Here's a Python program that takes in a list of sales amounts and calculates the discount for each one based on the criteria given
Write a Python programme to solve the given problem?
def calculate_discount(sales):
for amount in sales:
if amount > 2000:
discount = amount * 0.1
discounted_amount = amount - discount
print(discounted_amount)
else:
print(amount)
# Example usage
sales = [180, 2170, 3100, 9339, 2001]
calculate_discount(sales)
The program defines a function calculate_discount that takes in a list of sales amounts as an argument. It then loops through each amount in the list and checks if it is greater than 2000. If it is, the program calculates the discount as 10% of the amount, subtracts the discount from the amount, and prints the discounted amount. If the amount is less than or equal to 2000, the program simply prints the original amount.
In the example usage, we create a list of sales amounts and pass it to the calculate_discount function. The program then prints out the discounted amounts or the original amounts, depending on their values.
To learn more about Python program, visit: https://brainly.com/question/26497128
#SPJ1
Give the correct biological term 4 programme where members of the community help patients take their medicine regularly
The correct biological term for a program where members of the community help patients take their medicine regularly is community-based medication adherence.
A programme or project that engages community members in encouraging patients to take their medications as directed on a regular basis is referred to as community-based medication adherence.
The goal of this kind of programme is to combat pharmaceutical non-adherence, which affects a lot of people who have chronic illnesses like heart disease, diabetes, and hypertension.
Medication non-adherence can lead to worse health outcomes, higher healthcare expenses, and a lower quality of life.
Therefore the correct term is community-based medication adherence.
For such more question on biological:
https://brainly.com/question/24658219
#SPJ11
a technician is selecting a pc that will be used by an employee who wants to share a keyboard and mouse among three devices. what is a major consideration that needs to be taken into account?
The major consideration when selecting a PC for a user who wants to share a keyboard and mouse among three devices is the compatibility of the devices.
The PC should be able to support the type of keyboard and mouse that the user is trying to use and should be compatible with the other devices the user will be connecting to. Additionally, it is important to ensure that the PC has enough processing power and memory to support the user's needs.Learn more about PC here: https://brainly.com/question/21474169
#SPJ11
According to the article, what is the primary reason that the internet ate nordstrom's profits?
Nordstrom has been struggling with declining profits, and while its e-commerce business is growing, it is not as profitable as its physical stores .
The company's shares have fallen 30% in the past year, and after its fourth-quarter earnings missed analyst estimates, Nordstrom admitted that it needed to improve its e-commerce operations . Despite growing digital sales, rising costs are crimping Nordstrom's profits, and the company is transitioning to a digital-first business to try to address the issue.
Therefore, it appears that the primary reason for Nordstrom's declining profits is not solely related to e-commerce, but rather a combination of factors such as rising costs, declining physical store sales, and a need to improve its e-commerce operations.
Find out more about nordstrom's profits
brainly.com/question/14082887
#SPJ4
what is mechanical advantage of a lever of a grain crusher
Explanation:
The mechanical advantage of a lever of a grain crusher is the ratio of the output force to the input force. It is a measure of how much easier it is to do a job using the lever compared to doing it without. For example, if the output force is twice as great as the input force, then the mechanical advantage of the lever would be 2. This means that the job can be done with half the effort. The mechanical advantage of a lever of a grain crusher can be increased by increasing the length of the lever arm, which reduces the input force required to move the grain. This makes it easier to crush the grain, as less force is needed to do the job.
The src="" attribute points to the location of the image to be displayed in an HTML document? True or False
Answer:
I think it's true
Explanation:
the meaning of the src"" is source and if you write img src you need to write f4om where you got the image by copying image address
write down the output of the following program by showing dry down
The output of the given program will be:
"CPE"
This is because the program defines a subroutine named RESULT which takes a string parameter A$. The RESULT subroutine first calculates the length of the string A$ using the LEN() function and stores it in variable B. It then initializes a counter C to 1 and enters a loop that runs as long as C is less than or equal to B.
In each iteration of the loop, the program takes the character at the position specified by C in the string A$ using the MID$() function and appends it to a new string B$. The program then increments the counter C by 2 and continues with the next iteration of the loop.
