German Collegiate Programming Contest 2. Juli 2011
|
|
|
- Brett Merritt
- 10 years ago
- Views:
Transcription
1 German Collegiate Programming Contest 2. Juli 2011 The Problem Set No Title Page A Faculty Dividing Powers 3 B Genetic Fraud 5 C Indiana Jones and the lost Soccer Cup 7 D Magic Star 9 E Magical Crafting 11 F My brother's diary 13 G Security Zone 15 H Sightseeing 17 I Suiting Weavers 19 J Time to live 21 Good luck and have fun!
2 This page is intentionally left (almost) blank. 2
3 Problem A Faculty Dividing Powers Fred Faculty and Paul Power love big numbers. Day after day Fred chooses a random integer n and he computes n!. His friend Paul amuses himself by computing several powers of his randomly chosen integer k like k 2, k 3,... and so on. On a hot summer day, Fred and Paul got really, really bored, so they decided to play a joke on their buddy Dave Divider. Fred chooses a random integer n while Paul chooses a random integer k. They want Dave to find the biggest integer i such that k i divides n! without a remainder, otherwise they will throw a cake in Dave s face. Because Dave does not like cakes in his face, he wants you to help him finding that integer i. Input The first line contains the number of test cases t (1 t 100). Each of the following t lines contains the two numbers n, k (2 n 10 18, 2 k ) separated by one space. Output For each test case, print the maximum integer i on a separate line. Sample Input Sample Output 3 2 3
4 This page is intentionally left (almost) blank. 4
5 Problem B Genetic Fraud Computer Scientists have a rough life. Due to the shortage of bright young minds like yourself, good programmers are mostly like famous movie stars. It s just like everyone wants to get their hands on your hard earned cash. The situation got so out of hand that you are faced by a lawsuit nearly every day of the year. Each lawsuit is filed by someone claiming alimonies for your alleged child. Luckily for you, you know pretty much about genetic sequences. You know that the human DNA sequence can be represented by a possibly 1 N characters long string, containing only characters a to z. And you know that a similarity test of the DNA strings of the alleged child to your own can prove your innocence. The only problem is that this does not only happen to you. As all labs are busy, testing needs at least a year. Still, not all hope is lost. You managed to get the information from one of the DNA labs on how to compute the probability of a genetic relationship between two DNA strings. If you could only help the DNA labs to test two DNA strings for a genetic relationship really fast, you could get the evidence you need for your own lawsuits. A genetic relationship test, or GRT, requires some heavy computation on the DNA strings. They first acquire all similar regions within two DNA strings. We understand a region within a DNA string to be a consecutive interval within the DNA string. Regions of equal length of DNA strings are similar to each other, whenever (a[i] b[j]) 1, where a[i], b[j] are lower-case letters. A GRT between two DNA sequences is positive, whenever the two DNA sequences have a similar region of at least one half the length of the DNA sequences. Input The first line of the input gives the number of test cases C (0 < C 1 000). The first line of each such test case holds an integer N, denoting the length of the two DNA strings to be tested. The following two lines contain a string of N lower-case letters each, giving the two DNA substrings of the two persons to test. Output For each test case print one line. If the GRT is positive, print out POSITIVE. Print NEGATIVE, if the test fails. Sample Input 3 4 aaaa bbcc 8 iacdefgh abeaaaaa 8 iacdefgh abeafaaa Sample Output POSITIVE NEGATIVE NEGATIVE 5
6 This page is intentionally left (almost) blank. 6
7 Problem C Indiana Jones and the lost Soccer Cup In 1930 the first FIFA World Cup was held in Uruguay, and Uruguay won the Cup in a dramatic final against Argentina. All of this seems like ages past, and now myth and legend rank around that historic first world cup. Some even claim that the original trophy cup that was awarded to Uruguay for their victory has mythical powers and would grant any side the strength to win the World Cup. Now that original cup has been lost in time, and even though its mythical powers are probably just stories, it is still an important artifact which belongs in a museum. Clearly an expert is needed to recover it. Famous archaeologist and adventurer Indiana Jones has taken this dangerous task onto himself and traveled to Uruguay to find the cup. His search has led him to an ancient underground cave system where the cup is rumoured to have been hidden. Many traps lure within these caves, and only his instinct and his faithful whip have saved Indy from certain death. Now he has reached a mysterious enormous gate and he can only speculate that the cup must be hidden behind that gate. Unfortunately it is shut close. The gate is riddled with switches and levers, and all of them are denoted with letters and numbers. As you may have guessed, the gate will only open if the switches and levers are pulled in