(a) what are the total number of resources present in the system? (b) compute what each process might still need. (b) is this system in a safe or unsafe state? why? (d) is this system currently deadlocked? why or why not? (e) which processes, if any, are or may become deadlocked? (f) if a request from p3 arrives (0,1,0,0), can that request be safely granted? if granted, what would be the resulting state (safe, unsafe, deadlocked)? which processes, if any, are or may become deadlocked if this request was immediately granted?

Answers

Answer 1

When the system can distribute all the resources demanded by all the processes without experiencing a deadlock, that state is referred to as being safe.

Why the system is safe?

Computer security is essential because it safeguards your information. Effective malware and virus prevention makes programs function more quickly and smoothly by preventing viruses, which is essential for the general health of your computer.

In order to prevent viruses, malware, ransomware, and other threats from damaging your computer or device and its data and files, antivirus software operates. Firewalls are crucial for protecting your data and files from assault by filtering out dangerous software such as viruses and hackers.

Computer hardware, software, and procedures that are: reasonably secure from unauthorized access and misuse; reasonably reliable and operating correctly; and reasonably fitted to carrying out the intended functions are considered secure systems.

To learn more about system is safe refer to:

https://brainly.com/question/14364696

#SPJ4


Related Questions

bruce frequently works with a large number of files. he notices that the larger the files get, the longer it takes to access them. he suspects that this problem of time consumption in accessing those files is related to the files being spread over the disk. he needs to store the files contiguously on the disk. which utility should he use to achieve this task?

Answers

Disk defragmenter  utility should he use to achieve this task.

What is disk defragmenter?

Defragmentation is a procedure that lowers the level of fragmentation in file systems maintenance. It accomplishes this by dividing the mass storage device's file storage contents into the fewest possible continuous sections (fragments, extents).

In an effort to prevent fragmentation from returning, it also makes use of compaction to expand the areas of open space. Because they are frequently accessed in succession, several defragmentation tools attempt to keep smaller files within a single directory together.

The benefits of defragmentation and how it applies to file systems on mechanical disk drives (hard disk drives, floppy disk drives and optical disk media). When accessing fragmented files, the read/write heads of the hard drive move more slowly over the disk than when accessing the entire contents of a non-fragmented file sequentially without moving the heads to look for additional fragments.

Learn more about Defragmentation click here:

https://brainly.com/question/14254444

#SPJ4

an application programming interface (api) for a website tells you how to group of answer choices use ajax to get data from the site use jsonp to get data from the site download data from the site navigate the site

Answers

An application programming interface (api) for a website tells you how to  navigate the site

What is Application Programming Interface?Using a set of definitions and protocols, Application Programming Interface are techniques that let two software components communicate with one another. For instance, the software system of the weather bureau contains daily weather information. Your phone's weather app "talks" to this system via Application Programming Interface  to provide you with daily weather updates.The term "API" stands for application programming interface and has been used by software for a long time to access data, server software, and other applications. APIs are incredibly adaptable and can be utilized with hardware, operating systems, databases, and web-based applications.

To learn more about application programming interfaces refer to:

https://brainly.com/question/12987441

#SPJ4

write some code that repeatedly reads a value into the variable n until a number between 1 and 10 (inclusive) has been entered.

Answers

Making a set of instructions that instruct a computer how to carry out a task is the process of programming. Computer programming languages like JavaScript, Python, and C++ can all be used for programming.

every iteration, the formula initVal:step:endVal increases the index by the value step, or decreases the index if step is negative.

valArray: On each iteration, create a column vector, index, from the array's succeeding columns. For instance, index = valArray on iteration one (:,1). The maximum number of times the loop can run is n, where n is the number of columns in the valArray, which is returned by numel(valArray(1,:)). Any MATLAB® data type, such as a character vector, cell array, or struct, may be used as the input valArray.

Learn more about array here-

https://brainly.com/question/19570024

#SPJ4

why can't i update my windows 10 there were problems installing some updates, but we'll try again later. if you keep seeing this and want to search the web or contact support for information, this may help:

Answers

These are the main reasons:

Conflicting software - In this case, you might need to remove the external program that causes this issue.Corrupted system files - Even though this could be a major issue for other Windows services, using a system repair tool will be helpful.Antivirus programs - These programs are necessary to protect your data, but they may interfere with some critical operations and may need to be turned off.

What can I do if Windows 10 updates won’t install?

