The assignment extends an existing program by adding three new functionalities: visiting every node and applying a function to its data, visiting nodes with a specified key and applying a function to their data, and visiting nodes with a specific data element and applying a function to their data
1. The assignment requires adding three new functionalities to an existing program that utilizes a binary search tree. The original functionality involves reading data from a file, inserting it into the binary search tree, and allowing the user to search for data associated with a key string. The new functionalities include visiting every node in the tree and applying a function to the data of each node, visiting nodes with a specified key and applying a function to their data, and visiting nodes with a specific data element and applying a function to their data. Additionally, there is an extra credit option to create a class and overload operators for the binary node class.
2. The assignment builds upon an existing program that uses a binary search tree. The original functionality, which reads data from a file, inserts it into the binary search tree, and allows searching by key, remains unchanged. The new functionalities involve visiting every node in the tree and applying a function to the data of each node. This can be achieved by implementing a visit() function that takes a function as an argument and applies it to the data of each node. Additionally, there is a variation of the visit() function, visitnamed(), which applies a function only to the node with a specified key.
3. Furthermore, the assignment introduces another variation of the visit() function, visitonly(), which applies a function only to nodes with a specific data element. For example, if the data element is "Cat," the visitonly() function will apply the provided function to all nodes in the tree that contain the substring "Cat" in their data.
4. To test the implemented functionalities, it is recommended to create multiple functions, such as foo() and foo2(), with different behaviors. These functions can print the nodes they reach in various ways, for instance, printing names in lowercase or uppercase. By running the program and observing the output, it should be evident that the visit functions are working correctly.
5. For extra credit, it is suggested to create a class that represents the type of nodes in the binary search tree. This involves overloading operators such as less than (<), greater than (>), and equal to (==) to enable comparisons and manipulations with instances of the class. Overloading these operators allows for a more customized implementation of the binary search tree based on the specific requirements of the class.
6. There is an extra credit option to create a class and overload operators for the binary node class. Proper testing should be performed to ensure the correctness of the implemented functionalities.
Learn more about binary search tree here: brainly.com/question/30391092
#SPJ11
How can a user access the Mailbox Cleanup tools?
Start a new AutoArchive.
Enter the Backstage view.
Left-click the Inbox folder.
Open the Deleted Items folder.
Answer:
Sorry this isn’t an answer but does anyone know of a quizlet for the Microsoft Office course because I can’t find anything anywhere. Help a fellow student out. I need answers.
Explanation:
Answer: B: enter backstage view
Explanation:
I took the test. Plz mark me brainliest!
rolyr0905 avatar
rolyr0905
09/24/2020
Computers and Technology
College
answered
Which of the following is an example of software piracy?
A) copying software from work to use at home
B) buying software to use in your home office
C) taking corporate secrets from work to sell
D) working at two jobs that are both in the IT field
An example of software piracy is when a user copies software from work to use at home without permission. Therefore, the correct option is A) copying software from work to use at home.
Software piracy is defined as the illegal copying, distribution, or use of computer programs.
It is the act of using, copying or distributing computer software without permission from the software owner.
How is software piracy illegal?
Software piracy is illegal because it breaks copyright laws.
Copyright law provides the legal framework for the protection of intellectual property.
It grants copyright owners exclusive rights to their work, including the right to make copies and distribute them.
Copyright owners can take legal action against those who infringe their rights by engaging in software piracy.
Know more about software here:
https://brainly.com/question/28224061
#SPJ11
which region of the country overall has the lowest connectivity to the internet?
According to a report by the Federal Communications Commission (FCC), the region with the lowest connectivity to the internet in the United States is rural areas.
This is mainly due to the lack of infrastructure and investment in broadband technology in these areas. Many rural communities have limited access to high-speed internet services, which makes it difficult for them to participate in online activities such as education, commerce, and telehealth.
Additionally, factors such as low population density and topographical barriers can further hinder the development of broadband infrastructure in rural areas. Therefore, efforts are being made by the government and private sector to bridge this digital divide and improve connectivity in rural America.
