Write a program that will print out statistics for eight coin tosses. The user will input either an "h" for heads or a "t" for tails for the eight tosses. The program will then print out the total number and percentages of heads and tails. Use the increment operator to increment the number of tosses as each toss is input. For example, a possible sample dialog might be: For each coin toss enter either ‘h’ for heads or ‘t’ for tails. First toss: h Second toss: t Third toss: t Fourth toss: h Fifth toss: t Sixth toss: h Seventh toss: t Eighth toss: t Number of heads: 3 Number of tails: 5 Percent heads: 37.5 Percent tails: 62.5

Answers

Answer 1

Answer:

Written in Python

head = 0

tail = 0

for i in range(1,9):

     print("Toss "+str(i)+": ")

     toss = input()

     if(toss == 'h'):

           head = head + 1

     else:

           tail = tail + 1

print("Number of head: "+str(head))

print("Number of tail: "+str(tail))

print("Percent head: "+str(head * 100/8))

print("Percent tail: "+str(tail * 100/8))

Explanation:

The next two lines initialize head and tail to 0, respectively

head = 0

tail = 0

The following is an iteration for 1 to 8

for i in range(1,9):

     print("Toss "+str(i)+": ")

     toss = input()  This line gets user input

     if(toss == 'h'):  This line checks if input is h

           head = head + 1

     else:  This line checks otherwise

           tail = tail + 1

The next two lines print the number of heads and tails respectively

print("Number of head: "+str(head))

print("Number of tail: "+str(tail))

The next two lines print the percentage of heads and tails respectively

print("Percent head: "+str(head * 100/8))

print("Percent tail: "+str(tail * 100/8))


Related Questions

Florian and Tobias would like to begin communicating using a symmetric cryptosystem, but they have no prearranged secret and are not able to meet in person to exchange keys. What algorithm can they use to securely exchange the secret key?

a. IDEA
b. Diffie-Hellman
c. RSA
d. MD5

Answers

The answer is MD5

Hope this helps you have a great thanksgiving

Greedy Algorithm Design
A couple wants to buy n major items. They will buy one item per month. They will buy all of their items at the CrazySuperStore. Due to the current economy, it is known that at some point in the future there will be a single price hike on all items at the same time, but due to the uncertainty of economic processes, it is not known when that price hike will occur. For each of the n items the couple wants to buy, both the current price, ai and the future price, bi (bi > ai), are known. (Note that the individual price hikes on items may vary. For example, one item may go from $100 to $105 while another might go from $300 to $400. They only assumption you may make about the prices is that the second price is strictly higher than the first and that you have access to all before/after prices.) Devise a greedy strategy so that the couple is guaranteed to minimize the amount of money they spend on the items. Assume that no matter what, the couple will buy all items. Clearly describe your strategy and intuitively (or formally) prove why it's optimal.

Answers

Answer:

The algorithm is as follows:

1. Start

2. Get the number of items (n)

3. Get the current price of the n items (a1, a2..... an)

4. Get the possible hiked price of the n items (b1, b2..... bn)

5. Calculate the difference between the current and hiked prices for each item i.e. \(d_i = b_i - a_i\)

6. Sort the differences in descending order (i.e. from the greatest to the least)

7. Buy items in this order of difference

8. Stop

Explanation:

The algorithm is self-explanatory; however, what it does is that:

It takes a list of the current price of items (say list a)

E.g: \(a = [100, 150, 160]\)

Then take a list of the hiked price of the items (say list b)

E.g: \(b = [110, 180, 165]\)

Next, it calculates the difference (d) between corresponding prices \(d_i = b_i - a_i\)

\(d = [(110 - 100),(180-150),(165-160)]\)

\(d = [10,30,5]\)

Sort the difference from greatest to lowest (as the difference is sorted, lists a and b are also sorted)

\(d = [30,10,5]\)

\(a = [150, 100, 160]\)

\(b = [180, 110, 165]\)

If there is no hike up to item k, the couple would have saved (i = 1 to d[k-1])

Assume k = 3

The couple would have saved for 2 item

\(Savings = d[1] + d[2]\)

\(Savings = 30 +10\)

\(Savings = 40\)

The saved amount will then be added to the kth item in list a i.e. a[k](in this case k = 3) in order to buy b[k]

Using the assumed value of k

\(a[k] = a[3]\)

\(a[3] = 160\)

\(b[3] = 165\)

Add the saved amount (40) to a[3]

\(New\ Amount = 40 + 160\)

\(New\ Amount = 200\)

This new amount can then be used to buy b[3] i.e. 165, then they save the change for subsequent items

The address of a cell is created by the intersection of
the
of the cell.