If the updates won't install, Windows Update might not be operating properly. Resetting the relevant parts and attempting again will resolve this.

Occasionally, you might receive The error notice "We couldn't complete the updates" comes if a problem with your system stops the update from finishing. Antivirus software may occasionally be the cause of this.

A few users claimed that Windows updates were awaiting installation, which the built-in troubleshooters could resolve.

How can I fix the problems with installing updates?

Run Windows Update troubleshooter

Run the DISM tool

Manually reset Windows Updates components

Run a System File Checker scan

Temporarily disable your antivirus security software

Download updates manually

Learn more about windows update click on this:

https://brainly.com/question/28903855

#SPJ4

After launching the Mail Merge task pane,
the first step is to:
(A)Identify the data source
(B) Identify the main document
(C) Specify the letter size
(D)Specify the envelope size

Answers

After launching the Mail Merge task pane, the first step is to

B. Identify the main document

What is mail merge?

Mail merge is a method of building  letters or emails with a bit of automation.  

It requires two components

a template of a letter or an email with specific placeholders And a spreadsheet with a set of dataThese can be names, addresses or any other custom data.Form letters, mailing labels, envelopes, directories, and bulk e-mail and fax distributions. Mail Merge is most commonly used to print or email multiple recipients form lettersCustomize form letters for particular on mass-produce covers and labels.

Hence, Identifying the main document is the first stage in Mail Merge Task.

To learn more about Mail Merge from the given link

https://brainly.com/question/21677530

#SPJ13

what is process modeling? multiple choice an illustration of the movement of information between external entities and the processes and data stores within the system software suites that automate systems analysis, design, and development a formal, approved document that manages and controls the entire project a graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment

Answers

Option 4 is correct. The graphical representation of business processes or workflows is called process modeling.

Similar to a flow chart, each stage of the process is broken down into its component parts to provide a complete picture of the tasks involved in the process as they relate to the business environment. By providing data-driven visual representations of the most important business processes, business process modeling provides organizations with an easy approach to comprehend and optimize workflows. The different business processes that underpin most organizations' day-to-day operations are generally pretty well understood. Data modeling is the technique of utilizing words and symbols to describe the data and how it flows to create a streamlined picture of a software system and the data pieces it includes.

Learn more about operating here-

https://brainly.com/question/18095291

#SPJ4

which statement best describes how vpc routers and firewalls work? they are managed by in virtual machines and customers cannot modify them. they are managed by as a built-in feature

Answers

The phrase "they are managed by as a built-in feature" best captures how virtual private network routers and firewalls operate.

What is vpn and firewall?For packets going to and from VM instances, both VPC firewall rules and hierarchical firewall policies are in effect. Even when traffic is only moving between VMs within the same VPC network, these types of firewalls nonetheless regulate it.Based on a configuration you define, VPC firewall rules enable you accept or restrict connections from or to the virtual machine (VM) instances. Regardless of its configuration or operating system, instances are always protected by enabled VPC firewall rules, even if they have not yet started up.In your VPC, you employ a firewall for each Availability Zone. You select a subnet to house a firewall endpoint which filters your traffic for each Availability Zone.

To learn more about vpn firewall refer to :

https://brainly.com/question/28002218

#SPJ4

a data analyst adds specific characters before and after their code chunk to mark where the data item begins and ends in the .rmd file. what are these characters called?

Answers

If a data analyst adds specific characters before and after their code chunk to mark where the data item begins and ends in the .rmd file, these characters are called delimiters.

Who is a data analyst?

A data analyst can be defined as an expert or professional who is saddled with the responsibility of inspecting, transforming, analyzing, and modelling data with the sole aim of discovering useful information, providing insights, and creating informed conclusions, in order to support decision-making and create a completed report.

What is a delimiter?

In Computer technology, a delimiter can be defined as a set of characters that are designed and developed to be used by computer programmers for marking the beginning and ending of a data item in a code chunk (.rmd file).

In this context, we can reasonably infer and logically deduce that a delimiter is used for indicating where a data item starts and end.

Read more on data analyst here: brainly.com/question/27853454

#SPJ1

Complete Question:

A data analyst adds specific characters before and after their code chunk to mark where the data item begins and ends in the .rmd file. what are these characters called?

A. Delimiters.

B. Syntax

C. Markdown

D. Backtricks

open the pt activity. perform the tasks in the activity instructions and then answer the question. which port does switch0 use to send frames to the host with the ipv4 address 10.1.1.5?