Once the loop has been completed, the program prints the final value of B$, which will contain every other character of the input string A$. In this case, since the input string is "COMPUTER", the output will be "CPE".
Learn more about program at:
https://brainly.com/question/11023419
#SPJ1
1. Write a loop that reads positive integers from standard input, printing out those values that are even, each on a separate line. The loop terminates when it reads an integer that is not positive. 110132013301-1
Answer:
while True:
num = int(input())
if num <= 0:
break
if num % 2 == 0:
print(num)
Explanation:
The while loop runs indefinitely until it encounters a non-positive integer input. Within the loop, we read the integer input using input() and convert it to an integer using int(). We then check if the integer is positive or not. If it is not positive, we break out of the loop. If it is positive, we check if it is even by checking if the remainder after dividing by 2 is 0. If it is even, we print it out using print().
when mason navigates to an e-commerce site in his browser, the webpage asks for permission to store cookies on his computer. if he refuses, what feature of the website might not work correctly?
When Mason navigates to an e-commerce site in his browser, if he refuses, the feature of the website that may not work correctly is login/registration or access to the cart.
Cookies are small data files that are stored on a user's computer by a web server. Cookies are used to keep track of user actions, preferences, and login information on the webpage. Cookies are essential in the e-commerce business because they enable customers to save items in the cart, make purchases, and access previous orders without having to log in or input information again and again. Cookies are also used by websites to collect data about their customers, such as the pages they visit, the time they spend on the website, and their interests.If Mason denies the website's request to store cookies, he may not be able to use some essential features of the website, such as the login/registration system, cart access, or preference settings. Without cookies, Mason's computer won't remember his login information, so he'll have to log in every time he visits the site. If the site uses cookies to keep track of his cart items, Mason's cart won't work correctly, and he may have trouble purchasing items on the site.Learn more about e-commerce here: https://brainly.com/question/1295884
#SPJ11
1. Computer Hardware can consist of a
A. monitor, mouse, applications, games
B. keyboard, mouse, operating system
C. monitor, keyboard, CPU and mouse
D. monitor, operating system, applications
Answer:
C. monitor, keyboard, CPU and mouse.
Explanation:
Computer hardware refers to the physical components of a computer system that can be touched and seen. Some of the major hardware components of a computer include:
Monitor: A display screen that shows the output of the computer.
Keyboard: An input device used for typing and entering data into the computer.
CPU (Central Processing Unit): The "brain" of the computer that processes instructions and performs calculations.
Mouse: An input device used for navigating and interacting with the computer.
Option A is incorrect because a monitor and a mouse are hardware components, but applications and games are software components that run on the hardware. Option B is incorrect because an operating system is software, not hardware. Option D is incorrect because applications and an operating system are software components, not hardware.
2you have a class B IP address with a subnet mask of /23. How many bits were borrowed from the
host portion of the address?
A Class B IP address is a range of IP addresses that begins with the binary digits "10" and has a subnet mask of 255.255.0.0. When a /23 subnet mask is used with a Class B IP address, it means that 23 bits are used for the network portion of the address and the remaining 9 bits are used for the host portion.
To calculate how many bits were borrowed from the host portion of the address, we need to subtract the number of bits used for the network portion (23) from the total number of bits in the host portion (which is 16 bits in a Class B address). 16 - 23 = -7 This calculation gives us a negative number, which is not possible. It indicates that there has been an error in the calculation or that the subnet mask is invalid for a Class B IP address.Therefore, we can conclude that the question is incorrect or incomplete as it does not provide accurate information to determine how many bits were borrowed from the host portion of the address.
To learn more about IP addresses click the link below:
brainly.com/question/16011753
#SPJ4
the complete question is:you have a class B IP address with a subnet mask of /23. How many bits were borrowed from the
host portion of the address?
A company organizes all of its client database in order of the amount of money that the account is worth. When a new account is added, it is placed in the correct order in the database based on the worth of the account. Which classic algorithm would be best suited to perform this function?
