Description
I don't know how to find the answer. If someone can give me an explanation on this, that would be greatly appreciated.
Unformatted Attachment Preview
CS177 Spring 2015
Midterm 2 - Page 2 of 19
1. What is the output of the following Python program?
def myFunc ( matrix ) :
x = matrix [ 0 ] [ 0 ]
for i in range ( len ( matrix ) ) :
for j in range ( len ( matrix [ 0 ] ) ) :
i f i == j and x < matrix [ i ] [ j ] :
x = matrix [ i ] [ j ]
print ( x )
matrix = [ [ 5 , 0 ,
[7 , 0 ,
[3 , 4 ,
[1 , 2 ,
myFunc ( matrix )
A. 0
B. 1
C. 11
D. 17
E. 20
10 , 2 0 ] ,
17 , 3 ] ,
9 , 15] ,
6, 11]]
April 02, 8pm-9pm
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Excellent! Definitely coming back for more study materials.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Code for 2D Shapes in Modern OpenGL Project
In this assignment, you will create commented code for 2D shapes in modern OpenGL.
If you encounter any challenges while c ...
Code for 2D Shapes in Modern OpenGL Project
In this assignment, you will create commented code for 2D shapes in modern OpenGL.
If you encounter any challenges while completing this assignment, be sure to post your questions or issues to the General Questions discussion. It is essential to ask for help when you need it and successfully complete each activity, as the course will continue to build on earlier learning as your skills progress.
Prompt
Before you begin, be sure to review the module resources for this week’s topics. Then, if you have not done so already, navigate to the CS 330 folder in GitHub. From there, download the ZIP file containing all of the items within this folder, including assignment tutorials for Module Two through Module Six. There are two essential parts to these tutorials: the markdown (MD) files that walk you through how to work with different OpenGL capabilities, and the solution (SLN) file that contains all the code for each section of the tutorials. On your own machine, open the solution (SLN) file in Visual Studio and navigate to the Module Two tutorial sections in the Solution Explorer. While you may open the markdown (MD) file using an external text-based program, we recommend you instead follow along with the Module Two Tutorial in GitHub so it is easier to review the different sections, code, and supporting images. Going through all the sections in the tutorial and attempting the embedded exercises will help you practice the skills you will need to demonstrate in this assignment.
Once you understand the content in the tutorial, you will begin this assignment by opening a new Visual Studio project that has all the libraries set up correctly (which you learned how to do in the previous module). The goal of this assignment is to write commented modern OpenGL code that creates two right-angle triangles.
Specifically, you must address the following rubric criteria:
Create code to address the required functionality. The work you complete in OpenGL must meet the required functionality and visual representation that are outlined for this particular topic. Achieving this result may require multiple attempts or the application of programming strategies, but that is okay! Working in iterations is an important part of any coding project. You may also wish to refer back to relevant sections of this week’s tutorial for further guidance or review.
Apply logic and proper syntax to code. Source code should be free of logical or syntax errors that prevent the application from running as expected. You will be given credit for code that is well on its way to meeting specifications or solving the problem.
Apply commenting and formatting standards to facilitate understanding of the code. All code should be well commented. This is a practiced art that requires clarity and concision. Your comments should explain the purpose of lines or sections of the code and may also include the method you used to achieve a specific task in the code. Be sure to document any sections of code that are producing errors or incorrect results. Also, all code should be organized to meet formatting standards.
2 pages
Protecting Organizational Assets From Malicious Attacks
Determining the exact security requirements for an enterprise is essential for setting and implementing appropriate securi ...
Protecting Organizational Assets From Malicious Attacks
Determining the exact security requirements for an enterprise is essential for setting and implementing appropriate security measures. Such measures ...
3 pages
Part 1 Nitesha
In your own words, define the following elements of thought: (a) question at issue, (b) inferences, (c) point of view, and ...
Part 1 Nitesha
In your own words, define the following elements of thought: (a) question at issue, (b) inferences, (c) point of view, and (d) implications. Provide a ...
Rasmussen College ACA: Is Health Care a Right or Privilege? Paper
Few would argue against the notion that health care is a service most Americans need. After the rollout of the Affordable ...
Rasmussen College ACA: Is Health Care a Right or Privilege? Paper
Few would argue against the notion that health care is a service most Americans need. After the rollout of the Affordable Care Act (ACA), one central question that came up for national debate was whether access to health care was a fundamental right or whether it was a privilege.In a 1-2 page paper, written in APA format, address the following:Explain at least three (3) of the most common reasons why all Americans don't have access to health care in the United States even after the ACA.Express your opinion about whether you think access to health care is a right or privilege. Explain your reasoning and provide references as needed to support your opinion.
