suppose data array contains 10000000 elements. using the binary search algorithim, one requires only

Answers

Answer 1

An effective approach for locating a particular item from a sorted list of elements is binary search. It works by continually dividing the section of the list that might contain the item in half, until there is only one possible position left.

What is the must required for binary search algorithm?

Sorted arrays can be used for binary search. A middle-of-the-array element and the desired value are first compared in a binary search. The position of the element in the array is returned if the target value matches the element. The lower half of the array is searched if the target value is less than the element.

To arrive at this point, I comparisons are required, where n2i=1. We get i=logn when we solve for i. Depending on how many items are in the list, the maximum number of comparisons is logarithmic. As a result, the binary search returns O. (logn).A binary search algorithm is used to locate an element in an array that has already been sorted.

To learn more about binary refer to:

https://brainly.com/question/15190740

#SPJ4


Related Questions

What is the classification of the Gartner company?
multimedia
consultant
search engine
Cloud software company

Answers

Answer:

It Is Multimedia

Explanation:

Trust Me

Consultant.

"Gartner is a provider of research and consulting services for businesses in the IT sector"

Write a function predict_wait that takes a duration and returns the predicted wait time using the appropriate regression line, depending on whether the duration is below 3 or greater than (or equal to) 3.

Answers

The appropriate function which could be used to model the scenario can be written thus ; The program is written in python 3 ;

y = 3x + 3.5

#since no data is given ; using an hypothetical regression equation expressed in slope - intercept format ; where, x = duration and y = Predicted wait time.

def predict_wait(x) :

#initialize a function named predict_wait and takes in a certain duration value, x

y = 3*x + 3.5

#input the x - value into the regression equation to calculate y

return y

#return y

Learn more : https://brainly.com/question/25556810

Admission to attend a show are as follows:
Adults: $20
Children:$15

Write a program that reads the number of children attending the show, as well as the number of adults. Calculate and print the total revenue made.(Pascal)

Answers

Answer:

#include <bits/stdc++. h>

using namespace std;

int main(){



int AdultPrice = 20;

int ChildrenPrice = 15;

int numChildren, numAdults;

cin >>numChildren >> numAdults;

int revChildren = numChildren*ChildrenPrice;

int revAdult = numAdults*AdultPrice;

cout << revChildren+revAdult << endl;

return 0;

}

why should technology be used?

Answers

Answer: Okay

Explanation:

Technology is important because it makes you feel more secure with every area in life for both personal and business reasons. With technology advancing more people are able to have access to supplies such as fresh water and food because technology can help deliver those items to people that otherwise couldn't get it.

check image dont answer if you dont know please

check image dont answer if you dont know please

Answers

Answer:

Explanation:

1-2nd option

2-1st option

3-last option

hope this helps!! have a good rest of ur day!! <3

Identify the fallacy (if there is one) committed in the following passage: “In America the people appoint the legislative and the executive power and furnish the jurors who punish all infractions of the laws. The intuitions are democratic, not only in their principle, but in all their consequences. The people are therefore the real directing power.”

Ad Hominem
Tu Quoque
Appeal to Popularity
Appeal to Ignorance
No Fallacy In Passage

Answers

Based on the excerpt, we can logically deduce that there is: D. No Fallacy In Passage.

The types of fallacy.

In English literature, there are different types of fallacy and these include the following:

Appeal to authoritySlippery slopeHasty generalizationsAd HominemAppeal to Popularity (Ad populum)

Based on the excerpt, we can logically deduce that there is no fallacy In the passage because the statement isn't a false belief or based on illogical arguments and reasoning.

Read more on fallacy here: https://brainly.com/question/1395048

#SPJ1

3.15 LAB: Countdown until matching digits
Write a program that takes in an integer in the range 20-98 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.

Ex: If the input is:

93
the output is:

93 92 91 90 89 88
Ex: If the input is:

77
the output is:

77
Ex: If the input is:

15
or any value not between 20 and 98 (inclusive), the output is:

Input must be 20-98.


#include

using namespace std;

int main() {

// variable

int num;



// read number

cin >> num;

while(num<20||num>98)

{

cout<<"Input must be 20-98 ";

cin>> num;

}



while(num % 10 != num /10)

{

// print numbers.

cout<
// update num.

num--;

}

// display the number.

cout<
return 0;

}




I keep getting Program generated too much output.
Output restricted to 50000 characters.