Answers

The address of a cell is created by the intersection of the respective column and row.

Additional information about "cell" is as follows:

Cells are the tens of thousands of rectangles that each worksheet is made up of. When a row and a column come together or intersect, the location is known as a cell.Columns are denoted by A, B, and C, and rows are denoted by digits. Each cell has a distinct name that comes after its column and row, also known as a cell address. Since the selected cell intersects column C and row 5, the cell address in the example below is C5.Each entry you make into a spreadsheet is stored in a cell. A cell can contain a variety of content types, including text, formatting, formulas, and functions.Cell formatting options: Cell formatting options can change how dates, numbers, and characters are displayed. A couple of percentage examples are 0.15 and 15%. We can even change a cell's text or background color.

To know more about Cell Address, visit: https://brainly.com/question/28461824

#SPJ9

................. are used to summarize data (option) (a) report (b) action ​

Answers

i think report is right for the question

Jonathan wants to create an online journal. He will use it to share with his friends all the cool places he visits while in Europe. Which social networking tool should Jonathan use to create a journal while on his trip?
a: email
b: a blog
c: a wiki
d: a forum

Answers

Answer:

a blog

Explanation:

a forum is for questions, a wiki doesn't make sense in this situation and email wouldn't be used for this either so it should be a blog

The correct answer is b I hope this helps luv

Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lower even number. Hint: Use an if statement and the % operator to detect if n is odd, decrementing n if so. Enter an integer: 7 Sequence: 64 20 (2) If n is negative, output 0, Hint: Use an if statement to check if n is negative. If so, just set n = 0. Enter an integer: -1 Sequence: 0 Show transcribed image text (1) Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lower even number. Hint: Use an if statement and the % operator to detect if n is odd, decrementing n if so. Enter an integer: 7 Sequence: 64 20 (2) If n is negative, output 0, Hint: Use an if statement to check if n is negative. If so, just set n = 0. Enter an integer: -1 Sequence: 0

Answers

Answer:

The program in Python is as follows:

n = int(input("Enter an integer: "))

if n < 0:

   n = 0

print("Sequence:",end=" ")

for i in range(n,-1,-1):

   if i%2 == 0:

       print(i,end = " ")

Explanation:

This gets input for n

n = int(input("Enter an integer: "))

This sets n to 0 if n is negative

if n < 0:

   n = 0

This prints the string "Sequence"

print("Sequence:",end=" ")

This iterates from n to 0

for i in range(n,-1,-1):

This check if current iteration value is even

   if i%2 == 0:

If yes, the number is printed

       print(i,end = " ")

I'm trying to figure out how to put this together can anyone help me solve this?

I'm trying to figure out how to put this together can anyone help me solve this?

Answers

The if-else statement to describe an integer is given below.

How to illustrate the information

The if-else statement to describe an integer will be:

#include <stdio.h>

#include <stdbool.h>

int main(void) {

int userNum;

bool isPositive;

bool isEven;

scanf("%d", &userNum);

isPositive = (userNum > 0);

isEven = ((userNum % 2) == 0);

if(isPositive && isEven){

  printf("Positive even number");

}

else if(isPositive && !isEven){

  printf("Positive number");

}

else{

  printf("Not a positive number");

}

printf("\n");

return 0;

}

Learn more about integers on:

https://brainly.com/question/17695139

#SPJ1

How would you show an external document in a running presentation?​

Answers

There are a few steps that show an external document in a running presentation.

What are the steps needed?

