Your company has a benchmark that is considered representative of your typical applications. One of the older-model workstations does not have a floating-point unit and must emulate each floating-point instruction by a sequence of integer instructions. This older-model workstation is rated at 120 MIPS on this benchmark. A 3rd -party vendor offers an attached processor that is intended to give a hardware accelerator to your workstation. The attached processor executes each floating-point instruction on a dedicated processor, without emulation. The workstation/attached processor rates 80 MIPS on the same benchmark. The following symbols are used to answer this exercise:

I – Number of integer instructions executed on the benchmark
F – Number of floating-point instructions executed on the benchmark
Y – Number of integer instructions to emulate a float-point instruction
W – Time to execute the benchmark on the processor alone
B – Time to execute the benchmark on the processor/coprocessor combination.

Required:
a. Write an equation for the MIPS rating of each configuration using the symbols above.
b. What is the value of B?
c. What is the MFLOPS rating of the system with the coprocessor?
d. Your colleague wants to purchase the coprocessor even though the MIPS rating for the configuration using the coprocessor is less than that of the processor alone. Is your colleague’s evaluation correct?

Answers

Answer 1

Answer:

a-The equation for processor only configuration is [tex]120\times 10^6=\dfrac{I+YF}{W}\\[/tex] while that for processor and co-processor configuration is [tex]80\times10^6=\dfrac{I+F}{B}[/tex].

b-The value of B is 1.1 second.

c-The value of MFLOPS for co-processor system in configuration 2 is 80 MFLOPS.

d-The evaluation of your colleague is correct.

Explanation:

a

The MIPS rating equations are as follows

Configuration 01 (Processor only)

[tex]120\times 10^6=\dfrac{I+YF}{W}\\[/tex]

Configuration 02 (Processor + Co-processor)

[tex]80\times10^6=\dfrac{I+F}{B}[/tex]

b

From the equation, for processor and co-processor equation the value of B is calculated. For it to be calculated, the I value is calculated from the processor configuration with the following data F= 8 * 10^6 . Y= 50, W = 4 sec:

[tex]I=120\times10^6\timesW-YF\\I=(120\times10^6\times4)-(8\times10^6\times50)\\I=80\times10^6 \text{instructions}[/tex]

Using this value of I gives

[tex]B=\dfrac{I+F}{80\times10^6}\\B=\dfrac{80\times10^6+8\times10^6}{80\times10^6}\\B=\dfrac{88\times10^6}{80\times10^6}\\B=1.1\text{second}[/tex]

The value of B is 1.1 second.

c

The MFLOPS rating of configuration 2 is given as

[tex]\text{MFLOPS}=\dfrac{F}{B-\dfrac{I}{MIPS_{proc+coproc}}}\\\text{MFLOPS}=\dfrac{8\times10^6}{1.1-\dfrac{80\times10^6}{80\times10^6}}\\\text{MFLOPS}=\dfrac{8\times10^6}{1.1-1}\\\text{MFLOPS}=\dfrac{8\times10^6}{0.1}\\\text{Processor+Coprocessor MFLOPS}=80 \text{MFLOPS}[/tex]

So the value of MFLOPS for co-processor system in configuration 2 is 80 MFLOPS.

d

The value of W is 4 seconds while the value of B is 1.1 seconds. Despite being the configuration with lower MIPS, the co-processor configuration has a lower execution rate and thus the evaluation of your colleague is correct.


Related Questions

HOW TO DOWNLOAD BEAMNG DRIVE

Answers

Explanation:

Answer:

Explanation:

on what device

cmo se puede añadir amigo ??'

Answers

Answer:ok

Explanation:

what is the best plugin for subscription sites?

Answers

Answer:

Explanation:

MemberPress. MemberPress is a popular & well-supported membership plugin. ...

Restrict Content Pro. ...

Paid Memberships Pro. ...

Paid Member Subscriptions. ...

MemberMouse. ...

iThemes Exchange Membership Add-on. ...

