1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
15

Locker doors There are n lockers in a hallway, numbered sequentially from 1 to n. Initially, all the locker doors are closed. Yo

u make n passes by the lockers, each time starting with locker #1. On the ith pass, i = 1, 2,...,n, you toggle the door of every ith locker: if the door is closed, you open it; if it is open, you close it. After the last pass, which locker doors are open and which are closed? How many of them are open?
Computers and Technology
1 answer:
kow [346]3 years ago
5 0

Answer:

// here is code in C++

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

   int n,no_open=0;

   cout<<"enter the number of lockers:";

   // read the number of lockers

   cin>>n;

   // initialize all lockers with 0, 0 for locked and 1 for open

   int lock[n]={};

   // toggle the locks

   // in each pass toggle every ith lock

   // if open close it and vice versa

   for(int i=1;i<=n;i++)

   {

       for(int a=0;a<n;a++)

       {

           if((a+1)%i==0)

           {

               if(lock[a]==0)

               lock[a]=1;

               else if(lock[a]==1)

               lock[a]=0;

           }

       }

   }

   cout<<"After last pass status of all locks:"<<endl;

   // print the status of all locks

   for(int x=0;x<n;x++)

   {

       if(lock[x]==0)

       {

           cout<<"lock "<<x+1<<" is close."<<endl;

       }

       else if(lock[x]==1)

       {

           cout<<"lock "<<x+1<<" is open."<<endl;

           // count the open locks

           no_open++;

       }

   }

   // print the open locks

   cout<<"total open locks are :"<<no_open<<endl;

return 0;

}

Explanation:

First read the number of lockers from user.Create an array of size n, and make all the locks closed.Then run a for loop to toggle locks.In pass i, toggle every ith lock.If lock is open then close it and vice versa.After the last pass print the status of each lock and print count of open locks.

Output:

enter the number of lockers:9

After last pass status of all locks:

lock 1 is open.

lock 2 is close.

lock 3 is close.

lock 4 is open.

lock 5 is close.

lock 6 is close.

lock 7 is close.

lock 8 is close.

lock 9 is open.

total open locks are :3

You might be interested in
A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
Ivanshal [37]

Answer:

the answer is A

Explanation:

I just did this

3 0
3 years ago
Read 2 more answers
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at
Zepler [3.9K]

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

4 0
3 years ago
Capstone Project part 11 quiz
kobusy [5.1K]
It is checking if the response is not yet yes
4 0
2 years ago
Which recorder is least recommended in automation anywhere?
raketka [301]
<h2>Answer:</h2>

<u>Screen recorder</u><u> is the least recommended one</u>

<h2>Explanation:</h2>

There are three types of recorders. They are Smart Recorder, Web Recorder and Screen or sometimes called Standard Recorder. Smart Recorder is used for desktop applications while Web recorder is used for Web-based applications. The least recommended one is Screen Recorder which is used for building simple tasks that involves few mouse clicks and keystrokes. It works by capturing screen co-ordinates and therefore, no calibration is taken into account. It is generally used when you plan to run the task on the same machine on which, it was recorded.

4 0
3 years ago
Read 2 more answers
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however,
tia_tia [17]

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

8 0
3 years ago
Other questions:
  • Wanda wants to find some basic information about her computer, for example, what operating system and how much RAM are installed
    10·1 answer
  • Where should fire extinguishers be stored on a boat?
    7·1 answer
  • How can you create balance to your drawing using only grayscale values?
    12·1 answer
  • Does anyone know the answer to this question
    9·1 answer
  • Need done ASAP
    15·1 answer
  • What is the term for a set of actions carried out on inputs?
    7·1 answer
  • Of the following choices what was the best thing to do with electronic equipment you no longer want
    7·1 answer
  • Hello im looking for someone to answer my question. Its about a coding project called "Quiz Master". Im having trouble with the
    7·1 answer
  • Think of a genre (science, music, math, sports, video games, etc.) and create at least 10 questions. You can decide whether you
    15·1 answer
  • "To speed up magnetic hard drive performance , ___________ is often used. "
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!