A faulty sensor or a bad network connection can result in missing or iot sensor data that lacks a time stamp indicating when the reading occurred.
Why is my IoT data not showing up?A faulty sensor or a bad network connection can result in indicating when the reading occurred. or loT sensor data that lacks a time stamp 7. One of the first things developers of IoT applications should focus on is building in 2. redundancy and backup from the start.
What new risks are raised by placing a new system of sensors?There is an increased risk of exposing internal systems to hacking, viruses, and destructive malware. b. Faulty sensors or bad network connections may result in missing data or senor data lacking time stamps indicating when the reading occurred.
To know more about sensor visit :-
https://brainly.com/question/15396411
#SPJ4
you are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activity.you have noticed that the action you have taken needs to be improved.
action to the problem\tasks:
Answer:
answer it yourself or ask your teacker
Explanation:
Which of the following is the general term used to describe software code that isdesigned to cause damage to a computer system?
A) Virus
B) Malware
C) Adware
D) Madware
Answer:
B. Malware
Explanation:
Malware is the general term used to describe software code that is designed to cause damage to a computer system
Malware also known as malicious software. It is a single term which refers to virus, trojans, adware spy ware, rogue, scare ware, worm etc.
They are intentionally designed to cause damage to a computer system.
Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.
Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.
You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:
What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.
In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:
Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.What is the Case Facts?First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.
Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.
Learn more about affidavit from
https://brainly.com/question/30833464
#SPJ1
Consider the LIBNAME statement below: LIBNAME 'path-to-file'; TRUE/FALSE: The name of the SAS library you are creating must match the name of the folder it references.
The SAS Library is a collection of a SAS file or more that is SAS recognized and stored as a unit.
Every file is a library member, it assists you to get your job organized. It consists of all your files in the same library if a SAS program needs or more than one SAS.A logical name termed a libre is a reference in a SAS library. The single SAS library can't store files at various physical sites, in which SAS deletes the temporary SAS library contents but not SAS libraries.That's why the given statement is "false".
Learn more:
brainly.com/question/14354148
Give me some information about Shakira because I need to do a project
Answer:Summary : She's a Columbian pop singer who's sold more than 70 million albums sold worldwide. Her best known songs are "Hips Don't Lie" and " Whenever, Where ever".
Explanation: Born on February 2, 1977 in Barranquilla, Colombia. Her full name is Shakira Isabel Merabarak Ripoll. She wrote her first song on May 11, 1985. On October 1st she had her first successful album. On September 21, 1998 her album was sold worldwide
Answer:
Shakira's hips don't lie.
working with the tkinter(python) library
make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?
To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.
How can I make a tkinter window always appear on top of other windows?By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.
This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.
Read more about python
brainly.com/question/26497128
#SPJ1
Describe what social engineering is and explain its existence and prevalence.
Explain why SE is an important part of an information technology security course.
Perform statistical research in the social engineering area providing the following: (1) Describe the current percentage of cyber attacks relying on social engineering and the percentage of attacks from both internal and externa sources; and (2) Describe how these percentages impact the current corporate social engineering incident response effort.
Discuss employee and management responsibilities with regard to information security and combating SE. Make sure your work clarifies your opinion as to who carries more responsibility for preventing SE-the employees or management. Provide examples to back up your statements.
Social engineering is a tactic used by attackers to manipulate individuals into divulging sensitive information or performing actions that may be harmful to the organization.
Social engineering attacks exploit human psychology, emotions, and trust to trick people into revealing sensitive information or performing actions that they otherwise wouldn't. The attacks can take many forms, such as phishing emails, phone scams, pretexting, and baiting.
What is social engineering?The prevalence of social engineering attacks has increased in recent years, as attackers have become more sophisticated and creative in their methods.
According to the Verizon Data Breach Investigations Report (DBIR) in 2020, social engineering is used in 84% of successful cyber attacks and the most common form of social engineering is phishing. It is also reported that around 30% of phishing messages are opened and 12% of recipients click on the malicious link.
