1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
2 years ago
7

Your team at amazon is overseeing the design of a new high-efficiency data center at hq2. a power grid need to be generated for

supplying power to n servers. all servers in the grid have to be connected such that they have access to power. the cost of connections between different servers varies. assume that there are no ties, names of servers are unique, connections are directionless, there is at most one connection between a pair of servers, all costs are greater than zero, and a server does not connect to itself. write an algorithm to minimize the cost of connecting all servers in the power grid. input two arguments - num, an integer representing number of connections. connectons, representing a list of connections where each element of the list consists of two servers and the cost of connection between the servers. note: the cost of connection between the servers is always greater than 0.
example input num = 5 connection = [[a,b,1], [b,c,4], [b,d,6], [d,e,5], [c,e,1]]

output [[a,b,1], [b,c,4], [c,e,1], [d,e,5]]
Computers and Technology
1 answer:
elixir [45]2 years ago
3 0

Answer:

void print2(int row) {

for (int i = 0; i < row; i++) {

 char ch = 'a';

 char print = ch;

 for (int j = 0; j <= i; j++) {

  cout << print++;

 }

 cout << endl;

}

}

int count_digits(int num) {

int count = 0;

int temp = num;

while (temp != 0) {

 temp = temp / 10;

 count++;

}

return (num % count);

}

Explanation:

You might be interested in
Assume that the following code segment C is executed on a pipelined architecture that will cause data hazard(s): Code segment C:
KiRa [710]

Answer:

See explaination

Explanation:

a) Reorganizing the code

ADD $s2 , $t2, $t3

ADD $t5, $s2, $t6

SUB $t4, $s2, $t5

AND $t5,$t4,$t6

The reordering of the instruction leads to less hazards as compared to before.

b) with NOP

ADD $s2 , $t2, $t3

NOP

NOP

SUB $t4, $s2, $t5

NOP

ADD $t5, $s2, $t6

NOP

NOP

AND $t5,$t4,$t6

c. Pipeline with stalls

see attachment please

d. pipeline with forwarding

see attachment

5 0
3 years ago
What type of elictrical service is there in your area? 2 wire or 3 wire​
lilavasa [31]

Answer:

3 wire and 5 wire!

Explanation:

We have 3 wire connections, having Live, Neutral and Ground, but also 5 wire connections, having 3 phases, Neutral and Ground.

3 0
3 years ago
Read 2 more answers
using the concept of defense in depth, which layers might we utilize to implement defenses to secure ourselves against someone r
quester [9]

Environmental protections would need to be in place which would ensure USB threats were non-issue by using the concept of defense in depth. Provide them with work USB sticks that have automatic encryption protection instead of expecting them to find or utilise ones that have been supplied to them by others. One technique to ensure that there won't be a data breach if a USB stick is lost is to use encrypted devices.

A method known as "defence in depth" uses a variety of security measures to safeguard an organization's assets. The idea is that extra layers exist as a backup to ensure that threats are stopped along the road if one line of protection is breached.

In order to safeguard the confidentiality, integrity, and availability of a computer network and the data contained inside it, a number of security methods and controls are deliberately stacked throughout the network. This strategy is known as defence in depth (DiD).

Depending on the point of concentration, defence in depth can be divided into three control layers. These include administrative, technical, and physical controls.

Learn more about defense in depth:

brainly.com/question/13566507

#SPJ4

7 0
1 year ago
10. Blender® allows users to duplicate an object simply by selecting it and pressing duplicate on the toolbar (shift+D). (1 poin
lisov135 [29]
<span>10. Blender® allows users to duplicate an object simply by selecting it and pressing duplicate on the toolbar (shift+D).
True

11. According to the unit, which of the following is an important first step in any creative endeavor?
pre-production

Hope this helps.
</span>
5 0
3 years ago
These 2 questions PLEASEEE (:
kramer

Answer:

not sure of the second but the first is pixels

4 0
3 years ago
Read 2 more answers
Other questions:
  • If you want to prioritize downloads of your mobile app instead of visits to your mobile site, you should: a) add a sitelink exte
    10·1 answer
  • Hich function would be used to remove a section of text from a document?
    12·1 answer
  • How do you access the dark web? What are the negatives of doing this?
    14·1 answer
  • Components of an operating system include process,memory,and file management. what is another component of and operating system
    5·2 answers
  • Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
    6·1 answer
  • Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being abl
    7·1 answer
  • (ACCESS 2016)
    7·2 answers
  • What are the services offered by web-based email?​
    12·1 answer
  • Which of the following is not a data visualization technique?
    6·1 answer
  • Which property do you use to align an element horizontally with the left or right edge of its parent element?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!