Answer:
a-true
Explanation:
you find that you not certain about what you want so I suggest you find information on that certain subject
Answer:
FALSE.Hope it helps..☺
1 Refer to the plan below and write a Java program called PrintSum which outputs the sum of the (10 marks) ..umbers from 0 up to n, where n is input by the user: Plan Initialise total and counter to 0 Get n from the user
WHILE the counter is <=n
update the total
add 1 to counter print total
The java program that called "PrintSum" that follows the provided plan is given below.
What is the Java program?import java.util.Scanner ;
public class PrintSum {
public static void main(String[] args){
int total =0;
int counter = 0;
Scanner scanner = newScanner(System.in);
System.out.print("Enter a number (n):");
int n = scanner.nextInt();
while (counter <= n) {
total += counter;
counter++;
}
System.out.println(" The sum of numbers from 0 to " +n + " is: " + total);
}
}
How does this work ?This program prompts the user to enter a number (n),then calculates the sum of numbers from 0 to n using a while loop.
The total variable is updated in each iteration of the loop,and the counter is incremented by 1. Finally, the program outputs the calculated sum.
Learn more about Java at:
https://brainly.com/question/26789430
#SPJ1
In MIPS, all operation codes (op-codes) use ______ only.
A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits
Answer:
5 bits
Explanation:
ue82ijevw8ey जभछतड।णृबदजठणब
Which of these is false?
Power BI is a tool for visualizing your data and for storytelling
Power BI is interactive and you work with dashboards and reports to discover trends and insights.
Power BI is collaborative - you work from the same data (reports, apps, dashboards) with colleagues to collaborate and share.
Power BI is another name for the reporting tools found in Excel and Microsoft Dynamics
Answer:
false
Explanation:
i think its false but , try asking your teacher to be sure of this
problem description IT
In IT, a problem description refers to a clear and concise explanation of an issue or challenge that needs to be resolved within a technology system or application.
How is this so?It involves providing relevant details about the symptoms, impact, and context of the problem.
A well-written problem description outlines the specific errors, failures, or undesired behavior observed and provides enough information for IT professionals to analyze and identify potential solutions.
A comprehensive problem description is crucial for effective troubleshooting and problem-solving in the IT field.
Learn more about Problem Description at:
https://brainly.com/question/25923602
#SPJ1
Consider this scenario: A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach?
Answer:
The company effectively implemented patch management.
Explanation:
From the question we are informed about a scenario whereby A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. In this case The company effectively implemented patch management. Patch management can be regarded as process involving distribution and application of updates to software. The patches helps in error correction i.e the vulnerabilities in the software. After the release of software, patch can be used to fix any vulnerability found. A patch can be regarded as code that are used in fixing vulnerabilities
Critical Thinking
6-1
Devising a DC Strategy
Problem:
This project is suitable for group or individual work. You're the administrator of a network of 500 users and three Windows Server 2016 DCs. All users and DCs are in a single building. Your company is adding three satellite locations that will be connected to the main site via a WAN link. Each satellite location will house between 30 and 50 users. One location has a dedicated server room where you can house a server and ensure physical security. The other two locations don't have a dedicated room for network equipment. The WAN links are of moderate to low bandwidth. Design an Active Directory structure taking into account global catalog servers, FSMO roles, sites, and domain controllers. What features of DCs and Active Directory discussed in this chapter might you use in your design?
The Active Directory (AD) database and services link users to the network resources they require to complete their tasks.The database (or directory) holds crucial details about your environment, such as how many computers and users there are, as well as who has access to them.
What is the features of DC refer ?
