The max nukber of elements visited will be 6.
What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a disk
Answer:
current disk queue length
Explanation:
help this poped up on my pc im on my laptop what does it mean HELP rC % M i \g e - A u t o M e r g e d - b a s e ~ 3 1 b f 3 8 5 6 a d 3 6 4 e 3 5 ~ a m d 6 4 ~ ~ 1 0 . 0 . 1 0 2 4 0 . 1 6 3 8 4 . c a t rC % M i c r o s o f t - W i n d o w s - C l i e n t - F e a t u r e s - P a c k a g e - A u t o M e r g e d - n e t ~ 3 1 b f 3 8 5 6 a d 3 6 4 e 3 5 ~ a m d 6 4 ~ ~ 1 0 . 0 . 1 0 2 4 0 . 1 6 3 8 4 . c
Explain methods of managing digital databases including permission marketing and the application of suppressions/opt-outs
The steps to manage a database management system are
State or define your needs.Form a Shortlist. Look into your options. Implement your Software. Keep Your Database.What is opt-out?The Opt-out method is known to be often used in permission marketing as it is in the case where a user is said to leaves a mailing list or a website.
Therefore, The steps to manage a database management system are
State or define your needs.Form a Shortlist. Look into your options. Implement your Software. Keep Your Database.Learn more about database management from
https://brainly.com/question/24027204
#SPJ1
The goal of this task is to perform a web crawl on a URL string provided by the user. From the crawl, you will need to parse out all of the images on that web page and return a JSON array of strings that represent the URLs of all images on the page. [Jsoup](https://jsoup.org/) is a great basic library for crawling and is already included as a maven dependency in this project, however you are welcome to use whatever library you would like.
Required Functionality
We expect your submission to be able to achieve the following goals:
- Build a web crawler that can find all images on the web page(s) that it crawls.
- Crawl sub-pages to find more images.
- Implement multi-threading so that the crawl can be performed on multiple pages at a time.
- Keep your crawl within the same domain as the input URL.
- Avoid re-crawling any pages that have already been visited.
Extra Functionality
No individual point below is explicitly required, but we recommend trying to achieve the following goals as well:
- Make your crawler "friendly" - try not to get banned from the site by performing too many crawls.
- Try to detect what images might be considered logos.
- Show off your front-end dev skills with Javascript, HTML, and/or CSS to make the site look more engaging.
- Any other way you feel you can show off your strengths as a developer ????
PLEASE do not send us a submission with only a basic JSoup crawl and only a couple lines of code.** This is your chance to prove what you could contribute to our team.
Your project will be due exactly 48 hours after you receive this project. To submit, zip up your project (`imagefinder.zip`) and email it back to me. **Please include a list of URLs that you used to test in your submissions.** You should place them in the attached `test-links.txt` file found in the root of this project.
Structure
The ImageFinder servlet is found in `src/main/java/com/eulerity/hackathon/imagefinder/ImageFinder.java`. This is the only provided Java class. Feel free to add more classes or packages as you see fit.
The main landing page for this project can be found in `src/main/webapp/index.html`. This page contains more instructions and serves as the starting page for the web application. You may edit this page as much as it suits you, and/or add other pages.
Finally, in the root directory of this project, you will find the `pom.xml`. This contains the project configuration details used by maven to build the project. If you want/need to use outside dependencies, you should add them to this file.
Running the Project
Here we will detail how to setup and run this project so you may get started, as well as the requirements needed to do so.
Requirements
Before beginning, make sure you have the following installed and ready to use
- Maven 3.5 or higher
- Java 8
Setup
To start, open a terminal window and navigate to wherever you unzipped to the root directory `imagefinder`. To build the project, run the command:
>`mvn package`
If all goes well you should see some lines that ends with "BUILD SUCCESS". When you build your project, maven should build it in the `target` directory. To clear this, you may run the command:
>`mvn clean`
To run the project, use the following command to start the server:
>`mvn clean test package jetty:run`
You should see a line at the bottom that says "Started Jetty Server". Now, if you enter `localhost:8080` into your browser, you should see the `index.html` welcome page! If all has gone well to this point, you're ready to begin!
## Submission
When you are finished working on the project, before zipping up and emailing back your submission, **PLEASE RUN ONE LAST `mvn clean` COMMAND TO REMOVE ANY UNNECESSARY FILES FROM YOUR SUBMISSION**. Please also make sure to add the URLs you used to test your project to the `test-links.txt` file. After doing these things, you may zip up the root directory (`imagefinder`) and email it back to us.
## Final Notes
- If you feel you need more time to work, you are free to ask for it.