The region with the lowest connectivity to the internet may vary depending on the country in question. Generally, rural or remote areas tend to have lower connectivity rates compared to urban or metropolitan areas, regardless of the country.
Learn more about Federal Communications Commission here: https://brainly.com/question/27337881
#SPJ11
what clinical systems do you think would be the most difficult to perform an etl on and why?
Complex electronic health record (EHR) systems with diverse data types and interdependencies would be the most challenging for ETL processes.
What are the key challenges in performing ETL on complex electronic health record (EHR) systems?The clinical systems that would be most difficult to perform an ETL (Extract, Transform, Load) on are those with complex data structures and interdependencies, such as electronic health record (EHR) systems.
This is because EHR systems typically contain a wide range of data types, including structured and unstructured data, and involve intricate relationships between patient records, diagnoses, medications, lab results, and other healthcare information.
Extracting, transforming, and loading such diverse and interconnected data while maintaining data integrity and preserving the context and meaning of the information can be challenging.
Additionally, EHR systems often have large volumes of data, requiring efficient processing and storage solutions.
Learn more about health record (EHR)
brainly.com/question/29430723
#SPJ11
"NOTE: write an algorithm, not a code" You are given a file called "std" and composed of "Number, Name, Address" fields. (You can define the type of fields by yourself) Write an algorithm that makes "insert, delete, update and retrieve", processes on the records in the file. "Number" field is the key of each record. Here is the template of report: Steps Actions 1 Name of the report and date 2 Author of report 3. Literature review 4. Your contribution 5 Explanation algorithm and sub algorithms 6 Summary 7. Future advice 8. References
Answer:
1. get the absolute path to the file
2. load the file as a table (dataframe in python)
3. to insert a row;
create a dataframe of the same field typeconcatenate the new dataframe horizontally with the same dataframe4. to delete a row, select and drop the row where the 'Number' field matches a value.
5. to update the values in row, use the number field as a key to replace the existing values.
6. print of save to a variable the rows where the number field matches a given value.
Explanation:
Follow the report template to create a report for the algorithm.
The algorithm gets the absolute path to the file and loads the file as a tabular file from there the data can be queried without accessing the main file. The insert algorithm creates a new dataframe and appends it to the main dataframe.
The delete, update and retrieve all use the same subalgorithm, getting the rows with the number field as the key value.
what is the name of html command?
Here are some.
<html></html> This is the root element tag. ... <head></head> ... <title></title> ... <body></body> ... <h1></h1> ... <p></p> ... <a></a> ... <img></img>hope it helps.stay safe healthy and happy....
Explain the simliparities or difference between a workbook , worksheet and spread sheet
Answer:
Spreadsheet vs Workbook. Summary: Difference Between Spreadsheet and Workbook is that Spreadsheet software allows users to organize data in rows and columns and perform calculations on the data. ... While Workbook is consider as whole file that can contain bundle of worksheets in it.
Explanation:
mark brainlyist
1. What do you think are the importance of 5S Principles?
2. Cite a situation in which you can apply the knowledge of understanding 5S Principles?
1) The importance of the 5s Principles is to improve productivity in industries, hospitals, government and education. Additionally it helps to eliminate wasted time, space and inventory.
(2) I can use the knowledge acquired from the 5s Principles to make my everyday life easier.
Please have a great day <3
In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a(n) ______________.
A. group
B. record
C. file
D. field
E. attribute
In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a "record".
A record is a collection of related data items that are treated as a single unit. In a database, a record typically corresponds to a row in a table and contains information about a particular entity or object. In this case, the record describes the top student and includes their last name, first name, and student number. Each record in the table would correspond to a different student in the database. Fields, on the other hand, correspond to the individual data elements within a record, such as last name, first name, and student number in this example. Attributes are similar to fields and refer to the characteristics of an entity or object in the database.
