answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
2 years ago
10

In the second example with modulus math, why can't Eve find the solution?

Computers and Technology
1 answer:
Leno4ka [110]2 years ago
6 0
C. She would have to resort to trial and errors to find a matching exponent
You might be interested in
Chinh wants to have a program print, "Sorry, but that isn’t one of your options" until the user enters the correct information.
kolbaska11 [484]

Answer:

a wile loop

Explanation:

8 0
2 years ago
Write the recursive function max_depth; it is passed a binary (any binary tree, not necessarily a binary search tree) and a valu
OleMash [197]

Answer:

A python code was used in writing of the recursive function max_depth; and passed a binary (any binary tree, not necessarily a binary search tree) and a value as arguments.

Explanation:

Solution

To solve this given question we make use of Python programming language.

Thus

THE CODE:

class BinaryTreeNode:

def __init__(self, value, left=None, right=None):

self.value = value

self.left = left

self.right = right

# recursive max_depth function implementation

def max_depth(tree, value):

if tree == None:

return -1

# recursive calls to this function

leftDepth = max_depth(tree.left, value)

rightDepth = max_depth(tree.right, value)

# return the maximum depth

if tree.value == value or leftDepth > -1 or rightDepth > -1:

return 1 + max(leftDepth, rightDepth)

else:

return max(leftDepth, rightDepth)

btn1 = BinaryTreeNode(2)

btn2 = BinaryTreeNode(3, None, btn1)

btn3 = BinaryTreeNode(3)

btn4 = BinaryTreeNode(3)

btn5 = BinaryTreeNode(2, btn2, btn3)

btn6 = BinaryTreeNode(1, btn4)

tree = BinaryTreeNode(3, btn5, btn6)

print('max_depth(tree, 1):',max_depth(tree, 1))

print('max_depth(tree, 2):',max_depth(tree, 2))

print('max_depth(tree, 3):',max_depth(tree, 3))

Note: Kindly find an attached copy of the Implementation of max_depth() function, Code to test the max_depth() function and the sample output below.

8 0
2 years ago
Which of the following would be a considered a want rather than a need for most people?
UNO [17]

c. would be the best answer.


3 0
2 years ago
Which one of the following would be considered a fixed cost of operating a motor vehicle?
lana [24]
What are the choices

8 0
2 years ago
1. In the Entity-Relationship Model, relationships can have attributes.
Vladimir [108]

Answer:

1. A. True

2. A. True

3. B. Conceptual.

4. Three (3).

Explanation:

An Entity-Relationship Model is used in databases to describe the structure and relationship between data elements known as entities.

1. True: In the Entity-Relationship Model, relationships can have attributes.

2. True: Attributes are the smallest division of data in ER diagram.

3. Conceptual: the level of abstraction which the Entity-Relationship Model most concerned with.

4. Consider the following relationship involving two entities, students and classes: A student can take many classes. A class can be taken by many students. The number of tables which can be used to represent this relationship in a schema is 3 because we are having three (3) parameters which are simply the students and the two entities.

In database management, the term "schema" is used to denote a representation of data.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

5 0
2 years ago
Other questions:
  • An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE
    5·1 answer
  • Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
    9·1 answer
  • Which one of the following is the best example of an authorization control? (a)- Biometric device (b)- Digital certificate (c)-A
    11·1 answer
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr
    14·1 answer
  • Write the definition of a function printAttitude, which has an int parameter and returns nothing. The function prints a message
    14·1 answer
  • Write a function named max that accepts two integer values as arguments and returns the value that is the greater of the two. Fo
    12·1 answer
  • Consider the following sequence of instructions:
    7·2 answers
  • Look at the top 3 banking activities done via mobile banking vs. online banking. What characteristics do you notice for both?
    9·1 answer
  • I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outs
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!