Check program for any unterminated loops generating output

Answers

Answer:

See explaination

Explanation:

n = int(input())

if 20 <= n <= 98:

while n % 11 != 0: // for all numbers in range (20-98) all the identical

digit numbers are divisible by 11,So all numbers that

​​​​​​ are not divisible by 11 are a part of count down, This

while loop stops when output digits get identical.

print(n, end=" ")

n = n - 1

print(n)

else:

print("Input must be 20-98")

Developers must avoid using data that ______ select 3 options

1. Are based on historic inequalities

2. do not represent the people it bill be used for

3. Favor majority groups

4. Are inaccurate or incomplete in any way

5. Are based on their assumptions or knowledge

Answers

Developers must avoid using data that:

1. Are based on historic inequalities

2.do not represent the people it will be used for

3.Are inaccurate or incomplete in any way

HELP ASAP! Can someone help me identify the issue with my c++ code? My output looks like the given outcome but is wrong. Please help, I'll appreciate it.

#include //Input/Output Library
#include //Format Library
using namespace std;
const int COLS = 6;
const int ROWS = 6;
void fillTbl(int array[ROWS][COLS], int);
void prntTbl(int array[ROWS][COLS], int);
int main(int argc, char **argv)
{
int tablSum[ROWS][COLS];
prntTbl(tablSum, ROWS);
return 0;
}
void fillTbl(int array[ROWS][COLS], int numRows)
{
for (int row = 1; row <= numRows; row++)
{
cout << setw(4) << row;
}
}
void prntTbl(int array[ROWS][COLS], int print)
{
cout << "Think of this as the Sum of Dice Table" << endl;
cout << " C o l u m n s" << endl;
cout << " |";
for (int row = 1; row <= ROWS; row++)
{
cout << setw(4) << row;
}
cout << "" << endl;

cout << "---------------------------------" << endl;
for (int row = 1; row <= 6; row++)
{
if (row == 1)
cout << " ";
if (row == 2)
cout << "R ";
if (row == 3)
cout << "O ";
if (row == 4)
cout << "W ";
if (row == 5)
cout << "S ";
if (row == 6)
cout << " ";
cout << row << " |";
for (int col = 1; col <= 6; col++)
{
cout << setw(4) << row + col;
}
cout << endl;
}
}

HELP ASAP! Can someone help me identify the issue with my c++ code? My output looks like the given outcome
HELP ASAP! Can someone help me identify the issue with my c++ code? My output looks like the given outcome

Answers

I see that your code is missing the function call to fillTbl() which is responsible for populating the tablSum array. Y

The Program to use

fillTbl(tablSum, ROWS);

This will ensure that the array is properly filled before being printed.

Therefore, you need to call this function before calling prntTbl() in the main() function. Add the following line before prntTbl(tablSum, ROWS);:

To guarantee the correct filling of the array, it must be ensured prior to its printing.

Read more about debugging here:

https://brainly.com/question/18554491

#SPJ1

https://www.celonis.com/solutions/celonis-snap

Using this link

To do this alternative assignment in lieu of Case 2, Part 2, answer the 20 questions below. You
will see on the left side of the screen a menu for Process Analytics. Select no. 5, which is Order
to Cash and click on the USD version. This file is very similar to the one that is used for the BWF
transactions in Case 2, Part 2.
Once you are viewing the process analysis for Order to Cash, answer the following questions:
1. What is the number of overall cases?
2. What is the net order value?
Next, in the file, go to the bottom middle where you see Variants and hit the + and see what it
does to the right under the detail of variants. Keep hitting the + until you see where more than a
majority of the variants (deviations) are explained or where there is a big drop off from the last
variant to the next that explains the deviations.
3. What is the number of variants you selected?
4. What percentage of the deviations are explained at that number of variants, and why did you
pick that number of variants?
5. What are the specific variants you selected? Hint: As you expand the variants, you will see on
the flowchart/graph details on the variants.
6. For each variant, specify what is the percentage of cases and number of cases covered by that
variant? For example: If you selected two variants, you should show the information for each
variant separately. If two were your choice, then the two added together should add up to the
percentage you provided in question 4 and the number you provided in question 3.
7. For each variant, how does that change the duration? For example for the cases impacted by
variant 1, should show a duration in days, then a separate duration in days for cases impacted
by variant 2.
At the bottom of the screen, you see tabs such as Process, Overview, Automation, Rework, Benchmark,
Details, Conformance, Process AI, Social Graph, and Social PI. On the Overview tab, answer the
following questions:
8. In what month was the largest number of sales/highest dollar volume?
9. What was the number of sales items and the dollar volume?
10. Which distribution channel has the highest sales and what is the amount of sales?
11. Which distribution channel has the second highest sales and what is the amount of sales?
Next move to the Automation tab and answer the following questions:
12. What is the second highest month of sales order?
13. What is the automation rate for that month?
Nest move to the Details tab and answer the following questions:
14. What is the net order for Skin Care, V1, Plant W24?
15. What is the net order for Fruits, VV2, Plant WW10?
Next move to the Process AI tab and answer the following questions:
16. What is the number of the most Common Path’s KPI?
17. What is the average days of the most Common Path’s KPI?
18. What other information can you get off this tab?
Next move to the Social Graph and answer the following questions:
19. Whose name do you see appear on the graph first?
20. What are the number of cases routed to him at the Process Start?