- If you are having any trouble, especially with the setup, please reach out and we will try to answer as soon as we can.
- The ideas listed above on how to expand the project are great starting points, but feel free to add in your own ideas as well.
- Try to follow some good-practice principles when working on your code, such as meaningful and clean variable/method names and other good coding practices.
- The code we have provided is to allow you to hit the ground running. You are free to use whatever web service you would like (as long as you use Java 8 and it is runnable from the command line).
- We look forward to seeing what you can do, so good luck and have fun
The goal of this task is to perform a web crawl on a URL string provided by the user by the Add one or numerous URLs to be visited.
What is a multithreaded internet crawler?The internet crawler will make use of a couple of threads. It may be capable of moving slowly all of the precise internet pages of a website. It may be capable of documenting again any 2XX and 4XX links. It will take withinside the area call from the command line. It will keep away from the cyclic traversal of links.
Here are the primary steps to construct a crawler:
Step 1: Add one or numerous URLs to be visited.
Step 2: Pop a hyperlink from the URLs to be visited and upload it to the Visited URLs thread.
Step 3: Fetch the page's content material and scrape the records you are interested by with the ScrapingBot API.
Read more about the web:
https://brainly.com/question/14680064
#SPJ1
Choose the correct order for the process of a user attempting to access network resources: 1. network protocol 2. application 3. network client 4. nic driver
Answer:
2, 3, 1, 4
Explanation:
Why do people take off the keys on the school computers
Answer:
is this supposed to be a joke-
Explanation:
cuz i dont get it
which one of the following will reach every element in the array a? 1. for(int i = 0; i <= a.length; i++) 2. for(int i = 0; i < a.length; i++) 3. for(int i = 1; i <= a.length; i++) 4. for(int i= 1-1 ; i < a.length; i++)
Answer:
You can simplify the problem down by recognizing that you just need to keep track of the integers you've seen in array that your given. You also need to account for edge cases for when the array is empty or the value you get would be greater than your max allowed value. Finally, you need to ensure O(n) complexity, you can't keep looping for every value you come across. This is where the boolean array comes in handy. See below -
public static int solution(int[] A)
{
int min = 1;
int max = 100000;
boolean[] vals = new boolean[max+1];
if(A.length == 0)
return min;
//mark the vals array with the integers we have seen in the A[]
for(int i = 0; i < A.length; i++)
{
if(A[i] < max + 1)
vals[A[i]] = true;
}
//start at our min val and loop until we come across a value we have not seen in A[]
for (int i = 1; i < max; i++)
{
if(vals[i] && min == i)
min++;
else if(!vals[i])
break;
}
if(min > max)
return max;
return min;
}
PYTHON!
Build a simple restaurant program by serving this menu to the customer:
1. Muffin of the Day
2. Bagel and Cream Cheese
3. Granola, Fruit, and Yogurt
4. Steel Cut Oat with Fruits
5. exit.
===========================================================
requirements:
1. Create 4 classes for each course.
2. Each course will be having ingredients as their Attribute of class. example: Muffin - egg,oil,sugar.
3. First function of the course's menu is printing the steps of making the course by putting it into
functions. (you will just need "print statement" at least).
4. Second function of the course's menu is printing "Dish is served".
5. (you can add more functions for more points of the program).
6. Show the menu to the customer as long as they don't choose menu number 5.
7. When the customer choose a course, build the object and call all the functions that you built.
The efficiency, effectiveness, clarity, completeness and neatness of the program will be assessed.
Answer:
hi Po konbanwa sayo I'm pilipino I'm live in philippines
What are the method to decrease friction?
Answer: For objects that move in fluids such as boats, planes, cars, etc the shape of their body is simplified in order to reduce the friction between the body of the objects and the fluid.
By polishing the surface, polishing makes the surface smooth and friction can be reduced.
Using lubricants such as oil or grease can reduce the friction between the surfaces.
When objects are rolled over the surface, the friction between the rolled object and the surface can be reduced by using ball bearings.
Explanation:
Which file format produces a lock-down version of an access database? accdb accdb-be accde accdb-e
The file format that produces a lock-down version of an access database is called; ACCDE
How to Identify Access Database?ACCDB files are the default Microsoft Access database format in Access 2007 and later versions while the ACCDE format is a read-only, compressed version.
Now, the file format that produces a lock down version of an access database is called ACCDE file which is a Microsoft Access Execute Only Database file used to protect an ACCDB file.
Read more about Access Database at; https://brainly.com/question/9745438
#SPJ1
which of the following is an output device ?