the correct order, but beware! - For if anyone is unlucky enough to get the order wrong, doom awaits him. Luckily, during his exploration of the caves Indy has found several encrypted hints which provide clues about the correct sequence. Here s one: The faithful knows that X comes before O And another: Under no circumstances should you touch unless the Θ has been moved! Clearly these clues give hints about the correct order, but there are a lot of switches and levers, and there are lots of clues. Indy needs help! Given all of the hints Indy has collected, can you help him determine the correct order of the levers and switches so that he can successfully complete his adventure? But beware Indy could have missed some hints; or perhaps he misinterpreted some of them. The former case will likely leave more than one possible sequence while the latter will lead to no possible sequence at all. You must detect these cases and warn Indy. Input The first line of input contains the number of test cases C (C 30). For each test case there is one line with the number n (1 n ) of switches/levers on the gate and the number h (0 h ) of hints that Indy has discovered. Then follow h lines, one for each clue, with the numbers a and b (1 a, b n, a b), meaning that lever a must be pulled before lever b. Output For each test case output one line with the correct sequence of the numbers 1 to n. Separate the numbers with a whitespace. If there is no possible sequence, print recheck hints instead. If there are multiple possible sequences, print missing hints instead. Sample Input Sample Output missing hints recheck hints 7
8 This page is intentionally left (almost) blank. 8
9 Problem D Magic Star A magic star consists of all the numbers from 1 to 12 arranged in the shape of a hexagram: The magic comes from the fact that in each line of 4 numbers, the sum of the numbers is 26. In the example given above, the six lines consist of the following numbers: There are several possible ways to arrange the numbers to get a magic star. Given a partially labelled star, your task is to extend the solution such that a magic star is formed. Input The input consists of a visualization of the star; the unlabelled fields of the star will be represented by an x character, and labelled fields will contain a letter between A and L, where the i-th letter in the alphabet represents number i. The character. is used to align the fields of the star in the shape of a hexagram. You may assume that each input will use the same alignment of the fields as the one in the sample input. Output Print the lexicographically smallest extension of the given partial solution which is a magic star (lexicographically smallest means that the concatenation of the rows should result in a string which is lexicographically smaller than other potential solutions). You may assume that there is always a solution for the given input. Sample Input...x....A.I.D.x...x...x...x.x.x.x....x... Sample Output...F....A.I.D.L...H...E...C.J.B.K....G... 9
10 This page is intentionally left (almost) blank. 10
11 Problem E Magical Crafting One of the recent hypes in terms of independent games has been Minecraft, a cute little game in which you mine some materials and are able to craft a lot of stuff using these materials. Since you already mastered the Minecraft universe, you decide to write your own little mod for the game to add magical crafting. For a magic craft, you start with a single block of magic stone m 1 = A. By adding a specific amount of diamonds you can transform the magic stone into two magic stones m 2 A... Z and m 3 A... Z, or even into a non-transformable final glow stone g. This is called a crafting recipe. The glow stone transformation can only transform a magic stone m into its matching lighting effect g, i.e. the magic stone A can be transformed in the lighting effect a. This transformation always costs exactly 1 diamond. This way you want to be able to craft wonderful magic lights for your own world. But as you are aware of the rareness of the precious diamonds, and also very picky about the lighting effects you want to achieve, you have to test your crafting recipes. The question arises if your set of crafting recipes allows you to create all your desired lighting effects and how many diamonds you will need. Input The first line of the input gives the number of test cases C (0 < C 100). Each test case starts with two integers 0 R 30, 0 L 10 on a single line, denoting the set of recipes and the number of lighting effects. The next R lines contain the set of recipes. Each crafting recipe is given by the magic stones m 1, m 2, and m 3 as well es the number of diamonds necessary 0 d on a single line. The next L lines contain the lighting effects you want to achieve. Each of theses lines contains an integer 1 l 100, which represents the length of the lighting effect. The line completes with a single string of length l, consisting only of lower case characters a... z, the glowstones within the effect. Output For every test case print CASE # followed by the number of the test case, starting with 1, on a single line. For each lighting effect print a single line. If the effect is possible print POSSIBLE WITH X DIAMONDS, with X representing the number of diamonds you will need to achieve the effect. In the case the lighting effect cannot be crafted, print IMPOSSIBLE. Sample Input A A A 2 3 aaa 8 aaaaaaaa 5 ababa 1 a 3 1 A B C 1 C P C 7 B I C 11 4 icpc Sample Output CASE #1 POSSIBLE WITH 7 DIAMONDS POSSIBLE WITH 22 DIAMONDS IMPOSSIBLE POSSIBLE WITH 1 DIAMONDS CASE #2 POSSIBLE WITH 23 DIAMONDS 11