1. On the slide, select the icon or link to the object that you want to set to run.

2. On the Insert tab, in the Links group, click Action.

3. In the Action Settings dialog box, do one of the following:

4. To click the embedded icon or link in order to open the program, click the Mouse Click tab.

5. To move the mouse pointer over the embedded icon or link in order to open the program, click the Mouse Over tab.

6. Under Action on click or Action on mouse-over, select one of the options, then select from the list at that option. For example, you can select Run Program and then browse to a program that you want to run, such as a web browser. Or if the object is a document, you can select Object action and then select Open to display the document or edit to work on it during your presentation.

To know more about External document, Check out:

https://brainly.com/question/13947276

#SPJ1

.

Algorithm:

Suppose we have n jobs with priority p1,…,pn and duration d1,…,dn as well as n machines with capacities c1,…,cn.

We want to find a bijection between jobs and machines. Now, we consider a job inefficiently paired, if the capacity of the machine its paired with is lower than the duration of the job itself.

We want to build an algorithm that finds such a bijection such that the sum of the priorities of jobs that are inefficiently paired is minimized.

The algorithm should be O(nlogn)


My ideas so far:

1. Sort machines by capacity O(nlogn)
2. Sort jobs by priority O(nlogn)
3. Going through the stack of jobs one by one (highest priority first): Use binary search (O(logn)) to find the machine with smallest capacity bigger than the jobs duration (if there is one). If there is none, assign the lowest capacity machine, therefore pairing the job inefficiently.

Now my problem is what data structure I can use to delete the machine capacity from the ordered list of capacities in O(logn) while preserving the order of capacities.

Your help would be much appreciated!

Answers

To solve the problem efficiently, you can use a min-heap data structure to store the machine capacities.

Here's the algorithm:

Sort the jobs by priority in descending order using a comparison-based sorting algorithm, which takes O(nlogn) time.

Sort the machines by capacity in ascending order using a comparison-based sorting algorithm, which also takes O(nlogn) time.

Initialize an empty min-heap to store the machine capacities.

Iterate through the sorted jobs in descending order of priority:

Pop the smallest capacity machine from the min-heap.

If the machine's capacity is greater than or equal to the duration of the current job, pair the job with the machine.

Otherwise, pair the job with the machine having the lowest capacity, which results in an inefficient pairing.

Add the capacity of the inefficiently paired machine back to the min-heap.

Return the total sum of priorities for inefficiently paired jobs.

This algorithm has a time complexity of O(nlogn) since the sorting steps dominate the overall time complexity. The min-heap operations take O(logn) time, resulting in a concise and efficient solution.

Read more about algorithm here:

https://brainly.com/question/13902805

#SPJ1

Which are benefits of using an IDE while writing a program? Select all the apply.

The IDE keeps track of and links files.

The IDE simplifies and coordinates the creation process.

The IDE allows the programmer to see errors.

Answers

Answer:

The IDE keeps track of and links files.

The IDE simplifies and coordinates the creation process.

The IDE allows the programmer to see errors.

Explanation:

The IDE stands for Integrated Development Environments. In the case when the program the following are the benefits of using an IDE

1. It tracks and link the files

2. It coordinates and simplify the proces of creation

3. Also it permits the programmer to view the errors

hence, the above represent the benefits

So all are considered to be the benefits

Answer:

Explanation:

ITs all 3. edge 2021

clicker game creating in code.org (PLEASE HELP FAST!!!)

clicker game creating in code.org (PLEASE HELP FAST!!!)

Answers

Use code.org's visual programming tools to create a clicker game by adding buttons, score tracking, and event handlers.

To create a clicker game in code.org, you can use the visual programming tools available.

Follow these steps:

1) Start by designing the game interface.

Add buttons, labels, and any other elements you want to display.

2) Create a variable to track the score or points in your game.

Initialize it to 0.

3) Add an event handler to the button's click event.

When the button is clicked, increment the score variable by a specific amount.

4) Update the score display to reflect the updated score value.

5) Consider adding a timer or level system to make the game more challenging.

6) Add sound effects or animations to enhance the user experience.

7) Test and debug your game to ensure it functions as intended.

8) Share and enjoy your clicker game with others.