Magic Members. ...

s2Member.

For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the recur() method using any parameter value 10 or greater.

public static int recur(int n)
{
if(n < 1)
{
return 3;
}
else
{
return recur(n / 5) + 2;
}
}

Answers

Answer:

(a): The base case: if(n<1)

(b): The recursive statement: recur(n / 5)

(c): Parameter 10 returns 7

Explanation:

Given

The above code segment

Solving (a): The base case:

The base case is that, which is used to stop the recursion. i.e. when the condition of the base case is true, the function is stopped.

In the given code, the base case is:

if(n<1)

Solving (b): The recursive statement:

The recursive statement is the statement within the function which calls the function.

In the given code, the recursive statement is:

recur(n / 5)

Solving (c): A call to recur() using 10

The base case is first tested

if (n < 1); This is false because 10 > 1

So, the recursive statement is executed

recur(n/5) +2=> recur(10/5)+2 => recur(2)+2

2 is passed to the function, and it returns 2

if (n < 1); This is false because 2 > 1

So, the recursive statement is executed

recur(n/5) +2=> recur(2/5)+2 => recur(0)+2

2 is passed to the function, and it returns 2

if (n < 1); This is true because 0 < 1

This returns 3

So, the following sum is returned

Returned values = 2 + 2 + 3

Returned values = 7

A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection contains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30% of the users were still using passwords discovered in this list. Which of the following would be the BEST combination to reduce the risks discovered?

a. Password length, password encryption, password complexity
b. Password complexity least privilege, password reuse
c. Password reuse, password complexity, password expiration
d. Group policy, password history, password encryption

Answers

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

PLEASE HELP ME FIX THIS CODE.

I WANT IT TO HAVE USER INPUT TO CHANGE AND IMAGE FILTER TO BLUE RED OR GREEN.


user_color = input("What color would you like to paint the canvas, blue, red or green?:")



def user_red(pixel):
pixel[0] = 100 + pixel[0]
pixel[1] = 100 - pixel[1]
pixel[2] = 100 - pixel[2]

return pixel

def user_green(pixel):
pixel[0] = 100 + pixel[0]
pixel[1] = 100 - pixel[1]
pixel[2] = 100 - pixel[2]

return pixel

def user_blue(pixel):
pixel[0] = 100 + pixel[0]
pixel[1] = 100 - pixel[1]
pixel[2] = 100 - pixel[2]

return pixel


def custom_filter(image, user_color):
for x in range(image.get_width()):
for y in range(image.get_height()):
pixel = image.get_pixel(x,y)
new_colors = invert_pixel(pixel)
image.set_red(x, y, new_colors[0])
image.set_green(x, y, new_colors[1])
image.set_blue(x, y, new_colors[2])



return image


def change_image():
global image
image = custom_filter(image, user_color)



timer.set_timeout(change_image, IMAGE_LOAD_TIME)

Answers

PLEASE HELP ME FIX THIS CODE.

I WANT IT TO HAVE USER INPUT TO CHANGE AND IMAGE FILTER TO BLUE RED OR GREEN.

user_color = input("What color would you like to paint the canvas, blue, red or green?:")

def user_red(pixel):

pixel[0] = 100 + pixel[0]

pixel[1] = 100 - pixel[1]

pixel[2] = 100 - pixel[2]

return pixel

def user_green(pixel):

pixel[0] = 100 + pixel[0]

pixel[1] = 100 - pixel[1]

pixel[2] = 100 - pixel[2]

return pixel

def user_blue(pixel):

pixel[0] = 100 + pixel[0]

pixel[1] = 100 - pixel[1]

pixel[2] = 100 - pixel[2]

return pixel

def custom_filter(image, user_color):

for x in range(image.get_width()):

for y in range(image.get_height()):

pixel = image.get_pixel(x,y)

new_colors = invert_pixel(pixel)

image.set_red(x, y, new_colors[0])

image.set_green(x, y, new_colors[1])

image.set_blue(x, y, new_colors[2])

return image

def change_image():

global image

image = custom_filter(image, user_color)

timer.set_timeout(change_image, IMAGE_LOAD_TIME)

who would benefit from using self-driving cars

Answers

Answer:

self independent

no need to depend on others

Answer:

Door dash employee's/Uber eat employees

would benefit from this

A train protection system automatically applies the brakes of a train if the speed limit for a segment of track is exceeded, or if the train enters a track segment that is currently signaled with a red light (i.e., the segment should not be entered). There are two critical-safety requirements for this train protection system:
The train shall not enter a segment of track that is signaled with a red light.
The train shall not exceed the specified speed limit for a section of track.
Assuming that the signal status and the speed limit for the track segment are transmitted to on-board software on the train before it enters the track segment, propose five possible functional system requirements for the onboard software that may be generated from the system safety requirements.

Answers

Explanation:

Five possible functional system requirements for the onboard software that may be generated from the system safety requirements:

software should enable the brakes to be applied instantly when the red light is signaled.speed of the train should be monitored when it's running on a segment so that it does not exceed the maximum speed limit.important for the system to examine the color displayed before a train enters a segment of the track.constant checking of the speed limit and color of the light so as to determine when the brakes should be applied. when there is a red light the system should notify/prevent the train from entering the segment.

Crop-Harvesting robots manage harvest automation, seeding, and weeding.
True
False

Answers

Answer: False

Explanation: I think there are specific robots for seeding, weeding and harvest automation. Unless its a multi purposed crop-harvesting robot I would assume it would only be related to harvesting tasks. (picking)

More info here: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7273211/

Design a class named Complex for representing complex numbers and the methods add, subtract, multiply, divide, abs for performing complex-number operations, and override toString method for returning a string representation for a complex number. The toString method returns a + bi as a string. If b is 0, it simply returns a.
Provide three constructors Complex(a, b), Complex(a), and
Complex(). Complex() creates a Complex object for number 0 and
Complex(a) creates a Complex object with 0 for b. Also provide
the getRealPart() and getImaginaryPart() methods for returning
the real and imaginary part of the complex number, respectively.
Your Complex class should also implement the Cloneable
interface.
Write a test program that prompts the user to enter two complex numbers and display the result of their addition, subtraction, multiplication, and division.
Here is the main class. It cannot be changed.
import java.util.Scanner;
public class Test {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter the first complex number: ");
double a = input.nextDouble();
double b = input.nextDouble();
Complex c1 = new Complex(a, b);
System.out.print("Enter the second complex number: ");
double c = input.nextDouble();
double d = input.nextDouble();
Complex c2 = new Complex(c, d);
System.out.println("(" + c1 + ")" + " + " + "(" + c2 + ")" + " = " + c1.add(c2));
System.out.println("(" + c1 + ")" + " - " + "(" + c2 + ")" + " = " + c1.subtract(c2));
System.out.println("(" + c1 + ")" + " * " + "(" + c2 + ")" + " = " + c1.multiply(c2));
System.out.println("(" + c1 + ")" + " / " + "(" + c2 + ")" + " = " + c1.divide(c2));
System.out.println("|" + c1 + "| = " + c1.abs());
Complex c3 = (Complex)c1.clone();
System.out.println(c1 == c3);
System.out.println(c3.getRealPart());
System.out.println(c3.getImaginaryPart());
}
}

Answers

Answer:

Explanation:

The following code is written in Java, it creates the entire complex class as requested so that it works with the main method that has been provided in the question without having to change anything in the main method. Proof of output can be seen in the attached picture below

import java.util.Scanner;

class Test implements Cloneable{

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       System.out.print("Enter the first complex number: ");

       double a = input.nextDouble();

       double b = input.nextDouble();

       Complex c1 = new Complex(a, b);

       System.out.print("Enter the second complex number: ");

       double c = input.nextDouble();

       double d = input.nextDouble();

       Complex c2 = new Complex(c, d);

