Enter a formula in cell E4 to calculate how long each item has been on sale. This is calculated by subtracting the launch date in cell D4 from the Data Updated date in cell C20. To show the time in years, divide that result by 365. Use an absolute reference to the date in cell C20. Copy the formula from cell E4 to cells E5:E14.



In D4 is 3/17/2013


In C20 is 10/14/2016



Any help? I have no idea what function is needed for this.

Answers

Answer 1

Final answer:

In Excel, to calculate the time an item has been on sale, use the formula =($C$20-D4)/365 in cell E4 and copy it down to E5:E14. This formula subtracts the launch date from the Data Updated date and converts the result to years using an absolute reference for the Data Updated date.

Explanation:

To calculate how long each item has been on sale in an Excel spreadsheet, you would subtract the launch date in cell D4 from the Data Updated date in cell C20 and then divide by 365 to convert the difference to years. Since cell C20 should not change when you copy the formula, you need to use an absolute reference for this cell.

The formula in cell E4 will be =($C$20-D4)/365. This formula uses the absolute reference $C$20 to ensure that as you copy the formula from cell E4 to cells   E5:E14, the reference to C20 remains constant.

After entering the formula in E4, you would then copy it down to the cells E5 through E14. The result will show you the time each item has been on sale in years.


Related Questions

P3. In Section 4.2 , we noted that the maximum queuing delay is (n–1)D if the switching fabric is n times faster than the input line rates. Suppose that all packets are of the same length, n packets arrive at the same time to the n input ports, and all n packets want to be forwarded to different output ports. What is the maximum delay for a packet for the (a) memory, (b) bus, and (c) crossbar switching fabrics?

Answers

Answer:

All points are explained below in detail.

I hope it will help you

Explanation:

Disk requests come in to the disk driver for cylinders 10, 22, 20, 2, 40, 6, and 38, in that order. A seek takes 6 msec per cylinder moved. The arm is initially at cylinder 20.



How much seek time is needed if


a) FCFS


b) SSTF


c) SCAN (elevator)


algorithm is employed?

Answers

Answer:

For  FCFS = 876msec For SSTF = 360msec For SCAN(elevator) = 348msec

Explanation:

Considering FCFS algorithm.

In FCFS, the requests are addressed in the order they arrive in the disk queue, this means that the number of cylinders traveled becomes equal to the total of disk requests. With the arm initially at 20, the first request is to read cylinder 10.

Therefore the cylinders traversed for the first request = 20 – 10 = 10  

For the second request i.e. a movement from cylinder 10 to cylinder 22, the number of cylinders traversed is = 22 - 10 = 12.

Similarly, for the third request seek arm will return to 20 from 22 so, cylinders traversed through would be = 22-20 = 2.    

Also for the fourth request, cylinders traversed would be = 20 – 2 = 18.

For the fifth request, cylinders traversed = 40 – 2 = 38.

Now for the sixth request cylinders traversed = 40 – 6 = 34.

For the seventh and last request, cylinders traversed = 38 – 6 = 32.

So now to get the how much seek time is required for Disk scheduling algorithm  

First we would add the total cylinders traversed = 10 + 12 + 2+ 18+ 38 + 34 + 32

     = 146 cylinders  

So therefore the total seek time = number of cylinders traversed X seek time per cylinder

               = 146 X 6

   = 876msec

Considering SSTF algorithm.

In SSTF (Shortest Seek Time First), requests having shortest seek time are executed first. So, the seek time of every request is calculated in advance in the queue and then they are scheduled according to their calculated seek time. What this means is that the closest disk (cylinder) next to the position of the seek arm is attended to first. With   the arm at 20 initially, the first request is to read cylinder 22 (i.e. the closest cylinder to the seek arm)

Therefore the cylinders traversed for the first request = 22-20 = 2

For the second request, the disk to focus on is disk 20 and the cylinders traversed = 22-20 = 2

Similarly for the third request the seek arm will move to 10 from 20 so, cylinder traversed = 20-10 =10

For fourth request, cylinder traversed = 10 – 6 = 4

For the fifth request, cylinder traversed = 6 – 2 = 4

For sixth request, since all other disk request closer to it has been attended to the seek arm will move to disk 38 to attend to that disk request So, the cylinder traversed = 38 – 2 = 36

For the last request, cylinder traversed = 40 -38 = 2

So now to get the how much seek time is required for Disk scheduling algorithm  

First we would add the total cylinders traversed = 2 + 2 +10 + 4 + 4 + 36 + 2  

     = 60 cylinders

So therefore the total seek time = number of cylinders traversed X seek time per cylinder

     = 60 X 6 = 360msec

From Here we see that SSTF is better or an improvement to FCFS as it decrease the average response time (Average Response time is the response time of the all requests).