For more such questions on Visual programming:

https://brainly.com/question/29362725

#SPJ11

discuss MIS as a technology based solution must address all the requirements across any
structure of the organization. This means particularly there are information to be
shared along the organization

Answers

MIS stands for Management Information System, which is a technology-based solution that assists organizations in making strategic decisions. It aids in the efficient organization of information, making it easier to locate, track, and manage. MIS is an essential tool that assists in the streamlining of an organization's operations, resulting in increased productivity and reduced costs.

It is critical for an MIS system to address the needs of any organization's structure. This implies that the information gathered through the MIS should be easily accessible to all levels of the organization. It must be capable of handling a wide range of activities and functions, including financial and accounting data, human resources, production, and inventory management.MIS systems must be scalable to meet the needs of a company as it expands.

The information stored in an MIS should be able to be shared across the organization, from the highest to the lowest level. This feature allows for smooth communication and collaboration among departments and employees, which leads to better decision-making and increased productivity.

Furthermore, MIS systems must provide a comprehensive overview of a company's operations. This implies that it must be capable of tracking and recording all relevant information. It should provide a real-time picture of the company's performance by gathering and analyzing data from a variety of sources. As a result, businesses can take quick action to resolve problems and capitalize on opportunities.

For more such questions on Management Information System, click on:

https://brainly.com/question/14688347

#SPJ8

is the logical topology is the arrangement of cables net work devices and end systems

Answers

The logical topology of a network is the path through which data is transferred.

What is logical topology?A logical topology is a networking concept that defines the architecture of a network's communication mechanism for all nodes. The logical topology of a network can be dynamically maintained and reconfigured using network equipment such as routers and switches.A logical topology describes how devices appear to the user to be connected. A physical topology describes how they are physically connected with wires and cables.Broadcast (also known as bus) and sequential are the two logical topologies (also known as ring). Every message sent over the network is received by all devices in a broadcast topology.The logical topology is used to create a path for signals to travel through the network. It employs network protocols to define the path for packet transfer. The most typical example of network protocol is ethernet protocol.

To learn more about topology refer to :

https://brainly.com/question/14879489

#SPJ1

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?

Access Outlook options in Backstage view.
Access Outlook options from the Home tab.
Access Quick Access commands using the More button.
This cannot be done.

Answers

Access Outlook options in Backstage view

Answers? I really need help. I'm stuck.

Answers? I really need help. I'm stuck.

Answers

Answer:

one is go to is computer 3 is keyboard for is mouse 5 is Ben 10 the important of religion list out the waste and changing factor of unit called circuit

Freya has queued up some transactions to email to customers and others to print. What steps should she take to select all the sales transactions to email

Answers

Considering the situation described above, the steps Freya should take to select all the sales transactions to email is "Filter the sales transaction list using Delivery Method set to Email, and then click the checkbox to the left of the table header row."

The Process of Filter to batch print or email

This process follows the steps below:

From the Delivery method dropdown menu, select Send later or Print later, then Apply.

Select the checkboxes for the transactions to email or print.

Select the checkbox at the top of the list to mark all.

Hence, in this case, it is concluded that there is a process to follow QuickBooks to carry out Filter to batch print or email.

Learn more about QuickBooks use here: https://brainly.com/question/25592743

To safeguard against losses of computer equipment and important information, businesses should have _____. Select 4 options.

disaster recovery plans

natural disaster plans

emergency response readiness

business continuity plans

intrusion detection systems

Answers

Answer:

A. disaster recovery plans

D. business continuity plans

C. emergency response readiness

E. intrusion detection systems

Explanation:

lmk if im correct

To safeguard against losses of computer equipment, one should have;

Intrusion detection systems.Business continuity plans.Emergency response readiness.

What safeguards should computers have?

There are a lot of ways to keep your computer equipment and important information, from been stolen, They include:

The use a surge protector. The use of Anti-Virus Programs, etc.

Hence, when you use the various methods above, one can be protected in case of loss or against loss.

Learn more about  computer equipment from

https://brainly.com/question/23275071

¿Cuál es la capacidad pulmonar del hombre y la mujer?

Answers

Answer

El RV promedio en hombres es 1.2 L y para las mujeres es 1.1 L.