By verifying user identity through login credentials and blocking illegal access to those resources, domain controllers limit access to domain resources.Requests for access to domain resources are subject to security policies, which domain controllers apply. To create and administer sites, as well as to manage how the directory is replicated both within and between sites, utilize the Active Directory Sites and Services console.You can define connections between sites and how they should be used for replication using this tool. All of the information is safeguarded and kept organized by the domain controller.The domain controller (DC) is the container that Active Directory uses to store the kingdom's keys (AD). Administrators and users can easily locate and use the information that Active Directory holds about network objects.A structured data store serves as the foundation for the logical, hierarchical organization of directory data in Active Directory. A networking appliance designed specifically for enhancing the performance, security, and resilience of applications provided over the internet is known as an application delivery controller (ADC). Distributed Control Systems (DCS. Automatic regulation. Program (logic) control Remote control (start, shutdown, change of set points), Alarms and notifications management,Collection and processing of process and equipment data. Graphic presentation of process and equipment condition data.Applications like production scheduling, preventative maintenance scheduling, and information interchange are made possible by the DCS.The global dispersion of your plant's subsystems is made easier by a DCS.A DCS may effectively monitor or enhance operational qualities like: Efficiency. Industrial processes are controlled by DCS to raise their dependability, cost-effectiveness, and safety.Agriculture is one process where DCS are frequently employed.chemical factories.refineries and petrochemical (oil) industries. The DCS is interfaced with the corporate network in many contemporary systems to provide business operations with a perspective of production.View Next:DCS Wiring Plans.Test on instrumentation.Secure Control System.dustrial communication, automation, and remote function. As the name implies, the DCS is a system of sensors, controllers, and associated computers that are distributed throughout a plant. Each of these elements serves a unique purpose such as data acquisition, process control, as well as data storage and graphical display.To learn more about Active Directory refer
https://brainly.com/question/24215126
#SPJ1
d) Declare an array list and assign objects from the array in (a) that have more than or equal to 4000 votes per candidate to it.
An example of how you can declare an ArrayList and assign objects from an array that have more than or equal to 4000 votes per candidate is given in the image attached?
What is the ArrayListIn this particular instance, one has introduce and establish a Candidate category that embodies every individual who is running for election, comprising their respective titles and total number of votes they receive.
One need to go through each element in the candidates array, assess whether their vote count meets or exceeds 4000, and include them in the highVoteCandidates ArrayList. In conclusion, we output the candidates with the most votes contained in the ArrayList.
Learn more about ArrayList from
https://brainly.com/question/24275089
#SPJ1
1) If it takes your computer 2 hours to complete a process requiring 3TB of memory, how fast is your dada processing speed in KB per second
2) You are comparing two computerized devices to determine which to buy. You like downloading 30 MB songs. How many full songs will a device with 8GB storage hold
we are supposed to use the cancelling method thing or whatever
Kilobyte=KB=1024 bytes
megabyte=MB=1024 KB
gigabye=GB=1024 MB
terabyte=TB=1024 GB
If it takes a computer 2 hours to complete a process requiring 3TB of memory, the data processing speed in KB per second is: 416667KB/Second.
What is the justification for the above answer?Since our answer must be in KB/Sec, hence we first convert our data in to KB and Seconds.
Given the above conversion table,
3TB = 3 x 10⁹ or 3000000000 kb
2 hours = 7200 seconds
Hence,
Processing speed in KB/sec
= 3000000000/ 7200
= 416666.666667
\($\approx$\) 416667KB/Second
If one likes downloading 30 MB songs. How many full songs will a device with 8GB storage hold?8GB = 8000megabyts
Hence,
a device with 8,000 megabytes will contain:
8000/30
= 266 songs.
Learn more about Data Processing Speed:
https://brainly.com/question/14515121
#SPJ1
What will be the output?
name = "Dave"
print(name)
A. name
B. "Dave"
C. Dave
D. (name)
survey and describe the system
Survey systems help create, distribute, and analyze surveys by providing a framework for designing questionnaires, managing respondents, and analyzing data.
What is survey?A survey system lets users create surveys with different question types and response options. The system offers multiple ways to distribute surveys, including sharing a web link, email invites, website embedding, and social media.
Data is collected from respondents and stored accurately and securely, with error checking and validation in place. After survey completion, analyze data with summary stats, visualizations, filters, and cross-tabulations for identifying patterns. Survey systems have reporting features to generate detailed reports based on its data, including statistics, graphs, etc.
Learn more about survey from
https://brainly.com/question/14610641
#SPJ1
A library contains 60,000 books. 14,000 are on the subject of business, 22,000
are on healthcare and 12,000 on psychology and law. What percentage of the
library’s books is on computing, if computing books make up two-thirds of the
remainder?
Answer:
13%
Explanation:
Taking out business, healthcare, and psychology & law leaves 12,000. 2/3 of 12,000 is 8,000. 8,000 is 13(.333)% of 60,000.