Considering SCAN (elevator) algorithm  

In SCAN algorithm the disk arm moves into a particular direction and services the requests coming in its path and after reaching the end of disk, it reverses its direction and again services the request arriving in its path. So, this algorithm works as an elevator and hence also known as elevator algorithm. Therefore the number of cylinder traveled becomes equal to the total of disk request. With the arm at 20 initially

The first request is to read cylinder 22 i.e. the first cylinder on the upward movement  

Therefore the cylinders traversed would be  =   20 – 22 = 2

For the second request is to read cylinder 38, and the cylinders traversed would be   = 38 – 22 =16

For the third request, seek arm will move to 40 So, the cylinders traversed would be = 40 – 38 = 2

For the fourth request, seek arm will return to 20 since from 40 since 40 is the highest in this upward elevator movement So, cylinders traversed would be = 40 -20 = 20  

For the fifth request, cylinder traversed would be = 20 – 10 = 10

For the sixth request, cylinder traversed would be   = 10 – 6 = 4

For the seventh and last request, cylinder traversed = 6 – 2 = 4

So now to get the how much seek time is required for Disk scheduling algorithm  

First we would add the total cylinders traversed = 2 + 16 + 2 + 20 +10+ 4 + 4 = 58 cylinders

So therefore the total seek time = number of cylinders traversed X seek time per cylinder

   = 58 X 6

          = 348msec

From Here we see that SCAN is better or an improvement to FCFS and SSTF as it decrease the average response time (Average Response time is the response time of the all requests).

Final answer:

The seek times for the FCFS, SSTF, and SCAN algorithms are 876 msec, 360 msec, and 348 msec, respectively, based on the provided sequence of disk requests and starting position.

Explanation:

This question concerns the calculation of seek times for a disk drive using different disk scheduling algorithms: First-Come, First-Served (FCFS), Shortest Seek Time First (SSTF), and SCAN (also known as the elevator algorithm). The seek time is determined by the number of cylinders the disk arm has to move to fulfill the requests and the time it takes to move between cylinders.

FCFS: This algorithm processes requests in the order they arrive. Starting from cylinder 20, the arm moves to 10 (10 cylinders), then to 22 (12 cylinders), 20 (2 cylinders), 2 (18 cylinders), 40 (38 cylinders), 6 (34 cylinders), and finally to 38 (32 cylinders), for a total of 146 cylinders moved.SSTF: This algorithm chooses the request with the shortest seek time next. From cylinder 20, the closest request is at 22 (2 cylinders), then back to 20 (2 cylinders), to 10 (10 cylinders), 6 (4 cylinders), 2 (4 cylinders), 38 (36 cylinders), and finally 40 (2 cylinders), totaling 60 cylinders moved.SCAN: The arm moves in one direction and services requests until the end, then reverses direction. Starting from 20, the arm goes to 22 (2 cylinders), then to 38 (16 cylinders), turns around at the end, moves to 40 (2 cylinders), down to 10 (30 cylinders), and finally to 2 (8 cylinders), moving a total of 58 cylinders.

Consider the following 3 programs:

1
//contents of file foo.c:
static int a = 5;
int main() {
f();
return 0;
}
//contents of file bar.c:
static int a = 10;
void f() {
printf("%d\n", a);
}

2
//contents of file foo.c:
int a = 5; int main() {
f();
return 0;
}
//contents of file bar.c:
void f() { int a = 10;
printf("%d\n", a);
}

3
//contents of file foo.c:
int a = 5;
int main() {
f(); return 0;
}
//contents of file bar.c:
int a;
void main() {
printf("%d\n", a);
}

If the command "gcc foo.c bar.c" is executed, which of the above programs result in a linker error?

Answers

Answer:

If the following programs are executed then Program 2 results "linker error"

Explanation:

Because In program 1, which is in the C Programming Language they declare the integer data type variable "a" as static in both files, so the scope of the static member is in the file or method then, the output of the following Program 1 is 10.

