There are 6 jobs with distinct difficulty levels, and 3 computers with distinct processing speeds. Each job is assigned to a computer such that: The fastest computer gets the toughest job and the slowest computer gets the easiest job. Every computer gets at least one job. The number of ways in which this can be done is
Q: 1 ,1, -1,-1) are members of class with target value 1. (1 ,1, 1,-1) and (1 ,-1, -1,1) are members of...
A: Use Perceptron to classify (1 ,1, 1,1) and (-1 ,1, -1,-1) are members of class with target value 1. ...
Q: Write a SQL query that selects OrderID and OrderDate from the Orders table and OrderDetailID from th...
A: Introduction: A JOIN clause is used to merge data from more than "2" tables based on a standard colu...
Q: Explain REST and state the protocol that REST used for communication
A: A protocol is set of rules and regulations which governs during working of system.
Q: What is the height of an empty BST
A: Given What is the height of an empty BST?
Q: Small monster scientists do a great deal of work to analyze small monster migratory and feeding patt...
A: # function to draw the 10X8 griddef drawGrid(horiz_mult, vert_mult, constant):# importing the turtle...
Q: Relationship between supertypes and subtypes. Where does the rule of disjunction apply?
A: A supertype is a generic entity type it has a relationship with one or more than one subtypes. A su...
Q: t d,f,k,m
A: Bubble sort is a type of sorting. It is stepping through lists that is to be sorted, comparing each ...
Q: Assume that list1 contains 100 items. The number of items in the following slice is list1[-4:-3] ere...
A: Solution:
Q: 22. Short answer question: please give an example of the atomicity problem.
A: In transactions and concurrency control there are ACID properties which are must be satisfied by all...
Q: Detail the components of the spheres of security paradigm. The document must have a sufficient quant...
A: Introduction: Information security is primarily concerned with preventing unauthorized access to dat...
Q: The voltage Ve(t) (in V) and the current i(t) (in Amp) t seconds after closing the switch in the cir...
A: Here, I have to provide a Matlab code to the above question.
Q: What is 5113439150942 in mantissa x base ^ exponent notation, to 4 significant digits using the ties...
A: According to the information given:- We have to find out the mantissa x base ^ exponent notation, to...
Q: What is computer network?
A: Given :- What is computer network?
Q: s. Create a program that will allow a user to enter 2 numbers using input dialog boxes and calculate...
A: Introduction:
Q: Write a python code to build regression models using the following learning algorithm
A: import matplotlib matplotlib.use('GTKAgg') import matplotlib.pyplot as plt import numpy as np f...
Q: Help with creating a function in MATLAB. Need to create a plot showing total growth of a data set. I...
A: The histogram plot can help in distribution and growth plotting the syntax is given below.
Q: Sterile Reports Research Example ERD Problem
A: Answer is given below.
Q: Write a statement that assigns finalValue with the multiplication of userNum1 and userNum2. Ex: If u...
A: Answer the above questions are as follows:
Q: Explain 2 types of HTTP connections
A: The Hypertext Transfer Protocol is an application layer protocol in the Internet protocol suite mode...
Q: C program that will display the cube of a number using a while loop.
A: Declaring header file in preprocessor directive section Defining main method Declaring variables Tak...
Q: How bandwidth impacts on the performance of a network. Discuss how bandwidth impacts on the perform...
A: Given The answer is given below.
Q: draw are use cased diagram for exam preparation app
A: INTRODUCTION: A use case diagram in UML is used to show the various ways in which a user may intera...
Q: Explain what is Civil liberties in Social and professional issues in computer Science.
A: answer is
Q: Suppose the procedure given in class for balancing multiple pairs of symbols in a string is executed...
A: The answer is given below.
Q: Using Common Lisp, complete the following programming exercises: Write a function that computes the ...
A: As per bartleby guidelines we need to answer only first question if different questions are posted p...
Q: Convert each of the following integers from binary notation to hexadecimal notation. a) 101010101010...