Computer Forensic
Scenario: You have been called into investigate an employee at your company for misusing company computers, stealing other ...
Computer Forensic
Scenario: You have been called into investigate an employee at your company for misusing company computers, stealing other employee's identity's and allegedly running a side-business. He uses an old Windows 7 system with the user-id of "Anybody". Using the virtual PC given to you as the suspect's computer and what you've learned in class so far, you should conduct an investigation on the live computer. You can use any of the tools/applications on the PC, but cannot download any others. (Reminder, there is no Internet Access in this segregated environment.) Gather and document as much evidence as you can from the target PC. Since this is an internal employee issue, you don't need to worry about search warrants or potentially corrupting evidence. You just need to generate a report for his manager and the HR director.
For this assignment, you need to create a professional report on what you have found. Place your answers, findings, and screenshots in a Word compatible file with proper attention to writing, grammar, punctuation, and spelling.
North Central Texas College Enterprise Risk Management Paper
At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be lead ...
North Central Texas College Enterprise Risk Management Paper
At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. Assignment:Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization's goals and objectives. In your final research project for the course, your task is to write a minimum of a 3 page paper discussing the following concepts:Introduction - What is an ERM?Why Should an Organization Implement an ERM Application?What are some Key Challenges and Solutions to Implementing an ERM?What is Important for an Effective ERM?Discuss at least one real organization that has been effective with implementing an ERM framework/application.Conclusion – Final thoughts/future research/recommendationThe paper needs to be minimum of 3 pages long, NOT including the title page and a references page (for a total of minimum 5 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet the following requirements:Be minimum of 3 pages in length, not including the required cover page and reference page.Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course, the course textbook, and at least FIVE scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Similar Content
Mixed Method Designs Cyber Security Paper
What is a mixed-methods study? What are the general advantages of conducting a mixed-methods study, rather than two or mor...
Cloud Computing Level Wise Issues
Q. Throughout the reading materials, there are references to security as it pertains to public and private cloud models. C...
Please answer questions regarding technology's effects on society
Mobile devices, the Internet, and other technologies have made a large impact on the daily lives of people all over the wo...
logistic regression
Part A on GLM: Please work on the same Example -Rats Survival Dataset in the R library(survival) (See pp. 219-224 ...
Cyber Terrorism and Weapons of Cyber Warfare Discussion
Using the Web or other resources, research an example of Cyber Terrorism.
Write a brief Discussion describing the terroris...
APUS Wireless Networking Greater Mobility for Doctors and Nurses Case Study
Good morning class, how is everyone? For starters, I would like to say Happy
New Year to all. My name is Aubrea and I’m ...
Security Evaluation Project
Procedural protocols for investigating certain crimes are normally given to a partnerships. Similarities would include tha...
Two Factpor 30575914
1. Calculation of the worth of information in a business depends on the types of information assets used and the organizat...
Main Post
I chose the video, “Everything around you can become a computer” as it is no less than my childhood dream becoming a r...
Related Tags
Book Guides
The Restless Wave
by John McCain
The Sixth Extinction An Unnatural History
by Elizabeth Kolbert
Faust
by Johann Wolfgang von Goethe
Silas Marner
by George Eliot
The Underground Railroad
by Colson Whitehead
Communist Manifesto
by Karl Marx
Too Much and Never Enough
by Mary L. Trump
Siddhartha
by Hermann Hesse
Othello
by Wiliam Shakespeare
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Code for 2D Shapes in Modern OpenGL Project
In this assignment, you will create commented code for 2D shapes in modern OpenGL.
If you encounter any challenges while c ...
Code for 2D Shapes in Modern OpenGL Project
In this assignment, you will create commented code for 2D shapes in modern OpenGL.
If you encounter any challenges while completing this assignment, be sure to post your questions or issues to the General Questions discussion. It is essential to ask for help when you need it and successfully complete each activity, as the course will continue to build on earlier learning as your skills progress.
Prompt
Before you begin, be sure to review the module resources for this week’s topics. Then, if you have not done so already, navigate to the CS 330 folder in GitHub. From there, download the ZIP file containing all of the items within this folder, including assignment tutorials for Module Two through Module Six. There are two essential parts to these tutorials: the markdown (MD) files that walk you through how to work with different OpenGL capabilities, and the solution (SLN) file that contains all the code for each section of the tutorials. On your own machine, open the solution (SLN) file in Visual Studio and navigate to the Module Two tutorial sections in the Solution Explorer. While you may open the markdown (MD) file using an external text-based program, we recommend you instead follow along with the Module Two Tutorial in GitHub so it is easier to review the different sections, code, and supporting images. Going through all the sections in the tutorial and attempting the embedded exercises will help you practice the skills you will need to demonstrate in this assignment.
