Answer:
1.) Write the formula, which assigns double x to double n raised to the double z power.
Answer: 2\times x → 2\times n^(2\times z<u>)</u>
2.) Write a formula, which will add 5 to the cube of double t times double n, and assign it to double x.
Answer: 5\plus 2\times t^3→2\times x
3.) Write a formula, which will assign double x to square root of the sum of the squares of the lengths of the two legs of a triangle. Declare double leg1, and double leg2, in order to find the hypotenuse. (Pythagorean Theorem)
Answer: 2\times x → \sqrt \{(l^2)_1 + (l^2)_2\}= hypotenuse
4.) Write a program that find the distance between two values on the number line by taking the absolute value of their difference. Assign the answer to double x. The two numbers have been declared as follows:
double num1, num2
Answer: length = \sqrt\{|num2 - num1\|} → 2\times x
Explanation:
Answer:
Check the explanation
Explanation:
Keep two iterators, i (for nuts array) and j (for bolts array).
while(i < n and j < n) {
if nuts[i] == bolts[j] {
We have a case where sizes match, output/return
}
else if nuts[i] < bolts[j] {
what this means is that the size of nut is lesser than that of bolt and we should go to the next bigger nut, i.e., i+=1
}
else {
what this means is that the size of bolt is lesser than that of nut and we should go to the next bigger bolt, i.e., j+=1
}
}
Since we go to each index in both the array only once, the algorithm take O(n) time.
Answer:
Circumference of drum = 18.86 m
Given:
Diameter of drum = 6 m
Radius of drum = 3 m
Find:
Circumference of drum
Computation:
Circumference of drum is called single rotation
Circumference of drum = 2πr
Circumference of drum = 2[22/7][3]
Circumference of drum = 18.857
Circumference of drum = 18.86 m
I've added my own code in a picture below. I didnt really notice any error, which would cause problems in your code. The main issues I had with your code is purely readability. You should start using the format function along with the curly brackets to concatenate variables into strings. You should also start doing even += 1 instead of even = even + 1. I also tweaked your range function. Simply putting n makes it much easier to read and understand.
Answer:
BlueBorne Attack
Explanation:
If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.
Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication
Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.