A: Converting From Binary Notation to Hexadecimal Notation:- (a). 1 0 1 0 1 0 1 0 1 0 1 0 approach :...
Q: Using C#, create an application that will ask the user to enter password set in the program for only...
A: Password print('Enter username and password to continue with exam')count=0while count < 3: us...
Q: y are some connections never purely pinned or purely fixed, site examples of these instances. Note...
A: Lets see the solution.
Q: ste
A: Solution) How to create a telegram bot 1) First, download the Telegram app for desktop. Once that is...
Q: EXERCISE 15 Write a function Your first name_Last name_Ex15 with three variables x, y, and z as inpu...
A: ANSWER:-
Q: describe 2 advantages of using higher level socket compared to lower level of the network stack
A: advantages of using higher level socket compared to lower level of the network stack
Q: 4 Sample Problems Prove that the following answers are correct. Handwritten work is fine, if you wan...
A: The binary number is converted into a decimal number by multiplying each element with power of 2 bas...
Q: Question: f(n) = 3n² + 25 g(n) = 3n² Prove that f(n) = 0 g(n)
A: answer: according to BIG-O definition f(n)= O(g(n)) when f(n) <= c*g(n) for n>=n0
Q: Change the current date format to: MON-DD-YYYY HH:MI:SS for your session ? Hint: use ALETER SESSION
A: Date is always stores in default way only but it can be converted into our required format of the da...
Q: PCH; OH_ Y CH;OH PcoP y coy p²
A:
Q: (b) The memory unit of a computer has 256K words of 32 bits each. The computer has an instruction fo...
A:
Q: Asap please Project description: Refer to the algorithm for Quicksort given in the link below. 1. Mo...
A:
Q: Laboratory Exercise Party Planner Objective: At the end of the exercise, the students should be able...
A: Given :- Laboratory Exercise Party Planner Objective: At the end of the exercise, the students shoul...
Q: 2. Consider the following kinds of information, and suggest the most appropriate data type to store ...
A: Find the answer below of above question. I hope this will meet your requirement.
Q: Each year, almost 20,000 of children are rushed to the hospital with injuries related to playground ...
A: The safety of children on playgrounds in the neighborhood is a significant concern.
Q: Suppose in the code below that signal Z changes at 20ns and no other signal changes after that time....
A: Solution : There are three processes A, B and C. The detail explanation given below
Q: Identify all the errors in the following code: title ("The", "Call", "of", "the", "Wild") %3D title[...
A: - We need to identify errors and correct it. - The code is in python. - The code has two errors wh...
Q: A number 428 in duodenary (base 12) is to be added to C10 in tredenary (base 13), what is their sum ...
A: Concept: Duodenary or base 12 number system have digit 0,1,2,3,4,5,6,7,8,9,A,B. Tredenary or base 13...
Q: Compile a list of the eight most important user interface design principles. In what order would you...
A: INTRODUCTION: The process through which designers create user interfaces in software or digital dev...
Q: Theoretical Background: Information Assurance (IA) architecture also known as security architecture ...
A: Answer: Information architecture (IA) is defined as the method of performing the practice of organiz...
Q: Most activities in a network diagram have a finish-finish relationship. True False
A: the above statement is an true
Q: Choose a software project of your choice (it should be unique) and write all seven Requirement engin...
A: what is a software project? A software project is the whole process of software development, from re...
Q: Create a cell array named CA containing six cells to store the short form of the first six month na...
A: Here is the solution with an output:-
Q: systems, and your laptop/
A: NOTE: ACCORDING TO COMPANY POLICY WE CAN SOLVE ONLY 1 QUESTION. YOU CAN RESUBMIT THE QUESTION AGAIN ...
Q: When new nodes are inserted into a binary search tree, where are they inserted? you find where...
A: What is a BINARY SEARCH TREE? The components of a binary search tree are arranged in a certain order...