In the Program 2, which is in the C Programming Language they declare the integer data type variable in both files with initialization of 5 and 10, so when they execute the following Program 2 then, it occurs an "linker error" because the following program cannot find the value of the integer variable a.

In the Program 3, which is in the C Programming Language they declare the integer data type variable in both files but they initialize in the file "foo.c" is 5 and not initialize in the file "bar.c", so when they execute the following Program 3 then, its output is 5.

Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation applies specifically to healthcare providers?

a. FFIEC
b. FISMA
c. HIPAA
d. PCI DSS

Answers

HIPAA compliance regulation applies specifically to healthcare providers

c. HIPAA

Explanation:

HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA applies to specifically to healthcare providers.

It is a law which was designed to provide privacy standards to protect the patient's medical records, reports and other health information which may be sensitive or confidential provided to health plans, doctors, hospitals and other health care providers.

How can this be achieved? Universal Containers stores invoices in SAP. Users want to view invoice data onthe related Account records in Salesforce.

A. Create a custom Invoice Object and connect to SAP using Data Loader.B. Create an External Object connected to an invoice table in SAP.C. Use SAP data export functions to load data directly in Salesforce.D. Connect to an O-Data Publisher Service for SAP databases.

Answers

Answer:

Option B  and  Option D

are correct answers.

Explanation:

To view the invoice data on the related account records in sales force when invoices are stored in SAP we must:

Create an External Object connected to an invoice table in SAP

           OR

Connect to an O-Data Publisher Service for SAP databases.

SAP can be defined as Systems, Applications and Products. SAP is basically a software which has a backbone of SAP ERP (most advance Enterprise Resource Planing). SAP software helps to manage many business areas by providing powerful tools that include financial and logistic areas.

I hope it will help you!

Which of the following function declarations correctly expect an array as the first argument?

Question 1 options:

void f1(int array, int size);

void f1(int& array, int size);

void f1(int array[100], int size);

void f1(float array[], int size);

All of the above

C and D

A and B

Answers

Answer:

Only

Option: void f1(float array[], int size);

is valid.

Explanation:

To pass an array as argument in a function, the syntax should be as follows:

functionName (type arrayName[ ] )

We can't place the size of the array inside the array bracket (arrayName[100]) as this will give a syntax error. The empty bracket [] is required to tell the program that the value that passed as the argument is an array and differentiate it from other type of value.

Which of the following are "Best Practices" that may be appropriate for software intensive programs? (Select all that apply)
Possible Answers (Please comment if you have the answer, Thank You):
Consider the risks of reusing existing software
Use metrics to manage and monitor risk
To speed development, only test software at completion
Generate new code whenever possible

Answers

The best practices that may be appropriate for software intensive programs are:

Consider the risks of reusing existing software To speed development, only test software at completion Generate new code whenever possible

Explanation:

Consider the risks of reusing existing software. While reusing the existing software one has to take special care about the modifications to be made and  inheritances to be made.In order to do speed up the development, test the software at completion.Once the software is complete,  it can be tested for all the bugs and improvements and improved in accordance.New code should be generated whenever possible to provide more abstraction and module formation to aid the process of coding and indentation.
Final answer:

Best practices for software intensive programs include considering the risks of reusing existing software, using metrics to manage and monitor risk, and generating new code whenever possible.

Explanation:Best Practices for Software Intensive ProgramsConsider the risks of reusing existing software: Reusing existing software can save time and effort, but it is important to assess the risks involved. It's crucial to evaluate the quality and compatibility of the software to ensure it meets the requirements.Use metrics to manage and monitor risk: Metrics provide a quantitative way to measure and track risks in software development. By using metrics, organizations can identify potential problems, assess the impact, and take necessary actions to mitigate risks.Generate new code whenever possible: While reusing code is beneficial, generating new code whenever possible helps ensure that the software is tailored to the specific needs and requirements of the program. This approach allows for more flexibility and adaptability in the long run.

Learn more about Software Intensive Programs here:

https://brainly.com/question/35070986

#SPJ3

Each 4G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network

A. True
B. False

Answers

Answer:

A. True.

Explanation:

It is true that each 4G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network.