Answers

1. The number of overall cases are 53,761 cases.

2. The net order value of USD 1,390,121,425.00.

3. The number of variants selected is 7.4.

4. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. Seven variants explain 87.3% of the total variance, including order, delivery, credit limit, material availability, order release, goods issue, and invoice verification.

10. January recorded the highest sales volume, with 256,384 items sold for USD 6,607,088.00. Wholesale emerged as the top distribution channel, followed by Retail.

12. December stood out as the second-highest sales month,

13. with an automation rate of 99.9%.

14. Notable orders include Skin Care, V1, Plant W24 (USD 45,000.00) and

15. Fruits, VV2, Plant WW10 (USD 43,935.00).

17. The most common path had a KPI of 4, averaging 1.8 days.

18. This data enables process analysis and improvement, including process discovery, conformance, and enhancement.

19. The Social Graph shows Bob as the first name,

20. receiving 11,106 cases at the Process Start.

1. The total number of cases is 53,761.2. The net order value is USD 1,390,121,425.00.3. The number of variants selected is 7.4. The percentage of the total variance explained at 7 is 87.3%. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. The seven specific variants that were selected are: Order, Delivery and Invoice, Check credit limit, Check material availability, Order release, Goods issue, and Invoice verification.6. Below is a table showing the percentage of cases and number of cases covered by each variant:VariantPercentage of casesNumber of casesOrder57.2%30,775Delivery and Invoice23.4%12,591Check credit limit5.1%2,757

Check material availability4.2%2,240Order release4.0%2,126Goods issue2.4%1,276Invoice verification1.7%9047. The duration of each variant is as follows:VariantDuration in daysOrder24Delivery and Invoice3Check credit limit2Check material availability1Order release2Goods issue4Invoice verification1

8. The largest number of sales/highest dollar volume was in January.9. The number of sales items was 256,384, and the dollar volume was USD 6,607,088.00.10. The distribution channel with the highest sales is Wholesale and the amount of sales is USD 3,819,864.00.

11. The distribution channel with the second-highest sales is Retail and the amount of sales is USD 2,167,992.00.12. The second-highest month of sales order is December.13. The automation rate for that month is 99.9%.14. The net order for Skin Care, V1, Plant W24 is USD 45,000.00.15.

The net order for Fruits, VV2, Plant WW10 is USD 43,935.00.16. The number of the most common path’s KPI is 4.17. The average days of the most common path’s KPI is 1.8 days.18. Additional information that can be obtained from this tab includes process discovery, process conformance, and process enhancement.

19. The first name that appears on the Social Graph is Bob.20. The number of cases routed to Bob at the Process Start is 11,106.

For more such questions deviations,Click on

https://brainly.com/question/24251046

#SPJ8

Print air_temperature with 1 decimal point followed by C.

Sample output with input: 36.4158102
36.4C

Answers

Answer:

printf("%.1f", air_temperature);

Explanation:

Name The Picture Of Tools And Equipment For Baking Purpose.

Name The Picture Of Tools And Equipment For Baking Purpose.

Answers

Answer:

from top left to right and than going down

1. Measuring Cup

2.Microwave/Oven

3.Scale

4.Pastry Brush

5.Measuring Spoons

6. Vacuum or some sort of decorative device maybe a pan

7.pie pan

8.piping bag

9.spacula

10. knife

11. rollin pin

12.Tart pan

explanation:

i am not sure what is nr. 6 but i got the rest sorry if i am unable to help you out.

Tom and Jerry opened a new lawn service. They provide three types of services: mowing, fertilizing, and planting trees. The cost of mowing is $35.00 per 5,000 square yards, fertilizing is $30.00 per application, and planting a tree is $50.00. Write an algorithm that prompts the user to enter the area of the lawn, the number of fertilizing applications, and the number of trees to be planted. The algorithm then determines the billing amount. (Assume that the user orders all three services.)