Step by step
Solved in 2 steps
- In a private university, students can enrol for at least 1 to a maximum of 5 subjects in a semester. Subjects that are to be offered in that particular semester will be assigned to a class. One class should have at least 5 students and up to a maximum of 40 students. Multiple classes for a subject can be created if the students number enrolled for the subject is large. A subject might not be offered on that semester depending on the needs. A lecturer can be assigned to zero and up to a maximum of 4 classes on that particular semester. Draw the class diagram to represent the above scenario. Each entity should have at least 1 attribute as its identity. Provide the relevant associations between these entities and include the multiplicities.Correct answer will be upvoted else Multiple Downvoted. Computer science. Berland local ICPC challenge has quite recently finished. There were m members numbered from 1 to m, who contended on a problemset of n issues numbered from 1 to n. Presently the article is going to happen. There are two issue creators, every one of them will tell the instructional exercise to precisely k back to back errands of the problemset. The creators pick the section of k continuous errands for themselves autonomously of one another. The sections can correspond, meet or not cross by any means. The I-th member is keen on paying attention to the instructional exercise of all continuous errands from li to ri. Every member consistently decides to pay attention to just the issue creator that tells the instructional exercises to the most extreme number of assignments he is keen on. Leave this greatest number alone artificial intelligence. No member can pay attention to both of the creators, regardless of…As a teaching administrator of the department, your responsibility is to schedule the classes for a particular classroom. Suppose there are n classes, each class i is represented by its start time and finishing time [Si, fi], and we say that two classes i and j are non-conflicting if they do not overlap in time (i.e., sizfj or szfi). You want to schedule as many classes for the classroom as possible, but the scheduled classes should be non-conflicting. Develop an algorithm so that you can select the maximum number of classes for the classroom. (We are expecting either pseudocode or language description of your algorithm)
- An Uni has n students who are regular competitive programmers. According to the ACM ICPC rules, each person can participate in the regional championship at most 5 times. The head of the Uni ACM Chapter is recently gathering teams to participate in this championship. Each team must consist of exactly three people, at that, any person cannot be a member of two or more teams. What maximum number of teams can the head make if he wants each team to participate in the world championship with the same members at least k times? The first line of input contains two integers, n and k. The next line contains n integers: y1, y2, ..., yn (0 ≤ yi ≤ 5), where yi shows the number of times the i-thperson participated in the ACM ICPC Regional . Write a python program that prints how many teams can be formed according to the above problem statement. Sample Input 1 52 04510 Sample Input 2 64 012345 Sample Input 3 65 000000 Sample Output 1 1 Sample Output 2 0 Sample Output 3 2Job scheduling: Consider the problem of scheduling n jobs of known durations t1, t2, . . . , tn for execution by a single processor. The jobs can be executed in any order, one job at a time. You want to find a schedule that minimizes the total time spent by all the jobs in the system. (The time spent by one job in the system is the sum of the time spent by this job in waiting plus the time spent on its execution.) Design a greedy algorithm for this problem. Does the greedy algorithm always yield an optimal solution? (Hint: You may get a clue from Prim’s Algorithm)PLEASE CODE IN PYTHON Problem Description:In order to ensure peace and prosperity for future generations, the United Nations is creating the world’s largest candy. The ingredients must be taken in railway cars from the top of a mountain and poured into Lake Geneva. The railway system goes steeply from the mountaintop down to the lake, with a T-shaped branch in the middle as shown below. Right now, each of the N ingredients is in its own railway car. Each railway car is assigned a positive integer from 1 to N. The ingredients must be poured into the lake in the order 1, 2, 3, . . . , N but the railway cars are lined up in some random order. The difficulty is that, because of the especially heavy gravity today, you can only move cars downhill to the lake, or sideways on the branch line. Is it still possible to pour the ingredients into the lake in the order 1, 2, 3, . . . , N ? For example, if the cars were in the order 2, 3, 1, 4, we can slide these into the lake in order as described…
