Questions
please write 1000 words about differences between Facebook and twitter in public relation

please write 1000 words about differences between Facebook and twitter in public relation

In: Operations Management

Identify a specific example of a cyberattack and discuss security measures that could be been employed...

Identify a specific example of a cyberattack and discuss security measures that could be been employed to protect against this type of cybercrime. Discuss the impact of cybercrime on an organization's reputation and how cybercrime can affect an organization's sustainability.

In: Computer Science

the main services that financial institutions provide as financial intermediaries

the main services that financial institutions provide as financial intermediaries

In: Finance

What are some of the possibilities for using Drones now and in the future? Please write...

What are some of the possibilities for using Drones now and in the future?
Please write it niely and should be 75 words atleast.
also please attach a link of the website used for reference.

In: Computer Science

With the advent of the Internet combined with globalization and the strong presence of multinational companies,...

With the advent of the Internet combined with globalization and the strong presence of multinational companies, many experts claim that cultural homogenization is destroying culture and traditional values. For example, in the future regardless of where you travel in the world, you may see a typical person on the street wearing a pair of Levis jeans, a Calvin Klein shirt, Nike shoes, while holding an iPhone in one hand and a cup of Starbucks in the other hand. State your opinion on this.

In: Psychology

Dollar-Value LIFO Retail Johns Company adopts the dollar-value LIFO retail inventory method on January 1, 2016....

Dollar-Value LIFO Retail

Johns Company adopts the dollar-value LIFO retail inventory method on January 1, 2016. The following information for 2016 is obtained from Johns' records:

Cost Retail
Inventory, January 1, 2016 $20,000 $29,000
Purchases 60,000 92,000
Net additional markups 1,000
Net markdowns 3,000
Sales 75,000

The price index on January 1, 2016, was 100, and on December 31, 2016, it was 110.

Required:

Compute the cost of the inventory on December 31, 2016. Round the cost-to-retail ratio to three decimal places.

JOHNS COMPANY
Calculation of cost of inventory using Dollar-Value LIFO
December 31, 2016
Cost Retail
Beginning inventory $20,000 $29,000
Purchases 60,000 $92,000
Add: Markups (net) 1,000
Less: Markdowns (net) (3000)
$90,000
Goods available for sale $80,000 $119,000
Less: Sales 75,000
Ending inventory at retail $44,000
Ending inventory at cost $ ?

In: Accounting

For java script 1. Make a set of buttons that demonstrate strings. Feel free to combine...

For java script

1. Make a set of buttons that demonstrate strings. Feel free to combine these new buttons with the buttons of the previous HW if you like, but you don't have to.

2. Modify the button styles

3. Add a for loop, a while loop, and a do while loop. These should be activated by buttons to demonstrate the loops.

In: Computer Science

In reality, network performance is limited by bandwidth, latency, jitters, congestions, Errors and etc. Meanwhile the...

In reality, network performance is limited by bandwidth, latency, jitters, congestions,
Errors and etc. Meanwhile the client also has the limitations due to resource load,
application interaction with TCP stack, and etc.
In this question, you will be tested for your familiarity in using Wireshark software for
packet capture and analyze the client’s TCP window size.
Instruction: Start packet capture in Wireshark application and download Ubuntu 18.04.2
image from this page: http://releases.ubuntu.com/bionic/.

Answer the following questions with proven screenshots:
(a) What is the Internet Protocol (IP) address of the URL of Ubuntu.com?
Answer Guide:
may use dnslookup + wirehshark to complete this action.

(b) What is the port number that the website/network service used?
Answer Guide: Kindly able to notice and differentiate between a simple HTTP, HTTPS,
TLS, and SSL. Some website may appear to use SSL/TLS for the comm. Provide a
screenshot to support your answer.

(c) How long does it take from the HTTP GET message was sent until the HTTP OK reply
was received for the ubuntu.com webpage that you visited?
Answer Guide: Inspect either the web is using HTTP/HTTPS or SSL/TLS and provide
your statement. The trick is, through the Wireshark. If there is no HTTP protocol
involves during the observation,

(d) Determine the TCP window size while downloading is still in progress. Determine the
steps taken to determine the TCP window size value with screenshot.
Answer Guide:
The Ubuntu ISO will be downloaded from a mirror. Please specify the mirror that you
are using at that moment. State the domain name, protocols involved, and the port
number.

(e) Provide a screenshot of TCP Window using I/O graph (Statistics > TCP StreamGraph
> Window Scaling Graph).
The window scaling graph shows the size of advertised receive window (including scaling
factor). The graph tells on how well the receiver can handle the received data.
Observation:

In: Computer Science

Print the mean and the first 10 eigenvector images and plot the first 100 eigenvalues using...

Print the mean and the first 10 eigenvector images and plot the first 100 eigenvalues using python.

In: Computer Science

1. For each of the following, prove using the definition of O(·): (a) 7n + log(n)...

1. For each of the following, prove using the definition of O(·):

(a) 7n + log(n) = O(n)

(b) n2 + 4n + 7 = O(n2 )

(c) n! = O(nn)

(d) 2n = O(22n)

Please explain the procedure clearly for all (They are of the same question)

In: Computer Science

What are some common logical fallacies (section 3.9) that you have witnessed in your life? (at...

