https://acm.cs.nthu.edu.tw/problem/13144/
The website is the problem, and I need to implement the 13144.h(which is function.h in the 13144.cpp) to get the right answer.
Thanks for your help.

Answers

Answer 1

Answer:

Th.. uh... yea... uh.. I don’t know

Explanation:


Related Questions

The first generation computers are likely to have been inverted in what period?

A. 1910s

B. 1920s

C. 1930s

D. 1940s

Answers

The first generation computers are likely to have been inverted in the period of the  1940s.

What is the era in 1st generation of computer?

The era is known to be around 1940-1956. This is said to be the period where the first set of computers were made.

Note that the first generation is one that vacuum tubes as the basic parts for memory and thus The first generation computers are likely to have been inverted in the period of the  1940s.

Learn more about  first generation computers  from

https://brainly.com/question/14713070

#SPJ1

An __________ hard drive is a hard disk drive just like the one inside your, where you can store any kind of file.

Answers

An external hard drive is a hard disk drive just like the one inside your computer, where you can store any kind of file.

These drives come in various sizes, ranging from small portable drives that can fit in your pocket to larger desktop-sized drives with higher storage capacities. They often offer greater storage capacity than what is available internally in laptops or desktop computers, making them useful for backups, archiving data, or expanding storage capacity.

Overall, external hard drives are a convenient and flexible solution for expanding storage capacity and ensuring the safety and accessibility of your files.

what percent of records are temporary, if you are not in the OSD?​

Answers

Answer:

Headed by the OSD Records Administrator, the OSD Records and Information Management (RIM) Program is responsible for oversight, implementation of the Federal Records Act within the Offices of the Secretary of Defense and the WHS supported Defense Agencies and Field Activities.

Explanation:

How does a network-based IDPS differ from a host-based IDPS? List and describe the three control strategies proposed for IDPSs.

Answers

A signature-based IDPS is sometimes called a pattern-based IDPS.

It has been identified that known patterns of the malicious behavior based on the signatures or predefined patterns of known attacks. In other words, it looks for the specific characteristics that have been previously identified as the indicators of the malicious activity.

Signature-based IDPSs use the database of signatures to detect malicious activity, which is constantly updated to keep up with new threats. When an IDPS detects an event that matches a signature in its database, it triggers an alert, and the system can take specific action to prevent the attack.

Learn more about database on:

https://brainly.com/question/30634903

#SPJ1

Describe a psychological challenge of space travel that astronauts can face.

Answers

Answer:

Loneliness

Explanation:

It is logical that an astronaught could be lonely up in space due to the absence of loved ones.

If democratic powers stop supporting free and independent media in their own countries and do not impose consequences on governments that restrict it, what could happen to the free press?

It could become extinct.
It could stop creating fake news.
It could improve its reporting.
It could become more honest.

Answers

Answer:

It could become extinct.

Explanation:

Create JUnit Tests Create JUnit Tests to test the budgetBalance methods in both the AllInclusive and ALaCarte classes. Test each method from polymorphically via an object variable that is of type Vacation. Review the JUnit API and documentation as since the budgetBalance method returns a double, you will need to use one of the assertEquals methods that handles doubles since doubles values may not be exact due to rounding errors.

Answers

Answer:

Here is the code.

Explanation:

Create JUnit Tests Create JUnit Tests to test the budgetBalance methods in both the AllInclusive and
Create JUnit Tests Create JUnit Tests to test the budgetBalance methods in both the AllInclusive and

6. In terms of a career, the word benefits refers to how much vacation and salary bonuses a person gets. True False​

Answers

It is false that in terms of a career, the word benefits refers to how much vacation and salary bonuses a person gets.

The term "benefits" in the context of a profession comprises a wider range of offerings supplied by a company to an employee, even if vacation and pay bonuses might be included in the benefits package.

Benefits frequently involve additional remuneration and benefits in addition to vacation time and salary increases.

Health insurance, retirement plans, paid time off, flexible work schedules, tuition reimbursement, employee assistance programmes, wellness programmes, and other benefits are a few examples of these.

The benefits package is intended to draw in new hires, keep them on board, improve job satisfaction, and support workers' health and work-life balance. Therefore, vacation time and incentive pay are just a portion of the total benefits that an employer provides.

Thus, the given statement is false.

For more details regarding career, visit:

https://brainly.com/question/8825832

#SPJ1

Which statements are true about mobile apps? Select 3 options.

Which statements are true about mobile apps? Select 3 options.