Answer:
a mouse
a keyboard
Explanation:
those are things that require human interaction with before any thing can appear on the screen of the computer
3 Select all the correct answers. Ana is creating a list of SMART goals. Which aspects should she pay attention to? The goal's success rate is at least 50%. The goal should be relevant to her career plan. The goal's success rate is more than 50%. The goal should be attainable within a given time frame. The goal to be attained should not be time bound. Jhy Reset Next
Ana is creating a list of SMART goals the aspects should she pay attention to are The goal should be relevant to her career plan.,The goal's success rate is more than 50% and. The goal should be attainable within a given time frame.
What are the examples?The intention of turning into an excessive college math trainer is well-defined. Measurable: Success may be measured via way of means of the range of applications, interviews and activity offers. Achievable: The intention-setter may have the precise diploma for the activity.
The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound. Defining those parameters as they pertain to your intention allows for making sure that your goals are manageable within a sure time frame.
Read more about the SMART goals.:
https://brainly.com/question/8986181
#SPJ1
If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attempt to resend the data and avoid another collision
Explanation:
Both station will retract their data. They will wait a random amount of time before sending out data again. This lessens the chance of collision again.
The entities on which data are collected are _____.
Answer:
The entities on which data are collected is known as variables.
Explanation:
Question 4 of 25
in which situation would modular design be least beneficial for a game
program?
a. the program is extremely simple.
b. the programmer wants each task to be unique.
c. the program has many different parts.
d. the programmer is concerned about errors.
A situation which modular design would be least beneficial for a game program is: A. the program is extremely simple.
What is modular design?Modular design can be defined as a software development technique that involves the separation of the overall functionality of a software into independent and interchangeable software sections or modules.
Also, modular design can be used to break a large code in a software into smaller blocks holding specific functions.
In this context, we can infer that modular design would be least beneficial for a game program when the software program is extremely simple.
Read more on modular design here: https://brainly.com/question/14192464
#SPJ1
Answer:
A. the program is extremely simple.
Explanation:
“How does revenue affect profit. How do expenses affect profit
Answer:
Profit depends on a simple formula: revenue minus expenses. The amount that your business ultimately earns is equal to the amount you have made in exchange for products or services minus the amount you have spent to keep your business running.
As a general rule, an increase in any type of business expense lowers profit. Operating expenses are only one type of expense that reduces net sales to reach net profit.
Explanation:
What does data warehousing allow organizations to achieve?
What does data warehousing allows organizations to collect only the current day's data from their various databases.
What is the role of Data warehousing?The role of data helps to boast the the speed and efficiency of accessing a lot of data sets in an organization.
What does data warehousing allows organizations to collect only the current day's data from their various databases.
Learn more about Data warehousing from
https://brainly.com/question/25885448
#SPJ1
With the advent of _____ that stored the games and could be interchanged in the console, users were no longer limited to a set number of games, leading many video game console makers to switch their emphasis to producing games
Answer:
game cartridges
Explanation:
what is a sub folder in ICT
Answer:
A sub folder is a folder within a folder.
Explanation:
A subfolder on a computer is a folder inside of another folder. For example, someone may create a main folder for their music and then create subfolders to separate the genres of music.
Additionally, "sub" prefix means "under" or within.
Hope this helps.
Answer:
It's folder that is created from the main folder.
How many pages is 1500 words double spaced 12 font?.
Answer:
1-2 pages
Explanation:
privacy principles need to be balanced against the ___ benefit that comes from the automated collection of private information. select 2 options.
corporate
political
ethical
societal
financial
The privacy principles need to be balanced against the corporate
the political benefit that comes from the automated collection of private information.
What is the privateness coverage of the employer?A privateness coverage is a file that explains how an employer handles any consumer, consumer or worker records accumulated in its operations. Most websites make their privacy guidelines to be had to web website online visitors.
The greater glad clients are, the longer they live with a business enterprise and offer sufficient enterprise to make certain increase and profitability. While setting collectively techniques for higher consumer service, a business enterprise ought to make certain that the stability among consumer expectancies and enterprise desires is maintained sustainably.Read more about the information:
https://brainly.com/question/25689052
#SPJ1
What sound(s) will you hear when this program is run
A. Just “meow”
B. A “Moo” and a “Baa”
C. Two “Moos” and three “Baas”
D. A “Moo” a “Baa” and “Hello”
"The actual use and implementation of computer started after third generations". Justify this statement in your own words.
Answer: The computers of third generation used IC which replaced transistors. Now' the computers were more faster ,smaller and reliable so people started to use them often for many purposes ..So the actual use and implementation of computer started after third generations
What does business informWhat does business information management do?