Learn more about Database here:
https://brainly.com/question/30634903
#SPJ11
2.3 pseudocode exercise on edhesive
Answer:
a=int(input("Enter a numerator: "))
b=int(input("Enter a divisor: "))
quotient=a/b
remainder=a%b
print("Quotient is: " + str(int(quotient)))
print("Remainder is: " + str(int(remainder)))
That's 2.3 question 1
a_ft = int(input("Enter the Feet: "))
a_inc = int(input("Enter the Inches: "))
b_ft = int(input("Enter the Feet: "))
b_inc = int(input("Enter the Inches: "))
sum_inc = a_inc + b_inc
# select the whole and the fractional part
inc_to_ft = sum_inc // 12
rem_from_div = sum_inc % 12
sum_ft = a_ft + b_ft + inc_to_ft
print("Feet: {} Inches: {}".format(sum_ft, rem_from_div))
That's 2.3 question 2
Explanation:
I wasn't sure which one you needed so I added both.
Select ALL the correct answers.
In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniques will contribute to green computing?
A.virtualization
B.grid computing
C.recycling
D.autonomic computing
Answer:
c. and a.
Explanation:
I think thought are right because you have to adapt the green
Answer:
A. Virtualization
C. Recycling
Write a question that prompts the user to input a sequence of numbers the algorithm should display the highest number entered. Data terminates when 000 is entered for. A number
Answer:
Explanation:
The following code is written in Java and asks the user to input a sequence of numbers separated by pressing the "ENTER" key and typing 000 to terminate the sequence. It saves all those numbers in an ArrayList and then goes through the Array to find and print the max number.
public static void MaxNumber () {
Scanner in = new Scanner(System.in);
System.out.println("Enter a as many numbers as you want seperated by the Enter Key... type 000 when done. ");
ArrayList<Integer> numbers = new ArrayList<>();
int exit = 1;
while (exit != 000) {
exit = in.nextInt();
numbers.add(exit);
}
int max = 0;
for (int x = 0; x < numbers.size(); x++) {
if (numbers.get(x) > max) {
max = numbers.get(x);
}
}
System.out.println(max);
}
is monitor is a television
Answer:
No, a monitor only shows what a different device tells them too however, a tv can be connected to nothing and show tv shows
If the algorithm does not have instructions for unanticipated results, the computer program will
what is the general term for programs used to operate a computer
Answer:
Software
Explanation:
ez
Answer: A Software System
For questions 1-3, consider the following code: x = int (input ("Enter a number: ")) if (x != 8): print ("A") if (x >= 10): print ("B") if (x < 10): print ("C") if (x % 2 == 1): print ("D") What is output if the user types in 13?
Answer:
ABD
Explanation:
13 not equal 8, greater than 10 and odd. Ifs will be executed step-by-step
The _____________ loop executes a process statement before a decision.
Answer:
The Iteration
Explanation:
Iteration is also known as repetition. It is used to execute a process (or statement) multiple times. Repetition statements are sometimes referred to as loops.
Hope this helped :) :3
Ned is trying to decide how he wants to connect the nodes on the network he created. What are the two options that he has?
Select one:
a through physical nearness or a central server
b. through hard cabling or wireless radio waves
c. through ethernet cables or Bluetooth
d. through software programs or osmosis
Since Ned is trying to decide how he wants to connect the nodes on the network he created, the two options that he has are option b and C:
b. Through hard cabling or wireless radio waves.
c. Through ethernet cables or Bluetooth.
What kind of cable does a computer system typically use to connect to a network?A twisted pair Ethernet cable called an Ethernet crossover is used to directly connect computing devices that would typically be connected through a network switch, Ethernet hub, or router, such as by connecting two personal computers together using their network adapters.
Note that a group of two or more interconnected nodes makes up a node network. Once a connection has been established between two or more nodes, all searches return lists of configured users and resources from both nearby and distant nodes. Every computer in the node network keeps track of this fundamental data.
Therefore, Through a link or communication channel, nodes are connected. A computer network may use cable, fiber, or both of these.