Answers

The port that Switch0 use to send frames to the host with the IPv4 address 10.1.1.5 is Fa0/11 (Option D)

What is IPv4 address?

An IPv4 address, which is a 32-bit number, identifies a network interface.

When the ipconfig /all command is executed at the PC0 command prompt, the IPv4 address and MAC address are shown. When PC0 pings IPv4 address 10.1.1.5, the switch logs the source MAC address (from PC0) as well as the port to which PC0 is connected.

As a result, after getting the destination reply, the switch checks the destination MAC address against the MAC addresses provided in the MAC address database.

Running the display mac-address-table command on the PC0 Terminal program reveals two dynamic MAC address entries. The MAC address and port entry for the destination, which does not belong to PC0, must be the one for the IPv4 address 10.1.1.5.

Learn more about IP addresses:

https://brainly.com/question/29345454

#SPJ1

Full Question:

Which port does Switch0 use to send frames to the host with the IPv4 address 10.1.1.5?

Fa0/1Fa0/5Fa0/9Fa0/11

which is not true about the using keyword? group of answer choices it can be used with inner or outer joins the join must be an equijoin, meaning the equals operator is used to compare the two columns you code a using clause in addition to the on clause you use it to simplify the syntax for joining tables

Answers

When you wish to combine multiple tables and the tables have the same column name and you want to compare the data from these tables using the same column name, use the Using keyword rather than the On keyword.

How to Using keyword in PHP?To learn more about PHP's "inner" and "outer" joins. I'll now explain how to join tables using the "Using" keyword in this article. The "On" keyword is substituted with the term "Using".The designation table has two columns, but the emp table has four columns (id, fname, lname, and salary) (id and role). Now you can see that both tables contain a "id" field.It is typical for columns that are being compared to have the same name when you code a "equi join."The "Using" keyword can be used to make the query simpler for joins like these. The following example demonstrates the use of the "Using" keyword in place of the "On" keyword. Using their IDs, we connected two tables in the sample below. And the emp role will be returned from the designation database based on the name of the id column.If you want to combine multiple tables with the same column names and compare the data from these tables using the same column names, you can use the "Using" keyword rather than the "On" keyword, according to the explanation that came before. The keyword "Using" is usable.

To Learn more About Using keyword Refer to:

https://brainly.com/question/26355510

#SPJ4

turn to code m36.8 in the tabular list. you will found a code first notation under code m36.8. under the code first notation, what is the code associated with ochronosis?

Answers

According to the scenario, the code associated with ochronosis is E70.2.

What is meant by a Tabular list?

A tabular list may be defined as a type of list that is systematically arranged in chronological order. This list consists of ICD-10-CM codes that are divided into chapters on the basis of the body system or condition.

According to the context of this question, a tabular list is essential for representing the alphabet index in the ICD-10-CM along with their assigned code. This is because The Alphabetic Index does not always provide the full code.

Therefore, the code associated with ochronosis is E70.2.

To learn more about Tabular list, refer to the link:

https://brainly.com/question/9442380

#SPJ1

write a function called convertstrtoint that inputs four strings that represent integers, converts the strings to integers, sums the values and prints the total of the four values.

Answers

A group of components of the same data types are held together in an array..

What is string and array?A group of components of the same data types are held together in an array, which is a linear data structure.An object that defines a string of characters is called a string.It is both one-dimensional and two-dimensional.String has only ever two dimensions.

#include <stdio.h>

#include <stdlib.h>

int main(void)

{

 char x[10];

 char y[10];

 char z[10];

  char t[10];

  int sum=0;

  puts("Enter 4 strings to be summed");

 scanf(" %s %s %s %s", x, y, z, t);

 printf("\nSum is=%d", atoi(x)+atoi(y)+atoi(z)+atoi(t));

}

To learn more about string refer,

https://brainly.com/question/12978443

#SPJ4

please help 2.7.8 auto fill

Answers

Using the knowledge of the computational language in JAVA it is possible to write a code that write a variables that store personal information that you often need to fill various forms.