Linear/Sequential Search
Insertion Sort
Selection Sort
None of these are viable options
The best classic algorithm for organizing a client database in order of the account's worth would be an Insertion Sort. Therefore the correct option is option B.
A straightforward sorting technique called "Insertion Sort" arranges an array in the right order by repeatedly inserting a particular element into a subarray that has already been sorted. Here is how the algorithm operates:
Start with the array's second element.In the subarray, contrast the current element with the items that came before it.Swap the two elements if the current one is smaller than the previous one.Till the current element is in the proper location, repeat step 3 one more.For every successive entry in the array, repeat steps 2-4.This is the most efficient algorithm for sorting a list of items in order of value. Therefore the correct option is option B.
For such more question on Insertion Sort:
https://brainly.com/question/13326461
#SPJ11
Write a code in python that asks and answers the question
What is the largest planet in our solar system?
Answer:
question = "What is the largest planet in our solar system?"
answer = "Jupiter"
user_input = input(question)
if user_input.lower() == answer.lower():
print("That's correct!")
else:
print("Sorry, that's incorrect. The correct answer is", answer)
Explanation:
In this code, we first define the question and answer as variables. Then we use the input() function to prompt the user to enter an answer to the question. We convert the user's input to lowercase using the lower() method to make the comparison case-insensitive.
We then use an if statement to check if the user's input matches the correct answer. If it does, we print a message indicating that the user is correct. If the user's input does not match the correct answer, we print a message indicating that the user is incorrect and we provide the correct answer.
which of the following statements is true? a. a relational database is a collection of related attributes b. a relational database is a collection of rows c. a relational database is a collection of tables
The true statement is "A relational database is a collection of tables." Thus, Option C is correct.
In a relational database, data is organized into tables, with each table consisting of rows and columns. Each row represents a unique record or instance, while each column represents a specific attribute or characteristic of that record.
The relationships between tables are established through the use of keys, which allow data to be linked and retrieved across multiple tables. Overall, a relational database provides a structured and organized way to store and manage large amounts of data, allowing for efficient querying, retrieval, and analysis of information.
Option C holds true.
Learn more about relational database https://brainly.com/question/31058709
#SPJ11
communicate with the old datacenter with a secure connection. which of the following access methods would provide the best security for this new datacenter?
The best access method that would provide the best security for this new datacenter is B: site-to-site VPN.
A site-to-site VPN (Virtual Private Network) is a secure way to connect two networks over the internet. It creates a secure tunnel between the two networks and encrypts all the data that is transmitted between them. This ensures that the data is protected from any unauthorized access or tampering.
A site-to-site VPN is also more efficient than other access methods, as it allows for seamless communication between the two networks without the need for additional hardware or software.In conclusion, a site-to-site VPN is the best access method for providing secure communication between the new datacenter and the old datacenter.
"
Complete question
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?
A: Virtual network computing
B: site-to-site VPN.
C: Secure Socket
"
You can learn more about site-to-site VPN at
https://brainly.com/question/26327418
#SPJ11
create a double array containing 15 elements create a double array containing 14 elements declare but do not create a double array create a double array containing 13 elements
To create a double array containing 15 elements, you can use the following code:
```java
double[] array = new double[15];
```
Similarly, to create a double array containing 14 elements, you can use the following code:
```java
double[] array = new double[14];
```
To declare but not create a double array, you can use the following code:
```java
double[] array;
```
Finally, to create a double array containing 13 elements, you can use the following code:
```java
double[] array = new double[13];
```
Each of these code snippets will create or declare a double array with the specified number of elements. You can then use the array to store and manipulate data as needed.
Learn more about programming:
https://brainly.com/question/26134656
#SPJ11
Find the next instance of text formatted in italic
Choose the More>> option after opening the Find window. Font can be selected by clicking the Format button. Choose Italic, then click OK. Selecting find will now search for terms with that formatting.
In Word, how do I find instances?Ctrl + F is pressed. Enter the desired text in the Search document box by clicking on it in the Navigation pane. Automatic search execution occurs. The document's results are highlighted, and the Navigation pane contains a list of all occurrences of the word.