When it comes to combating social engineering, both employees and management carry some level of responsibility. Employees are the first line of defense and play a vital role in protecting the organization's sensitive information. They should be educated and trained on how to identify and avoid social engineering attacks. Management, on the other hand, is
Learn more about social engineering from
https://brainly.com/question/29024098
#SPJ1
Giving reasons for your answer based on the type of system being developed, suggest the most appropriate generic software process model that might be used as a basis for managing the development of the following systems: • A system to control anti-lock braking in a car • A virtual reality system to support software maintenance • A university accounting system that replaces an existing system • An interactive travel planning system that helps users plan journeys with the lowest environmental impac
There are different kinds of systems. the answers to the questions is given below;
Anti-lock braking system: Is simply known as a safety-critical system that helps drivers to have a lot of stability and hinder the spinning of car out of control. This requires a lot of implementation. The rights generic software process model to use in the control of the anti-lock braking in a car is Waterfall model. Virtual reality system: This is regarded as the use of computer modeling and simulation that helps an individual to to be able to communicate with an artificial three-dimensional (3-D) visual etc. the most appropriate generic software process model to use is the use of Incremental development along with some UI prototyping. One can also use an agile process.University accounting system: This is a system is known to have different kinds of requirements as it differs. The right appropriate generic software process model too use is the reuse-based approach.
Interactive travel planning system: This is known to be a kind of System that has a lot of complex user interface. The most appropriate generic software process model is the use of an incremental development approach because with this, the system needs will be altered as real user experience gain more with the system.
Learn more about software development from
https://brainly.com/question/25310031
Relating to Blue Cross Blue shield billing notes what are some medical terms with corresponding billing rules
Relating to Blue Cross Blue shield billing notes what are some medical terms with corresponding billing rules are:
1. Diagnosis Codes
2. CPT Codes
3. E/M Codes
4. HCPCS Codes
5. Place of Service Codes
How is this so?1. Diagnosis Codes - These are alphanumeric codes from the International Classification of Diseases, 10th Revision (ICD-10), used to describe the patient's medical condition. They are essential for accurate billing and reimbursement.
2. CPT Codes - Current Procedural Terminology (CPT) codes are five-digit numeric codes that represent specific medical procedures, treatments, or services provided to the patient. These codes are used to determine reimbursement rates.
3. E/M Codes - Evaluation and Management (E/M) codes are a subset of CPT codes that specifically represent the time and complexity involved in assessing and managing a patient's medical condition during an office visit or consultation.
4. HCPCS Codes - Healthcare Common Procedure Coding System (HCPCS) codes are alphanumeric codes used to identify specific medical supplies, equipment, and services not covered by CPT codes. These codes are often used for durable medical equipment or outpatient procedures.
5. Place of Service Codes - These codes indicate where the healthcare service was rendered, such as an office, hospital, or clinic. They help determine the appropriate reimbursement rate based on the location of the service.
Learn more about medical terms at:
https://brainly.com/question/8628788
#SPJ1
The ___ bar changes depending on which tool is currently selected…?
Answer: Options (I'm not 100% sure but I think its options.) Have a nice day!
Answer:
Options (I'm not 100% sure but I think it's options.) Have a nice day!
Explanation:
Part A
In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they were born. Here is a sample execution of the program with the user input in bold:
What is your name? Amanda
How old are you? 15
Hello Amanda! You were born in 2005.
Write the program. Format your code using best practices. Refer to the zyBooks style guide, if needed, to use proper naming conventions for variables and methods. Use the most appropriate statements with minimal extraneous elements, steps, or procedures.
Run the program.
Debug the program. Be sure your code produces the correct results.
Save and submit your file.
Part B
While you don’t need an IDE to write a program, there are some features that make it desirable. What did you notice when using PyCharm to develop a simple program? For instance, you might have noticed how color is used. Identify two to three features that could make coding easier for programmers, and briefly explain why.
Using the knowledge in computational language in python it is possible to write a code that write a program that prompts the user for their name and age.
Writting the code:def born_yr(age):
return 2020-age
if __name__=="__main__":
name = input("What is your name?")
age = int(input("How old are you?"))
born=born_yr(age)
print("Hello", name + "!", "You are born in " + str(born) + ".");
See more about python at brainly.com/question/18502436
SPJ1
C++ program
Sort only the even elements of an array of integers in ascending order.