       System.out.println("(" + c1 + ")" + " + " + "(" + c2 + ")" + " = " + c1.add(c2));

       System.out.println("(" + c1 + ")" + " - " + "(" + c2 + ")" + " = " + c1.subtract(c2));

       System.out.println("(" + c1 + ")" + " * " + "(" + c2 + ")" + " = " + c1.multiply(c2));

       System.out.println("(" + c1 + ")" + " / " + "(" + c2 + ")" + " = " + c1.divide(c2));

       System.out.println("|" + c1 + "| = " + c1.abs());

       Complex c3 = c1;

       System.out.println(c1 == c3);

       System.out.println(c3.getRealPart());

       System.out.println(c3.getImaginaryPart());

   }

}

class Complex implements Cloneable {

   public interface Cloneable { }

   private double realPart;

   public double getRealPart() {

       return realPart;

   }

   public void setReal(double real) {

       this.realPart = real;

   }

   private double imaginaryPart;

   public double getImaginaryPart() {

       return imaginaryPart;

   }

   public void setImaginary(double imaginary) {

       this.imaginaryPart = imaginary;

   }

   public Complex(double a, double b) {

       realPart = a;

       imaginaryPart = b;

   }

   public Complex(double a) {

       realPart = a;

       imaginaryPart = 0;

   }

   public Complex() { }

   public Complex add(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getImaginaryPart();

       double imaginary2 = comp2.getImaginaryPart();

       return new Complex(real1 + real2, imaginary1 + imaginary2);

   }

   public Complex abs() {

       double real1 = Math.abs(this.getRealPart());

       double imaginary1 = Math.abs(this.getImaginaryPart());

       return new Complex(real1, imaginary1);

   }

   public Complex subtract(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 - real2, imaginary1 - imaginary2);

   }

   public Complex multiply(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 * real2, imaginary1 * imaginary2);

   }

   public Complex divide(Complex comp2) {

       double real1 = this.getRealPart();

       double real2 = comp2.getRealPart();

       double imaginary1 = this.getRealPart();

       double imaginary2 = comp2.getRealPart();

       return new Complex(real1 / real2, imaginary1 / imaginary2);

   }

   public String toString() {

       String result;

       result = realPart + " + " + imaginaryPart + "i";

       return result;

   }

}

Which of the following is the cause of transmission impairment?
Select one:
O Frequency
O Amplitude
O Attenuation
O Phase​

Answers

Answer:

Attenuation is the cause of transmission impairment.

hope it is helpful to you

∉∉∉⊆αβ∞∞the life of me

Answers

Answer:

?

Explanation:

I honestly agree to this statement
So poetic

Python program
You are given the following text file called Mytext.txt. Write a Python function called search_file that accepts the name of the file (i.e. filename) and a string to look for in the file (i.e. mystring) as parameters. The function then looks for mystring in the file. Whenever it finds the string in a line, it saves the line number and the text for that line in a dictionary. Finally, it returns the dictionary after reading all the lines in the file and populating the dictionary with all matching line numbers and line text. If an empty string or a blank string is passed as mystring then an empty dictionary is returned.
Sample Input: search_file("Mytext.txt","python")
Sample Input: search_file("Mytext.txt","")
Contents of Mytext.txt
Python is an interpreted, high-level, programming language.
Python is dynamically typed and garbage-collected.
Python was conceived in the late 1980s.
Python 2.0, was released in 2000.
Python 3.0, was released in 2008.
The interpreters are available for many operating systems.

