1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
6

Crees que es necesario que el estado Peruano, proponga nuevamente el aislamiento desde este 22 de diciembre al 02 de enero del 2

021.
Computers and Technology
1 answer:
Nady [450]3 years ago
8 0

Answer:

Efectivamente, es necesario que el gobierno de Perú establezca un nuevo aislamiento lo antes posible. Este período de fiestas, que va desde fines de diciembre hasta principios de enero, es un período de reuniones familiares y sociales, con lo cual dado el marco de una segunda oleada de coronavirus y la aparición de una nueva cepa de esta enfermedad en Gran Bretaña, es necesario extremar las precauciones y cuidados para que la situación no vuelva a complicarse como sucedió en el invierno pasado. Por lo tanto, es una necesidad tomar ciertas medidas restrictivas para evitar que la situación pase a mayores.

You might be interested in
Suppose you are organizing a party for a large group of your friends. Your friends are pretty opinionated, though, and you don't
Iteru [2.4K]

Answer:

Relative greedy algorithm is not optimal

Explanation:

Proving that Relative’s greedy algorithm is not optimal.

This can be further proved by the following example.

Let us assumethe friends to be invited be Ali, Bill, David, Dennis, Grace, Eemi, and Sam.

The enemy list of each friend is shown below:

• Ali: Bill. David, Dennis

• Bill: Ali, Grace, Eemi, Sam

• David: Ali, Grace, Eemi, Sam

• Dennis: Ali, Grace, Eemi, Sam

• Grace: Bill. David, Dennis. Eemi . Sam

• Eemi: Bill, David, Dennis, Grace, Sam

• Sam: Bill, David, Dennis, Eemi, Grace

From the enemy list, the one with fewer enemies is Ali.

If we invite Ali, then Bill, David, and Dennis cannot be invited.

Next person that can be invited is one from Grace, Eemi, and Sam

If we choose any one of them we cannot add any other person.

For example, if we choose Grace, all other members are enemies of Ali and Grace. So only Ali

and Grace can only be invited.

So we get a list of two members using relative’s greedy algorithm.

This is not the optimal solution.

The optimal solution is a list of 3 members

• Bill, David, and Dennis can be invited to the party.

Hence, it is proved that relative’s greedy algorithm is not optimal, where the maximum number of friends is not invited to the party.

3 0
4 years ago
TRY IT Choose the Right Technology MP3 player Widescreen laptop computer Smartphone Tablet computer with wireless Internet Suppo
Gnoma [55]

is this like a story or sum

3 0
3 years ago
Read 2 more answers
Given that note, write a program which tells us the major scale starting at that note, using the pattern above. In the main bloc
White raven [17]

<u>Solution and Explanation:</u>

the_notes = ['C','C#','D','D#','E','F','F#','G','G#','A','A#','B'] #original list

def get_scale(choice): #function to get the major diatonic scale

steps=[1,1,.5,1,1,1,.5] #separate list for steps

size=None

for i in range(0,12): #loop to find out the index of the note entered

if(the_notes[i]==choice):

size =i

break

new_notes=the_notes[size:] + the_notes[:size]

#the above statement rotate the list so that the entered note can become the first note in the new list(i.e new notes)

index =0 #

scale="" #a string to store the major diatonic scale

for i in range(0,7):

scale+=new_notes[index]+" "

if(steps[i]==1):

index = index+2

else:

index=index+1

return scale

#main block

while(1):

choice=input("What scale do you want or Q to quit? ")

if(choice=='Q'):

break

elif(choice in the_notes):

print(get_scale(choice))

else:

print("That is not a note")

5 0
3 years ago
A _______ acts as a security buffer between a corporation's private network and all external networks.
Contact [7]
The answer is a firewall. It is a system that will block potentially harmful software or websites from accessing your computer.
3 0
3 years ago
Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
miskamm [114]

Personally I just leave them in my inbox because who cares, Alison should; however, move them to the trash I guess

7 0
3 years ago
Other questions:
  • Karen thinks she should go out with Blane, an unattractive, social misfit, because “If I don’t go out with him, people will thin
    7·1 answer
  • In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
    15·1 answer
  • Respond to the following in three to five sentences. Select the workplace skill, habit, or attitude described in this chapter th
    15·2 answers
  • ​open-source software is​ ________.
    11·1 answer
  • Which of the following illustrates an example of a string data type?
    15·2 answers
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project
    11·1 answer
  • Which two components are configured via software in order for a PC to participate in a network environment
    5·1 answer
  • Write a method that computes the average of the values in an array of doubles. The header of the method is as follows:
    14·1 answer
  • What is used to print out very large posters or maps?
    10·2 answers
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!