A hacktivist is someone who _______.

a. ​attempts to gain financially and/or disrupt a company’s information systems and business operations
b. attempts to destroy the infrastructure components of governments
c. hacks computers or Web sites in an attempt to promote a political ideology
d. violates computer or Internet security maliciously or for illegal personal gain

Answers

Answer:

A hacktivist is someone who hacks computers or Web sites in an attempt to promote a political ideology

Explanation:

Computer hacking is the process in which attacker or outsiders try to access the data of the company or some personnel data to damage the reputation.

Now a days, computer hacking in terms of politics is also adopted by different attackers to damage the reputation of some politician. This type of hacker are called hacktivist.

Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.

Answers

Answer: Compromised

Explanation:

Access control is the controlling and management unit for handling the  access of any user on a particular system. It implements a selective restriction on the users to access the function of computing system.

Authorized and permitted user are allowed to access the services and unauthorized party is not allowed for accessing the resources of the system. Permissible user can perform any task and consume service device.Compromising in access control depicts about intruding and spying of unauthorized user in devices that is eavesdropping. Security bypass is fault that lets the access to access system by another route.Thus, flaw in access control occurs then security of controlling and managing the system will be at risk as hacker and attacker can get access to perform function.

Final answer:

Physical access, security bypass, and eavesdropping can compromise access controls that protect information within an organization. Implementing strong access control policies helps prevent unauthorized access and data breaches.

Explanation:

Physical access, security bypass, and eavesdropping are examples of how access controls can be compromised.

Access control mechanisms are critical for protecting the confidentiality, integrity, and availability of information. When these controls fail or are bypassed, it can lead to unauthorized access and potentially to the leakage or corruption of sensitive data. Physical access refers to situations where an unauthorized individual gains direct access to hardware or systems. Security bypass occurs when normal security procedures are avoided or circumvented, often due to system or human vulnerabilities. Eavesdropping is the act of secretly listening to private conversations or monitoring transmissions, which can be a form of information theft.

Organizations must implement strong access control policies and measures, including physical security, authentication protocols, and encryption, to reduce the risk of these types of compromises and to safeguard their information assets effectively.

Based on a customer's requirements, the CPQ Admin has created multiple configuration attributes and assigned them to a single feature. Which configuration is valid for displaying the attributes?Choose one answerA. Above or below all product options in the feature.B. Above or below the feature in the bundle.C. Above or below all features in the bundle.D. Above all product options in the feature."

Answers

Answer:

Option A is the correct option.

Explanation:

The following option is correct because the following configuration is used to show the attributes which assigned in the individual feature by the CPQ Admin. So, the following configuration is the valid configuration that fulfills the necessity of the customer's.

Option B, C, and D is not the valid configuration which based on the necessity of the customer's.

Write a function that takes in a nonnegative integer and sums its digits. (Using floor division and modulo might be helpful here!)def sum_digits(n):"""Sum all the digits of n.>>> sum_digits(10) # 1 + 0 = 11>>> sum_digits(4224) # 4 + 2 + 2 + 4 = 1212>>> sum_digits(1234567890)45 """

Answers

Answer:

def sum_digits(n):

   sum=0

   while n>0:

       num=n%10     #will store digits of number

       sum+=num    #sums the digits

       n=int(n/10)

   return sum  #sum of digits is returned

Explanation:

In the above method , n is the number whose digit sum is to be returned. Sum is the variable which will store the sum of digits. Then a while loop will be executed until n is greater than 0 then num will store the individual digits of number and those digits will be added in sum variable. After that, n will be divided by 10. As we want only int variable we will typecast it into int.

What is meant by Internet Key Exchange ( IKE)?
a. A remote access client/server protocol that provides authentication and authorization capabilities to users who are accessing the network remotely.
b. It is not a secure protocol. Provides identification to communication partners via a secure connection.
c. A protocol that allows computer systems to exchange key agreement over an insecure network.
d. A protocol that secures IP communications by authenticating and encrypting each IP packet.

Answers

Answer:

The correct answer to the following question will be Option d.

Explanation:

A protocol that is used to set authenticated and secure communication between two peers is termed as Internet Key Exchange (IKE), sometimes depends on the versions such as IKEv1 or IKEv2. We can also say that 'the method of exchanging keys for authentication and encryption over unsecured medium and can secure all IP communications'.