Answers

Answer:

The function in Python is as follows:

def search_file(filename,mystring):

my_dict = {}

count = 0

file = open(filename)

lines = file.readlines()

for line in lines:

 count+=1

 if mystring.lower() in line.lower():

  my_dict[count] = line.rstrip('\n')

return my_dict

Explanation:

This defines the function

def search_file(filename,mystring):

This initializes an empty dictionary

my_dict = {}

This initializes the number of lines to 0

count = 0

This opens the file

file = open(filename)

This reads the lines of the file

lines = file.readlines()

This iterates through the lines

for line in lines:

This increments the number line

 count+=1

This checks if the string exists in the line

 if mystring.lower() in line.lower():

If yes, the line number and the string are added to the dictionary

  my_dict[count] = line.rstrip('\n')

This returns the dictionary

return my_dict

what are the difference between bit address 7ch and byte address 7ch

Answers

so a byte address can only send  a get bytes (8 bits)

when a bit address can be more detailed as it can send a get not only bytes but bits also

-scav

What is the main fuction of command interpreter​

Answers

The command interpreter or the command-line interface is one of the ways a user can interface with the operating system. The command interpreter's main task is to understands and executes commands which it turns into system calls. The kernel is the central module of an OS.

_________________

Brainliest would be greatly appreciated!

I found this!

_________________

#SpreadTheLove

#SaveTheTrees

- Mitsu JK

Code.org lesson 8 level 5

Answers

Answer:

and?

Explanation:

an image can have only one background layer true or false​

Answers

Answer:

True

Explanation:

The background will always just be the background. You cannot blend two images together to make two background because it would be considered one background nonetheless.

the first page of a website is what?​

Answers

Answer:

index.html

Explanation:

The name of the html file for the homepage of a website is usually "index.html"

Landing page or Home page

write a complete program for the following situation related to the setting the speed of a car preset values before starting journey. . if speed is less than lower_set_speed, display the message "accelerate" to the screen, increases the cars speed to the lower set speed and output the new speed to screen .if speeds greater than upper_set_ speed, print the message "apply brake" to the new speed to the screen .Give all necessary documentation in the comments, including the file name. .allow the program to exit at the end. .output the speed to the screen. . how many different initial speeds will you need to test this code?

please help me it means a lot​

Answers

Answer:

Explanation:

Please specify which programming language this is supposed to be written in.

Without knowing that, only the last part can be answered "how many different initial speeds will you need to test this code?"

You will need to test at least 3 initial speeds: one below the lower-set-speed, one between the lower- and upper-set-speed and last one which is above the upper-set-speed.

When dragging a sheet tab to move it, the location of the _______ determines where the sheet tab will be moved.

square
line
arrow
last tab

Answers

the location of the arrow determines it

To specify the data sets you want to see for your particular user, you create or select a
d
Select one:
a. Filter
b. View
c. Switch
d. Scope

Answers

Answer:

B

Explanation:

Careers emerge solely to make profit for the industry.


False

True

Answers

Explanation:

Careers emerge solely to make profit for the industry: False

Brainliest and follow and thanks

morning dude

Which of the following best explains how an analog audio signal is typically represented by a computer?
a. An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.
b. An analog audio signal is measured as a sequence of operations that describe how the sound can be reproduced. The operations are represented at the lowest level as programming instructions.
c. An analog audio signal is measured as input parameters to a program or procedure. The inputs are represented at the lowest level as a collection of variables.
d. An analog audio signal is measured as text that describes the attributes of the sound. The text is represented at the lowest level as a string.

Answers

Answer:

A. An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.

Explanation:

I took the test

explain three main steps in mail merging (6 marks) ​

Answers

Answer:

Explanation:

The mail merging process generally requires the following steps:

Creating a Main Document and the Template.

Creating a Data Source.

Defining the Merge Fields in the main document.

Merging the Data with the main document.

Saving/Exporting.

short note about micro miniaturzation​

Answers

Answer:

the manufacture of extremely small versions of electronic devices.

