1 2 3 Tom 4 Tom Software House Weekly Sales Product Region Employee 5 Tom 6 Jenny 7 Jenny 8 Jeff 9 Jeff 10 Excel Word Access Excel Word Excel Word North North North North North East East Sales The correct function to sum all of Jeff sales. =SUMIFS(A3:A9,"Jeff",D3:D9) =SUMIF(A3:A9,"Jeff",D3:D9) =SUMIF(D3:D9,"Jeff",A3:A9) =SUMIFS(D3:D9,"Jeff",A3:A9) $210 $230 $190 $150 $240 $140 $340
Q: In most cases, character devices can transmit data far more quickly than block devices can. How…
A: Introduction: The system's standard system of system buffering is used by the block devices to…
Q: In light of the availability of on-chip L3 caches, please explain the pros and downsides of using…
A: Single threads execute one instruction sequence. The procedures are one-by-one. Multi-threaded…
Q: An arithmetic progression is a sequence of numbers such that the difference between the consecutive…
A: In this question, it is asked to provide a java code for the given problem statement. The problem…
Q: hat effect would runlevel 6 (or reboot.target) have if it were the syst
A: Lets see the solution.
Q: Which of the following is not a characteristic of IoT devices: remote controllability,…
A: IoTIoT is a network of interconnected computer devices that can conduct tasks and communicate with…
Q: The Priority. Queue ADT As an ADT, a priority queus P supports the following functions: • • • •…
A: Queue as ADT The queue abstract data type is defined by the following structure and operations.A…
Q: How many bytes of machine code and how many machine cycles do the following instructions take?…
A: In computer programming, machine code, also known as machine language, is the lowest-level…
Q: Immediate Activity Predecessor(s) A None B C DEFGH Calculate the expected time for completion an…
A: Time to completion: Time to completion (TTC) is a measurement of how long it will take to…
Q: comparison methods that can be useful when working with strings are StartsWith and EndsWith. These…
A: StartsWith and EndsWith are comparison methods that can be useful when working with strings. These…
Q: Mark all of the strings below it matches. Only consider full-string (not substring) matches.…
A: The above question is solved in step 2 :-
Q: If you publish an answer from another site, you will be downvoted. Answer in your own tongue, not a…
A: A synchronisation tool is semaphore. A semaphore component synchronizes or regulates access to…
Q: What is the output of the following code: .data A: .word 95 27 34 B: .word 391042 C: .word 642 315…
A: Here is the explanation regarding the given code.
Q: Determine which of the three IPv6 migration strategies is right for you.
A: IPv6: An organisation layer standard called Internet Protocol Version 6 facilitates information…
Q: Should a university course registration system be designed utilising the Waterfall or Agile…
A: Definition: The waterfall technique was developed as a standard paradigm for creating engineering…
Q: Describe three possible vulnerabilities in WiFi networks. Determine a possible attack method and a…
A: Introduction In simple terms, a Wi-Fi network seems to be a web connection that would be distributed…
Q: What is PGP, exactly? What are the five primary services provided by PGP?
A: What is PGP, given? What are the top five services that PGP offers? The answer is PGP, which stands…
Q: What is PGP, exactly? What are the five primary services provided by PGP?
A: What does PGP stand for? What are the five most essential services that PGP offers? PGP is short for…
Q: (15) 6. Minimal polynomial: a) Find the minimal polynomial of √3i over Q. b) Find the minimal…
A: Solution for the given question,
Q: Describe the inner workings of the CNSS security model. Just how big is it in three dimensions?
A: A three-dimensional model called the CNSS security model was created by John McCumbers in 1991.…
Q: Characterize the graphs G for which Y(G) +Y, (G)=p+1. 8
A: Introduction: The word "graph" does not apply to data charts like line graphs or bar graphs when…
Q: IP datagrams on a specific network can carry a maximum of only 440 bytes in the data portion. A node…
A: According to the information given:- We have to follow the instruction in order to get the number of…
Q: Can you explain the distinction between a class and an instance of a class?
