1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
5

Write Scheme functions to do the following. You are only allowed to use the functions introduced in our lecture notes and the he

lper functions written by yourself. (a) Return all rotations of a given list. For example, (rotate ’(a b c d e)) should return ((a b c d e) (b c d e a) (c d e a b) (d e a b c) (e a b c d)) (in some order). (b) Return a list containing all elements of a given list that satisfy a given predicate. For example, (filter (lambda (x) (< x 5)) ’(3 9 5 8 2 4 7)) should return (3 2 4).
Computers and Technology
1 answer:
klio [65]3 years ago
7 0

Answer:

Check the explanation

Explanation:

solution a:

def Rotate(string) :

n = len(string)

temp = string + string

for i in range(n) :

for j in range(n) :

print(temp[i + j], end = "")

print()

string = ("abcde")

Rotate(string)

solution b:

nums = [3,9,5,8,2,4,7]

res = list(filter(lambda n : n < 5, nums))

print(res)

You might be interested in
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
What is the best web browser to use?
tiny-mole [99]
That would depend on what you would like to get out of your experience with the web broswer. Google chrome offers more efficient computational algorhythms, a quicker navigation of the UI, but loses privacy due to the connected google services which can report your data usage if not properly configured.Browsers like firefox offer extension capability (the same as google chrome) and is open sourced, but may be slower to navigate depending on user to user experience.Other browsers i would avoid unless they are: TOR (which is still just a heavily modified and secured version of firefox).
6 0
3 years ago
Read 2 more answers
Which of the following Web 2.0 tools can aid in searches using key words? (1 p
svet-max [94.6K]

Web 2.0 Tools can aid in searches using key words

Explanation:

Web 2.0 Tools can aid in searches using key words .The followings are some tool like face book and you tube and google search that allow users to searches using key words. web 2.0 tools can be used to teach curriculum content, store data, create and edit video, edit photos,etc.,

Web 2.0 tools are easy to use websites designed to encourage creativity, team work, also helps in higher order thinking skills in classroom .The important thing is to teach students to think critically with whatever tools they have in front of them using key words while searching.

3 0
3 years ago
Which steps will create a new blank word document
mrs_skeptik [129]

Answer:

Open word

File > New

Select a template

8 0
4 years ago
Assuming each reference costs 1 byte, and each piece of data/info costs 1 byte as well. When will a doubly linked list be more a
NeX [460]

Answer:

The circular individually linked list is more efficient for time sharing process ,when multiple application are running on pc it is responsibility of an output system to put all process on a list and execute them all by giving them piece of time and make them wait when cpu is selected to other process.

It will be more suitable for output system to use circular list as when it reaches to last of list it will be manually reaches to starting node or process.

Singly circular linked list is used when we are concerned with the memory as only one process will be allocated memory at once and there are no chances of process to go never-ending waiting.

Explanation:

8 0
4 years ago
Other questions:
  • In what way, if any, are colleges and universities related?
    14·1 answer
  • The list below show test scores for 3rd period on a recent test.
    13·1 answer
  • Animation timing is does not affect the
    10·1 answer
  • Suppose that a NAT is between the Internet and a company's network. Now suppose that the NAT crashes, but quickly restarts, in a
    7·1 answer
  • 1. PIN
    10·1 answer
  • Which of the following is an example of metadata about a webpage?
    7·2 answers
  • Explain the role of ANY TWO components of the CPU
    8·1 answer
  • Which section of a PCM is responsible for sending the proper reference voltage to many of the sensors?
    7·1 answer
  • list three things that can spoil a printer if they are not of the correct specification and what damage may be caused​
    9·1 answer
  • you are a new lenovo service provider and need to use the recovery utility information on the lenovo support website. this infor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!