Learn more about ethernet from
https://brainly.com/question/28156384
#SPJ1
The value that excel displays for a cell is always the precise value you enter in the spreadsheet or the precise value resulting from a formula in that cell that is stored by the software.a. Trueb. False
This claim is untrue since Excel should always show the exact number that you enter into the column or the exact value that results from a calculation that is placed in that cell.
What are a few illustrations of spreadsheet applications?A type of computer application called a technology program may be used to organise, store, and analyse data in a tabular format. The application can imitate digital versions of paper accounting spreadsheets. They could also have several connected sheets with content is shown text, statistics, or graphics.
Which spreadsheet programme is the most straightforward?LibreOffice Arithmetic or Apache Avian influenza viruses Calc offline may indeed be adequate if you simply need a basic computer for straightforward administrative tasks, such as calculations. if you desire more complex features.
To know more about Spreadsheet visit:
https://brainly.com/question/8284022
#SPJ4
Write a function that accepts a string as an argument and then prints the string backwards.
Write in Python.
7
Answer:
Here's a Python function that takes a string as input and prints the reversed version of the string:
def print_backwards(string):
reversed_string = string[::-1]
print(reversed_string)
The [::-1] syntax in string[::-1] returns the reversed version of the input string. The function then assigns the reversed string to a variable reversed_string and prints it using the built-in print() function.
Here's an example usage of the function:
>>> print_backwards("Hello, World!")
!dlroW ,olleH
>>> print_backwards("123456789")
987654321
A piece of software that runs and manages virtual machines is known as a __________.
A piece of software that runs and manages virtual machines is known as a Hypervisor.
What is Hypervisor?Software that builds and manages virtual machines is called a hypervisor, also referred to as a virtual machine monitor or VMM (VMs). By essentially sharing its resources, such as memory and computation, a hypervisor enables a single host computer to handle numerous guest virtual machines (VMs). The host operating system gains a new software layer from a hosted hypervisor, while the guest operating system moves up to a third software level above the hardware. Oracle VM VirtualBox is a well-known example of a hosted hypervisor.
Type 1 hypervisors run on the system hardware directly; this is known as a "bare metal" embedded hypervisor.
VMware ESX and ESXi.Microsoft Hyper-V.Citrix XenServer.Oracle VM.Type 2 hypervisors run on a host operating system that offers virtualization features like memory management and I/O device support.
VMware Workstation/Fusion/Player.VMware Server.Microsoft Virtual PC.Oracle VM VirtualBox.Learn more about hypervisor here:
https://brainly.com/question/14990049
Sans serif typeface is a good choice for
a. printed documents
b.document headings
c. document text
d. document content
Answer: A Sans-serif font is a good choice for headings and small text where clarity and readability are paramount. A Serif font is good to use on larger blocks of printed text like on a flyer.
Explanation:
the first day anna read a quarter of the book. on the second day she read a third of the remainder. noticed that after two days he had 80 pages left unread. how many pages did the book have?
Answer:
160 pages
Explanation:
\(Day\ 1 = \frac{1}{4}\)
\(Day\ 2 = \frac{1}{3}Remainder\)
\(Left = 80\)
Required
The number of pages
Let the number of pages be x.
So, on day 1; we have:
\(Day\ 1 = \frac{1}{4}x\)
After day 1, there are:\(\frac{3}{4}x\) left ----------------- i.e x - 1/4x
On day 2, we have:
\(Day\ 2 = \frac{1}{3} * \frac{3}{4}x\)
\(Day\ 2 = \frac{1}{4}x\)
At this point, we have:
\(Day\ 1 = \frac{1}{4}x\)
\(Day\ 2 = \frac{1}{4}x\)
\(Left = 80\) ---- pages left
The summation of all must equal x, the book pages
\(Day\ 1 + Day\ 2 + Left = Total\\\)
\(\frac{1}{4}x + \frac{1}{4}x+ 80= x\)
Simplify the left-hand side
\(\frac{1}{2}x+ 80= x\)
Collect like terms
\(x - \frac{1}{2}x= 80\)
Simplify
\(\frac{2-1}{2}x= 80\)
\(\frac{1}{2}x= 80\)
Multiply by 2
\(2 * \frac{1}{2}x= 80*2\)
\(x = 160\)
Angelina has added page numbers to her report, but all of the pages are labeled "Page 1” at the bottom. What caused this issue?