Once you understand the content in the tutorial, you will begin this assignment by opening a new Visual Studio project that has all the libraries set up correctly (which you learned how to do in the previous module). The goal of this assignment is to write commented modern OpenGL code that creates two right-angle triangles.
Specifically, you must address the following rubric criteria:
Create code to address the required functionality. The work you complete in OpenGL must meet the required functionality and visual representation that are outlined for this particular topic. Achieving this result may require multiple attempts or the application of programming strategies, but that is okay! Working in iterations is an important part of any coding project. You may also wish to refer back to relevant sections of this week’s tutorial for further guidance or review.
Apply logic and proper syntax to code. Source code should be free of logical or syntax errors that prevent the application from running as expected. You will be given credit for code that is well on its way to meeting specifications or solving the problem.
Apply commenting and formatting standards to facilitate understanding of the code. All code should be well commented. This is a practiced art that requires clarity and concision. Your comments should explain the purpose of lines or sections of the code and may also include the method you used to achieve a specific task in the code. Be sure to document any sections of code that are producing errors or incorrect results. Also, all code should be organized to meet formatting standards.
2 pages
Protecting Organizational Assets From Malicious Attacks
Determining the exact security requirements for an enterprise is essential for setting and implementing appropriate securi ...
Protecting Organizational Assets From Malicious Attacks
Determining the exact security requirements for an enterprise is essential for setting and implementing appropriate security measures. Such measures ...
3 pages
Part 1 Nitesha
In your own words, define the following elements of thought: (a) question at issue, (b) inferences, (c) point of view, and ...
Part 1 Nitesha
In your own words, define the following elements of thought: (a) question at issue, (b) inferences, (c) point of view, and (d) implications. Provide a ...
Rasmussen College ACA: Is Health Care a Right or Privilege? Paper
Few would argue against the notion that health care is a service most Americans need. After the rollout of the Affordable ...
Rasmussen College ACA: Is Health Care a Right or Privilege? Paper
Few would argue against the notion that health care is a service most Americans need. After the rollout of the Affordable Care Act (ACA), one central question that came up for national debate was whether access to health care was a fundamental right or whether it was a privilege.In a 1-2 page paper, written in APA format, address the following:Explain at least three (3) of the most common reasons why all Americans don't have access to health care in the United States even after the ACA.Express your opinion about whether you think access to health care is a right or privilege. Explain your reasoning and provide references as needed to support your opinion.
Computer Forensic
Scenario: You have been called into investigate an employee at your company for misusing company computers, stealing other ...
Computer Forensic
Scenario: You have been called into investigate an employee at your company for misusing company computers, stealing other employee's identity's and allegedly running a side-business. He uses an old Windows 7 system with the user-id of "Anybody". Using the virtual PC given to you as the suspect's computer and what you've learned in class so far, you should conduct an investigation on the live computer. You can use any of the tools/applications on the PC, but cannot download any others. (Reminder, there is no Internet Access in this segregated environment.) Gather and document as much evidence as you can from the target PC. Since this is an internal employee issue, you don't need to worry about search warrants or potentially corrupting evidence. You just need to generate a report for his manager and the HR director.
For this assignment, you need to create a professional report on what you have found. Place your answers, findings, and screenshots in a Word compatible file with proper attention to writing, grammar, punctuation, and spelling.
North Central Texas College Enterprise Risk Management Paper
At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be lead ...
North Central Texas College Enterprise Risk Management Paper
At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. Assignment:Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization's goals and objectives. In your final research project for the course, your task is to write a minimum of a 3 page paper discussing the following concepts:Introduction - What is an ERM?Why Should an Organization Implement an ERM Application?What are some Key Challenges and Solutions to Implementing an ERM?What is Important for an Effective ERM?Discuss at least one real organization that has been effective with implementing an ERM framework/application.Conclusion – Final thoughts/future research/recommendationThe paper needs to be minimum of 3 pages long, NOT including the title page and a references page (for a total of minimum 5 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet the following requirements:Be minimum of 3 pages in length, not including the required cover page and reference page.Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course, the course textbook, and at least FIVE scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Earn money selling
your Study Documents