1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jek_recluse [69]
3 years ago
15

Again, suppose that n and r denote integer values where r > 0 and n ≥ 0. What are two "simple" values, say lowEnough and tooH

igh, such that lowEnough ≤ ⌊n√r⌋⌊nr⌋ < tooHigh. Explain based on your answer to the previous question.
Suppose you would like to know ⌊47226−−−−−√5⌋⌊472265⌋. Explain how you could find ⌊47226−−−−−√5⌋⌊472265⌋ using a guess and verify method. Note: Explain your answer by relating this problem to the number guessing game described earlier. Think about what would be an appropriate question to use in place of "Is secret_number < guess_number?" and think about good choices for the starting values of lowEnough and tooHigh.
Computers and Technology
1 answer:
enyata [817]3 years ago
6 0

Answer:

Answer explained

Explanation:

From the previous question we know that while searching for n^(1/r) we don't have to look for guesses less than 0 and greater than n. Because for less than 0 it will be an imaginary number and for rth root of a non negative number can never be greater than itself. Hence lowEnough = 0 and tooHigh = n.

we need to find 5th root of 47226. The computation of root is costlier than computing power of a number. Therefore, we will look for a number whose 5th power is 47226. lowEnough = 0 and tooHigh = 47226 + 1. Question that should be asked on each step would be "Is 5th power of number < 47227?" we will stop when we find a number whose 5th power is 47226.

You might be interested in
What finger is used to key letter c
kumpel [21]

Answer:

your pointer finger

sorry if this is wrong

Explanation:

8 0
3 years ago
Read 2 more answers
In ancient times what did kings and tribals chiefs use to communicate
mel-nik [20]

Answer:

they used sign language to communicate and also pegion was used to communicate

8 0
3 years ago
You have two DCs, each with three Active Directory-integrated zones. You're getting inconsistent DNS lookup results and suspect
nikklg [1K]

Since their or two domain controller and where their or three active directory is associates.

  • As first check the tcpip ranges to be checked if both falls on same tcpip address. Better to change the one from tcpip address.
  • Second is host and subdomain has to checked and reconfigure if necessary.
  • Computer name and connected their group to be checked.
  • With NSLOOKUP command from disk operation system come check ping tracking reply is positive or negative.

When we query for DNS, end user need to see the positive reply from list of servers. Possible for scanning the IPV6 address across the domains and find as positive or negative response. End user has to decide the primary and secondary domain controller’s

Normally secondary domain controller’s as to be configured as standard alone. On success on deciding primary and secondary domain controller’s automate the process from primary to secondary by configuration with ns records. Possible for domain partition also.

8 0
3 years ago
It’s illegal to hack into a system without authorization, but is it ethical for a gray-hat to hack into a system if the intent i
oksian1 [2.3K]

Answer:

Some hackers are smart about there hacking .. others have a a plot but didnt test there theory

Explanation:

8 0
3 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
4 years ago
Other questions:
  • Which of the following is NOT a MySQL table storage engine?
    6·1 answer
  • Whats the difference between firms that provide services and firms that sell products?
    7·2 answers
  • What option from the format tab should you use to remove unwanted parts of a picture
    8·1 answer
  • The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IE
    12·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • An operating system that allows a single user to work on two or more programs at the same time is what type of OS?
    14·1 answer
  • Design an application for the Sublime Sandwich Shop. The user makes sandwich order choices from list boxes, and the application
    8·1 answer
  • Advantages and disadvantages of a watch tower​
    15·1 answer
  • If we increase the sample rate of a device from 48khz to 96khz, what is the impact to the network?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!