What are some common logical fallacies (section 3.9) that you have witnessed in your life? (at work/school, in conversation, TV, Internet, etc.)

They can be related to technology, try not to get overly political in nature. Avoid Ad Hominem arguments in discussion.

In: Computer Science

Please use the python and explain. Also please show python. Suppose that a cashier owes a...

Please use the python and explain.

Also please show python.

Suppose that a cashier owes a customer some change and that the cashier only has quarters, dimes, nickels, and pennies. Write a program the computes the minimum number of coins that the cashier can return. To solve this problem use the greedy algorithm explained below. PROBLEM STATEMENT: Your program should first ask the user for the amount of money he/she is owed (in dollars). You may assume that the user will enter a positive number. It should then print the minimum number of coins with which that amount can be made. Assume that the only coins available are quarters (25 cents), dimes (10 cents), nickels (5 cents), and pennies (1 cent). EXAMPLES: If cashier owes 56 cents (i.e. $0.56) to the customer, the minimum number of coins the cashier can return is 4 (in particular, 2 quarters, 0 dimes, 1 nickel and 1 penny. It is not possible to return 3 or less coins). If cashier owes $1.42 to the customer, the minimum number of coins the customer can return is 9 (in particular 5 quarters, 1 dime, 1 nickel and 2 cents). Thus your program will look like this, for different runs:

Enter the amount you are owed in $: 0.56 The minimum number of coins the cashier can return is: 4

Enter the amount you are owed in $: 1.42 The minimum number of coins the cashier can return is: 9

Enter the amount you are owed in $: 1.00 The minimum number of coins the cashier can return is: 4

In: Computer Science

Q1- Given a set S = {1, 2, . . . , n} of players, with...

Q1-

Given a set S = {1, 2, . . . , n} of players, with skill levels

a1, a2, . . . , an,

we need to partition the set of players S into two teams S1 and S2 of equal total skill. The teams do not need to be of equal size. However, every player must be in exactly one team. In other words,

S1S2 = S                                        (1)

S1 ∩   S2 = ∅                                                     (2)

Σ ak= Σ ak                                  (3)

kS1   kS2

  1. Give a brute-force algorithm to solve this problem.

Hint: You must be able to generate subsets of S. To do that, you can use a list of binary digits b = b1b2. . . bnwhere setting b = 100010 means that only players 1 and 5 are in the subset represented by b.

  1. Give time complexity analysis for the worst case.

Hint: How many subsets of S contain a specific element i?

Q2-

Intervals (1, 8), (6, 9), (10, 14), (7, 11), (3, 12). Maximum activity is in the interval (7, 8), where four jobs are active.

Given a set S of n open intervals on R defined by

(a1, b1), (a2, b2), . . . , (an, bn)

Each airepresents the beginning time of a process, and birepresents the termination time of the process. There is an open interval (x, y) where the greatest number of processes is active. What are the x and y of such an interval. Consider the example given in Figure 1.

  1. Give a brute-force algorithm to solve this problem, with a worst-case running time of Θ(n3).
  2. Provide the time complexity analysis.

In: Computer Science

Design a counter that uses only 3 D flip-flops and as many logic gates as needed....

Design a counter that uses only 3 D flip-flops and as many logic gates as needed. The counter follows a sequence: 0, 5, 25, 15, 9, 6, 12, 3, 0, 5, 25, 15, 9, 6, 12, 3, …. Show all design details, i.e., block diagram, equations, and circuit diagram.

In: Electrical Engineering

Given a doubly linked list in c++, how do I create a function that returns the...

Given a doubly linked list in c++, how do I create a function that returns the pointer to first node in the given pattern, For example, given mainList (a -> b -> c -> d) and sublist  (b -> c), our function should return a Node pointer that points to first node of the sublist in the mainList. If the pattern doesn't exist in the mainList, we should return a nullptr, there are multiple of the same sublist in the mainList, we should return the very first instance where pattern is seen.

struct Node {

char value;

Node* next;

Node* prev;

}

Node* findList(Node* subList, Node* mainList) {

// need to do this

}

void printList(Node* node)
{
    while (node != nullptr)
    {
        printf("%c ", node->value);
        node = node->next;
    }
}
Node *newNode(char key)
{
    Node *temp = new Node;
    temp->value= key;
    temp->next = nullptr;
    return temp;
}
int main() {
    // this is the sublist
    Nucleotide *a = newNode('T');
    a->next = newNode('G');
    a->next->next = newNode('T');
    a->next->next->next = nullptr;

    // this is the main list
    Node *b = newNode('A');
    b->prev = nullptr;
    b->next = newNode('A');
    b->next->prev = b;
    b->next->next = newNode('C');
    b->next->next->prev = b->next;
    b->next->next->next = newNode('T');
    b->next->next->next->prev = b->next->next;
    b->next->next->next->next = newNode('G');
    b->next->next->next->next->prev = b->next->next->next;
    b->next->next->next->next->next = newNode('A');
    b->next->next->next->next->next->prev = b->next->next->next->next;
    b->next->next->next->next->next->next = nullptr;
    printList(a);
    cout << endl;
    printList(b);
    cout << endl;
    Node *c = findList(a, b);
    cout << c->value << endl;

    return 0;
}

In: Computer Science