Answers

Answer:

INPUT area of the lawn

INPUT number of fertilizing applications

INPUT number of trees to be planted

SET bill = (35 x area of the lawn/5000) + (30 x number of fertilizing applications) + (50 x number of trees to be planted)

PRINT bill

Explanation:

Ask the user to enter the area of the lawn, the number of fertilizing applications, and the number of trees to be planted

Calculate the bill

Print the bill

I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AM

Questions for chapter 8: EX8.1, EX8.4, EX8.6, EX8.7, EX8.8

I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for
I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for
I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for

Answers

The response to the following prompts on programming in relation to array objects and codes are given below.

What is the solution to the above prompts?

A)

Valid declarations that instantiate an array object are:

boolean completed[J] = {true, true, false, false};

This declaration creates a boolean array named "completed" of length 4 with initial values {true, true, false, false}.

int powersOfTwo[] = {1, 2, 4, 8, 16, 32, 64, 128};

This declaration creates an integer array named "powersOfTwo" of length 8 with initial values {1, 2, 4, 8, 16, 32, 64, 128}.

char[] vowels = new char[5];

This declaration creates a character array named "vowels" of length 5 with default initial values (null for char).

float[] tLength = new float[100];

This declaration creates a float array named "tLength" of length 100 with default initial values (0.0f for float).

String[] names = new String[]{"Sam", "Frodo", "Merry"};

This declaration creates a String array named "names" of length 3 with initial values {"Sam", "Frodo", "Merry"}.

char[] vowels = {'a', 'e', 'i', 'o', 'u'};

This declaration creates a character array named "vowels" of length 5 with initial values {'a', 'e', 'i', 'o', 'u'}.

double[] standardDeviation = new double[1];

This declaration creates a double array named "standardDeviation" of length 1 with default initial value (0.0 for double).

In summary, arrays are objects in Java that store a fixed-size sequential collection of elements of the same type. The syntax for creating an array includes the type of the elements, the name of the array, and the number of elements to be stored in the array. An array can be initialized using curly braces ({}) to specify the initial values of the elements.


B) The problem with the code is that the loop condition in the for loop is incorrect. The index should start from 0 instead of 1, and the loop should run until index < masses.length instead of masses.length + 1. Also, the totalMass should be incremented by masses[index], not assigned to it.

Corrected code:
double[] masses = {123.6, 34.2, 765.87, 987.43, 90, 321, 5};

double totalMass = 0;

for (int index = 0; index < masses.length; index++) {

   totalMass += masses[index];

}


The modifications made here are to correct the starting index of the loop, fix the loop condition, and increment the totalMass variable correctly.


C)

1)
Code to set each element of an array called nums to the value of the constant INITIAL:

const int INITIAL = 10; // or any other desired initial value

int nums[5]; // assuming nums is an array of size 5

for (int i = 0; i < 5; i++) {

   nums[i] = INITIAL;

}


2) Code to print the values stored in an array called names backwards:
string names[4] = {"John", "Jane", "Bob", "Alice"}; // assuming names is an array of size 4

for (int i = 3; i >= 0; i--) {

   cout << names[i] << " ".

}



3) Code to set each element of a boolean array called flags to alternating values (true at index 0, false at index 1, true at index 2, etc.):

bool flags[6]; // assuming flags is an array of size 6

for (int i = 0; i < 6; i++) {

   flags[i] = (i % 2 == 0);

}


Learn more about array objects at:

https://brainly.com/question/16968729

#SPJ1

Why vechiles Tyres are black in colour?​

Answers

Answer: See explanation

Explanation:

It should be noted that the rubber that tire is made from has a color that's milky white but due to the fact that carbon black is being added to the rubber, then the tire will turn to black.

The importance of carbon black to tires is immense as it acts as the stabilizing chemical compound. Also, it helps in increasing the strength of the tire and its durability and also protects the tire from ozone effect.

Windows 8 allows ______________ to be personalized.

Internet Explorer settings
social media profiles
backgrounds and user environment colors
usernames and passwords

Answers

Answer:

backgrounds and user environment colors

Explanation:

Windows 8 allows it since Windows 8 makes it easy to customize the look and feel of the Desktop view. In this lesson, you'll learn how to access the Personalization pane, which allows you to customize the theme, background image, and color of your Desktop. You'll also learn how to adjust your font size and text display..

what does syntax error mean :-;
explain briefly.

thankyou!

Answers

A syntax error is an error in the syntax of a sequence of characters or tokens that is intended to be written in a particular programming language. For compiled languages, syntax errors are detected at compile-time. A program will not compile until all syntax errors are corrected.