How can you choose every occurrence of a term in Word?Try these things: Click "Find" in the Word document you wish to copy the text from. Advanced search > Type your search term, then click "More." Highlight All Text in Reading.
To know more about window visit:-
https://brainly.com/question/13502522
#SPJ1
When you pull into the middle of an intersection to properly secure a left turn you are _
Answer:
declaring your intention to turn
Explanation:
When you enter the intersection, stay to the right of the center line. Keep your wheels straight to avoid being pushed into oncoming traffic should a rear-end collision occur. When approaching traffic clears or stops for a red light, complete your turn.
Hope this helps!
Brainliest and a like is much appreciated!
Differentiate the type of certification and/or degree offered by matching each with the type of program/school that offers it.
1. offer a certificate of completion; may offer certification after passing a test
2. may offer certificates; may offer associates degrees, bachelors' degrees, and masters' degrees
3. offer various types of degrees, including associates degrees, bachelors' degrees, masters' degrees, and doctoral degrees
Options: training programs, online programs, colleges or universities
Provide a completion certificate; give certification after passing a test: training initiatives, Certificates, as well as associate's, bachelor's, and master's degrees, may be offered: e-learning courses.
What distinguishes a certificate from a degree?The length of the course is the main distinction between a certificate, diploma, and degree programme. Although some certificate programmes run 1.5 to 2 years, a certification course typically lasts six months to a year. A diploma course may follow a semester or an annual schedule.
What distinguishes a certification from a certificate?Professional certification cannot be obtained through a certificate programme. Although completing a certificate programme could help you get ready for a professional certification in a certain industry.
To know more about e-learning visit:-
https://brainly.com/question/28259839
#SPJ1
(a) Analyze the following C++ code, and explain in details on how all the variables are updated during the execution and what the output will be. (Note: no credits if only the cout results are provided) (b) During the execution of the above program, which variables will be stored in the static memory area, what will be stored in the stack area, and what will be in the heap area? When line 30 is executed, draw a diagram to show all functions in the memory. Note: draw different copies of the recursive function to reflect the calling procedure.
(a) The code initializes two variables, x and y, to the values of 10 and 20, respectively. It then declares a function, f, which takes two arguments, a and b, and returns the result of a + b. The code then calls the function with the values of x and y as arguments, and assigns the result to the variable z. Finally, the code prints the value of z, which is 30.
(b) The variables x, y, and z will be stored in the static memory area, as they are global variables. The variables a and b will be stored in the stack area, as they are local variables within the function f. There are no variables stored in the heap area in this program.
When line 30 is executed, the function f will be called with the values of x and y as arguments. The function will then return the result of a + b, which is 30, and this value will be assigned to the variable z. The diagram below shows the functions in the memory at this point:
|---------------------|
| f(a=10, b=20) |
|---------------------|
| main() |
| x = 10 |
| y = 20 |
| z = 30 |
|---------------------|
Learn more about the functions in the memory:
https://brainly.com/question/14241634
#SPJ11
consider using a simple linked list as a dictionary. assume the client will never provide duplicate elements, so we can insert elements at the beginning of the list. now assume the peculiar situation that the client may perform any number of insert operations but will only ever perform at most one lookup operation. a. what is the worst-case running time of the operations performed on this data structure under the assumptions above? briefly justify your answer. b. what is the worst-case amortized running time of the operations performed on this data structure under the assumptions above? briefly justify your answer.
The worst-case running time of the operations on this data structure would be O(n), where n is the number of elements in the linked list. The worst-case amortized running time of the operations on this data structure would still be O(n), since the worst case is still possible.
The maximum time that can be used to execute a lookup operation in a linked list is proportional to the size of the list. Each element of the list will be checked one by one, which means that it will take a long time to execute when there are many elements. The lookup operation will be executed in O(n) time on the worst-case because of the list of size n.
The worst-case amortized running time is O(1) because it considers the total time taken to execute all insert and lookup operations. This is why the cost of a particular operation is distributed among all other operations that are executed on the data structure.
