1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
4 years ago
11

github Portfolio Balances An investor opens a new account and wants to invest in a number of assets. Each asset begins with a ba

lance of o, and its value is stored in an array using 7-based indexing. Periodically, a contribution is received and equal investments are made in a subset of the portfolio. Each contribution will be given by investment amount, start index, end index. Each investment in that range will receive the contribution amount. Determine the maximum amount invested in any one investment after all contributions
Computers and Technology
1 answer:
OLEGan [10]4 years ago
6 0

The following code will be used to determine the maximum amount invested

<u>Explanation:</u>

long maxValue(int n, int rounds_rows, int rounds_columns, int into rounds)

{

   // Define the variable to store

   // the maximum amount invested.

   long max = 0;

   

   // Define an array of size n,

   // to store the n investments.

   long *investments = (long*)malloc(sizeof(long)*n);

   int i=0;  

   // Initially set all

   // the investments to 0.

   for(i=0;i<n;i++)

   {

       investments[i] = 0;

   }

   i=0;

   // Run the loop to

   // perform the rounds.

   while(i<rounds_rows)

   {

       // Get the left value

       // of the current round.

       int left = rounds[i][0];

       

       // Get the right value

       // of the current round.

       int right = rounds[i][1];

       // Get the contribution

       // for the current round.

       int contribution = rounds[i][2];

       // Since the user uses 1-based

       // indexing, subtract 1 from left

       // and right as the program uses

       // 0-based indexing. That is, the

       // investments in the array start

       // from 0 and not 1.

       right = right - 1;

       int j=0;

       // Run the loop to add the

       // contribution to all the investments

       // between left and right, both inclusive.

       for(j=left; j<=right; j++)

       {

           investments[j] += contribution;

       }

       i++;

   }

   // Traverse the investments array

   // to find the maximum element.

   max = investments[0];

   for(i=1; i<n;i++)

   {

       if(investments[i]>max)

       {

           max = investments[i];

       }

   }

   // Return the

   // maximum investment.

   return max;  

}

You might be interested in
The following slide was created as part of a presentation that trains new employees how to use the scheduling and calendar softw
brilliants [131]

it has animation, but it does not have multimedia and only has text and no images

8 0
3 years ago
Read 2 more answers
There are a number of classifications that can be applied to security controls.
kodGreya [7K]

Answer:

Preventive control is not a classification that can be applied to security controls.

Explanation:

At the most basic level, we should protect resources and assets that are of value to an organization by mitigating the risk to those assets and resources. Security controls include any type of policy, technique, procedure, or solution that help mitigate risks. There are models that define security control objectives and are classified by control type and by function

By Control Type

  1. Physical control: Anything that can be touched and can be used to detect and prevent unauthorized access from adversaries and threat actors. Examples include CCTV, electric fences, Biometrics
  2. Technical controls: Examples include firewalls, AMSI solutions, IDSs and IPSs that help protect an organization’s resources and assets. They can be both hardware and software solutions.
  3. Administrative controls: These are the overall design of the protocols or guidelines that define business needs based upon the organization’s security goals that help implement a secure environment. Things like staff awareness and training are among the examples of administrative controls.

Learn more about Security Control classification

brainly.com/question/13239384

brainly.com/question/14409331

#LearnWithBrainly

5 0
4 years ago
Give examples of sound effects that can be used in a cartoon or computer game
vredina [299]
-Bubbles
-Explosion
-Pebbles
-Popping Balloon
--Hopping Noise
4 0
4 years ago
Which of these purchases is most likely to be paid for with a credit card
Vesna [10]

Answer:

plane ticket?

Explanation:

7 0
3 years ago
Which commands are on the right-most side of the Title bar? (From Microsoft Word)
jeyben [28]
<h2>Answer:</h2>

Title bar is the top most bar of a window. As obvious from the name, it has the title of the program in use. It has name of the program or more specifically the name of currently open document is written in this horizontal bar.

The option/commands present in the right most o the title bar are as follows:

  • Close
  • Maximize/Resize
  • Minimize

Close command is needed to exit the program/application. A cross icon is used as close command. Maximize/Resize command helps to expand the window to the screen pane as well as allows the user to adjust the screen of application accordingly. Two squares icon is used as a button for this command. Minimize command helps by shutting the app to the task bar so that it can be expanded/maximized later. A dash/line icon is used as a button for this command.

<h2>I hope it will help you!</h2>

6 0
3 years ago
Other questions:
  • Write a program to display a message telling the educational level of a student based on their number of years of school. The us
    6·1 answer
  • nancy finds it difficult to locate emails in her inbox . what action should she take to locate a particular type of email instan
    12·1 answer
  • What can you say about the following Java class definition?
    10·1 answer
  • What are parrallel lines​
    6·1 answer
  • What is a piece of information sent to a function
    15·1 answer
  • Psychographics may also be called A. personality analytics. B. social group dynamics. C. lifestyle analysis. D. opinion insight.
    6·1 answer
  • What key do I use to start my presentation
    9·1 answer
  • Hide Time Remaining A
    11·1 answer
  • given the variables temperature and humidity, write an expression that evaluates to true if and only if the temperature is great
    11·1 answer
  • Your client Mr. Smith has requested a reservation at Eleven Madison Park this evening for a party of 2 at 6PM. Unfortunately, th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!