A: In contrast, the instance of the class is a real thing that really uses the definitions of the class…
Q: What are the five most noteworthy computer graphics applications in today's corporate world?
A: GIVEN: What are the five most common ways that computer graphics are used? Here are five examples of…
Q: Compare the task of making a cake to the computation of three loop iterations on a parallel…
A: Introduction: Date level parallelism: It's a loop of a sort that will go through separate iterations…
Q: Mark all of the strings below it that it matches. Only consider full-string (not substring) matches.…
A: According to the information given:- We have to choose the correct option in order to satisfy the…
Q: Answer the following questions with a simple true or false and a short explanation of why you chose…
A: The data link layer protocol known as the SR protocol, or selective repetition protocol, transfers…
Q: Consider, as an example, a program that generates inventory reports for a company of reasonable…
A: Users of the Output: For the system generating inventory reports at a small store, the shop and…
Q: What is the MSC anchor's function in the GSM network?
A: Definition: A mobile switching station anchor role is another name for the anchor job in an MSC.…
Q: SAS transmits data to SCSI hard drives through parallel cables. How truthful or incorrect is this…
A: In order to determine if the statement "SAS sends data to SCSI discs through parallel connections"
Q: make notepad program in android studio kotlin
A: INTRODUCTION: You will discover how to make and use your first Android app in this codelab using the…
Q: A downgrade assault is defined as an attempt to lower something's value.
A: Downgrade assault is a type of computer attack which reduces it's security levels.
Q: What media features set an infrared network apart?
A: A wireless mobile technique called infrared (IR) is used for close-quarters device communication.…
Q: There are four general states of a process: (1) ready, (2) running, (3) waiting, and (4) terminated.…
A: Process : A running process is referred to as a program. It is the instance of a computer program…
Q: To what extent have vulnerabilities in the layer-2 protocol used by routers been discovered? When…
A: Introduction : Vulnerabilities are weaknesses in software, hardware, or firmware that can be…
Q: Write a Python program to create a joinplot and add regression and kernel density fits using "reg"…
A: jointplot The joint plot is the clearest approach to comprehend both the individual distribution of…
Q: Algorithm for Decision-making for a wumpus hunter using influence maps. Wumpus-Hunter-React(v) in:…
A: given data:
Q: Describe how the merging of the internet, mobile phones, and other media has paved the way for the…
A: Emerging Technologies: A disruptive technology is one that overthrows an existing technology and…
Q: Why do Chrome OS devices use less internal storage than competing desktop operating systems?
A: System Operating Procedures: The operating system (OS) is the software layer between the user and…
Q: 1. Write a MongoDB query to display the first 5 restaurants which are in the borough Bronx. 2. Write…
A: Suppose Structure of 'restaurants' collection: { "address": { "building": "1007", "coord": […
Q: What are some examples of Automata Theory in action?
A: The applications of automata theory must be determined here. Answer: There are several varieties of…
Q: Write a python program that reads the first n lines of a te Suppose you have a file with all these…
A: code;
Q: a. Hash the following reindeer names, in this order based on the first letter of their name into a…
A: To hash the reindeer names into a hash table of size 8, we can use a simple hash function that maps…
Q: One of the Big Ten Deliverables is often overlooked, misunderstood and even more often just plain…
A: The solution to the given question is: Answer C : Simple Operating Procedures (SOP) Simple Operating…
Q: To what end is encryption still considered the primary means of preventing information loss?
A: The process of encryption refers to the loop that The encoding of information is done with the…
Q: Do you think encryption mechanisms are a key to solving ransomware attacks?
A: Yes encryption mechanism will be a key to solve ransomware attacks.