When multiple insert operations are executed, the client will insert elements at the beginning of the linked list. Since the elements are unique and there is only one lookup operation, the cost of the lookup operation is shared among all the insert operations, resulting in O(1) amortized time.
Learn more about the data structure at https://brainly.com/question/29487957
#SPJ11
HELP!!
A delivery of information from one person—or a small team of people—to an audience is called a ____________.
Question 8 options:
Presentation
Template
Speaker Notes
Slide Show Toolbar
Answer:
Presentation
Explanation:
Information is being presented to an audience (this makes sense).
A template can be used to organize the information that is to be given to the audience.
Speaker notes only help the speaker give the information to the audience.
Slide how toolbar is only for creating the slideshow that can be used to help the audience understand what the speaker is saying.
shameeka is setting up a computing system for predicting earthquakes based on processing data from seismographs (devices that record earth movements). the system will start off with data from local seismographs but eventually handle millions of data points from seismographs worldwide. for her system to work well, what is an important feature? choose 1 answer: choose 1 answer: (choice a) the system must use heuristic-based algorithms. a the system must use heuristic-based algorithms. (choice b) the system must be scalable. b the system must be scalable. (choice c) the system must use lossy compression. c the system must use lossy compression. (choice d) the system must be open-source. d the system must be open-source.
For the computing system designed to predict earthquakes based on processing data from seismographs, what is an important feature is the system must be scalable. The correct option b.
Scalability is an important feature because the computing system is intended to manage millions of data points from seismographs worldwide. To effectively scale the system to the new data requirements, it must be capable of handling this massive volume of data without slowing down or crashing.Another important feature that could be useful is machine learning algorithms, which could help the system become more accurate over time as more data is added. But since the question only asks for one answer, the correct answer is scalability.Learn more about data here: https://brainly.com/question/26409104
#SPJ11
question 5) can you perform a mitm attack using the apr cache poisoning approach if the devices are on separate networks (separated by a router)?
Yes, a mitm attack can be performed using the APR cache poisoning approach even if the devices are on separate networks separated by a router.
Mitm (man-in-the-middle) attacks are malicious activities in which an attacker interferes with the communications between two endpoints, allowing them to read, modify, or insert new data into the intercepted packets. Man-in-the-middle (MitM) attack, also known as a monster-in-the-middle (MitM) attack, is a cyberattack where an attacker intercepts an existing communication between two parties, alters it and forwards it to the receiver or client as if it were from the genuine source. A significant requirement for performing a mitm attack is to establish a connection between the attacker and the target. The attacker must intercept the data transmitted between the target and the web server.This is generally done in two ways: one is to connect the attacker's computer to the same network as the target, and the other is to send malicious code to the victim's machine, which will redirect data sent to the web server through the attacker's computer. By using APR cache poisoning, the attacker can initiate a man-in-the-middle attack (MiTM) to alter traffic between two devices on the same network. ARP cache poisoning involves modifying the ARP tables of network devices with false entries. By replacing a legitimate MAC address with the attacker's MAC address in the ARP cache, the attacker can intercept traffic destined for that device or even modify that traffic before forwarding it. However, if the target is on a different network or subnet, the ARP broadcast requests will not reach the target, and hence, the attacker cannot carry out an ARP spoofing attack. Therefore, if the devices are on separate networks separated by a router, it would not be possible to carry out a man-in-the-middle attack by ARP cache poisoning since ARP broadcasts will not be able to traverse the router, and the attacker will be unable to spoof the MAC address of the gateway/router.Learn more about networks here: https://brainly.com/question/13010101
#SPJ11
Note that common activities are listed toward the top, and less common activities are listed toward the bottom. According to O*NET, what are common work activities performed by Elementary School Teachers? Check all that apply.
thinking creatively
coaching and developing others
staffing organizational units
teaching and training others
repairing and maintaining electronic equipment
organizing, planning, and prioritizing work
Answer: 1 2 4 6
According to O*NET, common work activities performed by Elementary School Teachers include:
Teaching and training othersThinking creativelyCoaching and developing othersOrganizing, planning, and prioritizing workWhat do school teachers do?Elementary school teachers are responsible for providing instruction to students in a variety of subjects, developing lesson plans and materials, assessing student progress, and communicating with parents and administrators.