How have advancements in technology and social media impacted communication and relationships in our society?

Answers

Answer:The advancement of technology has changed how people communicate, giving us brand-new options such as text messaging, email,  and chat rooms,

Explanation:

Answer: the answer will be they allow faster and more efficient communication and can help build relationships.

Explanation:

Select the correct answer from each drop-down menu.
Tanya wants to include an instructional video with all its controls on her office website. The dimensions of the video are as follows:
width="260"
height="200"
What code should Tanya use to insert the video?
To insert the video, Tanya should add the following code:

✓="video/mp4">

Select the correct answer from each drop-down menu.Tanya wants to include an instructional video with

Answers

The browser will use the first file that it supports. If the browser does not support any of the files, the text between the video and </video> tags will be displayed.

How to explain the information

Tanya can use the following code to insert the video with all its controls on her office website:

<video width="260" height="200" controls>

 <source src="video.mp4" type="video/mp4">

 <source src="video.ogg" type="video/ogg">

 Your browser does not support the video tag.

</video>

The width and height attributes specify the dimensions of the video player. The controls attribute specifies that the video player should display all its controls. The source elements specify the location of the video files.

The first source element specifies the location of the MP4 file, and the second source element specifies the location of the Ogg file. The browser will use the first file that it supports. If the browser does not support any of the files, the text between the video and </video> tags will be displayed.

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

Write a program in c++ that plays a number guessing game with a Human user. The Human user will think of a number between 1 and 100, inclusive. The program will make guesses and the user will tell the program to guess higher or lower. A sample run of the program might look like this: Ready to play (y/n)? y Think of a number between 1 and 100. My guess is 50. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: h My guess is 75. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: h My guess is 88. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: l My guess is 81. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: c Great! Do you want to play again (y/n)? y Think of a number between 1 and 100. My guess is 50. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: l My guess is 25. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: h My guess is 37. Enter 'l' if your number is lower, 'h' if it is higher, 'c' if it is correct: c Great! Do you want to play again (y/n)? n The strategy that the program will use goes like this: Every time the program makes a guess it should guess the midpoint of the remaining possible values. Consider the first example above, in which the user has chosen the number 81: On the first guess, the possible values are 1 to 100. The midpoint is 50. The user responds by saying "higher" On the second guess the possible values are 51 to 100. The midpoint is 75. The user responds by saying "higher" On the third guess the possible values are 76 to 100. The midpoint is 88. The user responds by saying "lower" On the fourth guess the possible values are 76 to 87. The midpoint is 81. The user responds "correct" Additional Requirements The purpose of the assignment is to practice writing functions. Although it would be possible to write the entire program in the main function, your solution should be heavily structured. Most of the point penalties given on this assignment will be for not following the instructions below carefully. The main function must look exactly like this. Copy and paste this code into your file, and don't edit it: int main() { char response; cout > response; while (response == 'y') { playOneGame(); cout > response; } } The playOneGame() function should implement a complete guessing game on the range of 1 to 100. The lower and upper bounds of the range should be assigned to global named constants and then not used again in your code. In addition, you should implement the following helper functions to be invoked inside your playOneGame() function: void getUserResponseToGuess(int guess, char& result) The getUserResponseToGuess() function should prompt the user to enter 'h', 'l', or 'c' (as shown in the sample output). It should set its "result" parameter equal to whatever the user enters in response. It should do this ONE time, and should not do anything else. Note that printing the guess is part of the prompt. int getMidpoint(int low, int high) The getMidpoint() function should accept two integers, and it should return the midpoint of the two integers. If there are two values in the middle of the range then you should consistently chose the smaller of the two.

Answers

Answer:

the question is too long. dear

.mate

that’s too much to understand, could you make it more simple to read and understand?

You need to migrate an on-premises SQL Server database to Azure. The solution must include support for SQL Server Agent.

Which Azure SQL architecture should you recommend?

Select only one answer.

Azure SQL Database with the General Purpose service tier

Azure SQL Database with the Business Critical service tier

Azure SQL Managed Instance with the General Purpose service tier

Azure SQL Database with the Hyperscale service tier

Answers

The recommended architecture would be the Azure SQL Managed Instance with the General Purpose service tier.

Why this?

Azure SQL Managed Instance is a fully managed SQL Server instance hosted in Azure that provides the compatibility and agility of an instance with the full control and management options of a traditional SQL Server on-premises deployment.

Azure SQL Managed Instance supports SQL Server Agent, which is important for scheduling and automating administrative tasks and maintenance operations.