Writting the code:

public class FormFill

{

private String fName;

private String lName;

private int streetNumber;

private String streetName;

private String aptNumber;

//create varieables

// Constructor that sets the first and last name

// streetNumber defaults to 0

// the others default to an empty String

public FormFill(String firstName, String lastName)

{

fName = firstName;

lName = lastName;

}

//give meaning to some varieables

// Sets streetNumber, streetName, and aptNumber to the given

// values

public void setAddress(int number, String street, String apt)

{

streetNumber = number;

streetName = street;

aptNumber = apt;

}

//give meaning to some varieables

// Returns a string with the name formatted like

// a doctor would write the name on a file

//

// Return string should be formatted

// with the last name, then a comma and space, then the first name.

// For example: LastName, FirstName

public String fullName()

{

String fullName = lName + ", " + fName;

return fullName;

}

//give meaning to some varieables

// Returns the formatted address

// Formatted like this

//

// StreetNumber StreetName

// Apt AptNumber

//

// You will need to use the escape character \n

// To create a new line in the String

public String streetAddress()

{

String fullstret = streetNumber + " " + streetName + "\n" + "Apt " + aptNumber;

return fullstret;

}

//give meaning to some varieables

// Returns a string with the credit card information

// Formatted like this:

//

// Card Number: Card#

// Expires: expMonth/expYear

//

// Take information as parameters so we don't store sensitive information!

// You will need to use the escape character \n

public String creditCardInfo(int creditCardNumber, int expMonth, int expYear)

{

String credi = "Card Number: " + creditCardNumber + "\n" + "Expires: " + expMonth + "/" + expYear;

return credi;

}

//compile variables

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

hich iot devices can be used to improve workplace safety in mining, heavy industries, and construction?

Answers

IoT seismic sensors are the devices that can be used to improve workplace safety in mining, heavy industries, and construction.

The mining sector can be hazardous. Miners can be put in danger by risky working conditions, demanding manual labor, and proximity to powerful machines, but the internet of things (IoT) can be helpful. The Internet of Things (IoT) can be used to improve mining safety and potentially save lives.

In 2020 alone, there were over 3,000 occupational accidents in the mining sector that cost workers days off. Even while that number has steadily decreased over the previous few years, it is still quite high. Given how frequently these accidents occur, mines must to take every precaution to safeguard their workers.

Here are some ways in which IoT devices can assist mining companies in doing that.

To know more about IoT click here:

https://brainly.com/question/25703804

#SPJ4

error1could not write to output file 'the process cannot access the file because it is being used by another process.

Answers

This issue typically arises when you try to launch a programme that you haven't shut down previously. It can be can be an Operating system error or in any program you are coding.

This may occur if the file being referenced is open in another application or if the uploading process crashes. To fix it, first confirm that no users are currently viewing the file anywhere, then restart the computer to ensure it is not open as a leftover from a crash.

It is common knowledge that if a file is already in use, another process cannot change it. In this case, the Operating system locks a file when a programme or process opens it, making it impossible for another programme to make changes to it.

The problem usually arises when the user tries to execute a netsh command. Some users claim that when they attempt to right-click a website in the IIS (Internet Information Services) MMC (Microsoft Management Console) snap-in, they receive the error message.

Closing your programme (which could be the forms you created) or restarting the application are the next steps to correct it. If nothing else seems to work, launch task manager and check to see if your programme is still active even if you can't see it on the screen.

To learn more about Operating system error click here:

brainly.com/question/21452397

#SPJ4

How can you identify the type of resource returned by a search engine?
Select one:
O a. It's impossible to tell without clicking on the URL to see what happens
O b. The type will be clearly labeled next to the description
O c. You request a specific type up-front when you begin the search
O d. Look at the file extension at the end of the URL

Answers

d.Look at the file at the end of the URL

How to look at the file at the end of the URL?

The file's extension informs your computer which program created or can open the file and which icon to use. For instance, the docx extension instructs your computer to display a Word symbol when you examine the file in File Explorer and that Microsoft Word may open it.

Extensions are crucial since they inform your computer about the file's icon and the program that may open it. For instance, a file with the extension "doc" indicates to your computer that it is a Microsoft Word file.

Hence looking at the file  at the end of the URL is suggested

To know more about the file please follow this link:

https://brainly.com/question/12325790

#SPJ1

when designing a database, you should . a. make sure that entities are in normal form before table structures are created b. create table structures then normalize the database c. only normalize the database when performance problems occur d. consider more important issues such as performance before normalizing

Answers

When designing a database, you should make sure that entities are in normal form before table structures are created.