To be effective in these tasks, teachers need to be able to think creatively and organize and prioritize their work. They also need to coach and develop their students, as well as collaborate with other teachers and staff members to ensure that students receive a well-rounded education.
Read more about work activities here:
https://brainly.com/question/30526083
#SPJ1
[ASAP] Question # 6 Multiple Choice
When associating an event handler with a button click, which event occurs when you click the right button of a mouse?
1. Button-Right
2. Button-1
3. Button-3
4. Button-2
Answer:
3. Button-3
Explanation:
In Java Swing, mouse button events are identified by integers, with Button-1 being the left mouse button, Button-2 being the middle mouse button, and Button-3 being the right mouse button. Therefore, to handle a right mouse button click, you need to listen for the Button-3 event.
Here's an example of how to associate an event handler with a right mouse button click in Java Swing:
button.addMouseListener(new MouseAdapter() {
public void mousePressed(MouseEvent e) {
if (e.getButton() == MouseEvent.BUTTON3) {
// handle right mouse button click
}
}
});
Consider the following method. Public static int mystery (int [] arr) int count=0; int curr = arr[arr. Length - 1]; for (int value : arr) { if (value > curr) { count = count + 1; } else { count = count - 1; } curr = value; } return count; } The following code segment appears in another method of the same class. Int []arr = (4, 14, 15, 3, 14, 18, 19); System. Out. Println (mystery (arr)); What is printed as a result of executing the code segment? (A) - 7 B) -6 (C) 3 (D) 5 (E) 7
The output of executing the code segment will be (D) 5. Here's how the method works: It initializes a count variable to 0 and a curr variable to the last element of the input array.
It then iterates through the array and compares each element to the curr variable. If the element is greater than curr, count is incremented by 1. Otherwise, count is decremented by 1. After each comparison, curr is set to the current element. Finally, the method returns the count value. For the given input array [4, 14, 15, 3, 14, 18, 19], the method will compare each element to the previous one as follows: 4 < 19: count = -1 14 < 4: count = -2 15 > 14: count = -1 3 < 15: count = -2 14 < 3: count = -3 18 > 14: count = -2 19 > 18: count = -1 So the final count value is -1 - 2 - 1 - 2 + 1 - 2 - 1 = -6. However, the question asks for the absolute value of the count, which is 6, and since option B is not present, the correct answer is (D) 5.
To learn more about array click on the link below:
brainly.com/question/13151204
#SPJ4
Relani is a new Internet search engine. The site focuses on displaying the most popular, frequently accessed sites worldwide first in any search, encouraging users to explore the most optimal options. In this case, Relani avoids:_______.
a. Attribute determinance.
b. Peripheral-route processing.
c. Information overload.
d. Central-route processing.
e. Problem recognition
Relani is a new Internet search engine. The site focuses on displaying the most popular, frequently accessed sites worldwide first in any search, encouraging users to explore the most optimal options. In this case, Relani avoids Information overload. Therefore the correct answer is Option C.
Relani's emphasis on prioritizing the most well-known, regularly visited websites across the globe in any search helps to reduce the number of possibilities displayed to the user and prevent them from being overloaded with information, which is a common issue with other search engines.
Using this strategy, consumers' search processes will be made simpler and the likelihood of information overload would be decreased.
For such more question on Information overload:
https://brainly.com/question/3738775
#SPJ11
safiya is a software engineer at a company that's developing software for self-driving cars. she's working on software that uses computer vision and machine learning algorithms to detect pedestrians walking near the car and trigger the brakes when needed. after training the algorithm on a large dataset of training data (videos of pedestrians walking near cars), they try it out in cars with backup drivers. the drivers report that it detected most pedestrians, but failed to detect people using wheelchairs and parents pushing strollers. the drivers had to manually respond in those cases. what's the best way that safiya can improve the machine learning algorithm's ability to detect all pedestrians? choose 1 answer: choose 1 answer: (choice a) she can add videos of people using wheelchairs and strollers into the training data set (perhaps crowd-sourcing them if there are none already available). a she can add videos of people using wheelchairs and strollers into the training data set (perhaps crowd-sourcing them if there are none already available). (choice b) she can program rules into the network about the shapes and movement patterns of wheelchairs and strollers. b she can program rules into the network about the shapes and movement patterns of wheelchairs and strollers.