Answers

The statements are true about mobile app development are;

Software development kits can provide a simulated mobile environment for development and testingMobile app revenues are expected to growWhether a mobile app is native, hybrid, or web, depends on how the app will be used and what hardware needs to be accessed by the app

How is this so?

According to the question, we are to discuss what is mobile app and how it works.

As a result of this mobile app serves as application that works on our mobile phone it could be;

nativehybridweb

Therefore, Software development kits can provide a simulated mobile environment.

Learn more about mobile apps at:

https://brainly.com/question/26264955

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Which of the following statements are true about mobile app development? Select 3 options.

• Software development kits can provide a simulated mobile environment for development and testing

• Testing is not as important in mobile app development, since the apps are such low-priced products

• Mobile apps can either take advantage of hardware features or can be cross-platform, but not both

• Mobile app revenues are expected to grow

• Whether a mobile app is native, hybrid, or web, depends on how the app will be used and what hardware needs to be accessed by the app

Write pseudocode for a function that translates a telephone number with letters in it (such as 1-800-FLOWERS) into the actual phone number. Use the standard letters on a phone pad.

Answers

Answer:

Explanation:

Function telToNumbers with one parameter of a String input for the telephoneNumber

String var newTelephoneNum;

for loop through telephoneNumber {

Char var currentChar = current Character in the loop;

currentChar to lower Case;

Switch statement (currentChar) {

 case "a" or "b" or "c" : newTelephoneNum += "2"; break;

 case "d" or "e" or "f" : newTelephoneNum += "3"; break;

 case "g" or "h" or "i" : newTelephoneNum += "4"; break;

 case "j" or "k" or "l" : newTelephoneNum += "5"; break;

 case "m" or "n" or "o" : newTelephoneNum += "6"; break;

 case "p" or "q" or "r" or "s" : newTelephoneNum += "7"; break;

 case "t" or "u" or "v" : newTelephoneNum += "8"; break;

 case "w" or "x" or "y" or "z" : newTelephoneNum += "9"; break;

 default : newTelephoneNum += currentChar; break;

 }

}

print newTelephoneNum;

"If an architecture has a move instruction with more than one word and at most one of the two operands may be an indirect memory reference, the minimum number of frames needed to run a process on this architecture is"

Answers

Answer:

6

Explanation:

An instruction set architecture (ISA) can be defined as series of native memory architecture, instructions, addressing modes, external input and output devices, virtual memory, and interrupts that are meant to be executed by the directly.

Basically, this set of native data type specifies a well-defined interface for the development of the hardware and the software platform to run it.

Also, the set of instructions that defines the computer operation to perform (operand specifier) such as the addition of memory contents to a register, conditional move is referred to as an opcode. Thus, the number of operands in an instruction is grouped with respect to the maximum number of operands stated in the particular instruction such as 0, 1, 2, 3, etc.

In a processor, the minimum number of frames needed by a process depends on its instruction set architecture (ISA), as well as the number of pages used by each instruction.

Hence, if an architecture has a move instruction with more than one word and at most one of the two operands may be an indirect memory reference, the minimum number of frames needed to run a process on this architecture is 6.

Compare and contrast frame header to internet protocol header.

Answers

A Frame Header is known to have the source and the destination addresses of all the frame and the control bytes while the  IP header is known to be the header information at the start of an Internet Protocol packet.  

The IP packets is made up of a header that is used for addressing and routing.

What is IP header?

This type of header is known to have the source address and the destination address.  IP is known to be one that uses an Internet datagram that has all the information that are the same to the physical frame.

A frame is regarded as the unit of transmission that is found on a link layer protocol. It is made up of a link layer header that is known to be followed by a packet.

Learn more about  IP header from

https://brainly.com/question/4297610

You are responsible for implementing the following member functions as part of the SkipList
class in SkipList.hpp:
SkipList()
This is the constructor for the class. You should initialize any variables you add to the class
here. Note from the "Restrictions" section of this document that your implementation must be
a linked structure. Notice that the size of the SkipList is not passed as a parameter. This
means that the SkipList can be arbitrary length, purely determined by how many insertions
are made. This means you will be allocating memory for your SkipList dynamically as
insertions are made.

Answers

The C++ SkipList constructor initializes a linked structure with sentinel nodes, height 0, and random seed for tower heights.