QUESTION 1 Choose a term from COLUMN B that matches a description in COLUMN A. Write only the letter (A-L) next to the question number (1.1-1.10) in the ANSWER BOOK. COLUMN A 1.1. Substances that provide nourishment to the body 1.2. How you think and feel about something 1.3. Helps to cope with the challenges of being a student Exercise relating to increasing your heart rate 1.5. Having traits or qualities traditionally associated with 1.4. men 1.6. Seeing, hearing, or sensing something that is not really there 1.7. 1.8. Leaving everything till the last minute Is Chapter 2 in the Constitution of SA 1.9. Group of people who share notes and information 1.10. Ability to exercise for extended period of time COLUMN B A hallucination B nutrients C study group D procrastinate E endurance F Bill of Rights G Cardio-vascular H masculine I attitude J resilience K strength L flexibility
Answer:
1.1 B nutrients 1.2 I attitude 1.3 J resilience 1.4 H masculine 1.5 L flexibility 1.6 A hallucination 1.7 D procrastinate 1.8 F Bill of Rights 1.9 C study group 1.10 E endurance
Explanation:
Need help
I need help with this it’s really confusing and I have to send it to my teacher with a file I don’t get it
Answer:
100 POINTS MATHEMATICS MIDDLE SCHOOL HOMEWORK.
I will report you if you answer incorrectly or steal my points.
You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.
Project – Develop an outline for your business plan. While most of it is an outline, write a business idea statement, a purpose statement, and a plan of the next steps to do.
Our trade plan outlines the happening of a mobile app that tracks often water consumption and reminds consumers to stay hydrated.
What is the purpose?The purpose of our app search out reassure healthy hydration tendencies and advance overall wellness.
To solve our aims, we will conduct consumer research, create an example, test accompanying a focus group, purify established responses, and launch the app on two together iOS and Android principles.
We will also evolve a shopping approach, gather responses, steadily improve the app, and survey participation with well-being and well-being parties for expansion.
Read more about business plan here:
https://brainly.com/question/28303018
#SPJ1
4:when a computer is on it is
normally termed......
A:information
B:programming
C:running ↓
Answer:
c: running
Explanation:
when the computer is turned on The operating system keeps things organized in the background so that multiple programs can run at the same time
What happens during a SQL interjection?
A.
XML input is affected
B.
a syntax error occurs
C.
LDAP statements are exploited
D.
system operations are affected
Answer:
SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server.Design a pda (pushdown automata) of the following:
a^n b^n c^m d^4m
Answer:
Explanation:
Here is the design of a Pushdown Automaton (PDA) for the language L = {a^n b^n c^m d^4m}:
1. The PDA has a stack to store symbols.
2. The initial state is q0 and the initial stack symbol is Z0.
3. The transitions are defined as follows:
- Transition from q0:
- Read 'a' from the input, push 'A' to the stack, and remain in q0.
- Read 'b' from the input, pop 'A' from the stack, and transition to q1.
- Read 'c' from the input, push 'C' to the stack, and transition to q2.
- Read 'd' from the input, push 'D' to the stack, and transition to q3.
- Transition from q1:
- Read 'b' from the input, pop 'A' from the stack, and remain in q1.
- Read 'c' from the input, push 'C' to the stack, and transition to q2.
- Read 'd' from the input, push 'D' to the stack, and transition to q3.
- Transition from q2:
- Read 'c' from the input, push 'C' to the stack, and remain in q2.
- Read 'd' from the input, pop 'C' from the stack, and transition to q2.
- Read 'd' from the input, pop 'D' from the stack, and transition to q2.
- Read end of input, pop 'Z0' from the stack, and transition to q4 (final state).
- Transition from q3:
- Read 'd' from the input, push 'D' to the stack, and remain in q3.
- Read end of input, pop 'Z0' from the stack, and transition to q4 (final state).
4. The PDA accepts the input string if it reaches the final state q4 with an empty stack.
Note: This PDA design assumes that n and m are positive integers. If n or m can be zero, some modifications to the transitions may be needed to handle those cases.
in media literacy,
how does media influence public? and the press
⚫ analyze or compare the influences of social media
⚫ analyze the ethics or journalist, news outlets, etc
what is mean by computers
do any of you know of a good online web browser?
Answer:
For me well the obvious GO OGLE...LOL sorry didnt understood well..
Answer: the dark web
Explanation:
Which of the following would be considered unethical for a programmer to do? (5 points)
Create software used to protect users from identity theft
Ignore errors in programming code that could cause security issues
Protect users from unauthorized access to their personal information
Use someone else's code with the original developer's permission
One thing that would be onsidered unethical for a programmer to do is B. Ignore errors in programming code that could cause security issues
Why would this be unethical for a programmer ?Creating software designed to protect users from identity theft stands as a commendable and ethical endeavor, demonstrating the programmer's commitment to safeguarding user information and thwarting identity theft.
