1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
3 years ago
9

Ok so I have two accounts and like, the other account has -20 points??? what happened​

Computers and Technology
2 answers:
nevsk [136]3 years ago
8 0
You need to do the questions to get more points
Dafna1 [17]3 years ago
8 0
Answer more questions for points
You might be interested in
When a Select Case statement executes, the value of the test expression is compared with the values that follow each of the ____
goldenfox [79]

Answer:

Case

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

A Select Case statement can be defined as a conditional statement that avails software developers or programmers the ability to test a variable by comparing it with a list of values.

In a Select Case statement, each variable is referred to as a Case.

Generally, when a Select Case statement executes, the value of the test expression is compared with the values that follow each of the Case keywords.

7 0
3 years ago
Show the array that results from the following sequence of key insertions using a hashing system under the given conditions: 5,
sergejj [24]

Answer:

a) Linear probing is one of the hashing technique in which we insert values into the hash table indexes based on hash value.

Hash value of key can be calculated as :

H(key) = key % size ;

Here H(key) is the index where the value of key is stored in hash table.

----------

Given,

Keys to be inserted are : 5 , 205, 406,5205, 8205 ,307

and size of the array : 100.

First key to be inserted is : 5

So, H(5) = 5%100 = 5,

So, key 5 is inserted at 5th index of hash table.

-----

Next key to inserted is : 205

So, H(205) = 205%100 = 5 (here collision happens)

Recompute hash value as follows:

H(key) =(key+i) % size here i= 1,2,3...

So, H(205) =( 205+1)%100 = 206%100 = 6

So, key 205 is inserted in the 6th index of the hash table.

----------

Next Key to be inserted : 406

H(406) = 406%100 = 6(collision occurs)

H(406) =(406+1) %100 = 407%100 = 7

So, the value 406 is inserted in 7the index of the hash table.

-----------------

Next key : 5205

H(5205) = 5205%100 = 5(collision)

So, H(5205) = (5205+1)%100 = 6( again collision)

So, H(5205) = 5205+2)%100 = 7(again collision)

So, H(5205) = (5205+3)%100 = 8 ( no collision)

So, value 5205 is inserted at 8th index of the hash table.

-------------

Similarly 8205 is inserted at 9th index of the hash table because , we have collisions from 5th to 8th indexes.

-------------

Next key value is : 307

H(307) = 307%100 = 7(collision)

So, (307+3)%100 = 310%100 = 10(no collision)  

So, 307 is inserted at 10th index of the hash table.

So, hash table will look like this:

Key       index

5         5

205         6

406         7

5205 8

8205 9

307         10

b) Quadratic probing:

Quadratic probing is also similar to linear probing but the difference is in collision resolution. In linear probing in case of collision we use : H(key) = (key+i)%size but here we use H(key) =( key+i^2)%size.

Applying Quadratic probing on above keys:.

First key to be inserted : 5.

5 will go to index 5 of the hash table.

-------

Next key = 205 .

H(205) = 205%100 = 5(collision)

So. H(key)= (205+1^2)%100 = 6(no collision)

So, 205 is inserted into 6th index of the hash table.

--------

Next key to be inserted 406:

So, 406 %100 = 6 (collision)

(406+1^2)%100 = 7(no collision)

So, 406 is moved to 7th index of the hash table.

----------

Next key is : 5205

So, 5205%100 = 5 (collision)

So, (5205+1^2)%100 = 6 ( again collision)

So, (5205+2^2)%100 = 9 ( no collision)

So, 5205 inserted into 9th index of hash table.

-----------

Next key is 8205:

Here collision happens at 5the , 6the , 9th indexes,

So H(8205) = (8205+4^2)%100 = 8221%100 = 21

So, value 8205 is inserted in 21st index of hash table.

--------

Next value is 307.

Here there is collision at 7the index.

So, H(307) = (307+1^2)%100 = 308%100= 8.

