answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
2 years ago
13

Write a function string middle(string str) that returns a string containing the middle character in str if the length of str is

odd, or the two middle characters if the length is even. For example, middle ("middle") returns "dd".
Computers and Technology
1 answer:
Katen [24]2 years ago
6 0

Answer:

function getMiddle(s) {

return s.length % 2 ? s.substr(s.length / 2, 1) : s.substr((s.length / 2) - 1, 2);

}

// I/O stuff

document.getElementById("submit").addEventListener("click", function() {

input = document.getElementById("input").value;

document.getElementById("output").innerHTML = getMiddle(input);

});

Explanation:

// >>> is an unsigned right shift bitwise operator. It's equivalent to division by 2, with truncation, as long as the length of the string does not exceed the size of an integer in Javascript.

// About the ~ operator, let's rather start with the expression n & 1. This will tell you whether an integer n is odd (it's similar to a logical and, but comparing all of the bits of two numbers). The expression returns 1 if an integer is odd. It returns 0 if an integer is even.

// If n & 1 is even, the expression returns 0.

// If n & 1 is odd, the expression returns 1.

// ~n & 1 inverts those two results, providing 0 if the length of the string is odd, and 1 if the length of the sting is even. The ~ operator inverts all of the bits in an integer, so 0 would become -1, 1 would become -2, and so on (the leading bit is always the sign).

// Then you add one, and you get 0+1 (1) characters if the length of the string is odd, or 1+1 (2) characters if the length of the string is even.

You might be interested in
Question 1 :Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often mad
ryzh [129]

Answer:

Category 6 Cabling

Explanation:

Category 6 cables are High-performance UTP cable that can transmit data 10/100/1000Mbps transfer and up to 10Gbps over shorter distances. They usually make uses of a longitudinal separator, this seperators always tend to separates each of the four pairs of wires from each other.

A twisted-pair cable is a cables that is mostly made of copper wires that are twisted around each other and are surrounded by a plastic jacket, twisted pair cables are majorly used for networking.

There are two types of twisted pair cable,

UTP (Unshielded Twisted Pair) are a type of twisted pair cabling that does not include shielding around its conductors.

STP(shielded twisted pair) are types of twisted pair cabling that does include shield around its conductors.

A category 6 cable can eithet be pure copper UTP or STP.

And they are best for networking.

7 0
2 years ago
You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
Alekssandra [29.7K]

Answer:

Make use of hash tables

Explanation:

The appropriate thing to use for this should be a hash table.

A Hash Table can be described as a data structure which stores data in an associative manner. In a hash table, data is stored in an array format, where each data value has its own unique index value. Access of data becomes very fast if we know the index of the desired data. So we can perform Hashing on ISBN Number since its unique and based on the Hash Function w ecan store the Information record.

There is no requirement for printing the file in order - HashTables dont store the data in order of insertions, so no problems with that

It becomes a data structure in which insertion and search operations are very fast irrespective of the size of the data. So Querying books details can be fast and searching will take less time.

It can also be pointed out that it wont be too expensive for Hardware implemtation as HashTables stores data based on Hash Functions and memory consumption is also optimal which reduces memory wastages.

7 0
2 years ago
Write a loop to populate the list user_guesses with a number of guesses. The variable num_guesses is the number of guesses the u
Masja [62]

Answer:

num_guesses = int(input())

user_guesses = []

for i in range(num_guesses):

    x = int(input())

    user_guesses.append(x)

   

print(user_guesses)

Explanation:

This solution is provided in Python

This line prompts the user for a number of guesses

num_guesses = int(input())

This line initializes an empty list

user_guesses = []

This loop lets user input each guess

for i in range(num_guesses):

This line takes user input for each guess

    x = int(input())

This appends the input to a list

    user_guesses.append(x)

This prints the user guesses    

print(user_guesses)

6 0
1 year ago
You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file
neonofarm [45]

Answer: Provided in the explanation section

Explanation:

The question says :

You are working on a documentation file userNotes.txt with some members of your software development team. Just before the file needs to be submitted, you manager tells you that a company standard requires that one blank space be left between the end-of-sentence period (.) and the start of the next sentence. (This rule does not affect sentences at the very end of a line.) For example, this is OK: Turn the knob. Push the "on" button. This is not: Turn the knob. Push the "on" button. Asking around among your team members, you discover that some of them have already typed their sentences in the approved manner, but others have inserted two or even more blanks between sentences. You need to fix this fast, and the first thing you want to do is to find out how bad the problem is. What command would you give to list all lines of userNotes.txt that contain sentence endings with two or more blanks before the start of the next sentence?

Solution:

Here, our fundamental aim is to look for the content which is having single space between different sentences. As it sentences finishing with . Going before with single and various spaces we have to channel and match just e the sentences which are finishing with ". "

For this we use order called "GREP" in Unix. "GREP " represents worldwide quest for standard articulation. This order is utilized inquiry and print the lines that are coordinating with determined string or an example. The example or indicated string that we have to look through we call it as customary articulation.

Syntax of GREP:

GREP [OPTIONS] PATTERN [FILE_NAME]

​​​​​​For our solution please follow the command

GREP "*\•\s$" userNotes.txt

Now it will display a all the lines having . Followed by single space.

6 0
2 years ago
RFID tags are used in secure environments primarily due to the fact they are impossible to counterfeit.
denis23 [38]

Answer: True

Explanation:

 Yes, the given statement is true that the RFID tags are basically used in the secure system because it is impossible to counterfeit.

RFID basically stand for the radio frequency identification that provide a method to retrieve the data or information quickly from the system. It basically used as radio wave technology in which we can easily track the objects and people by using proper programmed data.

The tag is basically placed in the object for unique identification. There are basically two types of tags in the RFID that is active and passive.

4 0
2 years ago
Other questions:
  • Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
    7·1 answer
  • ______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site. MT
    9·1 answer
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • (1) Output a menu of automotive services and the corresponding cost of each service. (2 pts) Ex: Davy's auto shop services Oil c
    15·1 answer
  • As a digital forensics examiner, it’s a good idea to build a list of references for information on privacy laws in other countri
    13·1 answer
  • Suppose two threads execute the following C code concurrently, accessing shared variables a, b, and c: Initialization int a = 4;
    15·1 answer
  • Define a method printAll() for class PetData that prints output as follows with inputs "Fluffy", 5, and 4444. Hint: Make use of
    13·1 answer
  • Calvin is an aspiring graphic designer. He wants to achieve Adobe Certified Expert certification in software that will be helpfu
    9·1 answer
  • Checkpoint 10.43 Write an interface named Nameable that specifies the following methods: _______{ public void setName(String n)
    12·1 answer
  • The variable isopen is to be used to indicate whether or not a store is currently open. Which of the following is the most appro
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!