PLEASE HELP
Find five secure websites. For each site, include the following:

the name of the site

a link to the site

a screenshot of the security icon for each specific site

a description of how you knew the site was secure

Use your own words and complete sentences when explaining how you knew the site was secure.

Answers

The name of the secure websites are given as follows:

wwwdotoxdotacdotuk [University of Oxford]wwwdotmitdotedu [Massachusetts Institute of Technology]wwwdotwordbankdotorg [World Bank]wwwdotifcdotorg [International Finance Corporation]wwwdotinvestopediadotorg [Investopedia]

Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.

What is Website Security?

The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.

It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.

Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.

Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.

Learn more about website security:
https://brainly.com/question/28269688
#SPJ1

PLEASE HELPFind five secure websites. For each site, include the following:the name of the sitea link

Given integer variables seedVal and highest, generate three random numbers that are less than highest and greater than or equal to 0. Each number generated is output. Lastly, the average of the three numbers is output.

Answers

Answer:

Here's a Python code snippet to generate three random numbers between 0 and highest (exclusive), and then calculate the average of these numbers:

import random 

seedVal = int(input("Enter seed value: "))

highest = int(input("Enter highest value: ")) 

random.seed(seedVal)

num1 = random.randint(0, highest)

num2 = random.randint(0, highest)

num3 = random.randint(0, highest) 

print("First number:", num1)

print("Second number:", num2) 

print("Third number:", num3)

average = (num1 + num2 + num3) / 3 

print("Average:", average)

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

This data was entered starting in the top left of a spreadsheet. Friends Favorite Food Favorite Book Favorite Place Favorite Sport Chris Pizza A Separate Peace Beach Football Filip Ice Cream The Things They Carried Gym Tennis Ghjuvanni Chocolate Cake Lord of the Flies City Lacrosse Yosef Lacustrine High Low Medium What item is in cell B3? A Separate Peace A Separate Peace Chips Chips The Things They Carried The Things They Carried Ice Cream

Answers

The item in cell B3 is option A:"A Separate Peace"

What is the cell about?

In the given data, it is provided that the entries were made starting from the top left corner of the spreadsheet. The first column is labeled as 'Friend', second as 'Favorite Food', third as 'Favorite Book' and fourth as 'Favorite Sport'. So each entry belongs to one of these columns.

As per the data provided, "A Separate Peace" is the book that Chris, one of the friends mentioned, likes, and that information falls under the third column, 'Favorite Book' and it is the third row.

The answer is option A because, in a spreadsheet, data is usually entered starting in the top left corner, and each cell is identified by its row and column. In the given data, "A Separate Peace" is the third item in the second column, so it is located in cell B3.

Learn more about cell from

https://brainly.com/question/28435984

#SPJ1

Jane wants to type a math assignment involving percentages she wants to insert the percent symbol after typing a number which key should Jane express along the shift key

Answers

To type a percent symbol. Press shift+5.

Automated implementation of an application's build, test, and deployment process is called as _____________________.

Answers

Answer:

Deployment pipeline.

Explanation:

Automated implementation of an application's build, test, and deployment process is called as deployment pipeline.

Generally, the main components of the deployment pipeline are the; build automation, test automation and deployment automation.

The main purpose why software engineers use the deployment pipeline is to enable them avoid any waste in the software development process, and to avail them the opportunity to give a rapid feedback to the production team during deployment of the software application. This ultimately implies that it involves the process of picking up a code from version control and presenting it to the end users of the software application in an automated manner.

Since, it is done automatically it helps to mitigate human errors and to meet customer's requirements.


44. A user would like to set a public network for a DMZ server.
Which of the following is a public IP subnet? (5 points)
O 172 16.1.0/24
O 192.168.10.0/25
O 64.65.128/24
O 10.0.1.0/24

Answers

Answer:

The public IP subnet out of the given options is:

c. 64.65.128/24

Explanation:

The other subnets are part of private, non-routable IP address ranges:

172.16.1.0/24 is within the 172.16.0.0 - 172.31.255.255 private range

192.168.10.0/25 is within the 192.168.0.0/16 private range

10.0.1.0/24 is within the 10.0.0.0/8 private range

What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me

Answers

Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.

Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.



PLS MARK ME AS BRAINLIEST.

Password protection restricts access to a resource, while encryption secures the actual content of that resource by transforming it into an unreadable form.

Ask about the difference between password protection and encryption.

Now, Password protection and encryption serve different purposes when it comes to securing data.

Password protection is a method of restricting access to a device, system, or specific files by requiring users to enter a password. It acts as a barrier to prevent unauthorized individuals from accessing the protected resource.

The password is typically a combination of characters that only authorized users should know.

Encryption, on the other hand, is a technique used to convert plain text or data into an unreadable format, called ciphertext, using an encryption algorithm.

The ciphertext can only be decrypted back to its original form by someone possessing the decryption key.

Encryption ensures that even if someone gains unauthorized access to the data, they will not be able to read or understand it without the decryption key

Hence, Both measures are commonly used together to enhance data security.

To learn more about password protection visit:

https://brainly.com/question/32167725

#SPJ3

which of the following task manager tabs on a windows system is used to display the processes owned by each signed-in user?

Answers

The "Users" tab in Task Manager on a Windows system is used to display the processes owned by each signed-in user. (Option B)

What is the explanation for the above response?


This tab allows you to view the resource usage for each user, as well as the processes running under each user's account. It can be useful in identifying which user accounts are consuming the most resources and may need to be optimized.

Task Manager is a system monitoring tool in Windows that allows users to view and manage running processes, performance statistics, and startup programs, among other things.

Learn more about  task manager at:

https://brainly.com/question/17745928

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:


Which of the following Task Manager tabs on a Windows system is used to display the processes owned by each signed-in user?

Processes

Users

App history

Startup

A processor operates at a clock rate of 1.6 GHz yet has a varying CPI for different instruction types. A given program has 400 ALU instructions which take the processor 7 cycles complete each instruction. It has 300 memory instructions that take 12 cycles to cycles to complete each instruction. It also has 90 branching operations that take 21 cycles to cycles to complete each instruction. How long does it take to execute this program

Answers

Answer:

0.0051825 ms

Explanation:

From the given information:

The clock time is = \(\dfrac{1}{clok \ rate}\)

\(=\dfrac{1}{6} Ghz\)

\(=\dfrac{1}{6}\times 10^9\)

To milliseconds, we have;

= 0.000000625 ms

However, the execution time is the sum total of all instruction types multiplied by the ratio of cycles taken per instruction and cycle time.

Mathematically;

Execution time is: \(\Bigg[Sum \ of \ all \Big(instruction \ type \times \dfrac{cycles taken }{instruction} \Big) \Bigg] \times cycle \ time\)

Recall that:

the cycles taken according to the ALU = 400 × 7 =2800

cycles required according to the memory instructions = 300 × 12 = 3600

cycles for branching = 90×21 = 1890

THUS;

Total cycles = 2800 + 3600 + 1890

= 8290 cycles

Finally, execution time = 8290 cycles × 0.000000625 ms

= 0.0051825 ms

Select the best ansiver for each question below
c. Linux
c. operational interference
2. What type of software works with users, application software, and computer hardware
handle the majority of technical details?
a Application
b. Desktop
d. system
The ability to switch between different applications stored in memory is called
a Diversion
b. Multitasking
d. programming
Graphic representations for a program, type of file, ar function:
a. App
e image
b. Icon
d. software
The operating system based on Linux, designed for Netbook computers, and focused on
Internet connectivity through cloud computing:
a Chrome
c. Unix
b. Mac
d. Windows
Programs that coordinate computer resources, provide an interface, and run applicatio​

Answers

Answer:

the answer is going to be system

You have decided that the complexity of the corporate network facility and satellite offices warrants the hiring of a dedicated physical security and facilities protection manager. You are preparing to write the job requisition to get this critical function addressed and have solicited some ideas from the PCS working group members regarding physical and environmental security risks. Discuss the operational security functions that the physical security and facilities protection manager would be responsible for. Discuss how these functions would inform the development and implementation of system related incident response plans. Further discuss how these incident response plans fit into business continuity planning. Include at least one research reference and associated in-text citation using APA standards. In yourreplies to your peers further discuss how the concepts improve the security posture of PCS.

