Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept odd numbers only. Print invalid input if given input is not valid.

Answers

Answer 1

Answer:

Bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept odd numbers only is explained below in detail.

Explanation:

Even digits at an even table and odd digits at an odd table

Given an array of size n comprising an equal number of odd and even digits. The difficulty is to manage the numbers in such an approach that all the even digits get the even table and odd digits get the odd table. The necessitated auxiliary space is O(1).

Examples :

Input : arr[] = {8, 5, 1, 12, 6, 3}

Output : 3 6 1 12 5 8

Input : arr[] = {7, 9, 10, 19, 13, 18, 21, 20, 4, 14}

Output : 18 9 10 19 20 7 14 13 4 21


Related Questions

Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goal is to convince the recipient into submitting personal information, such as passwords or bank account numbers.

Question 9 options:
True
False

Answers

Answer:

this is true

Explanation:

the answer is true

The answer is true .

4.15 LAB: Password modifier

Answers

I've included my code in the picture below. Best of luck.

The program written modifies inputted password, replacing certain characters to make it stronger. The program is written in python 3 thus ;

password = input("Set your password : ")

#accepts input from user meant for password

modified_password = ''

#initialize an empty string to hold the modified password

for val in password:

#loop through each password value

if val == 'i':

modified_password += "!"

elif val == 'a':

modified_password += ''

elif val == 'm' :

modified_password += 'M'

elif val == 'B' :

modified_password +='8'

elif val == 'o':

modified_password += '.'

else :

modified_password += val

#checks for certain values in the input and replaces them, with the output assigned to the modified password variable

print(modified_password+"q*s")

Sample run of the modified password with the string "q*s" concatenated at the end.

Learn more :https://brainly.com/question/15086326

Which of these is not an application software?
A. Control and Measurement
B. APPS
C. Spreadsheets
D. Utilities​

Answers

A; control and measurment

Answer:

D. utilities should be the answer

What will be the output of the given code?

class BookName {
public void book() {
System.out.println(“new book”);
}
}
public class Check{
public static void main(String args[]) {
BookName c1[] = new BookName [5];
for (int i = 0; i<10 ;i++) {
c1[i] = new BookName();
c1[i].book();
}
}
}

A. to print new book five times
B. to print the numeral 5 five times
C. a runtime error
D. to print new book 10times

Answers

Answer:

B

Explanation:

Type the correct answer in the box. Spell all words correctly.

Review the situation below and identify the television system in use.

Laura lives in the mountainous state of Nevada. She doesn’t receive very good television reception. She wonders whether there is a problem with her television set or the antenna she uses. Her neighbor Patsy does not have any problem with her television reception. Patsy also mentioned that she has no antenna. Patsy is possibly using a ___ television system.

Answers

Answer:

Patsy is possibly using a cable television system.

Explanation:

The cable television system is the private television service provision system that is provided not through signals captured by means of antennas, but through coaxial cables that are connected from the home to the poles belonging to the providers, located on the public road.

The advantages of wired televission are relatively high sound and image quality with a minimum of interference with the simplicity and low cost of subscriber receivers.

Spyware is malicious software installed on a computer without the owner’s knowledge. It is designed to monitor data and allow unauthorized remote access.

Question 6 options:

True

False

Answers

Answer:

True

Explanation:

PLEASE HURRY AND BE SERIOUS

Which of the following statements is true of a hierarchical addressing scheme? Check all of the boxes that apply.

It includes different parts that represent the location of a computer or device on a network.

It presents numbers in a randomized format.

It is used for IP addresses.

Answers

Answer:

It is used for IP addresses.  It includes different parts that represent the location of a computer or device on a network.