Answer: Here is one way you could write a C++ program to sort only the even elements of an array of integers in ascending order:
Explanation: Copy this Code
#include <iostream>
#include <algorithm>
using namespace std;
// Function to sort only the even elements of an array in ascending order
void sortEvenElements(int arr[], int n)
{
// create an auxiliary array to store only the even elements
int aux[n];
int j = 0;
// copy only the even elements from the original array to the auxiliary array
for (int i = 0; i < n; i++)
if (arr[i] % 2 == 0)
aux[j++] = arr[i];
// sort the auxiliary array using the STL sort function
sort(aux, aux + j);
// copy the sorted even elements back to the original array
j = 0;
for (int i = 0; i < n; i++)
if (arr[i] % 2 == 0)
arr[i] = aux[j++];
}
int main()
{
// test the sortEvenElements function
int arr[] = {5, 3, 2, 8, 1, 4};
int n = sizeof(arr) / sizeof(arr[0]);
sortEvenElements(arr, n);
// print the sorted array
for (int i = 0; i < n; i++)
cout << arr[i] << " ";
return 0;
}
Which sentence has correct parallel structure?
О А. The software allows users to create new documents, copying files from other sources, and saving new changes.
Users need a laptop, internet connection, and need an appropriate document editor.
SO B.
O C.
To install the application, connect the flash drive, run the setup, and restart the system.
OD.
The application bundle contains a DVD, the flash drive, and instruction manual.
The sentence that has parallel structure is "To install the application, connect the flash drive, run the setup, and restart the system." (opiton C)
What is parallel structure?The repeating of a certain grammatical form inside a phrase is known as parallel structure (also known as parallelism). A parallel construction is created by making each comparable object or notion in your phrase follow the same grammatical pattern.
Consider this example: "I forgave you when you lost my cat, when you left me at the airport, and when you threw out my favorite stuffed animal." The parallel structure is the recurrent usage of I forgave you when you.
Hence, option C is correct.
Learn more about parallel structure:
https://brainly.com/question/8055410
#SPJ1
5. Name the special window that displays data, when you insert a chart.
a) Datasheet b) Database c) Sheet
Answer:
A.Datasheet
Explanation:
I hope it's helpful
What is the main reason for assigning roles to members of a group?
It speeds up the time it takes to do a task.
It provides a way for the group to meet on a regular basis.
It allows one person acting in the role of the facilitator to take charge and do all the work.
It creates leadership and direction for the team, making it easier to work together for a common purpose.
Answer: it creates leadership and direction for the team, making it easier to work together for a common purpose.
Explanation:
The reason for assigning roles to members of a group is that it creates leadership and direction for the team, making it easier to work together for a common purpose.
When roles are delegated to the members of a group, each person gets his or her own part of the job or project. This makes it easier to work together and as a team. It also ensures that the project is handled well and faster as it creates a direction.
Answer:
D. It creates leadership and direction for the team, making it easier to work together for a common purpose.
Explanation:
Describe the basic internal operation of magnetic hard disc
Explanation:
Magnetic hard disks (HDDs) are a type of storage device used in computers to store data persistently. Here are the basic internal operations of magnetic hard disks:
Platters: The hard disk consists of several circular disks called platters that are made of a rigid material like aluminum or glass. These platters are coated with a thin layer of magnetic material.
Read/Write Heads: Read/Write Heads are small electromagnets that are positioned above and below each platter. The heads move in unison and are attached to a mechanical arm called the actuator. The actuator positions the heads over the appropriate tracks on the platters.
Spindle Motor: The spindle motor rotates the platters at high speed, typically between 5400 and 15000 revolutions per minute (RPM). The faster the RPM, the faster the hard disk can read and write data.
Magnetic Fields: When data is written to the hard disk, the read/write heads create a magnetic field that aligns the magnetic particles on the platters in a specific pattern, representing the data being written.
Reading Data: When data is read from the hard disk, the read/write heads detect the magnetic pattern on the platters and convert it back into digital data. The read/write heads move rapidly over the platters, reading data from multiple tracks simultaneously.
File System: To organize and manage data on the hard disk, a file system is used. A file system keeps track of the location of data on the hard disk, as well as other information such as file names, permissions, and timestamps.
leave a comment
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?
In credentialed scanning, policy compliance plugins give you an advantage known as option C: Customized auditing.
What does auditing serve to accomplish?The goal of an audit is to determine if the financial report's information, taken as a whole, accurately depicts the organization's financial situation as of a particular date. For instance, is the balance sheet accurately recording the organization's assets and liabilities?
Therefore since the goal of such a tailored audit, aside from cost and time savings, so, it is to present an objective overall picture of your supplier's organization in all pertinent disciplines, allowing you to better target risk areas and allocate control resources where they are most needed.