The other three options are not related to these types of working or IKE doesn't refer to those works. So, option d is the correct answer.

PP 11.1 – Write a program that creates an exception class called StringTooLongException, designed to be thrown when a string is discovered that has too many characters in it. In the main driver of the program, read strings from the user until the user enters "DONE". If a string is entered that has too many characters (say 20), throw the exception. Allow the thrown exception to terminate the program.

Answers

Answer

The answer and procedures of the exercise are attached in the following archives.

Step-by-step explanation:

You will find the procedures, formulas or necessary explanations in the archive attached below. If you have any question ask and I will aclare your doubts kindly.  

What advantages do stack parameters have over register parameters?a. Programs using stack parameters execute more quickly.b. Register parameters are optimized for speed.c. Stack parameters reduce code clutter because registers do not have to be saved and restored.d. Stack parameters are compatible with high-level languages.

Answers

Answer:

C. Stack parameters reduce code clutter because registers do not have to be saved and restored.

D. Stack parameters are compatible with high-level languages.

Explanation:

The advantages stack parameters have over register parameters are that stack parameters reduce code clutter because registers do not have to be saved and restored and are also compatible with high-level languages.

________ is a remote access client/server protocol that provides authentication and authorization capabilities to users who are accessing the network remotely. It is not a secure protocol.
1. Network access server (NAS)
2. Extensible Authentication Protocol (EAP)
3. Authentication Header (AH)
4. Terminal Access Controller Access Control System (TACACS)

Answers

Answer:

Correct answer is (4)

Explanation:

Terminal Access Controller Access Control System

What is the purpose of using self.id in tests, while working with unittest?A. self.id returns the name of moduleB. self.id returns the name of methodC. self.id returns the name of classD. self.id returns reference value

Answers

Answer:

B. self.id returns the name of method.

Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver?

A. IPSEC
B. SHA
C. DES
D. CRC

Answers

Answer:

Option A i.e., IPSEC is the correct option.

Explanation:

Because Internet Protocol security is the security of the Internet Protocol that make secure the sent message by sender and which has been received intact by the receiver which is intended to receive the message. Internet Protocol Security uses the Internet Protocol version 4 and the Internet Protocol version 6. So, that's why the following option is correct.

What is the most common way for an attacker outside of the system to gain unauthorized access to the target system?

Answers

Stack and buffer overflow

Local variables:A. Lose the values stored in them between calls to the method in which the variable is declared
B. May have the same name as local variables in other methods
C. Are hidden from other methods
D. All of the above

Answers

Answer:

All of the above

Explanation:

A local variable is a variable which is declared within a method or is an argument passed to a method, it scope is usually local (i.e. it is hidden from other method). it can also have the same name as a local variable in another method and it loses the values stored in them between calls to the method in which the variable is declared. So all the option listed above are correct.  

Which of the following describes a VPN?

a. A hardware and software solution for remote workers, providing users with a data-encrypted gateway through a firewall and into a corporate network
b. A connection that connects two offices in different locations
c. A proprietary protocol developed by Microsoft that provides a user with a graphical interface to another computer
d. A small home office

Answers

Answer:

a. A hardware and software solution for remote workers, providing users with a data-encrypted gateway through a firewall and into a corporate network

Explanation:

VPN is the initial for Virtual Private Network. it is a highly secured channel that is encrypted end to end for for exchanging information via a public network like the internet.

Write a program that lets the user enter 10 values into an array. The program should then display the largest and smallest values stored in the array. You will loop once to read in the numbers, then another loop to find the smallest and largest number in the array and display/print the largest and smallest numbers to the screen.

Answers

Final answer:

To write a program that lets the user enter 10 values into an array and then display the largest and smallest values stored in the array, you can use a for loop to prompt the user for input, and another for loop to find the largest and smallest values in the array. Here's an example implementation in C++.

Explanation:

To write a program that lets the user enter 10 values into an array and then display the largest and smallest values stored in the array, you can follow these steps:

#include <iostream>
using namespace std;

int main() {
   int arr[10];
   
   // Prompt the user to enter 10 values
   for(int i = 0; i < 10; i++) {
       cout << "Enter a value: ";
       cin >> arr[i];
   }
   
   // Find the largest and smallest values
   int largest = arr[0];
   int smallest = arr[0];
   
   for(int i = 1; i < 10; i++) {
       if(arr[i] > largest) {
           largest = arr[i];
       }
       
       if(arr[i] < smallest) {
           smallest = arr[i];
       }
   }
   
   // Print the largest and smallest values
   cout << "Largest value: " << largest << endl;
   cout << "Smallest value: " << smallest << endl;
   
   return 0;
}

Which of the following is NOT a strategy for protecting Active Directory (AD)?