What is the best way to design a database?Database Design GuidelinesThink about all perspectives when planning.Choose a database type, normalize your data, make structures transparent, define constraints to preserve data integrity, document everything, plan for increasing backup time in the build, and keep privacy as your top priority.

Logic design is one of the five stages of database design. Physical layout. Implementation. monitoring, modifying, and upkeep.

The arrangement of data in accordance with a database model is known as database design. The data pieces' relationships with one another are decided by the designer.

They can start to fit the data to the database model with this knowledge. The data is handled appropriately by the database management system.

To learn more about  database design refer to:

https://brainly.com/question/13266923

#SPJ4

Which is an example of a report a company might create using a relational database?

a. a toy manufacturer joining data tables of restaurant locations, customer names, and amount of toys ordered
b. a clothing retailer joining data tables of pant designers, available styles, and herbal teas
c. a hospital joining data tables of surgical equipment, best-selling novels, and types of surgery
d . a college bookstore joining data tables of professor names, classes they teach, and books they require

Answers

The correct answer is c

if you wanted to see the steps your users take to reach a key task or conversion, which exploration technique would you use to visualize those steps and see how well they are succeeding or failing at each step?

Answers

With the use of funnel exploration, you can easily assess how well your users are succeeding or failing at each step in the process of completing a task.

You can indicate the route you anticipate traffic to travel by using a destination target. This route is known as a funnel. Analytics can track where people enter and leave the path to reach your objective when you describe the steps in a funnel. The Goal Flow and Funnel reports contain this data. Scope is divided into four categories: product, hit, session, and user. Product - value is utilized with the specified product. When a hit is made, the hit-value is applied to that particular hit.

Learn more about Data here-

https://brainly.com/question/11941925

#SPJ4

you would like to transmit three numbers from one node to another node using digital communication medium. each number you enter the keyboard has to be converted to digital bits ( i.e. ones and zeros). how many bits will be needed to store and send all three numbers

Answers

Eight bits are required to store and send all three numbers. Three bits can store 2·2·2 values. So to store 3 values, you need at least two bits.

What are bits ?

The smallest piece of data that a computer can process and store is a bit (binary digit). Similar to an on/off light switch, a bit is always in one of two physical states. Usually a 0 or 1, the state is represented by a single binary integer.

Computers interpret our intentions and process information based on how those "instructions" are represented as bits.

The majority of systems process and store data in bytes, even if a computer may be able to evaluate and alter data at the bit level. A byte is an eight-bit string that is regarded as a single entity. Bytes are always used to refer to a computer's memory and storage.

The place value, also known as the bit value, is the value that is assigned to each bit in a byte. Based on the individual bits of a byte, the place values are utilised to interpret the meaning of the byte as a whole. In other words, the byte values show which character corresponds to each byte.

To learn more about Bits refer :

https://brainly.com/question/19667078

#SPJ4

use drag and drop to show the different types of media which can be easily integrated into a site and which ones cannot.

Answers

Site Page integration: Chart, Image, Video, and Document

Integration not possible: Flash animation and Game

What is website integration?When your website communicates or receives data from another program, system, or website, this is referred to as website integration. Website integrations are helpful for connecting data from many sources. Combining this data can help you comprehend your clients' needs and behaviors, fill in any operational gaps, and lessen human mistake.You may better manage sales and marketing efforts by integrating your website. Through conversion rate optimization, you may monitor the success of your marketing initiatives when an application is incorporated into your website.The fundamentals of integration revolve around making it easier for your website and another application to exchange data. The two apps can connect thanks to an API (application programming interface). An API key is frequently required in order to access data from another system.

To learn more about website integration, refer to

https://brainly.com/question/13110523

#SPJ4

must eat is a company that allows online food delivery. must eat rolls out updates every month for better user interface. recently, after one of its updates, the network team of the company detects certain unauthorized access to the main data frame of the company. on inspection, the team notices that there has been no breach of sensitive data. what kind of cybersecurity exploitation was attempted by the hackers in this scenario?

Answers

Since must eat is a company that allows online food delivery, the kind of cybersecurity exploitation was attempted by the hackers in this scenario is  A zero-day attack.

What is meant by zero day attack?

Since the seller or developer has only become aware of the flaw, they have "zero days" to remedy it, hence the term "zero-day." When hackers take advantage of the vulnerability before developers have a chance to fix it, it is known as a zero-day assault.