- Job scheduling Consider the problem of scheduling n jobs of known durations t1,t2,. . .,tn for execution by a single processor. The jobs can be executed in any order, one job at a time. You want to find a schedule that minimizes the total time spent by all the jobs in the system. (The time spent by one job in the system is the sum of the time spent by this job in waiting plus the time spent on its execution.) Design a greedy algorithm for this problem. Does the greedy algorithm always yield an optimal solution?A robot is a programmable machine that can carry out a series of automated tasks. The final lab for the semester is to build a robot of your own design. Your robot should contain at least two sensors, and two output mechanisms that work together to perform a task. Sensors can be something like a temperature or light sensor. Output mechanisms can be things like servo motors or lights. In order to make sure that the task your robot performs is sufficiently complex to meet the objectives of the course you will need to write a proposal that answers the questions below.1. Describe the purpose or goal of your robot. Answer the question, “Why does this robot exist?” What problem does it solve? What are some of the challenges to solving that problem?2. Describe how your robot will solve the problem. What sensors will it use? How will it behave based on the inputs and how will it overcome the challenges presented?3. How will you know if your robot successfully meets its goals? What tests will…BRACU has n students who are regular competitive programmers. According to the ACM ICPC rules, each person can participate in the regional championship 6. at most 5 times. The head of the BRACU ACM Chapter is recently gathering teams to participate in this championship. Each team must consist of exactly three people, at that, any person cannot be a member of two or more teams. What maximum number of teams can the head make if he wants each team to participate in the world championship with the same members at least k times? The first line of input contains two integers, n and k. The next line contains n integers: yly2.yn (0syis5), where yi shows the number of times the ihperson participated in the ACM ICPC Regional. Write a python program that prints how many teams can be formed according to the above problem statement. Sample Input 1 52 04510 Sample Input 2 Sample Output 1 6 4 Page 7 / 10 012345
- Jin Mori is like any other student who loves sleeping. Jin Taejin, his grandfather, imposes a waking schedule that Jin Mori must follow to avoid tardiness at his school. The schedule stated that on weekdays, Mori must be awake at "7:00" and at "10:00" at weekends. Taejin added an exemption for their school vacation. If it is their school vacation, the schedule is "10:00" for weekdays and "off" for weekends. If Jin will not follow the schedule, he is not allowed to practice his favorite martial art, taekwondo. Your job is to create a program that will serve as the alarm clock for Jin Mori. Expected Output: Test Case 1: Vacation: False Day: Monday Alarm Time: 7:00 Awake: Yes Be ready for your practice Mori! Test Case 2: (input) (input) (auto generated) (input) Vacation: False Day: Saturday Alarm Time: 10:00 Awake: No (input) (input) (auto generated) (input) You are not allowed to practice your taekwondo!A medical Centre can have many doctors. A doctor can be scheduled for many appointments but may not have any scheduled appointment at all. A patient can schedule request for one or more appointments. However, every appointment is about only one patient. As a result of every appointment, there must be a bill. One payment is applied to exactly 1 bill, and 1 bill can be paid off over time by several payments. A bill can be outstanding, having nothing yet paid on it at all. One patient can make many payments, but a single payment is made by only 1 patient. Some patients are insured by an insurance company. If they are insured, they can only carry insurance with one company. An insurance company can have many patients carry their policies. For patients that carry insurance, the insurance company will make payments, each single payment is made by exactly 1 insurance company. (Hint: final ERD must include 7 tables.) a) Identify the entities with attributes and keys (primary and foreign keys).…On a chess board of r rows and c columns there is a lone white rook surrounded by a group of opponent's black knights. Each knight attacks 8 squares as in a typical chess game, which are shown in the figure - the knight on the red square attacks the 8 squares with a red dot. The rook can move horizontally and vertically by any number of squares. The rook can safely pass through an empty square that is attacked by a knight, but it must move to a square that is not attacked by any knight. The rook cannot jump over a knight while moving. If the rook moves to a square that contains a knight, it may capture it and remove it from the board. The black knights. never move. Can the rook eventually safely move to the designated target square? The figure illustrates how the white rook can move to the blue target square at the top-right corner in the first sample case. The rook captures one black knight at the bottom-right of the board on its way. Rok nd kight lcoes by Chunen Input The first line…