A.
identify information requirements for coworkers
B.
identify information requirements for different management levels
C.
create project plans for the project management team
D.
produce sales turnover summary for the sales professionals
E.
create financial documents for the finance departmentation management do?
Answer:
B) identify information requirements for different management levels
Explanation:
Business information management is based off of identifying the needs of a company. (This is also a plato answer)
Use the svd() function in matlab to compute a, the rank-1 approximation of a. clearly state what a, is, rounded to 4 decimal places. also, compute the root-mean square error (rmse) between a and a.
a=[1 2 2]
[ 3 4 5]
[ 6 7 8]
Using the knowledge in computational language in C code it is possible to write a code that organizes and calculates the value of the matrix of A*A and that is in up to 4 decimal places.
Writing the code in C is possible:
A=[1 2 2;3 4 5;6 7 8];
[u ,s ,v] = svd(A);
k = 1;
A1 = u(:,1:k)*s(1:k,1:k)*v(:,1:k)'; %'
RMSE = rms(sqrt(mean((A - A1).^2)))
See more about C code at brainly.com/question/17544466
#SPJ1
Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original material
Non-linear editing can cause modification in the original video whereas editing and re-edit and re-edit again can cause the video to be less true than the original material.
What is non-linear editing?In non-linear editing, the editor can do any operation with the video like adding or removing any frame without starting from the beginning.
It's been characterized as a ‘cut and paste’ technique that can really innovate how video makers approach videography.
Therefore Non-linear editing can cause modification in the original video whereas editing and re-editing and re-editing again can cause the video to be less true than the original material.
To know more about non-linear editing follow
https://brainly.com/question/15614247
#SPJ4
What does a primary key allow a user to do in a database?
PLEASE HELP
A primary key is the field (or fields) that is often employed to specifically identify each record in a table.
What is the role of this key?The Primary key is known to be the key that helps a user to be able to form a specific identifier for each row in one's table.
Note that it helps a person to link your table to other tables and as such, a primary key is the field (or fields) that is often employed to specifically identify each record in a table.
Learn more about primary key from
https://brainly.com/question/12001524
#SPJ1
Answer: its A
Explanation:
Artificial intelligence (ai) in perspective is a complex and interdisciplinary field that involves several specialties, including:
Artificial intelligence (ai) in perspective is a complex and interdisciplinary field that involves several specialties, including Interdisciplinary research diploma applications integrate or greater conventional educational guides of have a look at right into a greater personalized major.
What is Interactions among AI Artificial intelligence?Interactions among AI Artificial intelligence and schooling is but some other instance of interdisciplinarity in AI (Oudeyer et al., 2016), that may immediately gain now no longer best the 2 fields, schooling and AI, however society and productiveness as a whole.
Interdisciplinary research diploma applications integrate or greater conventional educational guides of having a look at right into a greater personalized major. Unlike a liberal arts diploma wherein you'll have a look at an extensive type of subjects, an interdisciplinary diploma lets in college students to discover a greater centered subject matter that crosses into more than one field.Read more about the interdisciplinary :
https://brainly.com/question/25955559\
#SPJ1
Disadvantages of the divisional organization structure are _____. each division is able to operate independently from the parent company each division is able to operate independently from the parent company cheap to operate cheap to operate cannot share resources with other divisions cannot share resources with other divisions more expensive to operate more expensive to operate
Answer:
Disadvantages:
1. A division may feel separated from the parent company because it has too much independence
2. This feeling of separation may lead to the division only worrying about meeting it's goals and objectives and not the companies as a whole
3. This system may be more expensive to operate and cannot share resources with other divisions
Explanation:
Explain different characteristics of computer?
[tex]\huge\purple{Hi!}[/tex]
The characteristics of computer are speed, accuracy, reliability, Automaticon, Memory
Speed=A computer works with much higher speed and accuracy compared to humans while performing mathematical calculations. Computers can process millions (1,000,000) of instructions per second. The time taken by computers for their operations is microseconds and nanoseconds.
Accuracy=Computers perform calculations with 100% accuracy. Errors may occur due to data inconsistency or inaccuracy.
Reliability=A computer is reliable as it gives consistent result for similar set of data i.e., if we give same set of input any number of times, we will get the same result.
Automation=Computer performs all the tasks automatically i.e. it performs tasks without manual intervention.
Memory=A computer has built-in memory called primary memory where it stores data. Secondary storage are removable devices such as CDs, pen drives, etc., which are also used to store data.