Explanation: My dad is a professional engineer

Answer:

Its A and C

Explanation:

I did it on ed2020

A manufacturer of scented candles is preparing to produce five new candles with fragrances of peppermint, cinnamon, lemon, spice pumpkin, and pine scents to sell for the holiday season. To track the sale of the new scented candles you will need to create a program that should use two parallel element arrays. An array that will hold the names of the 5 new scented candles and another array that holds the count of the 5 new scented candles that are sold over the next couple of months. The program will track the fragrance type of the candle purchased and the number of candles sold for each fragrance. The program should also generate a report that displays the fragrance type of the 1.largest number and 2.smallest number of candles sold and the 3.total sales of all candles purchased.

Answers

Answer:

Why are you asking someone to create a program

Explanation:

Declare report candle fragrance_]{459.’~

For an indirect reference, what happens if there is no list of limited values authorized for a user in the direct reference?

a. SQL Injection
b. Brute Forcing of stored encrypted credentials
c. XML Injection
d. Access to sensitive data possible

Answers

Answer: Access to sensitive data possible

Explanation:

A reference is a value that allows a particular datum to be accessed indirectly by a program.

It should be noted that when there is no list of limited values authorized for a user in the direct reference, this will lead to a possibility for an access to sensitive data. Therefore, in order for this to be prevented, there should be a list of limited values that will be authorized for a user.

The absence of a list of limited values which would restrict access to certain files or data will lead to vulnerability of sensitive data. Hence, access to sensitive data possible.

The possibility of data being assessed by an unauthorized user is very likely when there is no restriction.

The reference is supposed to be key as a key to control the level of access given to users by providing a list of limited authorized values.

Hence, when these list is absent, then, access to sensitive data possible becomes very likely.

Learn more : https://brainly.com/question/16666220

Why is body language an important indicator in business meetings? A. You will be able to communicate more strongly. B. You will know if your audience is engaged. O C. You will know how you look to your peers. O D. You will be a better oral presenter. SUB​

Answers

Answer:

you will know if your audience is engaged.

Explanation:

Answer:B

Explanation:

I just took the test

Users can customize their Windows device by going to the Control Panel under __________.

Answers

Answer:

The Settings app

Explanation:

The control panel on windows can be accessed by going into the settings app, or by going to the side bar and clicking the gear icon.

Answer:

hmmmm i would say system preferences but i may be incorrect

Explanation:

Which of the following should be implemented when there is a period of high employee turnover?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about which of the following should be implemented when there is a period of high employee turnover?

The options to this question are given below.

A review of NTLM hashes on the domain servers A review of group policies A review of user access and rights A review of storage and retention policies

The correct option to this question is-3:

A review of user access and right.

Other options are not correct because these options are not related to review when employee turnover is going high etc.

What solicits online input such as product ratings from consumers?
A qiuck response code
Computer forensics
Crowdsourcing
Or Crowdfunding?

Answers

Answer:

Crowdsourcing I think is the correct answer. "A quick response code" and "Computer Forensics" both don't make sense as answers, and Crowdfunding is specifically for money.

How is the two point formula used to find the equation of a line when 2 points are known?

Answers

y-y1=((y2-y1)/(x2-x1))(x-x1)
Here (x1,y1) and (x2,y2) are the given points
taking the change in y over the change in x

I want to make apps but I don't know how and which things I have to learn first ,so if you know mention from starting to ending​

Answers

Answer:

There are a lot to learn, especially the basics. I'd suggest using SolorLearn for this.


To identify a document as a template, you will need to change the file type in the_____ dialog box.

A. Options

B. Save As

C. References

D. Template

Answers

Answer:

A) options this is correct

Explanation:

Answer:

The answer is definitely option A

Explanation:

Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are maintaining your firewall and network security configuration correctly?

Answers

Explanation:

It is extremely important for organizations to adopt the principles of network security and firewall configuration according to the highest security parameters and requirements, because through vulnerabilities in an organization's network system, attacks by hackers and criminals can occur. they take advantage of some system failure to steal data and information, which can be detrimental to companies that may have stolen sensitive information, organizational performance data, bank account intrusion and asset theft, etc.