This harmful computer worm targeted machines in Iran, India, and Indonesia that were utilized for manufacturing. Iran's uranium enrichment facilities were the main target in an effort to thwart the nation's nuclear program.

Therefore, Since there are currently no antivirus signatures or updates for zero-day threats, they are by definition challenging to identify. There are a variety of zero-day vulnerability detection techniques that can be used to locate previously unknown software vulnerabilities.

Learn more about A zero-day attack from

https://brainly.com/question/27715022
#SPJ1

See full question below

Must Eat is a company that allows online food delivery. Must Eat rolls out updates every month for better user interface. Recently, after one of its updates, the network team of the company detects certain unauthorized access to the main data frame of the company. On inspection, the team notices that there has been no breach of sensitive data. What kind of cybersecurity exploitation was attempted by the hackers in this scenario?

1. It could have been an evil twin exploit.

2. It could have been an attempted hack by a white hat hacker

3. A zero-day attack might have been the cause

4. It could have been an attempted hack by a gray hat hacker

you are working as a security admin in an enterprise. while you were analyzing different password attacks, you found that whenever an individual user's password gets cracked, another user with the same password residing in the same password digest file also has their account compromised. how should you prevent this from happening in the future?

Answers

To prevent from this different password attacks in the future You should add salt to the password before hashing.

Why is it called salt in hashing?

Prior to hashing a password, extra information is added to a string called a salt. It is comparable to adding table salt to meals in that it alters and enhances the cuisine, hence the name "salt."Random bits are added to each password instance before it is hashed to provide a cryptographic salt. Even when two users select the identical passwords, salts provide distinct passwords. By requiring attackers to recompute hash table attacks using the salts for each user, salts help us prevent hash table attacks.An attacker can use hash tables to steal passwords and compromise accounts if there is a system-wide salt. Instead, every password made for a user should be individually hashed and salted.

To learn more about salted passwords refer :

https://brainly.com/question/15081762

#SPJ4

question 1 an analyst notes that their data is formatted as euros, but it should be formatted as pesos. what spreadsheet tool can help them select the right format?

Answers

The format as currency tool can be used the change the currency format from Euros to Pesos.

What is Currency tool ?

Numerous currencies are frequently associated with large universes. It might be challenging at times to keep track of their values, particularly their comparative values. Hopefully, this currency tool will be useful in that regard. The tool will automatically update once you enter the names of your currencies, their exchange rates to the first currency, and, optionally, the amount you want to see altered. just like that.

The "Add a currency" button allows you to add new currencies, and the corresponding buttons let you save and load your data. Everything will be saved in your browser, allowing you to easily close your browser, return at a later time, and reload your prior work. Keep in mind that only modern browsers and not using them will make this function.

To learn more about Currency Exchange , refer :

https://brainly.com/question/21263954

#SPJ4

1. If you were making a sports game, should you include a mode where the computer can play against itself? If so, why? If not, why not?

Answers

Answer:

I say not

Explanation:

because it's pretty not smart to have the computer going against itself

In a nested loop, the inner loop goes through all of its iterations for each iteration of the outer loop. True or false?.

Answers

True

To get the total number of iterations in a nested loop, add the number of iterations in the inner loop to the number in the outer loop.


You can learn more about at :
brainly.com/question/14003857#SPJ4

write a function choose door that asks the user to input an integer 1,2,3 to choose a door and returns the door they chose. you should catch any errors that the user might make and continue asking for input until the user inputs a valid choice.

Answers

The required function is written in C++:

#include <iostream>

using namespace std;

void func_input(int);

int main()

{

   int in_num;

  cout<<"Please enter 1,2, or 3 :  ";

   cin>>in_num;

   func_input(in_num);

   return 0;

}

void func_input(int in_n)

{

if (in_n==1 || in_n==2 || in_n==3)

  {

    if (in_n==1)

      cout<<"door 1 opened";

    if (in_n==2)

     cout<<"door 2 opened";

    if (in_n==3)

     cout<<"door 3 opened";

  }

  else

    cout<<"Please enter a valid number";

}

Please find the implementation of the function with output in the given attachment.

You can learn more about function at

https://brainly.com/question/16362961

#SPJ4

you are working on a project to design a new software for your company to use. creating the software involves an extensive amount of high level coding. this yields for a potentially high risk. how long should your sprints be?

Answers

Creating the software involves an extensive amount of high level coding. this yields for a potentially high risk should long sprints be as short as possible.