She typed “Page 1” in the footer.
She added a header instead of a footer.
She did not create a numbered list in her footer.
She forgot to click the Continue Numbering option.
Answer:
She typed "Page 1" in the footer.
Explanation:
This occured because the footer only repeats the same message across the footers unless you enable page numbering.
Hope this helps!
help me i dont understand REAL ANSWERS PLS
Answer:
it's answer is B
hope it helps you
Which of the following statements are true regarding models? Select 3 options.
In a model, the general characteristics are separated from the details.
Models help predict how a specific solution will respond.
Models help you understand a complex situation by including all of the details.
Models represent the system or problem at a detailed implementation level.
Models help communicate a design.
Answer:
Answer:
Models help predict how a specific solution will respond
In a model, the general characteristics are separated from the details
Models help communicate a design
Explanation:
The statements that are true regarding models are:
B. Models help predict how a specific solution will respond.
A. In a model, the general characteristics are separated from the details.
E. Models help communicate a design.
What is a model?A model is an artificial representation of an object or a process. Models are used to show the process or things that are very big and can not be understood by the actual thing.
By looking for patterns in a set of input data, predictive modeling uses mathematics to foretell future events or results.
Therefore, the correct options are A. In a model, the general characteristics are separated from the details, B. Models help predict how a specific solution will respond, and E. Models help communicate a design.
To learn more about the model, refer to the link:
https://brainly.com/question/14281845
#SPJ2
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
23 24
Computing
L2 - Review the sentences below and fill in the blanks using the
list of words provided.
To connect together different devices, you need cables. The cables carry the messages sent between machines
communicating with one another. The most common type are called 'Ethernet cables'. The cable is made up of a
number of copper wires and has the ability to send data in_both directions.
A
connects a number of computers together within the same room or building. This means that each computer
does not need to have its own dedicated connection to every other computer in a network, which reduces the
number of needed.
A is often described as a powerful computer that provides services. One example of a service that it can
provide is shared access to such as text, images, sound, or
List of words: cables, server, files, video, hub, both
11
Click to add speaker notes
Answer: 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Explanation: x1
What is a stepping function?
A. a function that allows users to select which portion of a software program they would like to use
B. a function that allows users to make helpful notes about error messages they encounter
C. a function in a compiler that enables programmers to indent code when creating subfunctions
D. a function in a compiler that enables programmers to run a program line by line and observe the
current values of program variables
Answer:
D.
Explanation:
a function in a compiler that enables programmers to run a program line by line and observe the current values of program variables
Answer:
Its D i got it right
Explanation:
Information stored on CD-ROM disc must be read and then erased.True or false?
Answer:
False
Explanation:
assume you have two integer variables, num1 and num2. which of the following is the correct way to swap the values in these two variables?
a.int temp = num; 2
num2 = num1; num1 = temp; b.int temp = num1 num2 = num1; num1 = num2; c.num1 = num2; num2 = num1 ; d.int temp = num1; num2 = temp1; temp = num2; num1 = temp; e.None of these
(a) int temp = num1; num1 = num2; num2 = temp; .The correct way to swap the values in two integer variables is option (a) int temp = num1; num1 = num2; num2 = temp;
In option (a), we create a temporary variable "temp" and assign it the value of the first variable "num1". We then assign the value of the second variable "num2" to the first variable "num1", and finally assign the value of the temporary variable "temp" to the second variable "num2". This effectively swaps the values in the two variables. Option (b) is incorrect as it does not create a temporary variable to hold the value of either variable before the swap. Option (c) is also incorrect as it swaps the values of the variables incorrectly. Option (d) is incorrect as it assigns the value of "num1" to "num2" before swapping. Option (e) is incorrect as one of the given options is the correct way to swap the values in two integer variables.
Learn more about programming here:
https://brainly.com/question/14368396
#SPJ11