Answer:
1) Bottom-up
2) Top-down
Explanation:
In general dynamic programming is a divide and conquer strategy which can be implemented using bottom up approach or top down approach.
Bottom-up approach in dynamic programming will solve a relatively simple sub-problem first and then use the solution to build and arrive at solutions to a bigger sub-problem.
Top down approach is reversed to bottom-up approach and is also known as Memoization Method. Instead of solving a problem started from the base state sub-problem, the top down approach break a problem into a smaller problems from the top most destination state until it reaches the bottom most base state.
Answer:
The answer is below
Explanation:
There are various reasons to apply arrays in a program. Some of which includes:
1. Arrays provides users to easily save specified numbers of the element in them.
2. It easily store data of similar types and sizes.
3. It allows users to store data in various dimensional arrays.
4. It eliminates deficit of memories for the location of its elements
Answer:
false
Explanation:
try to limit the amount of info on each slide
Answer: Transaction processing system
Explanation:
A transaction processing system basically records all the data in the system. It is the set of data that basically monitor all the transaction process in the system. It basically perform various transaction oriented applications in the system.
It also allow time delay in the system when the item is supposed to being sold to the actually selling of the item. There are basically various types of transaction processing system arr payroll, account payable and the inventory control.
Answer:
A and B
Explanation:
EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.
Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.
There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.