So, 307 is inserted at 8the index of the hash table.

Key           Index

5                  5

205                  6

406                  7

5205                9

8205               21

307                   8

3 0
3 years ago
PLTW IM Chapter 1.2-1.3 i need this please
Luden [163]

<u>Answer:</u>

<em><u>Biomedical Science</u></em>

<em><u>The application of the principles of the natural sciences, especially biology and physiology to clinical medicine</u></em>

<em><u>Control group</u></em>

<em><u>The group in an experiment where the independent variable being tested is not applied so that it may serve as a standard for comparison against the experimental group where the independent variable is applied.</u></em>

<em><u>Dependent Variable</u></em>

<em><u>The measurable affect, outcome, or response in which the research is interested.</u></em>

<em><u>Experiment</u></em>

<em><u>A research study conducted to determine the effect that one variable has upon another variable</u></em>

<em><u>Forensic Science</u></em>

<em><u>The application of scientific knowledge to questions of civil and criminal law</u></em>

<em><u>Hypothesis</u></em>

<em><u>Clear prediction of anticipated results of an experiment</u></em>

<em><u>Independent Variable</u></em>

<em><u>The variable that is varied or manipulated by the researcher</u></em>

<em><u>Negative control</u></em>

<em><u>Control group where the conditions produce a negative outcome. Negative control groups help identify outside influences which may be present that were not accounted for when the procedure was created</u></em>

<em><u>Personal protective equipment</u></em>

<em><u>Specialized clothing or equipment, worn by an employee for protection against infectious materials.(as defined by OSHA)</u></em>

<em><u>Positive control</u></em>

<em><u>Group expected to have a positive result, allowing the researcher to show that the experiment set up was capable of producing results.</u></em>

<em><u>Adenine</u></em>

<em><u>A component of nucleic acids, energy carrying molecule such as ATP, and certain co enzymes. Chemically it is a purine base.</u></em>

<em><u>Chromosome</u></em>

<em><u>Any of the usually linear bodies in the nucleus that contain genetic material.</u></em>

<em><u>Cytosine</u></em>

<em><u>A component of nucleic acids that carries hereditary information in DNA and RNA in cells . Chemically it is a pyrimidine base.</u></em>

<em><u>Deoroxyribonucleic acid</u></em>

<em><u>A double-stranded helical nucleic acid molecule capable of replicating and determining the inherited structure of a cell proteins</u></em>

<em><u>Gel electrophoresis</u></em>

<em><u>The separation of nucleic acids or proteins, on the basis of their size and electrical charge, by measuring their movement through an electrical field in a gel.</u></em>

<em><u>Gene</u></em>

<em><u>A discrete unit of hereditary information consisting of a specific nucleotide sequence in DNA.( or RNA in some viruses).</u></em>

<em><u>Guanine</u></em>

<em><u>A component of nucleic acids that carries hereditary information in DNA and RNA in cells. Chemically it is a purine base.</u></em>

<em><u>Helix</u></em>

<em><u>Something in spiral form.</u></em>

<em><u>Model</u></em>

<em><u>A simplified version of something complex used, for example, to analyze and solve problems or make predictions.</u></em>

<em><u>Nucleotide</u></em>

<em><u>A building block of DNA, consisting of a 5 carbon sugar convalently bonded to a nitrogenous base and a phosphate group.</u></em>

<em><u>Restriction enzymes</u></em>

<em><u>A degradative enzyme that recognizes specific nucleotide sequences and cuts up DNA</u></em>

<em><u>Restriction fragment length polyphorisms (RFLPs)</u></em>

<em><u>Differences in DNA sequences on homologous chromosomes that can result in different patterns of restriction fragment lengths (DNA segments resulting from treatment with restriction enzymes)</u></em>

<em><u>Thymine</u></em>

<em><u>A component of nucleic acid that carries hereditary information in DNA cells. Chemically, it is a pyrimidine base</u></em>