12 This page is intentionally left (almost) blank. 12
13 Problem F My brother s diary Nowadays, people who want to communicate in a secure way use asymmetric encryption algorithms such as RSA. However, my older brother uses another, simpler encryption method for his diary entries. He uses a substitution cipher where each letter in the plaintext is substituted by another letter from the alphabet. The distance between the plaintext letter and the encrypted letter is fixed. If we would define this fixed distance d to 5, A would be replaced by F, B by G, C by H,..., Y by D, Z by E. With a fixed and known distance d the decryption would be somewhat simple. But my brother uses random distances for each of his diary entries. To decrypt his diary I have to guess the distance d for each entry. Thus, I use the well known phenomenon that the letter E is used more often in English words than other letters. Can you write a program for me that calculates the distance d based on the fact that the most used letter in the encrypted text corresponds to the letter E in plaintext? Of course, I am interested in the decrypted text, too. Input The input consists of several test cases c that follow (1 c 100). Each test case is given in exactly one line containing one diary entry. Diary entries only use upper case letters (A-Z) and spaces. Each diary entry consists of at most encrypted letters (including spaces). Output For each test case, print one line containing the smallest possible distance d (0 d 25) and the decrypted text. If the decryption is not possible because there are multiple distances conforming to the rules above, print NOT POSSIBLE instead. Spaces are not encrypted. Sample Input 4 RD TQIJW GWTYMJWX INFWD JSYWNJX ZXJ F XNRUQJ JSHWDUYNTS YJHMSNVZJ THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG XVIDRE TFCCVXZRKV GIFXIRDDZEX TFEKVJK UVTIPGKZFE XVIDRE TFCCVXZRKV GIFXIRDDZEX TFEKVJK Sample Output 5 MY OLDER BROTHERS DIARY ENTRIES USE A SIMPLE ENCRYPTION TECHNIQUE 10 JXU GKYSA RHEMD VEN ZKCFI ELUH JXU BQPO TEW 17 GERMAN COLLEGIATE PROGRAMMING CONTEST DECRYPTION NOT POSSIBLE 13
14 This page is intentionally left (almost) blank. 14
15 Problem G Security Zone The manager of a large security company has to build a new surveillance system for different sites. A site consists of N objects where each object has its own security circle. At the border of the surveillance system a high voltage fence has to be installed. The security zone inside of the fence has to be connected. Furthermore, all objects and their security circles should be inside the security zone. The security circles of different objects will never overlap or touch. Now the manager needs your help. He asks you for the minimal needed fence length. Figure 1 Illustration of first and second sample input. Input The first line of the input gives the number of test cases C (0 C 100). The first line of each such test case holds the integer N: the number of objects in the current site (0 < N 25). Each of the following N lines holds three integers x i, y i, and r i that describe an object. The coordinates of the i-th object and the radius for the needed security circle for this object. ( x i, y i 100, 0 < r i 100) (The center of the security circle around an object is the position of the object itself.) Output For each test case print one line containing the minimal fence length for this case. Your output should have an absolute or relative error of at most Sample Input Sample Output
16 This page is intentionally left (almost) blank. 16
17 Problem H Sightseeing As a computer science student you are of course very outdoorsie, so you decided to go hiking. For your vacation this year, you located an island full of nice places to visit. You already identified a number of very promising tracks, but are still left with some problems. The number of choices is so overwhelming, that you had to select only a small subset of at most sights. And if that is not enough, you are very picky about the order in which you want to visit the sights. So you have already decided on an order in which you want to visit the preselected tracks. The problem you are left with is to decide in which direction to travel along each single track, and whether you may have to reduce your choice of tracks even further. After identifying the travel time between the endpoints of different tracks, you decide to write a program to figure out if you can make all your trips within the time you have planned for your vacation. Since you also do not want to waste any precious time, you only care about an optimal solution to your problem. Furthermore, the tracks can get pretty challenging. Thats why you do not want to hike along a track more than once. Input