In order to avoid such problems, it is necessary to have a constant management of the network systems and organizational software, in order to maintain the control, prevention and security of the systems.

how i simplify this boolean expression ?A'.B'.C'+A'.B'.C+A'.B.C+A.B'.C+A.B.C

Answers

Answer:

A⁵+B⁵+C⁵

A+A+A+A+A= A⁵

B+B+B+B+B=B⁵

C+C+C+C+C= C⁵

Answer:

woah thats crazy i have no clue

im so sorry

Explanation:


1a. Ust Seven (7) Components of a Computer?
1b. Explain in Details the functions of Each one Mentioned Above
2a. What is Internet?
2b. Identity and Explain in Details the uses of internet to students of

Answers

Explanation:

1a. i know only 4 components of computer these are users, data,hardware & software

1b.users,the person who use the computer

data,it is the collection of raw facts and figures

hardware,is the physical part of the computer that can be seen and touch

software,is a set of program that instruct the computer to perform the certain action

2a,an internet is worldwide systen of interconnected computer network

2b.if some student want to now about something he can use internet and get the answer,to commenicate with others,and to learn online

What game is this ?? Helpp mee??

Answers

Answer:

GTA 5

Explanation:

What game is this??????????????????????

Answers

Answer:

rocket league

Explanation: cars and balls

_____, a quality system standard is a three-part, continuous cycle of planning, controlling, and documenting quality in an organization.

a. Seven run rule
b. ISO 9000
c. ASQ
d. Six Sigma

Answers

Answer:

b. ISO 9000

Explanation:

ISO 9000 can be defined as a quality system standard is a three-part, continuous cycle of planning, controlling, and documenting quality in an organization.

This ultimately implies that, the ISO 9000 is a set of standards that typically guides an organization in ensuring that they meet both the stakeholders and consumer requirements or needs with respect to their products and services under statutory and regulatory requirements at a specific period of time.

what could a company do if it was using a commercial wan and a vulnerability appered thst allowed attackers

Answers

Answer:

The answer is below

Explanation :

If a company was using a commercial WAN and a vulnerability appeared that allowed attackers find routing information and therefore be able to eavesdrop on corporate transmissions "It is expected that such a company should try to formulate and establish Virtual Private Networks between corporate sites.

This will ultimately lead to intercepted transmissions to be unreadable. Though such means have been seen as time-consuming."

Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets to num_tickets

Answers

Solution :

function tickets(user_tickets){

var num_tickets;

if (user_tickets < 5) {

num_tickets = 1;

return ('num_tickets: '+ num_tickets);

}

else {

num_tickets = user_tickets;

 return('num_tickets: '+ num_tickets);

}

}

// Testing the tickets function

// With user_tickets = 3, 5, 8, and 1

console.log(tickets(3));

console.log(tickets(5));

console.log(tickets(8));

console.log(tickets(1));

write an if statement to Test if a number stored in y is between 6 and 10 inclusive. only an if statement.

Answers

y = whatever value you want

if 5 < y < 11:

   print("Your number is between 6 and 10")

__init__(self, features, phones): create/initialize instance variables for features and the list of phones (optional) in the plan. When phones is not provided, use an empty list as its initial value. Create an instance variable

Answers

Answer:

class Phone(object):

   def __init__(self, features, phones=[]):

       self.features = features

       self.phones = phones

Explanation:

In python object-oriented programming, an instance variable of a class object is created in the "__init__()" method. the "self" is a convention name used to represent the instance of an object class. The input values are assigned to the object variable with the self.'argument_name' statement.

When the phone argument is not given, the self.phones variable is initialized as an empty list.  

What do people do when they navigate using GPS

Answers

Answer:

they use  it when they are driving and when they dont know where they are doing

Explanation:

GPS or also known as Global Positioning System. It helps people locate and locate locations. Many people are using it for navigation.

What would give Lucy, an entry-level candidate, an edge over others while she seeks a programmer’s position? Lucy, an entry-level candidate, is looking for her first job. Lucy has a high GPA in her college transcripts, skill using a multitude of software, and skills in many extracurricular activities. She completed an internship at a reputed IT organization while she was at college. Her portfolio contains many self-made programs.

