Write a program to multiply two complex number and stored in third one by the concept of operator overloading using member function.
maximum(
[minimum(
[maximum([minimum([l(2),l(12)]),minimum([l(6),l(10)])]),
maximum([minimum([l(8),l(19)]),minimum([l(17),l(21)])])]),
minimum(
[maximum([minimum([l(5),l(4)]),minimum([l(15),l(9)])]),
maximum([minimum([l(12),l(16)]),minimum([l(2),l(12)])])])])
For this question you must author prolog code that allows you to apply alpha/beta pruning to a tree in this form using the top-level syntax: ?- alphabeta(T,V) where < T > is a tree in the form above and < V > is the final value. When called your code should also print out the value for each node processed and the pruning steps as it goes of the form:
"Leaf Value: 2" "Max node Value: 4" "Min node Value: 2" "Alpha Prune." "Beta Prune."
#loop through displayList
for i in range(0,len(displayList)):
#Test if the fist item in the current sub-list contains the text "Price Level
#Tip: Remeber that each sub-list is a (displayList). So you have
# to access its items via displayList followed by TWO indexes.
if
#Extract the second item from the current sub-list into variable called priceLevel
#Test if priceLevel is between previousPrice and currentPrice OR
# priceLevel == previousPrice OR
# priceLevel == currentPrice
if priceLevel >= previousPrice and priceLevel <= currentPrice or priceLevel == previousPrice or priceLevel == currentPrice:
#Sound the alarm. Pass in the frequency and duration.
if self.__currentPrice > self.__previousPrice:
frequency = 800
duration = 700
else:
frequency = 400
duration = 700
winsound.Beep(frequency, duration)
#Print the text 'Alarm' with a green background color, so that the user
#can go back and check when the alarm was sounded.Describe a type scenario involving 2 computer Devices transferring a video file using an unsecured ftp connection where TCP three-way handshake is susceptible to vulnerability
fill in the correct line of code
const int PASS = 50;
int numPass = 0, numFail = 0, totalMarks = 0;
double mark, perPass = 0, perFail = 0;
} while (mark > 100);
// if the inputted mark is not the sentinel value, process it
while (mark >= 0)
{
// increment the counter for the total number of data values
// *** Insert code
// Determine if the mark is a pass or fail (If statement)
// *** Insert code
// Read next mark
// *** Insert code
}
// Calculate the percentage of marks that were passes and fails
// *** Insert code
q1) fill in the required code line where //*** insert code is
const int PASS = 50;
int numPass = 0, numFail = 0, totalMarks = 0;
double mark, perPass = 0, perFail = 0;
while (mark >= 0)
{
// increment the counter for the total number of data values
// *** Insert code
// Determine if the mark is a pass or fail (If statement)
// *** Insert code
// Read next mark
// *** Insert code
}
// Calculate the percentage of marks that were passes and fails
// *** Insert code
Describe four units that makes IEEE 802.11 Architecture
Describe a typical scenario involving 2 computer Devices transferring a video file using an unsecured ftp connection where TCP three-way handshake is susceptible to vulnerability.
Describe a typical scenario involving 2 Computer Devices transferring a video file using an unsecured ftp connection where TCP three-way handshake is susceptible to vulnerability