Q: P is "Donna has a doll" Q is "Carol has a car" Write the simple English sentence for the following:…
A: Negation will change the sentence to a negative stance Question a Carol doesn't have a car and…
Q: Program - python Create an array of 10 integers and pre-populate it with 10 numbers. Then write a…
A: Below is an illustration of how to construct a 10-int integer array, pre-fill it with 10-numbers,…
Q: write a complete program in assembly (DO NOT use data segment in your code) c=0; b=7; do { C++; b--;…
A: SOLUTION- I have solved this problem in Assembly code with comments and screenshot for easy…
Q: As unique identifiers for each system, UIDs and GIDS can only be used once. How truthful or…
A: UIDs as well as GIDs The Unique Identifier, often known as the UID, is the group's one and…
Q: Shawn is approached by a medical staff team with a request to research and introduce a type of…
A: INTRODUCTION: IoT, or the Internet of Things, refers to the entire network of interconnected devices…
Step by step
Solved in 2 steps
- Hef sharks_minnows (minnows, sharks): shark_count = 0 minnow_count = len (minnows) for i in range(minnow_count): curr_shark_height = minnows [i] if curr_shark_height is not None: minnows [i] = None for j in range (i + 1, minnow_count): if minnows [j] == curr_shark_height: minnows [j] = None curr_shark_height -- 1 shark_count += 1 return shark_count <= sharks The provided code is imperfect, in that it sometimes returns True when it should return False, and sometimes returns False when it should return True. (a) Provide an example of a function call where the provided code will correctly return True (i.e. a True Positive) (b) Provide an example of a function call where the provided code will correctly return False (i.e. a True Negative) (c) Provide an example of a function call where the provided code will incorrectly return True (i.e. a False Positive) (d) Provide an example of a function call where the provided code will incorrectly return False (i.e. a False Negative)if L1={ab,b} L2={abb,bb} then L1L2= * O {ababb,abbb,abbab,bbab} O {ab,b,abb,bb} O {ababb,abbb,babb,bbb} O {abbab,abbb,bbab,bbb}Gamex, an online game website launches a game for kids where the kids have to pick up balls from a pool and drag them to the ribbon beneath the pool. The pool contains red, blue and green colored balls. Tester function of the game checks whether the kid have placed the picked balls according to the following constraints: The kid should have picked atleast one red, one blue and two green colored balls. The kid should place the balls in the following order. Red balls followed by green followed by blue balls. The number of red balls should be equal to blue balls. iv. i. ii. ii. The number of green balls should be twice as of red balls. Design pushdown automata to simulate the function of tester. Justify your answer.
- Brussel's choice def brussels_choice_step(n, mink, maxk): This problem is adapted from another jovial video "The Brussel's Choice" of Numberphile (a site so British that you just know there has to be a Trevor and a Colin somewhere in there) whose first five minutes you should watch to get an idea of what is going on. This function should compute and return the list of all numbers that the positive integer n can be converted to by treating it as a string and replacing some substring m of its digits with the new substring of either 2*m or m/2, the latter substitution allowed only when m is even so that dividing it by two produces an integer. This function should return the list of numbers that can be produced from n in a single step. To keep the results more manageable, we also impose an additional constraint that the number of digits in the chosen substring m must be between mink and maxk, inclusive. The returned list must contain the numbers in ascending sorted order.ISBNThis problem is slightly more difficult than the above problem. This one requires a data type that stores 10 digits. BackgroundPublishers and bookstores use a number system called the International Standard Book Number (ISBN) system to identify books. At the start of publication, each book is assigned a unique ISBN. An ISBN, once assigned, can never be re-used. Click here for detailed information on this numbering system.An ISBN consists of exactly 10 digits. The rightmost digit is the check digit. The check digit is validated modulo 11.• multiply each digit from the first to the ninth by a weight from 10 to 2 respectively (the first digit by 10, the second by 9,.., the ninth by 2).• the sum of the products plus the check digit should be divisible without remainder by 11.• if there is a remainder, the whole number is not a valid ISBN SpecificationsDesign a program that validates an ISBN. Your program keeps accepting a whole number and determining if that whole number is a valid…Write a function called set_plan(), which accepts, a string for a plan name, an integer for goal calories, and a pointer to an Excersie_plan. The function indirectly sets (via the pointer to the Excersie_plan) each component in the struct to the values passed into the function. The function does not return a value.