Learn more about Customized auditing from
https://brainly.com/question/7890421
#SPJ1
See full question below
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?
More accurate results
Safer scanning
Customized auditing
Active scanning
Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
Group of answer choices
self-modeling
gigabit ethernet
political awareness
social distancing
binary verificationism
Answer:
self-modeling
Explanation:
Robots, which are man-made machines which mimics the actions of man like walking, talking, rendering assistance are part of the future plans to make the society easier. It was mans' attempt to improve the society but still happens to be work in progress.
For the robots to be able to carryout its function, there is need for it to be self modelling in the sense of initiating and executing the commands which was already programmed into it. For example, telling it to walk will be initiated by him as a command, after processing the command, it will execute it without any other information.
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
Looking at the code below, what is the height of your GUI window?
setSize(500,400);
100
500
400
900
Answer:
Doey
So you gotta doey, it should be 900, the doey is sometimes wrong so be patient
An attacker has been analyzing encrypted data that he intercepted. He knows that the end of the data includes a template sent with all similar messages. He uses this knowledge to decrypt the message. Which of the following types of attacks BEST describes this attack? a. Known ciphertext b. Known plaintext c. Brute force d. Rainbow table
An attacker has been analyzing encrypted data that he intercepted. The type of attack that BEST describes this scenario is a known plaintext attack (option b).
A known plaintext attack is a type of attack where the attacker has access to both the encrypted data and the plaintext data. The attacker can then use this knowledge to decrypt other messages that use the same encryption method.
In this case, the attacker knows that the end of the data includes a template sent with all similar messages. This is considered to be the plaintext data. The attacker can then use this knowledge to decrypt the rest of the message.
The other types of attacks mentioned in the question are not applicable in this scenario. A known ciphertext attack (a) is when the attacker only has access to the encrypted data. A brute force attack (c) is when the attacker tries every possible combination to decrypt the data. A rainbow table attack (d) is when the attacker uses precomputed tables to find the encryption key.
Therefore, the correct answer is b. Known plaintext.
Learn more about encrypted data here:
https://brainly.com/question/28283722
#SPJ11
In which of the following situations must you stop for a school bus with flashing red lights?
None of the choices are correct.
on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus
you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus
The correct answer is:
on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school busWhat happens when a school bus is flashing red lightsWhen a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.
It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.
Learn more about school bus at
https://brainly.com/question/30615345
#SPJ1
Your mission is to read this uber-classified memo from the Grand Poobah of annan. Of course, it's in code, so you'll need to write a program to decrypt your message. The code is set up so that for the nth element in the array, you will need to read its nth letter. (Ex: if pirates is in array position 0, then print letter 0 of the word, which = p. if gangway is in array position 4, then print letter 4 = w.) To accomplish this, your main function should do the following: a. Declare 4 separate arrays of strings called secrets1, secrets2, secrets3, & secrets4 and assign them the following values: secrets1: { "platypus", "plethora","trend", "croak","almost", "toaster" }; secrets2: _{ "fire", "seen","trend", "produce" }; secrets3: { "tiretread", "chains", "stern", "bed bug" }; secrets4: {"oracle", "stetson","mother", "stie", "twigrot" }; b. Call the function decode 4 times - once for each array variable (secrets1, secrets2, secrets3 & secreets4) from Step a. (You'll have to do this with 4 lines of code; you can't use a loop for it.) c. Write a void function called decode that will i. Accept an array of strings, and the integer array length as the parameters. ii. Read through each word in the array. If the word is in the nth position of the array, then print the nth letter for that word. (For array item 0, print the letter at position 0 in the word. For array item 1, print the letter at position 1 in the word...etc.) Print all of the letters from this array on one line. iii. Print a blank
Answer:
Following are the code to this question:
#include<iostream>//declaring header file
using namespace std;
void decode(string* arr, int n)//defining a method decode
{
for(int i = 0; i < n; i++)//defining a loop for print value
{
cout << arr[i][i] << " "; // using print method to print ith letter of the string
}
cout << endl;//line break
}
int main()//defining main method
{
string secret1[] = {"platypus","plethora","trend","croak","almost","toaster"};//defining string arry and assign value
string secret2[] = {"fire","seen","trend","produce"};//defining string arry and assign value
string secret3[] = {"tiretread","chains","stern","bed bug"};//defining string arry and assign value
string secret4[] = {"oracle","stetson","mother","stie","twigrot"};//defining string arry and assign value
decode(secret1, 6);//calling method decode and pass string array and integer number
decode(secret2, 4);//calling method decode and pass string array and integer number
decode(secret3, 4);//calling method decode and pass string array and integer number
decode(secret4, 5);//calling method decode and pass string array and integer number
return 0;
}
output:
Please find the attachment.