Explanation:

asks

mxskssssksskwlwslskamzmzmsmsmz

def shared_motif(dna_list):
This function takes in a list of DNA strings and returns the longest common substring. A substring is a contiguous sequence of characters within a string. A common substring is a substring of every element in the given list of DNA strings. Note that the number of DNA strings in the input list is not always the same! There may be multiple solutions, but you only need to return the first one.
Example:
Sample input DNA list:
("GATTACA", "TAGACCA", "ATACA"]
The returned longest common substring:
"TA"

Answers

Answer:

Explanation:

The following code is written in Python, the function creates various nested loops to loop through each individual string comparing letter by letter in order to find the longest common substring. Finally, returning the substring itself.

def shared_motif(dna_list):

   substr = ''

   if len(dna_list) > 1 and len(dna_list[0]) > 0:

       for x in range(len(dna_list[0])):

           for i in range(len(dna_list[0]) - x + 1):

               if i > len(substr) and all(dna_list[0][x:x + i] in y for y in dna_list):

                   substr = dna_list[0][x:x + i]

   return substr

arr = ["GATTACA", "TAGACCA", "ATACA"]

stems = shared_motif(arr)

print(stems)

is the minimum level of security mechanism in a
system.
Select one:
O Baseline
O Security model
O Security policy
O Reconnaissance​

Answers

Answer:

Security policy is the minimum

Explanation:

what does this mean on a tamagotchi lol (this is the hello kitty one)

Answers

I not sure but I think it’s an apple.

I don't have that tamagotchi

But I do have 2 tamagotchi's

I think it's a cherry on your tamagotchi

Hoped this helped!

Have a wonderful day-

Create a PetStore class, a Dog class, and Cat class. Once instantiated, a PetStore should be able to take in and give out pets. The store's method for receiving pets should be called receive. This method should take a single pet object (either a Dog or Cat instance) and should add it to the store's inventory of pets. The store's method for giving out a pet should be called sell and can take no arguments. The method returns a pet when called.

Answers

Answer:

thanks to the great place

Explanation:

hottest year in hindi history and happiness and the world is not a big deal to me because I think it's a good thing for a woman who has been a good friend of yours and happiness and be happy with examples

Rick is a fan of logic-based games. However, he is bored of the classic ones, like Sudoku and Mastermind, since he has solved so many of them. Recently he found a new game in which one is given a string with some question marks in it. The objective is to replace all of the question marks with letters (one letter per question mark) in such a way that no letter appears next to another letter of the same kind.
Write a function:
def solution(riddle)
that, given a string riddle, returns a copy of the string with all of the question marks replaced by lowercase letters (a-z) in such a way that the same letters do not occur next to each other. The result can be any of the possible answers as long as it fulfils the above requirements.
Examples:
1. Given riddle = "ab?ac?", your function might return "abcaca". Some other possible results are 'abzacd", "abfacf".
2. Given riddle = "rd?e?wg??", your function might return "rdveawgab".
3. Given riddle = "????????", your function might return "codility".
Write an efficient algorithm for the following assumptions:
• the length of the string is within the range [1..100,000);
• string riddle consists only of lowercases letters (a - z) or '?';
• it is always possible to turn string 'riddle' into a string without two identical consecutive letters.
1 # you can write to stdout for debugging purposes, e.g.
2 # print("this is a debug message")
3
4 def solution (riddle):
5
6 # write your code in Python 3.6
7 pass

Answers

Answer:

The function is as follows:

import random

import string

def solution(riddle):

   s = list(riddle)

   for i in range(len(riddle)):

       alpha = "".join(random.choice(string.ascii_letters) for x in range(1))

       alpha = alpha.lower()

       if s[i] == '?':

           if i > 0 and i < len(s)-1:

               if s[i+1] != alpha:

                   s[i] = alpha

               elif s[i-1] != alpha:

                   s[i] = alpha

               else:

                   i=i

           else:

               if i == 0:

                   if s[1] != alpha:

                       s[i] = alpha

                   else:

                       i = i

               else:

                   if s[i-1] != alpha:

                       s[i] = alpha

                   else:

                       i = i

   riddle = ""

   for ele in s:

       riddle+=ele

   

   return riddle

Explanation:

See attachment for explanation where comments are used to explain some lines

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

import random

import string

def solution(riddle):

  s = list(riddle)

  for i in range(len(riddle)):

      alpha = "".join(random.choice(string.ascii_letters) for x in range(1))

      alpha = alpha.lower()

      if s[i] == '?':

          if i > 0 and i < len(s)-1:

              if s[i+1] != alpha:

                  s[i] = alpha

              elif s[i-1] != alpha:

                  s[i] = alpha

              else:

                  i=i

          else:

              if i == 0:

                  if s[1] != alpha:

                      s[i] = alpha

                  else:

                      i = i

              else:

                  if s[i-1] != alpha:

                      s[i] = alpha

                  else:

                      i = i

  riddle = ""

  for ele in s:

      riddle+=ele

  return riddle

See more about python at brainly.com/question/26104476

Other Questions
which of the following sentences uses correct punctuation?a.i am a good communicator, and i am a strong team member.b.i communicate well, i am a strong team member.c.i am a good fit for the job, i have the right experience.d.i have excellent telephone skills, i am detail oriented. Why does meiosis allow for the creation of organisms with unique characteristics Find the equation of the line shown Though unions can negotiate pay increases for their members, their actions can have unintended consequences for workers. Identify all such possible ones from the list below. It is possible that there is more than one correct answer.(a) Firms could possibly respond to unions demands for higher wages by hiring fewer workers.(b) Firms could possibly respond to unions demands for higher wages by substituting capital for labor.(c) Unions always drive down firms profits.(d) Higher rates of union membership always diminish aggregate levels of economic output. (Please Help Im blowing most of my points for this) In earthquake-prone areas, engineers design buildings that are resistant to earthquake damage. Heres a diagram of an earthquake-resistant building in Japan. Explain how features A, B, and C help protect the building from earthquake damage. In your explanation, describe how you could model each feature using marshmallows and toothpicks. Which of the following organs produce enzymes that help chemical digestion happen? A liver B small intestine C large intestine D rectum 6. Which of the following was NOT a motivation for a country to imperialize another?a. gain economic resourcesb. spread democracy and protect individual freedomsc. spread Christianityd. gain naval and military bases for trade route protection and international prestige According to the table below, what is the probability that a student chosen at random will be 16 or older? Age. 13 14. 15. 16. 17. 18Probability 0.01 0.25 0.30 0.28 0.15 0.01 A. 0.46 B. 0.83 C. 0.41 D. 0.44 What is the slope of the line shown below? (Enter your answer as a decimal ifnecessary.)(-2, 4)(4,-5) 1) How did women and minorities join in the war effort? Women:Minorities: Which country is developing urban centers most quickly?A. ChinaB. EgyptC. GermanyD. The United States How to find surface area of a triangular prism What group was created by Woodrow Wilson (although the US never joined) during the Paris Peace Conference to ensure world peace through disarmament, security, and diplomacy? Monica spanks her 3-year-old daughter as a punishment for undesirable behaviors.According to research, how might her daughter differ from her non-spanked peers bythe age of 5?Her daughter may be more obedient.Her daughter may show higher levels of aggressive behavior.Her daughter is more likely to fail.Her daughter may be more appreciative. Which describes herd instinct?O when there is a rise or expected rise in stock priceso when market trends are intensified by investors' behaviorO when a stock-market bubble developso when there is a decline or expected decline in stock prices Ahnberg Corporation had 660,000 shares of common stock issued and outstanding at January 1. No common shares were issued during the year, but on January 1, Ahnberg issued 280,000 shares of convertible preferred stock. The preferred shares are convertible into 560,000 shares of common stock. During the year Ahnberg paid $168,000 cash dividends on the preferred stock. Net income was $1,950,000.What were Ahnberg's basic and diluted earnings per share for the year? (Round your answers to 2 decimal places.) NO LINKS!!!!!! Help its urgent, PLEASE HELP!!!!!!!!!!!!!!!! Find the indication of the right triangle 2. If it costs $0.12 Per Cubic inchfor the Juice, What is the Cost for theoriginal Container ? objects made by people and can include tools, pottery, weapons, and jewlry