This would be the best option for the needed migration of dB.

Read more about SQL server here:

https://brainly.com/question/5385952

#SPJ1

Write a 250-word essay on the benefits and dangers of collecting and storing personal data on online databases. Things to consider:

Does the user know their data is being collected?
Is there encryption built into the system?
Is that encryption sufficient to protect the data involved?
Does collecting the data benefit the end user? Or just the site doing the collecting?

Answers

Answer:

The collection and storage of personal data on online databases has both benefits and dangers. On the one hand, collecting and storing data can be incredibly useful for a variety of purposes, such as personalized recommendations, targeted advertising, and improved user experiences. However, it's important to consider the risks and potential consequences of this practice, particularly in regards to privacy and security.

One concern is whether or not users are aware that their data is being collected. In some cases, this information may be clearly disclosed in a site's terms of service or privacy policy, but in other cases it may not be as transparent. It's important for users to be aware of what data is being collected and how it is being used, so that they can make informed decisions about whether or not to share this information.

Another important factor is the level of encryption built into the system. Encryption is a way of encoding data so that it can only be accessed by authorized parties. If a system has strong encryption, it can help to protect the data involved from being accessed by unauthorized users. However, if the encryption is weak or flawed, it may not be sufficient to protect the data. It's important to carefully consider the strength and reliability of any encryption used on a system that stores personal data.

Ultimately, the benefits and dangers of collecting and storing personal data on online databases will depend on the specific context and how the data is being used. It's important to weigh the potential benefits and risks, and to carefully consider whether the collection and storage of this data is truly in the best interests of the end user, or if it is primarily benefiting the site doing the collecting.

Explanation:

WHICH OF THE FOLLOWING TASKS ARE PART OF THE SOFTWARE EVALUATION PROCESS?
TESTERS...

Answers

With regard to software evaulation, note that the correct options are -

Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.

How is this so?

The tasks that are part of the software evaluation process include  -

Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.

Tasks not directly related to the software evaluation process are  -

Software developers writing code line by line.Creating a design for the software program.

Learn more about software evaluation at:

https://brainly.com/question/28271917

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Choose all that apply: Which of the following tasks are part of the software evaluation process?

testers check that the code is implemented according to the specification document

an specification document is created

software developers write code line by line

any issues with the software are logged as bugs

bugs are resolved by developers

a design for the software program is created

How to protect data in transit Vs rest?

Answers

Implement robust network security controls to help protect data in transit. Network security solutions like firewalls and network access control will help secure the networks used to transmit data against malware attacks or intrusions.

If this helps Brainliest please :)

Delivery delays are caused by all of the following factors except:

Delivery delays are caused by all of the following factors except:

Answers

Using inventory best practices…

Delivery delays are caused by all the following factors except using inventory best practices, such as safety stock inventory or cross-docking. Thus, option A is correct.

What is a Delivery?

The delivery of the product can be done with the help of transportation which can be via various means like railways, roadways, waterways and various other means. The product can be delivered through multiway.

The delivery can be delayed in various ways making the stock or the inventory in the way may be due to stocking of the goods and also because of inventory control.

The exception of employing inventories guidelines like safeguard asset tracking or merge results in late deliveries. Whenever you are conscious of the type of inventory, you can regulate it and administer it more effectively.

Therefore, option A is the correct option.

Learn more about delivery , here:

https://brainly.com/question/28179832

#SPJ2

C++ Programming Summary In an elementary school, a mixture of equal...
C++ Programming
Summary
In an elementary school, a mixture of equal amounts of nuts and dried fruit is provided during lunch. Suppose that the number of calories in each pound of nuts is 0.70 times the number of calories in each pound of dried fruit.
Instructions
Produce a program that prompts the user to input:
The number of students in the elementary school
The number of calories required for each student from the mixture
The number of calories in each pound of nuts.
The program outputs:
The amount of nuts and dried fruit needed for the students.
For simplicity, assume that each student requires the same amount of calories.
This is the code I have at the moment. I am not understanding what I am missing. The output is not what is expected.
When the input is "653" "577" "2744" the output should be "56.539" "56.539"
#include
#include
using namespace std;
int main()
{
double NoStudents, TotalcalRequired, caloriesNut, caloriesFruit;
double RequiredCal, TotalNut, Totalfruit;
cout << "Enter the number of students in the elementary school: "; cin >> NoStudents;
cout << "Enter the number of calories required for each student from the mixture: "; cin >> RequiredCal;
cout << "Enter the number of calories in each pound of nuts: "; cin >> caloriesNut;
TotalcalRequired = NoStudents * RequiredCal; caloriesFruit = caloriesNut / 0.70; TotalNut = TotalcalRequired / caloriesNut; Totalfruit = TotalcalRequired / caloriesFruit;
cout << "The total nuts needed is " << ceil(TotalNut) < return 0;
}