- Help Please: Write the definitions of the following functions: setWaitingTime getArrivalTime getTransactionTime getCustomerNumber of the class customerType defined in the section Application of Queues: Simulation #ifndef H_SIMULATION #define H_SIMULATION #include <fstream> #include <string> #include "queueAsArray.h" using namespace std; //**************** customerType **************** class customerType { public: customerType(int cN = 0, int arrvTime = 0, int wTime = 0, int tTime = 0); //Constructor to initialize the instance variables //according to the parameters //If no value is specified in the object declaration, //the default values are assigned. //Postcondition: customerNumber = cN; // arrivalTime = arrvTime; // waitingTime = wTime; // transactionTime = tTime void setCustomerInfo(int customerN = 0, int inTime = 0,…Project 2 – Vaccine DistributionIntroductionThis project will require you to write a function that handles matrix data using loops and indexing.You work for a government entity and have been tasked with processing information about vaccinesupply needs. Vaccines are being distributed to people in 5 phases, based on their age, pre-existingconditions, and jobs that place them at risk. Vaccines must be distributed in 2 doses. You haveinformation about the following:- Anonymous information from people in the vaccine site’s region:o The phase that they are eligible for.o Whether they have had 0, 1, or 2 doses of the vaccine.o How many days it has been since the last dose of the vaccine for an individual.- The number of vaccine doses that will be available each day.You have been tasked with determining a distribution plan for determining which individuals will get thevaccine on a given day.ProcedureWrite a function that takes 2 inputs:- A 3xN matrix of data on people in the region. Each…do q3 Question No 1: Create the following structures in C: Student : Name RegId Enrolled courses (Labs + Theory) Department Semester Faculty: Name Department Designation Salary: Implement the following scenario using functions: setMarks():This function will allow faculty member to set Student marks. getGpa(): Takes student as an argument and calculates the student’s GPA. displayStudent(): display the given student’s information. displayFaculty(): display the given faculty’s information. Question No 3: Refer to Question NO 01 Student structure and using pointer determine the senior student among two students. Print information of the senior student.
- /courses/46018/assignments/296094 >>> sum_of_greatest two(3, 100.900) 1000 4. pet_shopping_list For the purposes of this question, if you have a pet of a certain type, that pet needs food, treats, a bed and a house -- but multiple animals of the same kind can share. This function takes what kind of animal or animals you have and returns a shopping list for your pet or pets. PLAN FOR THIS FUNCTION: determine the word for a single kind of the animal. if the input is "mice", then we want the output to contain "mouse" (don't worry about any other unusual plurals). Otherwise, look for words that end with "es" and remove the final "es", so "foxes" goes to "fox". Otherwise, remove a final "s". Otherwise, assume that the word is singular. build and return a shopping list, which will be a list of strings. shopping lists should be in the shape: ["mouse food", "mouse treats", "mouse bed", "mouse house"] Sample calls should look like: >>> pet_shopping list("mice") I'mouse food', 'mouse treats',…Q3 OCaml type signature 1 Point The OCaml type signature val f : 'a -> a = indicates that function f has a parameter and return value that can be any type, as long as the types of f 's parameter and return value are the same. True False Q4 OCaml structured return values 1 Point OCaml, unlike most functional languages, does not allow functions to return structured values. True Falsei am writing a code in python in order to create an employee management application for a fictional paper company. Each employee is represented by 3 attributes: name, age and position I need to define and use the following functions display_employees(): (this needs a loop inside of the function) allocate_department (returns single list containing information) display_department_employees() (needs a loop inside of this function and uses allocate_department) head_of_department() (uses allocate_department and need to use a loop inside of this function) display_department_employees() (function that displays all info for all department. Thanks