Engaging in such behavior would be considered unethical since it undermines the security and integrity of the software, potentially exposing users to vulnerabilities and compromising their sensitive data. Respecting intellectual property rights and obtaining proper authorization reflects adherence to ethical and legal standards.
Find out more on programmers at https://brainly.com/question/13341308
#SPJ1
For the equation y = 5 + 6x, what does y equal when x is 4?
A.
29
B.
15
C.
19
D.
23
Answer:
y = 29
Explanation:
y = 5+6x
What is y when x = 4
Substitute x with 4 :
5 + 6(4)
5 + (6×4)
5 + 24
29
y = 29
Hope this helped and have a good day
Answer:
y=29
Explanation:
y=5+6x
y=5+6(4)
y=5+24
y=29
what is the different between ethical and legal issues?
Answer:
Ethical issue is anything that a person believes to be right or wrong that generally comes down based on personal opinion or a persons belief or philosophy while legal issue is any act done by a person whether he/she thinks it is right or wrong, whether it conforms to the law and needs legal expertise.
Explanation:
You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected
Considering the situation described here, the thing to do to ensure that the host OS is protected is to install a virtual machine.
What is a virtual machine?Virtual Machine is the virtualization of a computer system. The purpose of a Virtual Machine is to deliver the functionality of a physical computer containing the execution of hardware and software.
How Virtual Machine is used to ensure that the host OS is protectedVirtual Machine is used to host the virtual environment and subsequently run the operating system within the virtual machine.
This process allows the sandbox to be isolated from the physical hardware while accessing the installed operating system.
Hence, in this case, it is concluded that the correct answer is to install a virtual machine.
Learn more about Virtual Machine here: https://brainly.com/question/24865302
create a visual python quiz that pops up when you run the code
Refer to the attachment!!
Order the steps to access the Spell Checker pane.
Click on the Review tab.
Click on the Spelling button.
Navigate to the Proofing group.
The Order of the steps to access the Spell Checker pane is:
Click on the Review tab.
Navigate to the Proofing group.
Click on the Spelling button.
What is the order?In Microsoft Word and additional identical program, the Review tab is a ticket situated favorable of the screen, occasionally close tabs to a degree Home, Insert, and Page Layout.
In Clicking on the Review label will take you to the portion of the program that holds forms for inspecting and rewriting your document.
Learn more about Spell Checker pane from
https://brainly.com/question/14307537
#SPJ1
python assighment 12 not whole question
For this assignment, you will write a series of methods which are designed to help you analyze how often different words appear in text. You will be provided texts as lists of words, and you will use dictionaries to help with your analysis.
Methods to write
Method
Description
get_word_counts(word_list)
This method will take a list parameter and return a dictionary which has as its keys the words from the list, and has as its values the number of times that word appears in the list. So, for example, if you have the following list:
words = ["to", "be", "or", "not", "to", "be"]
then get_word_counts(words) should return this dictionary:
{'to': 2, 'be': 2, 'or': 1, 'not': 1}
number_of_appearances(word_counts, word)
This method takes a dictionary of word counts (like the one returned from your get_word_counts method) as a parameter and a single word. It returns the number of times that word appears in the text (i.e. the value if it exists in the dictionary, or 0 otherwise).
total_words(word_counts)
This method takes a dictionary of word counts (like the one returned from your get_word_counts method) as a parameter. It returns the total number of words from the text (i.e. the sum of all the values).
most_common(word_counts)
This method takes a dictionary of word counts (like the one returned from your get_word_counts method) as a parameter. It returns the word which appears the most frequently (i.e. the key with the highest value in the dictionary). Don't worry if there is more than one most common word; any correct answer should pass the grader, as it will be tested only on word count dictionaries with a single most common word.
single_words(word_counts)
This method takes a dictionary of word counts (like the one returned from your get_word_counts method) as a parameter. It returns a list containing every word which appears exactly once (i.e. every key which has a value of 1).
get_combined_counts(word_counts_a, word_counts_b)
This method takes two dictionaries of word counts (like the one returned from your get_word_counts method) as parameters. It returns a single dictionary which combines the totals from both.