Answers

You must create C++ programme to figure out how much of each component is required to make the combination.is a quick description of several possible approaches to the issue: Set up two variables to

The object-oriented programming paradigm is supported by the general-purpose computer language C++. It was created as a C programming language extension and includes features like classes, templates, and exceptions. Software for many different purposes, including as operating systems, embedded systems, video games, and financial analysis tools, is frequently developed in C++.Functions, variables, and classes described in source code files make up a C++ programme. An executable file containing the code is created and may be executed on a computer. Moreover, C++ offers libraries that offer pre-written code for typical tasks, saving time and effort for developers.High-performing apps are frequently created using the performance and efficiency of C++. It is a

Learn more about C++ programme here:

https://brainly.com/question/2750731

#SPJ4

Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character – to change every third character in the array to its replacement character

(C++ coding)

Answers

Method explanation:

Defining a method "changeCharacter" that takes three parameters that are "character array", and two integer variable "s, k" in its parameters.Inside the method, a for loop is declared that takes array value and defines a conditional statement that checks the 3rd character value in the array, is used to the array that holds its key-value.Please find the full program in the attachment.

Method description:

void changeCharacter(char* ar, int s, int k)//defining a method changeCharacter that takes three parameters

{

  for(int j = 1; ar[j]!='\0'; j++)//defining a for loop for 3rd character value in array  

  {

      if(j%3== 0)//use if block that check 3rd character value in array  

      {

          ar[j-1] = k; //Changing the 3rd character in array

      }

  }

}

Learn more:

Program: brainly.com/question/12975989

Write a function called changeCharacter that takes three parameters a character array, its size, and

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

Help is very much appreciated. Thank you for your time!

Answers

Answer: 266299         669922         292629        969622        Also just saying did you backup your files to the cloud?  If not you can buy a usb-c flash drive or a lighting cable flashdrive. Best Luck.

Explanation:

how do you fill different data into different cells at a time in Excel

Answers

The way that you fill different data into different cells at a time in Excel are:

Click on one or a lot of cells that you want to make use of as the basis that is needed for filling additional cells. For a set such as 1, 2, 3, 4, 5..., make sure to type 1 and 2 into the 1st two cells. Then pull the fill handle .If required, select Auto Fill Options. and select the option you want.

How do you make a group of cells auto-fill?

The first thing to do is to place the mouse pointer over the cell's bottom right corner and hold it there until a black + symbol appears. Drag the + symbol over the cells you wish to fill in while clicking and holding down the left mouse button. Additionally, the AutoFill tool rightly fills up the series for you.

Note that  Excel data entering  can be automated and this can be done by: On the Data tab, select "Data Validation," then click "Data Validation." In the Allow box, select "List." Enter your list items in the Source box, separating them with commas. To add the list, click "OK." If you wish to copy the list along the column, use the Fill Handle.

Learn more about Excel from

https://brainly.com/question/25879801
#SPJ1

You are given an initially empty stack and perform the following operations on it: push(B), push(A), push(T), push(I), pop(), pop(), push(Z), push(A), pop(), push(I), push(N), push(L), pop(), push(G), push(A), push(R), push(F), pop(), pop(). Show the contents of the stack after all operations have been performed and indicate where the top of the stack is.

Answers

The stack will contain the elements BRINGITON from top to bottom. The final contents of the stack are [B, A, Z, I, N, G, A], with "A" being the topmost element.

Initially, the stack is empty. The sequence of operations can be summarized as follows:

Push "B" onto the stack. Stack: [B]Push "A" onto the stack. Stack: [B, A]Push "T" onto the stack. Stack: [B, A, T]Push "I" onto the stack. Stack: [B, A, T, I]Pop an element from the stack. "I" is removed. Stack: [B, A, T]Pop another element from the stack. "T" is removed. Stack: [B, A]Push "Z" onto the stack. Stack: [B, A, Z]Push "A" onto the stack. Stack: [B, A, Z, A]Pop an element from the stack. "A" is removed. Stack: [B, A, Z]Push "I" onto the stack. Stack: [B, A, Z, I]Push "N" onto the stack. Stack: [B, A, Z, I, N]Push "L" onto the stack. Stack: [B, A, Z, I, N, L]Pop an element from the stack. "L" is removed. Stack: [B, A, Z, I, N]Push "G" onto the stack. Stack: [B, A, Z, I, N, G]Push "A" onto the stack. Stack: [B, A, Z, I, N, G, A]Push "R" onto the stack. Stack: [B, A, Z, I, N, G, A, R]Push "F" onto the stack. Stack: [B, A, Z, I, N, G, A, R, F]Pop an element from the stack. "F" is removed. Stack: [B, A, Z, I, N, G, A, R]Pop another element from the stack. "R" is removed. Stack: [B, A, Z, I, N, G, A]

