400deg. Ms Kallus is trying to convince her students to elect Mandy as the president of the Art Club. She says, Students, Mandy is the most skilled artist in the class. If I dont get him as the leader, everyone at school is going to laugh at me. I will be so embarrassed that I will want to die. What form of persuasion is Ms. Kallus using here?A. LogosB. PathosC. EthosD. a combination of ethos, pathos, and logosE. None of them how many times longeris the perimeter of the shorter side? Question 22 Marks: 1 The development and maintenance of an exposure control plan is one requirement ofChoose one answer. a. EPA's biomedical waste regulations b. OSHA's bloodborne pathogens regulations c. USDA/APHIS plant genetics regulations d. FIFRA after 24 hours, a sheep blood agar (sba) from a vaginal culture is read. the sba has alpha- hemolytic, pinpoint colonies all over the plate. a catalase test is performed, and it is negative. Beverly should use _____ advertising for her client who has requested a medium that is less wasteful than other media and produces the highest percentage of responses. Given an equation y=1/ 3x+5, explain the steps for using slope-intercept form to graph this equation. (1 point)1. Use the y-intercept to plot the point (5,0). Then, using the y-intercept as a reference point, move left 3 units and up 1 unit, and plot a second point.2. Use the y-intercept to plot the point (0,5). Then, using the y-intercept as a reference point, move left 1 unit and up 3 units, and plot a second point.3. Use the y-intercept to plot the point (0,5). Then, using the y-intercept as a reference point, move left 3 units and up 1 unit, and plot a second point.4. Use the y-intercept to plot the point (5,0). Then, using the y-intercept as a reference point, move right 3 units and up 1 unit, and plot a second point. Business: times of telephone calls. A communications company determines that the length of wait time, t, in minutes, that a customer must wait to speak with a sales representative is anexponentially distributed random variable with probability density functionf (t) = Ze-0.5t,0 St < 00.Find the probability that a wait time will last between 4 min and 5 min. Give the location of London as an ordered pair (x, y) A kicker kicks a football toward the opponents goal line during a game. Theball begins its flight with an initial velocity of 90 feet per second when it iskicked at a height of 2 feet by the kicker. To the nearest foot, what maximumheight will the ball reach?You may use the function:h(t) = 16t^2+90t+2A. 129 feetB. 981 feetC. 90 feetD. The answer cannot be determined.