Explanation:
In the above C++ language code, a method "decode" is declared that accepts a string array and an integer variable in its parameter, inside the method a for loop is declared, which is used "n" variable to print its \(i^{th}\) letter value in the given string value.
In the main method, 4 string array "secret1, secret2, secret3, and secret4" is declared which assigns some value, and then we call the method "decode" and pass string array value and an integer value in its parameter.
Il-Evaluation Directions: Read the questions carefully. Encircle the lett 1. Which part of computer is used to play sound? A. Keyboard B. Monitor C. Mouse D. Speak orate with items on y
Answer:
d. speaker
Explanation:
please mark brainliest
Python Code to be wriiten:
Will mark as brainliest if correct!
A bunny can hop at most 50 centimetres far. It wants to cross to the other side of the river, but it cannot swim. So the only hope is to hop on the rocks on the river, which are positioned in a straight line. The positions of the rocks are measured from the start location, assuming that the bunny starts at the 0 cm mark. The opposite bank could be treated as a big rock. It is the final rock in the tuple of rocks.
In the Figure below, the rocks are at locations 32, 46, 70, 85, 96, 123, and the opposite riverbank is at location 145.
The bunny will jump as far as it could for each hop. What is the smallest number of jumps it needs to take to reach the other side of the river? For the above example, it needs to make 3 jumps, as shown in the diagram above.
You may assume that there are at most 20 rocks (including the opposite bank).
Write a function rabbit that takes in a tuple representing the locations of the rocks. Your function should return the minimum number of jumps needed, or -1 if it is not possible for the bunny to reach the other side of the river. You may assume that the locations of the rocks in the tuple are valid (bigger than 0) and they are sorted in ascending order.
def rabbit(rocks):
# Fill in your code here
Test Cases:
rabbit((32, 46, 70, 85, 96, 123, 145)) 3
rabbit((40, 70, 150, 160, 180)) -1
rabbit((30, 70, 75, 120, 160, 170, 180, 190, 200, 246, 258)) 7
rabbit((51, 52, 53, 54, 55, 56, 57, 58)) -1
rabbit((50, 51, 101, 102, 152, 153, 203, 204, 254, 255, 305, 306, 356, 357, 407)) 15
Using the knowledge in computational language in python it is possible Write a function rabbit that takes in a tuple representing the locations of the rocks.
Writting the code:def rabbit(rocks):
jumps = 0
prev = 0
cursor = 0
i = 0
while i < len(rocks):
rock = rocks[i]
if rock - prev < 50:
cursor = rock
i += 1
continue
elif rock - prev >= 50 and prev != cursor:
jumps += 1
prev = cursor
continue
else:
return -1
if i == len(rocks):
rock = rocks[i-1]
if rock - prev <= 50:
jumps += 1
if jumps == 0:
return -1
return jumps
See more about python at brainly.com/question/29897053
#SPJ1
All of the following are examples of software, expect
Video games
Speakers
web browsers
photo editors
Answer:
speakers
Explanation:
speakers are tangible objects compared to video games, web browsers, and photo editors, which are programs that run on a computer
what is the purpose of the hardware component in the information system?
Answer:
The hardware aspect of an information system is the technology you can touch. These are the physical aspects of technology. Computers, tablets, mobile phones, disk drives, and more are all examples of information system hardware. Hardware is often considered the most visible aspect of an information system.
Explanation:
few toffees were distributed among oriya , piyush and payal . priya got 3/8 , piyush and payal 1/8 and 1/2 of total toffees respectively. who got the maximum toffees
Answer:
it is payal because 1/2 is a half
Explanation:
there you go
HACK ATTACK (MyPltw) MIT app inventor (1.2.2) - I need help on doing the actual hacking algorithm. If someone has done it before please show me how. These blocks are the ones that need to be edited.
Answer: 1.4.3.6.2 Is the order they should be in from there!!!
Explanation:
pls pls pls pls pls pls pls pls plks
Answer:
Want to begin introduction?.......