Learn more about stack :

https://brainly.com/question/14257345

#SPJ4

Other Questions
PLEASE HELP ME!! I WILL GIVE BRAINLIEST. ITS DUE IN AN HOUR Which is the MOST important safety measure to follow when using an acid in a classroom laboratory? Which of the following statements is true of the Leontief paradox?A. It raised questions about the validity of the Heckscher-Ohlin theory.B. It shows an anomaly that occurs when a nation has high domestic demand for a product.C. It explains the relationship between domestic demand and comparative advantage.D. It disproved Ricardos theory of comparative advantage. From the top of a 560 ft. tower an observer spots two bears. The angle of depression to the first bear is 34 and the angle of depression to the second bear is 46. What is the horizontal distance between the bears? This part is only to obtain your data. At the beginning of the compression process of an airstandard Otto cycle, the pressure is 1.42 bar, and the temperature 268 K, the volume is 405 cm^3 . The maximum temperature in the cycle 1879 K and the compression ratio is 7.11. (a) the heat addition, in k1. (b) the net work, in k. (c) the thermal efficiency, (d) the mean effective pressure, in bar (e) It a a-cylinder engine is turning at 2500RPM, and for every 2 turns there is a power stroke, de termine the ootpot powno in Watts and Hi (1) HP- 746 W What does the concept of the constitution as a ""higher law"" imply?. The Polygons are similar. Solve for x 109612 someone please please help me with this ! Maritza is baking cookies to bring to school and share with her friends on her birthday. The recipe requires 3 eggs forevery 2 cups of sugar. To have enough cookies for all of her friends, Maritza determined she would need 12 eggs. If hermom bought 6 cups of sugar, does Maritza have enough sugar to make the cookies? Why or why not? What does the national security act foreshadow about the cold war? Your supervisor has come to you with the following list of expenditures for the year and is asking you whether they should be capitalized or expensed as repairs and maintenance. Indicate all of the expenditures that would most appropriately be capitalized.1. Re-painted the office building. 2. Added a new wing onto the office building. 3. Took their fleet of cars in for servicing (changing the oil, etc.). 4. Added newer electronic locks on the doors in the production building. 5. Had an engine rebuilt in one of their fleet cars. An electron is projected vertically upward with a speed of 1. 70 106 m/s into auniform magnetic field of 0. 640 T that is directed horizontally away from theobserver. Describe the electrons path in this field what is the solution to the following system of equations?4x + 2y = 18x y = 3 What powers did the national government have under the Articles of Confederation? anyone can be my little sister True or false? An apple, potato, and onion all taste the same if you eat them with your nose plugged. The process of developing an approximation of the cost of the monetary resources needed to complete project activities is known as: You are an investor that contemplates investing in a new start up. You know that the profitability of the project you are looking at is either 0 or 2 million dollars. That is, there is some risk regarding the returns of the project: with 50% probability it will be very successful (generate a 2 million dollar cash flow) and with 50% chance it will fail (generate a 0 dollar cash flow). You find yourself in the bargaining table with the inventor of the project who tries to sell you their idea and make you invest in it. Consider the following scenarios: 1) The risk of the project is due to uncertain consumer response. That is, you don't know how much consumers will like the outcome of the project. You believe the start-upper knows as much about the consumer response as you do. Question: how much money are you willing to invest in the project? Why? Assume that you care only about the expected value of the project which is 1 million dollars (50%x0 + 50%x2,000,000). 1. What were the interests of Las Vegas Sands, and how does the Sands propose to meet those interests? Are there likely to be conflicts of interests within the Sands top management team? 2. What were the interests of the Spanish Government? Are there likely to be conflicts of interests within the Spanish government?3. What information did Las Vegas Sands need to understand to address the governments interests?4. What information did the Spanish government need to understand Las Vegas Sands interests? Select the correct choices that complete the sentence below.The value of tan(-150) degrees is blank because -150 degrees isin quadrant blank. The reference angle is blank and the exact valueof tan(