Give an example of a program that uses the congeneric version of a class from the STL and the equivalent program that uses the generic version.

Give an example of a program that uses the congeneric version of a class from the STL and the equivalent program that uses the generic version. How do the two implementations differ? Why is having the syntax of generics better? Please document everything.

Economic, and social impact the Civil War had on the American people. However, your textbook only provides an overview of how the war affected different segments of the population.

Economic, and social impact the Civil War had on the American people. However, your textbook only provides an overview of how the war affected different segments of the population. Therefore, your task for this activity is to conduct historical research in order to better understand the impact of the war on blacks, women, or soldiers. This activity should help you recognize the role of diversity in American society as well as to undertake historical research and compose a compelling historical argument based on your findings.

Find an example of a piece of artwork from each of the three modes of representation: realistic, abstract, and non-objective. Discuss how the artist has arranged the formal elements and principles of design to create each work. Compare and contrast each p

Find an example of a piece of artwork from each of the three modes of representation: realistic, abstract, and non-objective. Discuss how the artist has arranged the formal elements and principles of design to create each work. Compare and contrast each piece. How are they different? What do they have in common? The essay should be 450-700 words long. Include pictures of each piece. You can use any kind of art you want; drawing, sculpture, painting, design.

group Analysis. This paper is about your group in class – the group that is doing the semester-long project on an issue for Morgan (not the student presentation). It is not a research paper. It's an analysis of how your group functions according to th

group Analysis. This paper is about your group in class – the group that is doing the semester-long project on an issue for Morgan (not the student presentation). It is not a research paper. It's an analysis of how your group functions according to the criteria in the syllabus. Do not turn in something general that is either theoretical or could apply to any group. I want to see your assessment of how your group has been working this semester. general questions. for the first question group analysis. we work in a group project but, we don't meet each other. We work online project.

Given the following two functions: • f(n) = 3n^2 + 5 • g(n) = 53n + 9 Use limits to prove or disprove

1. Given the following two functions: • f(n) = 3n^2 + 5 • g(n) = 53n + 9 Use limits to prove or disprove each of the following: • f ∈ Ω(g) • g ∈ Θ(f) Answer: f(n) = 3n^2 + 5 g(n)= 53n +9 f(g(n) = 3 *(53*n +9)^2 + 5 = 3 *(53*53n^2 +81+952) +5 -equation 1 g(f(n)) = 53 *(3n^2 +5) +9 -equation2 Ω(g)=n 0(f)=n^2 From equation1 and equation 2 it is proved that: f(g(n) != g(f(n)) 2. Rank the following functions from lowest asymptotic order to highest. List any two or more that are of the same order on the same line. • 2^n • n^3 + 5n • log2_n • n^3 + 2^ 2 + 1 • 3^n • n^2 + 5n + 10 • n log_2 n • 10n + 7 • √n Answer: (Log_3 n = log_2 n) √n 10n + 7 n log_2 n n^ 2 + 5n + 10 (n^ 3 + 2n^ 2 + 1 = n^ 3 + 5n) 2^n 3^n 3. Consider the following functions for problems 3 and 4 int max(int[] array, int first, int last) { if (first == last) return array[first]; else if (first + 1 == last) return max(array[first], array[last]); else { int mid = (first + last) / 2; return max(max(array, first, mid), max(array, mid + 1, last)); } } int max(int left, int right) { if (left > right) return left; return right; } Write the recurrence equation that e!xpresses the execution time cost for the above algorithm. Draw the recursion tree assuming that n= 8. Answer: T(n) = T(n/2)+T(n/2)+c T(n)=2T(n/2)+c 4. 4. Determine the critical exponent for the recurrence equation in problem 3. Apply the Little Master Theorem to solve that equation. Is this algorithm optimal? Explain. Answer: T(n)=2T(n/2)+c Applying master theorem: a=2 and b=2 , c=0 log_b(a)>c T(n)=O(n)

Discussion 1: "Course Wrap-Up" Please respond to the following: Share two (2) new insights about policy making and the policy process you have discovered from this course.

Discussion 1: "Course Wrap-Up" Please respond to the following: Share two (2) new insights about policy making and the policy process you have discovered from this course. Make a persuasive argument for this type, of course, being a required elective for every college freshmen. Provide support for your response. Discussion 2: "Course Take-Away" Please respond to the following: identify one (1) of the many Web sites that you visited during this course that you enjoyed or found most helpful. Explain the reasons why the Website was beneficial to you. Discuss one (1) current policy debate that you have started to tune into more since this course started. Explain the reasons why you seem to be following the debate more closely and what you seem to focus more on after having taken this class.

Family Session Using an Eco map

Family Session Using an Eco map After viewing the "Client Session Transcript – Using an Eco map" media presentation, identify the primary family themes in the transcript. Discuss how using the ecomap could be appropriate for this family. What points would you want to make if you were the social worker meeting with them to discuss the ecomap that was created for their family? How would you anticipate the various family members responding and what skills would you anticipate needing to use during the session?

Given the RSA values: P = 107, Q = 173, E = 7; (40 pts) a. Find D using the Extended Euclidian Algorithm = ? Verify your answer!

Given the RSA values: P = 107, Q = 173, E = 7; (40 pts) a. Find D using the Extended Euclidian Algorithm =? Verify your answer! b. Encrypt the message M = Computer Security. Use the ASCII table to find the characters’ values. Note that the message is Ca$e s3n$1tivE. c. Decrypt the following numeric ciphertext [9512, 15952, 3539] and find their corresponding (decrypted) ASCII Characters

Evaluate the significance of code enforcement research conducted by the Urban Institute, National Fire Protection Association (NFPA)

Evaluate the significance of code enforcement research conducted by the Urban Institute, National Fire Protection Association (NFPA), the National Science Foundation, and the U.S. Fire Administration/National Fire Academy.