Here's an implementation of the SkipList constructor in C++ that initializes the variables needed for a linked structure:

#include "SkipList.hpp"

SkipList::SkipList() {

   head = new Node(INT_MIN);

   tail = new Node(INT_MAX);

   head->next = tail;

   tail->prev = head;

   height = 0;

   srand(time(NULL)); // initialize random seed for generating tower heights

}

In this implementation, the SkipList constructor initializes the head and tail sentinel nodes to INT_MIN and INT_MAX values, respectively. The next pointer of head is set to tail, and the prev pointer of tail is set to head, creating a doubly-linked list of height 0. The height variable is initialized to 0, indicating that there are no nodes in the SkipList yet. Finally, the random seed for generating tower heights is initialized using srand(time(NULL)).

Learn more about SkipList :

https://brainly.com/question/16014944

#SPJ4

Support technicians are expected to maintain documentation for each computer for which they are responsible. Create a document that a technician can use when installing Windows and performing all the chores mentioned in the module that are needed before and after the installation. The document needs a checklist of what to do before the installation and a checklist of what to do after the installation. It also needs a place to record decisions made during the installation, the applications and hardware devices installed, user accounts created, and any other important information that might be useful for future maintenance or troubleshooting. Don’t forget to include a way to identify the computer, the name of the technician doing the work, and when the work was done.

HELP!!

Answers

Answer: Computer Installation and Maintenance Documentation

Computer Identification:

- Computer Name:

- Serial Number:

- Model:

- Operating System:

Technician Information:

- Name:

- Date:

Before Installation Checklist:

- Backup important data

- Verify system requirements

- Check for BIOS updates

- Disconnect all peripherals and external devices

- Record hardware and software components

- Verify network connectivity

During Installation Checklist:

- Record decisions made during installation

- Select appropriate partition for installation

- Install necessary drivers

- Configure network settings

- Install Windows updates

After Installation Checklist:

- Install necessary software and applications

- Install necessary hardware devices

- Configure user accounts

- Install additional Windows updates

- Install antivirus software

Important Information:

- Hardware Components:

- Software Components:

- Network Configuration:

- Notes:

By signing below, I certify that I have completed the installation and maintenance checklist for the specified computer.

Technician Signature: ______________________________

Date: ____________________

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.
You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

Answers

Note that it is TRUE to state that you must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

How is this so?

Azure Event Hubs, a   data streaming platform,can be integrated with Azure Active Directory (Azure AD) for authentication and authorization purposes.

This ensures that requests to access and utilize Event Hubs resources are authorized and controlled through Azure AD, providing secure and authorized access to the application.

Learn more about Azure Active Directory at:

https://brainly.com/question/28400230

#SPJ1

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.

You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

True or False?

What will happen if you type pseudocode in another language's programming environment and try to run the
program?

Answers

Answer:

You will get compile error

Explanation:

The main issues covered by IT law are: Hardware licensing Data privacy Department security True False

Answers

The main issues covered by IT law are: Hardware licensing, Data privacy, Department security is a true statement.

What topics are addressed by cyber law?

There are three main types of cyberlaw:

Human-targeted crimes (e.g.: harassment, stalking, identity theft) Vandalism of property (e.g.: DDOS attacks, hacking, copyright infringement) The theft from the govt (e.g.: hacking, cyber terrorism)

Cyber law includes provisions for intellectual property, contracts, jurisdiction, data protection regulations, privacy, and freedom of expression. It regulates the online dissemination of software, knowledge, online safety, and e-commerce.

Note that some Internet security issues that must be considered are:

Ransomware Attacks. IoT Attacks. Cloud Attacks. Phishing Attacks.Software Vulnerabilities, etc.

Learn more about IT law from

https://brainly.com/question/9928756
#SPJ1  

Which function in Excel tells how many
numeric entries are there?
NUM
COUNT
SUM
CHKNUM​

Answers

Answer:

COUNT

Explanation:

Hope this helps! Plz mark brainliest!

How would you reply to an email message you've received that has multiple recipients, all of whom you would like to see your reply?

Answers

Answer:

depends on the app. if it's in google you can hit the reply all button and that will send the reply to all people or you can copy the email addresses from the original email into a new email

Answer:

the answer is c :D

Explanation:

What profession do you prefer to have in the future? In what way could you make an impact on society using the Internet?

Answers

Answer:

lawyer

Explanation:

by helping my society in terms of solving land cases that have been not settled in our history

Which 2 processes are operational processes

Answers

Answer:

New product development, manufacturing, and logistics and distribution are examples of operational processes, while strategic planning, budgeting, and performance measurement are examples of administrative processes. Operational and administrative processes share several characteristics.