The starter code already contains the following lines of code to test your methods on some words from two classic Beatles songs.
words = ['oh', 'i', 'need', 'your', 'love', 'babe', 'guess', 'you', 'know', 'its', 'true', 'hope', 'you', 'need', 'my', 'love', 'babe', 'just', 'like', 'i', 'need', 'you', 'hold', 'me', 'love', 'me', 'hold', 'me', 'love', 'me', 'i', 'aint', 'got', 'nothing', 'but', 'love', 'babe', 'eight', 'days', 'a', 'week', 'love', 'you', 'every', 'day', 'girl', 'always', 'on', 'my', 'mind', 'one', 'thing', 'i', 'can', 'say', 'girl', 'love', 'you', 'all', 'the', 'time', 'hold', 'me', 'love', 'me', 'hold', 'me', 'love', 'me', 'i', 'aint', 'got', 'nothing', 'but', 'love', 'girl', 'eight', 'days', 'a', 'week', 'eight', 'days', 'a', 'week', 'i', 'love', 'you', 'eight', 'days', 'a', 'week', 'is', 'not', 'enough', 'to', 'show', 'i', 'care']
counts = get_word_counts(words)
print("WORD COUNTS")
for word in sorted(counts):
print(word, counts[word])
print()
print("Appearances of 'need':", number_of_appearances(counts, "need"))
print("Appearances of 'want':", number_of_appearances(counts, "want"))
print()
print("Total words:", total_words(counts))
print("Most common word:", most_common(counts))
print()
print("SINGLE WORDS")
for word in sorted(single_words(counts)):
print(word)
print()
other_words = ['love', 'love', 'me', 'do', 'you', 'know', 'i', 'love', 'you', 'ill', 'always', 'be', 'true', 'so', 'please', 'love', 'me', 'do', 'whoa', 'love', 'me', 'do', 'love', 'love', 'me', 'do', 'you', 'know', 'i', 'love', 'you', 'ill', 'always', 'be', 'true', 'so', 'please', 'love', 'me', 'do', 'whoa', 'love', 'me', 'do', 'someone', 'to', 'love', 'somebody', 'new', 'someone', 'to', 'love', 'someone', 'like', 'you']
other_counts = get_word_counts(other_words)
print("OTHER WORD COUNTS")
for word in sorted(other_counts):
print(word, other_counts[word])
print()
combined_counts = get_combined_counts(counts, other_counts)
print("COMBINED WORD COUNTS")
for word in sorted(combined_counts):
print(word, combined_counts[word])
You should uncomment lines to test your methods as you go along. Leave these lines uncommented when you submit your code, as the grader will use them for one of the tests.
If you want to transform your own text to a list so you can analyze it using your methods, here is some simple code you can use to change a passage into a list. Be warned - it may not work if your text contains quotation marks or line breaks.
Python runs on a variety of operating systems, including Windows, Mac, Linux, and Raspberry Pi.
Thus, The syntax of Python is straightforward and resembles that of English. Python's syntax differs from various other programming languages in that it enables programmers to construct applications with fewer lines of code and Linux.
Python operates on an interpreter system, allowing for the immediate execution of written code. As a result, prototyping can proceed quickly. Python can be used in a functional, object-oriented, or procedural manner.
Web applications can be developed on a server using Python. Workflows can be made with Python and other technologies.
Thus, Python runs on a variety of operating systems, including Windows, Mac, Linux, and Raspberry Pi.
Learn more about Python, refer to the link:
https://brainly.com/question/32166954
#SPJ1
a. Draw the hierarchy chart and then plan the logic for a program needed by Hometown Bank. The program determines a monthly checking account fee. Input includes an account balance and the number of times the account was overdrawn. The output is the fee, which is 1 percent of the balance minus 5 dollars for each time the account was overdrawn. Use three modules. The main program declares global variables and calls housekeeping, detail, and end-of-job modules. The housekeeping module prompts for and accepts a balances. The detail module prompts for and accepts the number of overdrafts, computes the fee, and displays the result. The end-of-job module displays the message Thanks for using this program.
b. Revise the banking program so that it runs continuously for any number of accounts. The detail loop executes continuously while the balance entered is not negative; in addition to calculating the fee, it prompts the user for and gets the balance for the next account. The end-of-job module executes after a number less than 0 is entered for the account balance.