Limit the number of administrators with access to AD.

Ensure that administrators managing AD do so using separate Administrator user accounts.

Require that AD administrators do their AD work only from their workstations instead of dedicated terminal servers.

Periodically change the Directory Service Restore Mode (DSRM) password.

Answers

Answer:

Require that AD administrators do their AD work only from their workstations instead of dedicated terminal servers.

Step-by-step explanation:

Requiring that AD administrators do their AD work only from their workstations instead of dedicated terminal servers is not helpful and improbable. They will need to work from their dedicated terminal servers.

You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?

Answers

Answer:

The correct answer to the following question will be Crossover.

Explanation:

Crossover: The cable which is used to connect the same type of two Ethernet devices directly, known as Crossover cable also known as crossed cable. The temporary host-to-host networking can be created with the help of these types of crossed cables.

To connect the old router to the switch of a network, a normal cable will provide a link from the functioning.The crossover cable will be the most suitable cable for transferring the data from one device to another device, such as a laptop.

So, Crossover is the right answer.

SQL statement to verify the updated name field for the publisher with ID 5 SELECT * FROM Publisher WHERE PubID=5;

a. True
b. False

Answers

Answer:

Option(a) i.e "true" is the correct answer for the given question.

Explanation:

The select statement is used for fetching the record in the database. Select is the Data manipulation command. The given query gives  all the records where id=5 from the table publisher in the table format.After executing of query the user can verify that the field is updated or not in the table.

So the given statement is "true".

Describe precisely what the routers can send back to make prohibited outgoing TCP connections fail quickly. (Assume they cannot make any changes to the TCP implementation on clients.)

Answers

Answer:

See the explanation

Explanation:

1. The router can send back an ICMP error code indicating what happened in this case.  

2. If you send back an ICMP error code, the user's connection attempt will fail immediately, otherwise it will time out which will take several minutes.  

There are two types of ICMP codes they are destination unreachabl and destination administratively unreachable:

- The first pair of ICMP error codes(destination unreachable)might return, host unreachable and network unreachable. It is designed to indicate serious network problems.

- The second set of ICMP error codes the (destination administratively unreachable)might return, host administratively unreachable and network administratively unreachable.It is added to the official list of ICMP message types later, specifically to return when they dropped a packet.  

If your router returns an ICMP error code for every packet that violates your filtering policy you are also giving an attacker a way to probe your filtering system.  

If your router offers enough flexibility, it might make sense to configure it to return ICMP error codes to internal systems (which would like to know immediately that something is going to fail, rather than wait for a timeout) but not to external systems.

Hope this helps!

You are running an art museum. There is a long hallway with k paintings on the wall. The locations of the paintings are l1, ..., lk . These locations are real numbers, but not necessarily integers. You can place guards at locations in the hallway, and a guard can protect all paintings within 1 unit of distance from his location. The guards can be placed at any location, not just a location where there is a painting. Design a greedy algorithm to determine the minimum number of guards needed to protect all paintings.

Answers

Answer:

The answer to the algorithm is given below:

Explanation:

Algorithm:

#Define a set to keep track of the locations of the paintings.

location = {l1, l2, l3, l4, …, lk}

#Sort the set of locations.

Sort(location)

#Define a set to keep track of the positioned guards.

set P = {NULL}

#Define a variable to keep track of

#the location of the guard last positioned.

curr_guard = -infinity

#Define a variable to access the

#locations of the paintings.

i = 0

#Run the loop to access the

#location of the paintings.

#Since the location set has been sorted, the paintings

#are accessed in the order of their increasing locations.

while i < k:

#Check if the current painting is

#not protected by the current guard.

if location(i) > curr_guard + 1:

   

   #Assign a guard to

   #protect the painting.

   curr_guard = location(i) + 1

   

   #Add the guard to the set

   #of the positioned guards.