The best way that Safiya can improve the ability of the machine learning algorithm to detect all pedestrians is by adding videos of people using wheelchairs and strollers into the training data set. Option A is correct.
By adding more examples of people using wheelchairs and strollers to the training data, the machine learning algorithm can learn to recognize the unique features and movement patterns of these individuals and improve its ability to detect them.
Crowd-sourcing the data can be a good approach if the required videos are not readily available. Adding rules to the network can be helpful, but it may not be sufficient in detecting all types of pedestrians and can lead to overfitting.
Therefore, adding more diverse training data is generally a better approach for improving the performance of the algorithm. The correct answer is A.
Safiya is a software engineer at a company that's developing software for self-driving cars. she's working on software that uses computer vision and machine learning algorithms to detect pedestrians walking near the car and trigger the brakes when needed. after training the algorithm on a large dataset of training data (videos of pedestrians walking near cars), they try it out in cars with backup drivers. the drivers report that it detected most pedestrians, but failed to detect people using wheelchairs and parents pushing strollers. the drivers had to manually respond in those cases.
What's the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians?
A. She can add videos of people using wheelchairs and strollers into the training data set (perhaps crowd-sourcing them if there are none already available).
B. She can double the size of the training data set by partnering with another company in the self-driving car industry.
C. She can program rules into the network about the shapes and movement patterns of wheelchairs and strollers.
D. She can reduce the size of the training data set, removing videos of single pedestrians walking on foot such that the resulting dataset has a higher fraction of pedestrians using wheelchairs and strollers.
Learn more about the machine learning algorithm https://brainly.com/question/30352563
#SPJ11
Given a string and a non-empty substring sub, compute recursively the largest substring which starts and ends with sub and return its length.
strDist("catcowcat", "cat") → 9
strDist("catcowcat", "cow") → 3
strDist("cccatcowcatxx", "cat") → 9
The given query asks for a recursive function that finds the largest substring in a given string that starts and ends with a specified non-empty substring. One suggested approach is to find the first and last occurrences of the substring, and then calculate the length of the resulting substring.
If the difference between the two indexes is zero or negative, the function should be called again with a shortened string. This can be repeated until a valid result is found . Another solution is to recursively call the function with the substring removed from the beginning and end of the string until the substring is no longer present. The length of the resulting string is then returned .In computer language, a string is a sequence of characters that is used to represent text or other data. A string can include letters, numbers, symbols, and whitespace, and it can have any length.
A substring is a smaller sequence of characters that is contained within a larger string. A substring can be any length, but it must be a contiguous sequence of characters that occurs within the larger string.
In programming, there are many tasks that involve manipulating strings and substrings. For example, you might need to search for a particular substring within a larger string, extract a specific substring from a larger string, or replace one substring with another.
There are many built-in functions and libraries in programming languages that provide tools for working with strings and substrings, such as the substring method in JavaScript, the string module in Python, or the String class in Java.
Find out more about recursive function
brainly.com/question/30261472
#SPJ4
which network topology is in use when every network has a direct vpn connection to every other network? this topology provides any-to-any communication and provides the most optimal direct path for network traffic.
The network topology in use when every network has a direct VPN connection to every other network is called a full mesh topology. This topology provides any-to-any communication and provides the most optimal direct path for network traffic.
A mesh topology is a type of network topology in which all devices are connected to each other via multiple, redundant paths to provide a continuous data path. Because mesh topology uses multiple redundant interconnections between network nodes, it is also known as a "fully connected network."It can provide fault tolerance due to the presence of multiple paths to access the destination.It provides a high level of reliability by enabling multiple connections between devices in the network.It provides high-speed communication channels to devices that need to exchange information.
Learn more about VPN: https://brainly.com/question/14122821
#SPJ11