<em><u>Autopsy</u></em>

<em><u>An examination of the body after death usually with such dissections as will expose the vital organs for determining the cause of death</u></em>

<em><u>Bibliography</u></em>

<em><u>a document showing all the sources used to research information</u></em>

<em><u>Citation</u></em>

<em><u>A written reference to a specific work by a particular author or creator which identifies the document in which the work may be found</u></em>

<em><u>Documentation</u></em>

<em><u>The act of creating citations to identify resources used in writing a work</u></em>

<em><u>Health Insurance Portability and Accountability Act (HIPAA)</u></em>

<em><u>A comprehensive set of standards and practices designed to give patients specific rights regarding their personal health information</u></em>

<em><u>Medical examiner</u></em>

<em><u>A physician who performs an autopsy when death may be accidental or violent. He/she may also serve in some jurisdictions as the coroner.</u></em>

Explanation:

This is what I found when I searched up <u>pltw chapter 1.2-1.3 answers.</u>

I did this because there was not really a question in there.

PS:

I'm sorry if this is too long for you to read.

Give me brainliest, if you want to, that is.

7 0
3 years ago
Illustrate that the system is in a safe state by demonstrating an order in which the threads may complete.If a request from thre
Kamila [148]

Answer:

a. safe sequence is T2 , T3, T0, T1, T4.

b. As request(T4) = Available, so the request can be granted immediately

c. As request(T2) < Available, so the request can be granted immediately

d. As request(T3) < Available, so the request can be granted immediately.

Explanation:

It will require matrix

[i, j] = Max [i, j] – Allocation [i, j]

A B C D

T0 3 3 3 2

T1 2 1 3 0

T2 0 1 2 0

T3 2 2 2 2

T4 3 4 5 4

Available = (2 2 2 4)

1. Need(T2) < Available so, T2 can take all resources

Available = (2 2 2 4) + (2 4 1 3) (Allocation of T2) = (4 6 3 7)

2. Need(T3)<Available so, T3 will go next

Available = (4 6 3 7) + (4 1 1 0) = (8 7 4 7)

Like wise next T0, T1, T4 will get resources.

So safe sequence is T2 , T3, T0, T1, T4.

(Note, there may be more than one safe sequence).

Solution b.

Request from T4 is (2 2 2 4) and Available is (2 2 2 4)

As request(T4) = Available, so the request can be granted immediately.

Solution c.

Request from T2 is (0 1 1 0) and Available is (2 2 2 4)

As request(T2) < Available, so the request can be granted immediately.

Solution d.

Request from T3 is (2 2 1 2) and Available is (2 2 2 4)

As request(T3) < Available, so the request can be granted immediately.

5 0
3 years ago
When using a line graph, why is it inportant to only graph 1 - 3 series of data?. A. A line graph in Microsoft Excel will not al
ElenaW [278]
The most necessary point you need to follow when using a line graph, is to make your graph readable. So, the reason why is it inportant to only graph 1 - 3 series of data is that more than 3 series of data causes too many lines on the graph, which makes ti confusing to read. The last option is the correct one.
8 0
3 years ago
Other questions:
  • The concept of ____ refers to the idea that the internet is designed for all content to be treated equally.
    12·1 answer
  • 5(x + 4) = 4(x -6) |<br><br><br>How to do this problem
    10·1 answer
  • Troubleshooting a printer that does not work includes a. connecting the printer to your computer b. checking to see if there is
    13·1 answer
  • Question 11
    11·1 answer
  • Which two actions allow the System Administrator to limit Chatter access during roll-out to a subset of Salesforce users?
    9·1 answer
  • Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
    8·2 answers
  • PLEASE ANSWER!! If my pixel has an RGB value of (R - 150, G - 0, B - 100), what is the dominant value? Why?
    14·1 answer
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
  • Does any of yall play rob lox?
    5·2 answers
  • The readline method of bufferedreader returns _____ when end of file is reached.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!