Hierarchy chart and pseudocode required
The Hierarchy Chart for the program needed by Hometown Bank is given below:
Main Program
|
-------------
| |
Housekeeping module Detail module
| |
Prompts for balance Computes fee
and accepts input and displays result
|
-----------------
| |
End-of-job module Detail loop (while balance >= 0)
|
Displays message "Thanks for using this program"
Pseudocode for Main Program:Declare global variables
Call Housekeeping module
Call Detail module
Call End-of-job module
Pseudocode for Housekeeping Module:
Prompt for balance
Accept input for balance
Pseudocode for Detail Module:
Detail loop:
while (balance >= 0)
Prompt for number of overdrafts
Accept input for number of overdrafts
Compute fee: 1 percent of balance - 5 dollars * number of overdrafts
Display result
Prompt for balance
Accept input for balance
Pseudocode for End-of-job Module:
Display message "Thanks for using this program"
Read more about pseudocode here:
https://brainly.com/question/24953880
#SPJ1
=SUM(A2:A19,013,855,19)
What is the meaning of sum
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The meaning of the sum is to add the value of the given cells. Basically,the meaning of the sum is the addition of numbers.
For example, in excel write in the formula bar, "=Sum()" its meaning is to add the value of all the given reference cells. As given in the question, "=Sum()" will add the value of the cells A2,A19, O13 and then add into 855 and 19. After all this, show the addition result in the cells where this formula is written.
A Quicksort (or Partition Exchange Sort) divides the data into 2 partitions separated by a pivot. The first partition contains all the items which are smaller than the pivot. The remaining items are in the other partition. You will write four versions of Quicksort:
• Select the first item of the partition as the pivot. Treat partitions of size one and two as stopping cases.
• Same pivot selection. For a partition of size 100 or less, use an insertion sort to finish.
• Same pivot selection. For a partition of size 50 or less, use an insertion sort to finish.
• Select the median-of-three as the pivot. Treat partitions of size one and two as stopping cases.
As time permits consider examining additional, alternate methods of selecting the pivot for Quicksort.
Merge Sort is a useful sort to know if you are doing External Sorting. The need for this will increase as data sizes increase. The traditional Merge Sort requires double space. To eliminate this issue, you are to implement Natural Merge using a linked implementation. In your analysis be sure to compare to the effect of using a straight Merge Sort instead.
Create input files of four sizes: 50, 1000, 2000, 5000 and 10000 integers. For each size file make 3 versions. On the first use a randomly ordered data set. On the second use the integers in reverse order. On the third use the
integers in normal ascending order. (You may use a random number generator to create the randomly ordered file, but it is important to limit the duplicates to <1%. Alternatively, you may write a shuffle function to randomize one of your ordered files.) This means you have an input set of 15 files plus whatever you deem necessary and reasonable. Files are available in the Blackboard shell, if you want to copy them. Your data should be formatted so that each number is on a separate line with no leading blanks. There should be no blank lines in the file. Even though you are limiting the occurrence of duplicates, your sorts must be able to handle duplicate data.
Each sort must be run against all the input files. With five sorts and 15 input sets, you will have 75 required runs.
The size 50 files are for the purpose of showing the sorting is correct. Your code needs to print out the comparisons and exchanges (see below) and the sorted values. You must submit the input and output files for all orders of size 50, for all sorts. There should be 15 output files here.
The larger sizes of input are used to demonstrate the asymptotic cost. To demonstrate the asymptotic cost you will need to count comparisons and exchanges for each sort. For these files at the end of each run you need to print the number of comparisons and the number of exchanges but not the sorted data. It is to your advantage to add larger files or additional random files to the input - perhaps with 15-20% duplicates. You may find it interesting to time the runs, but this should be in addition to counting comparisons and exchanges.
Turn in an analysis comparing the two sorts and their performance. Be sure to comment on the relative numbers of exchanges and comparison in the various runs, the effect of the order of the data, the effect of different size files, the effect of different partition sizes and pivot selection methods for Quicksort, and the effect of using a Natural Merge Sort. Which factor has the most effect on the efficiency? Be sure to consider both time and space efficiency. Be sure to justify your data structures. Your analysis must include a table of the comparisons and exchanges observed and a graph of the asymptotic costs that you observed compared to the theoretical cost. Be sure to justify your choice of iteration versus recursion. Consider how your code would have differed if you had made the other choice.
The necessary conditions and procedures needed to accomplish this assignment is given below. Quicksort is an algorithm used to sort data in a fast and efficient manner.
What is the Quicksort?Some rules to follow in the above work are:
A)Choose the initial element of the partition as the pivot.
b) Utilize the same method to select the pivot, but switch to insertion sort as the concluding step for partitions that contain 100 or fewer elements.
Lastly, Utilize the same method of pivot selection, but choose insertion sort for partitions that are of a size equal to or lesser than 50 in order to accomplish the task.
Learn more about Quicksort from
https://brainly.com/question/29981648
#SPJ1