Design a class named StockTransaction that holds a stock symbol (typically one to four characters), stock name, number of shares bought or sold, and price per share. Include methods to set and get the values for each data field. Create the class diagram and write the pseudocode that defines the class.
Design a class named FeeBearingStockTransaction that descends from StockTransaction and includes fields that hold the commission rate charged for the transaction and the dollar amount of the fee. The FeeBearingStockTransaction class contains a method that sets the commission rate and computes the fee by multiplying the rate by transaction price, which is the number of shares times the price per share. The class also contains get methods for each field.
Create the appropriate class diagram for the FeeBearingStockTransaction class and write the pseudocode that defines the class and the methods.
Design an application that instantiates a FeeBearingStockTransaction object and demonstrates the functionality for all its methods.

Answers

The class diagram and pseudocode for the StockTransaction class is given below

What is the class?

plaintext

Class: StockTransaction

-----------------------

- symbol: string

- name: string

- shares: int

- pricePerShare: float

+ setSymbol(symbol: string)

+ getSymbol(): string

+ setName(name: string)

+ getName(): string

+ setShares(shares: int)

+ getShares(): int

+ setPricePerShare(price: float)

+ getPricePerShare(): float

Pseudocode for the StockTransaction class:

plaintext

Class StockTransaction

   Private symbol as String

   Private name as String

   Private shares as Integer

   Private pricePerShare as Float

   Method setSymbol(symbol: String)

       Set this.symbol to symbol

   Method getSymbol(): String

       Return this.symbol

   Method setName(name: String)

       Set this.name to name

   Method getName(): String

       Return this.name

   Method setShares(shares: Integer)

       Set this.shares to shares

   Method getShares(): Integer

       Return this.shares

   Method setPricePerShare(price: Float)

       Set this.pricePerShare to price

   Method getPricePerShare(): Float

       Return this.pricePerShare

End Class

Read more about StockTransaction  here:

https://brainly.com/question/33049560

#SPJ1

Cleaning agents and food products should be stored separately.
TRUE
FALSE

Answers

Answer:

true

Explanation:

5.19 LAB: Countdown until matching digits
PYTHON: Write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.

5.19 LAB: Countdown until matching digitsPYTHON: Write a program that takes in an integer in the range

Answers

Using the knowledge of computational language in python it is possible to write a code that write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.

Writting the code:

n = int(input())

if 20 <= n <= 98:

   while n % 11 != 0:

       print(n)

       n -= 1

   print(n)

else:

   print("Input must be 20-98")

See more about python at brainly.com/question/18502436

#SPJ1

5.19 LAB: Countdown until matching digitsPYTHON: Write a program that takes in an integer in the range

System testing – During this stage, the software design is realized as a set of programs units. Unit testing involves verifying that each unit meets its specificatio

Answers

System testing is a crucial stage where the software design is implemented as a collection of program units.

What is Unit testing?

Unit testing plays a vital role during this phase as it focuses on validating each unit's compliance with its specifications. Unit testing entails testing individual units or components of the software to ensure their functionality, reliability, and correctness.

It involves executing test cases, evaluating inputs and outputs, and verifying if the units perform as expected. By conducting unit testing, developers can identify and rectify any defects or issues within individual units before integrating them into the larger system, promoting overall software quality.

Read more about System testing here:

https://brainly.com/question/29511803

#SPJ1

In which sections of your organizer should the outline be located?

Answers

The outline of a research proposal should be located in the Introduction section of your organizer.

Why should it be located here ?

The outline of a research proposal should be located in the Introduction section of your organizer. The outline should provide a brief overview of the research problem, the research questions, the approach, the timeline, the budget, and the expected outcomes. The outline should be clear and concise, and it should be easy for the reader to follow.

The outline should be updated as the research proposal evolves. As you conduct more research, you may need to add or remove sections from the outline. You may also need to revise the outline to reflect changes in the project's scope, timeline, or budget.

