Below is the function that takes two parallel lists;
List of times in increasing order and that of distance travelled by that point in time.
I put into consideration the instructions given in the question.
ANSWER;
def find_velocity(time, distance):
velocities = []
for i in range(1, len(time)):
velocities.append((distance[i] - distance[i - 1]) / (time[i] - time[i - 1]))
return velocities
times are = [1, 3, 5, 7]
distances are = [25, 29, 35, 70]
print(find_velocity(times, distances))
Answer:
b) Bounded Waiting
Explanation:
int currentThread = 1;
bool thread1Access = true;
bool thread2Access = true;
thread1 { thread2 {
While (true) {
While (true)
{
while(thread2Access == true)
{
while(thread1Access == true)
{
If (currentThread == 2) {
If (currentThread == 1)
{
thread1Access = false; thread2Access = false;
While (currentThread == 2);
While (currentThread == 1);
thread1Access = true; thread2Access = true;
} }
/* start of critical section */ /* start of critical section */
currentThread = 2 currentThread = 1
… ...
/* end of critical section */ /* end of critical section */
thread1Access = false; thread2Access = false;
… ...
} }
} }
} }
It can be seen that in all the instances, both threads are programmed to share same resource at the same time, and hence this is the bounded waiting. For Mutual exclusion, two threads cannot share one resource at one time. They must share simultaneously. Also there should be no deadlock. For Progress each thread should have exclusive access to all the resources. Thus its definitely the not the Progress. And hence its Bounded waiting.
Answer:
Yes Juan has done enough to secure the network
Explanation:
All the computers are patched, have antivirus software, and have unneeded services shut down - this is done to prevent malware from residing in the system.
The network has a firewall with proxy server and IDS - the firewall limit access to network so as to limit intrusion into the network
The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days - this is done to prevent leakage of sensitive information in the network especially when there is a compromise in the network.
Answer:You can only find REaccuracy if you know the actual “true” measurement… something that's difficult to do unless you're measuring against the atomic clock. The formula is: REaccuracy = (Absolute error / “True” value) * 100%.
Explanation:
Answer:
Gantt Chart
Explanation:
Gantt chart can help in planning and managing projects by breaking a large project into a series of smaller tasks in an organized way. It tracks both time and interdependencies between tasks. It is an important tool for showing phases, tasks, milestones & resources.