Answers

Answer:

She completed an internship at a reputed IT organization while she was at college.

Explanation:

Based on her accomplishments the one aspect that would give her an advantage and set her apart from the competition would be that she completed an internship at a reputed IT organization while she was at college. Having done this means that she gained extremely valuable and recognized work-place experience that would be extremely valuable to any IT company looking to hire someone. Her other traits are all things that every individual applying for such a position must have including the portfolio of self-made programs.

Out-of-order instruction execution can cause problems because a later instruction may depend on the results from an earlier instruction. This situation is known as a ______ or a________

a. risk, reliance
b. hazard, reliance
c. risk, dependency
d. hazard, dependency

Answers

Answer:

C

Explanation:


This the code from the last post I did

Answers

import java.util.Scanner;

public class JavaApplication86 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       int x = 0, c = 0, sum = 0;

       while (true){

           x = scan.nextInt();

           System.out.println("You entered: "+x);

           if (x == -1){

               break;

           }

           sum += x;

           c++;

       }

       System.out.println("The sum is "+sum);

       System.out.println("You entered "+c +" numbers");

   }

   

}

This works for me. Instead of subtracting one from c and adding one to sum, I used an if statement to break away from the while loop if the entered number is -1.

Other Questions
Please helpp anyone Which of the following helped the Qin Dynasty unite China?A. They created a mail service.B. They required all people to worship a single god.C. They gave more power to local rulers.D. They developed standardizing writing. Hey guys!! What is your ethnicity?? What is the remainder when 3x27x+5 is divided by x+5? The plague broke out in London and the people ran away in panic . ( Change it in simple sentence from Compound ) pls answer correctly Read the following selection from Act II of Romeo and Juliet. What does the word in bold most likely mean? (10 points)FRIAR LAURENCEBut come, young waverer, come, go with me,In one respect I'll thy assistant be;For this alliance may so happy prove,To turn your households' rancour to pure love.Bolded- rancourSadness or miseryHappiness or funFriendship or loveHostility or anger 1/2 dived by what equlels 4 Plz HelpWhich of the following sentences would a proofreader need to correct?According to statistics from the International Alliance of Zoos, only three other zoos in the world have successfully birthed polar bear cubs in captivity.Giving birth to polar bear cubs in captivity is very difficult. Says zoo director MikeWilliams. So, were very excited by this prospect.The population of the Metropolitan Zoo is increasing by two, zoo officials told reporters on Tuesday.According to zoo officials, the baby polar bears are expected to arrive just in time for Christmas. Read the sentence and choose the option with the correct verb in the future tense.HELP ASAP PLEASE!Esta noche, Pedro ________ gallina para la cena. comer comern cocinar cocinarn Identify some objects which are copied fromnature like real objects but not their essence andnatural characteristics. Explain your answer. Which of these is a commonly abused prescription? opiate pain relievers heroin ecstasy motion sickness pills What is something that you would find so valuable that you would search the unknown regions of the world in order to find it? A trait such as having a crooked thumb is produced by a (n) How has air conditioning changed the economic activities of the subregions of the United States? Think about: the South and the West the rust belt and the sunbelt Molly had 6 or 33% robins in her yard. Does she need to find a percent, part or whole y varies directly with x. When y = 16, X = 80. What does y equal when x = 125?a.) 50b.) 25c.) 15d.) 20 Who was the leading sculptor in the Italian Neoclassical Revival? Renaldo bicycles long distances, and he has a steady speed. He can ride 126 kilometers in 9 hours. what is the rate of kilometers he can ride in 1, 2, 3, 4, 5 and 6 hours. Solve using EQUATIONS (with step by step explanation)3x+y=-9y=5x+7 Question 5/10Choose the statement that is true about healthinsurance.You do not need health insurance if you do not havea full time job.You don't need health insurance if you are youngand healthy.You don't need health insurance if you are underage 26.You should always have health insurance,regardless of your circumstances.