Find out more on outline at https://brainly.com/question/4194581

#SPJ1

1. Write a program that takes two numbers as input from the user and displays the sum of those numbers. 2. Write a program that asks the user for their name and age, and then displays a message that says "Hello [Name], you are [Age] years old!" 3. Write a program that asks the user for a temperature in Celsius and converts it to Fahrenheit. The conversion formula is Fahrenheit (Celsius* 1.8) + 32 4. Write a program that takes a list of numbers and returns the sum of all even numbers in the list. 5. Write a program that takes a list of words as input and returns the length of the longest word in the list. 6. Write a program that takes a string as input and returns the number of vowels in the string. 7. Write a program that takes two strings as input and returns True if they are anagrams (i.e., contain the same letters in a different order), False otherwise. 8. Write a program that takes a list of numbers and returns the second largest number in the list. 9. Write a program that takes a list of integers and returns a new list containing only the prime numbers. 10. Write a program that takes a string as input and returns True if it is a palindrome (i.e., reads the same forwards and backwards), False otherwise.​

Answers

Program to Display the Sum of Two Numbers:

The Program

num1 = float(input("Please enter the first number: "))

num2 = float(input("What is the second number?: "))

total = num1 + num2

print("By adding", num1, "and", num2, "the result is:", total)

Program to Display a Personalized Message:

name = input("Can I ask your name please?: ")

age = int(input("How old are you?: "))

print("Greetings,", name + ", so you're", age, "years old!")

Program to Convert Celsius to Fahrenheit:

celsius = float(input("Please provide the Celsius temperature reading: "))

fahrenheit = (celsius * 1.8) + 32

print("After converting to Fahrenheit it reads:", fahrenheit)

Read more about programs here:

https://brainly.com/question/26134656
#SPJ1

What is a foreign key? a security key to a database that stores foreign data a security key to a database located in another country a field in a table that uniquely identifies a record in a relational database a field in a table that links it to other tables in a relational database

Answers

Answer: a field in a table that links it to other tables in a relational database

A - a security key to a database that stores foreign data

Previous
Which of the following terms describes an organization that connects users to the Internet?
Web Server
Data Center
Internet Service Provider
Network Server
Mark this questio

Answers

Answer: Internet service provider

Explanation:

What characteristics are common among operating systems

Answers

The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.

Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.

1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).

2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.

3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.

4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.

5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.

6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.

This includes user authentication, access control mechanisms, and encryption.

7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.

These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.

For more such questions characteristics,click on

https://brainly.com/question/30995425

#SPJ8

Other Questions
14b = 56 Answer pls brainlist will be included if got right Which education degree does a Guidance Counselor usually hold?has a master's degree, but some could have a doctorate or bachelor's degree.has a doctorate degree, but some could have a master's or bachelor's degree.has a bachelor's degree, but some could have a master's degree.has a master's degree, but some could have a doctorate degree. worksheet 19Conflict Resolution (Part II)Morgans daily chore is to do the dishes after dinner each night. She just learned that she has apart in the school play and will have to rehearse at night, right after dinner. Morgans motherworks hard all day and is too tired to do the dishes. Morgan really wants to be in the school play. What is the inequality shown What is one (perhaps unintended) effect of the representative nature of american democracy? The __________ included freedom of speech, freedom of press, and freedom of assembly.A.Bill of RightsB.colonial chartersC.Northwest OrdinancesD.Articles of Confederation How do mutations in the DNA code impact real life? If hunters remove all of the mountain lions, what impact would that have on the trees?Please answer with a understandable explanation, using the image attached as a helping resource . ASAP Which of the following is not an important use of writing?A) It allows information to be passed from generation to generation.B) It allows information to be spread across great distances.C) It enables people to read literature.D) It helps people to speak more clearly. Lab: Environmental Changes in a Watershed What charts, tables, or drawings would clearly show what you have learned in this lab?. in pavlovs work with dogs, the psychic secretions were ________. I really need help in this I barely get it thx fredico has to lead a training for his company he wants to include a visual element to help engage his audience what type of application software is the best tool for the joba. desktop publishing softwareb. digital audio softwarec, presentation softwared. word processing software Find x. (The picture has the info) What is the name of Hrothgars great mead- hall? (Beowolf) Suppose that an individual has a body fat percentage of 19.6% and weighs 159 pounds. How many pounds of his weight is made up of fat? Round your answer to the nearest tenth. Read the sentence from the text.The youth said, How easy it is for you to ride, compared to me, weary from the arduous effort of walking.What does the word arduous mean? A. basic B. difficult C. proper D. lucky Joe Wong, owner of Cookie Palace, is discussing with his accountant which method of depreciation would be best for his new delivery truck. The cost of the truck is $20,000 with an estimated life of four years. The residual value of the truck is $2,500. Calculate depreciation expenses for each year. (Enter your answers as a whole dollar amount.) pls help............................................... You see an unknown individual approaching your workstation without a badge. When asked, the individual isunable to show you proper identification and becomes irate. You should:A. Ask the individual to show you his or her driver's license.B. Tell the individual to leave the facility immediately.C. Report the situation to the Security Manager.D. Assume that someone else will deal with the issue.