Answers

Answer:

All organizational security functions are as follows:  

i) Classify any vital data  

ii) Analyze of the hazard  

iii) Analyze vulnerability  

iv) Assess the risk  

v) Take the appropriate risk prevention measures.

Explanation:

These methods described the incident that will fit into this business model was its ongoing support and control of its system that involves the improvements and fix bugs.  For above-mentioned mechanisms aid in evaluating potential events/attacks and help reduce the risk involved with these, as well as promote network security by reducing the likelihood of any harm.  In this case, appropriate monitoring and monitoring should be a must.
Other Questions
Find the general solution of the differential equation: y+3y=te^4t.Use lower case c for the constant in your answer. The diagram shows the ratio of trees Maeve plants to the trees she harvests each day.All of the following diagrams represent equivalent ratios.Which diagram best shows how many trees Maeve planted on a day when she harvested 14 trees?Choose 1 answer: find all real numbers X such that 4x + 2 < 14 and -21x + 1 < 22 The waste-to-energy process generatesenergy in the form of electricity, heat, or fuelfrom the incineration of waste. Convertingnon-recyclable waste materials into electricity,heat, or fuel generates a renewable energysource. The 86 waste-to-energy facilitiesin the United States have the capacity toproduce 2,720 megawatts of power peryear by processing more than 28 milliontons of waste per year. Write an inequalityto show the possible power, p, that thewaste-to-energy facilities in the United Statesare capable of producing. A triangular plot of land has one side along a straight road measuring 307 feet A second side makes a 51 angle with the road, and the third side makes a 42 angle with the road. How long are the other two sides? The longer side of the triangular plot is feet. The shorter side of the triangular plot is feet. (Round to the nearest hundredth as needed )If answer correct will give brainliest. Need answer ASAP please The popualtion in 2016 is 899 447, the population increases by 8. 1% in three years A local council worker undertakes a survey, recording the travel time of vehicles traversing a 500 metre section of road. The worker records the following values: - 42 seconds - 37 seconds - 41 seconds - 33 seconds - 45 seconds Calculate the average speed. When New Firms Enter A Market, Existing Firms Will Sell Than Before, And Their Market Power Will Less More B. When Firms Exit A Market, Remaining Firms Will Sell Than Before, And Their Market....a. When new firms enter a market, existing firms will sell (less more) than before, and their market power will b. When firms exit a market, remaining firms will sell (less more ) than before, and their market power will c. If there is free exit from and entry into an industry, long-run economic profits will be (equal to zero positive negative) for firms in that industry. Some people believe that the experiences children have before they go to school will have the greatest effect on their future life. Others argue that experiences gained when they are teenagers have a bigger influence. Discuss both views and give your own opinions. is the following part of primary, secondary, or tertiary care?explore goals and plan interventions Why did the South secede from the United States?When was the period of Reconstruction? Why did it fail? All minerals have the same type of crystal structure because all of their atoms are arranged the same way.truefalse PLS HELP ME WITH THIS HOMEWORK the major nutritional deficit in early childhood is insufficient: Why are rules significant in writing molecular structures. 1 In what type orbital are the outer electrons of the atoms of the elements of Group 1 (IA) and Group 2 (IIA)? Part B--Highlight the sentence-- that best supports the answer to Part A.(Part A answer was: "Instead of giving up, Sonia uses her mistakes in court to figure out how to improve what she does")Her first real case in court involved a young college student who had been in a street fight. Sonia described this case when she wrote about it in her book. She said when she stood in front of the judge that day, she stammered. She didnt feel ready. The judge was using words she didnt even understand!Sonia lost her first case. But she didnt let that stop her. She knew what to doask for help and learn more. She won her second case. In fact, she did so well that her bosses considered her a star. Usually, the new DAs handled small crimes for a long time before they were given more important cases. But Sonia moved up very fast. A verb that helps complete another verb is called a distinguish between capital intensive and labour intensive Which option is an expression A 3+5 O B. 3 O c. 3+5>7 O D. 3+5=8