What does software developmnent means?

Software development is the name given to a group of computer science tasks involved in developing, deploying, and maintaining software. The set of instructions or programs that a computer follows are known as software. It makes computers programmable and is independent of hardware.

What is high level coding.?

Konrad Zuse's Plankalkül was the first high-level programming language intended for computers.

With the exception of Heinz Rutishauser's "Superplan" language and, to a lesser extent, ALGOL, it was not implemented during his lifetime, and World War II effectively cut off his original contributions from other advancements. Fortran was the first widely used high-level language. It was a machine-independent upgrade to IBM's earlier Autocode systems.

The ALGOL family introduced recursion as well as nested functions under lexical scope, with ALGOL 58 defined in 1958 and ALGOL 60 defined in 1960 by committees of European and American computer scientists.

Learn more about high level coding click here:

https://brainly.com/question/28823733

#SPJ4

Complete the sentence about bias and equity.
Biased algorithms may make
decisions that negatively impact the lives of individuals from minority groups.

Answers

The completed sentence is:

Biased algorithms may make erroneous decisions that negatively impact the lives of individuals from minority groups.

What is a Biased Algorithm and how do you prevent one?

Algorithmic bias refers to persistent and recurring flaws in a computer system that result in "unfair" outcomes, such as "privilege" for one category over another in ways that are inconsistent with the algorithm's intended function.

Use the following steps to decrease bias in algorithms:

STEP 1: Algorithms for inventory. Make a list of all the algorithms in use or developed in your business. A steward should be designated to manage and update the inventory.STEP 2: Look for bias in each algorithm.STEP 3: Retrain erroneous algorithms. Improve or stop using biased algorithms.STEP 4: Preventive measures. Create structures and protocols for ongoing bias mitigation and a permanent team to enforce those protocols.

Learn more about Biased Algorithms:
https://brainly.com/question/23282908
#SPJ1

tom surveys the users of a new software product. one of the survey questions asks users to rate their preferences on a likert scale. tom addresses the dimension of usability known as .

Answers

Tom addresses the dimension of usability known as  satisfaction. A collection of computer programs, documentation, and data is referred to as software. This is in contrast to hardware, which is the foundation of the system and does the real work.

What is Software?

Software is a collection of computer programs, documentation, and data. This is in contrast to hardware, which is the foundation of the system and does the real work.

A set of instructions, data, or programs used to run computers and carry out specified activities is referred to as software. It is the inverse of hardware, which describes a computer's physical components. Software is a catch-all phrase for apps, scripts, and programs that execute on a device.

Examples of well-known computer software include: operating systems (such as Microsoft Windows, Linux, and macOS) productivity software (for example, Microsoft Office Suite including Word, Excel, and PowerPoint) Browsers on the internet (including Firefox, Chrome, and Safari).

To learn more about software refer to:

https://brainly.com/question/1538272

#SPJ4



Other Questions
Contrast the Nurse and Friar Lawrence. Then, explain how the relationship between Juliet and the Nurse is like that of Romeo and the Friar. Cite textual evidence to support your answer.I need this please help me. I'm giving 30 points. a 70-year-old man has been diagnosed with angina pectoris and subsequently prescribed nitroglycerin spray to be used sublingually when he experiences chest pain. this drug will achieve relief of the patient's chest pain by: suppose you photographed earth's dark side from space, using ultraviolet-sensitive film, and using infrared-sensitive film. what would you expect to see in the photo? Using the graphs below, determine which water drop rate leads to the highest seed growth.(Note, the vertical axis represents the number of seeds, the blue lines represent the seeds and the green represents the sprouts)a.90 drops/hrb.72 drops/hrc.50 drops/hrd.12 drops/hr What is the equation of this graphed line which error in judgment occurs when people judge an entire group of people based on actions of a few? the table shows the number of pounds that 10 students in gary langs weight training class could bench press and squat. make a scatterplot to display the relationship between the bench press and squat weights for this sample. (use squat as the explanatory variable). describe the relationship shown in the scatterplot Write the linear equation when given the following information.m = -2 and b = -5 you are 5 ft tall. if the angle of elevation of a tower is 23 degree and you are standing 10 feet away from the base of the tower. how tall is the tower? Which is the best definition of feudalism?O a system where countries gain wealth by establishing coloniesO a system where people use trade and bartering to obtain goodsO a system where land is exchanged for military service and loyaltyO a system where the theory of natural rights of citizens is practiced What are the positive and negative effects of the mountain-climbing trade on the local environment and economy? 3-5 sentences, please thx think of a population outside the serengeti that you are familiar with, maybe one that lives near you. what factors do you think limit the size and growth of the population you chose? why katie company issues $14 million in bonds. the bonds are well received by investors solely based on the excellent reputation and past performance of the company, its products, and its executives. katie most likely is issuing a(n) bond. Sammys Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrella to tourists. Modify your Application as follows: Using PythonModify the getinput() function that accepts the user information so that it prompts for a customer name, first name and last name. Store in two separate variables.Add data validation to the account number so that only a 4 character string is allowed. The first character must be an A. You will need to use a while loop here because you do not know how many times the user will enter an invalid Account Number. You will have two conditions for the while loop: while the length of the account number variable does not equal 4 or while the account number variables does not start with the letter "A". Add a phone number input to the getinput(). Make sure that the phone number is 7 digits. Use a while loop that keeps asking the user to enter the phone number until it is seven digits.Return all values from the getinput() function -- there will be 5 of them.Modify the main() function so that the line that calls the getinput() function stores all 5 returned values in separate variables.Modify the main() function so that the values returned from the getinput() function are passed to the calculatefotal() function.Modify the header of the calculatetotal() function so that is accepts 5 parameters ( the account number, the number of minutes, the first name, the last name , and the telephone number.Modify the function that calculates the total and displays all the information, so that it displays the Contract Number, first and last names, and the Phone Number. The Phone Number should be displayed in the ###-#### format. You can the slice function to do this.Includes comments at the top to identify file name, project and a brief description.For further documentation, include comment for each section of code.Sample Run:ACCOUNT NUMBER:, A234 (program keeps prompting until a 4 character, starting with an AName Sally Douglass123 4567 (formatted in the module that displays the result)Minutes rented: 115Whole hours rented: 1Minutes remaining: 55Rental cost: $ 80Coupon good for 10% Off!This is my original code base on the instruction how do I add the new code to the case# Main function calls other functionsdef main():display()a,x=getinput()calculatetotal(x,a)# function to display logodef display():#Display the Sammys logoprint("-------------------------------------------------------------")print("+ +")print("+ SAMMYS MAKES IT FUN IN THE SUN +")print("+ +")print("+ +")print("-------------------------------------------------------------")# function to receive input from userdef getinput():# Request the minutes rented and store in variablecontract_number = (input("Enter the account number"))rented_minutes = int(input("Enter the number of minutes it took to rent: "))while (rented_minutes7200):rented_minutes = int(input("Try again"))return rented_minutes,contract_number# function to calculate hours, minutes remaining and costdef calculatetotal(acc,mins):# Calculate number of whole hourswhole_hours = mins//60# Calculate the number of minutes remainingremaining_min = mins % 60# Calculate the cost as hours * 40 + minutes remaining times 1#Calculation from smallest to greater by getting the smallest numbercost = whole_hours*40+ min(remaining_min*1, 40)# >Display minutes, whole hours, minutes remaining, and cost with labels# Print all valuesprint(("ACCOUNT NUMBER:"),acc)print("Minutes Rented:",mins)print("Whole Hours:",whole_hours)print("Minutes Remaining:",remaining_min) PLEASE HELPPPP FAST!!!!!Simplify the imaginary number... Carefully industrial growth with other countries has made North Korea very prosperous. True or false Which is NOT a reason that % of the world's population live between 20 degrees N and 60degrees N latitude?a. decent climateb. hot summersc. good vegetationd. wet enough for agricultureconvices is determined by consumer nora has strong feelings about the presence of the confederate flag outside public buildings in her town. these feelings stem in part from her political beliefs, and they may influence her voting behavior in the near future. nora has a(n): please choose the correct answer from the following choices, and then select the submit answer button. answer choices schema. appraisal. attitude. attribution. Question 1 of 10Why is this statement considered a theme and not a plot summary?True friends will always be there for you when you needthem.A. It presents a conflict that has been resolved.B. It relates the events of a specific story.OC. It introduces the main characters.D. It is a general idea about human nature. Ken spends $344.76 before tax at a hardware store. If the sales tax rate in his city is 7.5%, what is the total cost of his purchase? Round to the nearest cent if necessary.