   P = P + {curr_guard}

#Increase the value of

#the variable i by 1.

i = i + 1

#Define a variable to count

#the number of guards placed

count = 0

#Run the loop to count

#the number of guards.

for guard in P:

count = count + 1

#Display the number of guards

#required to protect all the paintings.

print ("The minimum number of guards required are: ", count)

Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Quit", "quit", or "q" for the line of text.

Answers

Final answer:

To write a program that takes in a line of text as input and outputs that line of text in reverse, you can use a loop to iterate through each character in the input string and concatenate them to a new string. The program can repeat until the user enters "Quit", "quit", or "q" for the line of text.

Explanation:

To write a program that takes in a line of text as input and outputs that line of text in reverse, you can use a loop to iterate through each character in the input string. Starting from the last character and moving backwards, you can concatenate each character to a new string. Here is an example program in Python:

line = input("Enter a line of text:")
reverse_line = ""

while line.lower() not in ["quit", "q"]:
   for i in range(len(line)-1, -1, -1):
       reverse_line += line[i]
   print(reverse_line)
   line = input("Enter a line of text:")
   reverse_line = ""

Write a program that takes two numbers from the Java console representing, respectively, an investment and an interest rate (you will expect the user to enter a number such as .065 for the interest rate, representing a 6.5% interest rate). Your program should calculate and output (in $ notation) the future value of the investment in 5, 10, and 20 years using the following formula:

future value = investment * (1 + interest rate)^year

We will assume that the interest rate is an annual rate and is compounded annually.

Answers

Answer:

in this case you have to use a For cycle

Explanation:

This is the entire code for this program

Step 1: We declare two variables investment and interest with double, and we take the numbers with the console.

We ask with console the two numbers  

We show the two number in console

Step 2: We create two new double variable: Value and cont5

We save the formula in the variable Value

We create 3 For cycle

the first one for 5 years

the second one for 10 years

the third one for 20 years

package javaapplication6;

import java.util.*;

public class JavaApplication6 {

   /**

    * @param args the command line arguments

    */

   public static void main(String[] args) {

       // TODO code application logic here

     double investment;

     double interest;

Scanner keyboard = new Scanner(System.in);

 

System.out.println("Enter the investment");

investment = keyboard.nextDouble();

System.out.println("Enter the interest" );

interest = keyboard.nextDouble();

 

System.out.println("With an investment of $"+investment);

 

System.out.println("an interest rate of "+interest+"% compounded annually:");

double Value = investment * (1+interest);

double cont5 = Value;

//int Value = getValue(investment,interest,5);

for(int year = 1; year <= 4; year++){

   cont5 = cont5 * Value;

}

System.out.println("In 5 years the value is : "+"$"+cont5);

double cont10 = Value;

//Value = getValue(investment,interest,10);

for(int year = 1; year <= 9; year++){

   cont10 = cont10 * Value;

}

System.out.println("In 10 years the value is : "+"$"+cont10);

double cont20 = Value;

//Value = getValue(investment,interest,20);

for(int year = 1; year <= 19; year++){

   cont20 = cont20 * Value;

}

System.out.println("In 20 years the value is : "+"$"+cont20);

}

}  

Suppose a computer using direct mapped cache has 220 bytes of byte-addressable main memory, and a cache of 32 blocks, where each cache block contains 16 bytes. a. How many blocks of main memory are there? b. What is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, block, and offset fields? c. To which cache block will the memory address 0DB6316 map?

Answers

Answer:

Following are given answers to each part as required.

I hope it will help you!

Explanation:

Other Questions
A brick of 203 x 102 x 57 mm in dimensions is being burned in a kiln to 1100C, and then allowed to cool in a room with ambient air temperature of 30C and convection heat transfer coefficient of 5 W/m2K. If the brick has properties of rho=1920 kg/m3,Crho= 790 J/KgK, and k = 0.90 W/mK, determine the time required to cool the brick to a temperature difference of 5C from the ambient air temperature. Do seasons inuence the type of pet people adopt? A researcher is interested in finding out whether thereis a relationship between the type of pet adopted (dog, cat, bird, etc.) and the season (winter, spring, summer, fall)during which such pet would be adopted. He randomly selects 200 adoption files from the humane society andrecords the season and pet type for each of the 200 adoptions.what kind of test scenario is this?A. Simple linear regressionB. One-sample t-test for a population meanC. Paired t-test for a population mean differenceD. Two-sample t-test for the comparison of two population meansE. One-sample Z-test for a population proportionF. Two-sample Z-test for the comparison of two population proportionsG. ANOVA for comparing many population meansH. Chi-squared test of goodness of fitI. Chi-squared test of independenceJ. Chi-squared test of homogeneityK. One-sample Binomial test for a population proportion A wooden block immersed partially into water. There were 15% of the total volume of the blockexposed and 85% of the total volume immersed in water. Calculate a. the density of the wooden block Nitrogen (N) needs three more electrons to fill its outermost energy level. What is the number of electrons that Nitrogen (N) has in its outermost energy level before it forms a bond? The function f(x) = 6x + 8 represents the distance run by a cheetah in miles. The function g(x) = x 2 represents the time the cheetah ran in hours. Solve (f/g)(3), and interpret the answer. a. 26; the cheetah's rate in miles per hour b. 26; the number of cheetahs c. 1/26 ; the cheetah's rate in miles per hourd. 1/26 ; the number of cheetahs ignore my working out Can someone help me and explain the answer please Solve the system:5x-7y=-41-3x-5y=-3 PLS HURRY!!! URGENT Select the documents below that set the legal precedent for the US Bill of Rights.Magna Carta 1215The Olive Branch PetitionVirginia Declaration of RightsUS ConstitutionArticles of ConfederationNorthwest Ordinances (1785 & 1787)Declaration of IndependenceEnglish Bill of Rights 1689SELECT ALL THAT APPLY WILL GIVE BRAINIESTPLS HURRY IM BEING TIMED!!! Holdup Bank has an issue of preferred stock with a $5.95 stated dividend that just sold for $96 per share. What is the banks cost of preferred stock? (Do not round intermediate calculations. Enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) Outstanding stock of the West Corporation included 40,000 shares of $5 par common stock and 10,000 shares of 5%, $10 par non-cumulative preferred stock. In 2016, West declared and paid dividends of $4,000. In 2017, West declared and paid dividends of $20,000. How much of the 2017 dividend was distributed to preferred shareholders? $9,000. $15,000. $5,000. None of these answer choices are correct. A major objective of written representations is toa.Shift responsibility for financial statements from the management to auditors.b.Provide a substitute source of audit evidence for substantive procedures that auditors would otherwise perform.c.Provide management an opportunity to make assertions about the quantity and valuation of the physical inventory.d.Impress on management its ultimate responsibility for the financial statements and disclosures Listed below are speeds (mi/h) measured from southbound traffic on I-280 near Cupertino, California (based on data from SigAlert). This simple random sample was obtained at 3:30 pm on a weekday. Use the sample data to construct a 95% confidence interval estimate of the population standard deviation. 62 61 61 57 61 54 59 58 59 69 60 67A.) 4.7 mi/h< find the sum of first 51term of an AP whose second and third term are 14 and 18 respectively Carter lives on a street where all the house numbers are a multiple of 6. Name two house numbers between 601 and 650 The basketball season is about to start, and the owners of the Red Lions team want to advertise that fact in their home metropolitan area. They plan to run a full-page newspaper ad in Metro News. The readership of Metro News is 850,000 and the cost of the ad is $82,000. What is the cost per thousand (CPM) of this campaign?a. $56.22b. $30.00c. $102.08d. $0.50e. $96.47 A massive urban complex created by the spatial convergence of expanding metropolitan areas is formally referred to as a:_________ In the U.S., people are required to pay taxes on a. nominal interest earnings, irrespective of their real interest earnings. b. real interest earnings, irrespective of their nominal interest earnings. c. real capital gains, irrespective of their nominal capital gains. d. All of the above are correct. Because it was too painful to think about how his marriage had fallen apart due to his wife's infidelity, Russell decided that he was not going to remember anything about his marriage. Russell is trying to use _____, a form of motivated forgetting, to help ease his pain.suppressionrepressiondecayinattentional blindness an ion of which element is lager then its atomA- AlB- BrC- CaD- Sr The pictures show changes that occurred between 2006 (left image) and2015 (right image). Which of the following efforts had the most impact onthese changes?Tot On DownA. The Paris AgreementB. The Antarctic TreatyC. The Montreal ProtocolD. The Kyoto Protocol Steam Workshop Downloader