The first line of the input gives the number of test cases C (0 < C 100). The first line of each such test case holds two integers N, T the number of tracks of the current hiker (1 N ) and the maximal time spent hiking throughout the vacation (0 T ) Each of the following N lines holds five integers c p, c bb, c be, c eb and c ee that describe a track (in order of importance). c p gives the length of the track in minutes. c xy gives the travel time of the official begin or end of a track to the beginning or end of the next most important track, where x and y are either b or e. All values given are non-negative integers not greater than Since you have to get back to your car, the list is circular. Furthermore, we will ignore the time it takes you to get to the start of your trip with your car. Output For each test case print one line. The output should contain a list of F and B for every track (in order) indicating whether you have to hike the track in forward direction or backward direction. If you cannot make the full trip within the planned time T, you should print IMPOSSIBLE to indicate that these trips are just too much hiking. Sample Input Sample Output FF BB IMPOSSIBLE 17
18 This page is intentionally left (almost) blank. 18
19 Problem I Suiting Weavers Willy the Weaver is in desperate hope to get married to the most beautiful and delightful female weaver Wilmar. Of course, Willy is not the only weaver interested in Wilmar. In order to impress the females, weavers build elaborately woven nests using leaf fibers. Tomorrow is the big day on which Wilmar will inspect all nests. There is a heavy storm at the moment, and no weaver can leave his nest within the hours before sunrise. However, the storm will produce many piles of leaf fibers, so that all weavers will have a chance to improve their nests. Therefore, Willy is curious if he can succeed weaving the most impressive nest, so that Wilmar will finally decide on getting married to him. Since size matters, Willy tries to figure out how large his nest and the ones of his rivals may become. For this purpose, Willy takes into consideration all known places offering leaf fibers suitable for nest construction. Since weavers do not like to leave their known territory, many of these places can be accessed by a subset of all weavers only, and some might even not be reachable by any weaver. To reduce complexity, Willy does not want to set up a flight plan. This implies that he does not consider any particular strategy of his rivals nor does he make any assumptions on how many fibers they can carry at a time or how quick and when they fly. It is therefore possible that a weaver succeeds in picking up all fibers in his territory. Finally, Willy assumes that all weavers are as integer as he is: they do not steal fibers from nests of their rivals. Is there any chance that no weaver will have a larger nest (number of fibers) than Willy after all leaf fibers have been picked up? Input The first line contains the number of testcases T (1 T 100). Each test case starts with a line containing two integers. The first integer W (1 W 100) is the number of weavers (including Willy); the second one P (1 P 400) is the number of places with leaf fibers. Next come W lines describing the nest of each weaver with four integers x, y, f, and r (0 x, y, r , 1 f ): x and y define the position of the nest, f is the size of the nest in number of fibers, and r is the radius of the territory in which the owner of the nest will search for additional fibers. The first of these W lines describes Willy s nest. Thereafter follow P lines defining the places with available leaf fibers with three integers x, y, and f (0 x, y , 1 f ): x and y define the position of the place, and f is the number of available leaf fibers. Output For each test case print one single line containing the string Suiting Success, if Willy has a chance to marry Wilmar after all fibers have been picked up (a tie in nest size is sufficient); else print Lonesome Willy. Sample Input Sample Output Suiting Success Lonesome Willy 19
20 This page is intentionally left (almost) blank. 20
21 Problem J Time to live As you might know, most computer networks are organized in a tree-like fashion, i.e. each computer is reachable by each other computer but only over one, unique path. The so-called Time to live (TTL) specifies after how many hops a network packet is dropped if it has not reached its destination yet. The purpose of the TTL is to avoid situations in which a packet circulates through the network caused by errors in the routing tables. The placement of a router that connects the network to another network is optimal when the maximal needed TTL for packets that are sent from this router to any other computer within the same network is minimal. Given a network as specified above, you should calculate the maximal needed TTL in this network if you can select the computer that should be used as router. Input The first line of the input consists of the number of test cases c that follow (1 c 100). Each test case starts with a line specifying N, the number of computers in this network (1 < N ). Computers are numbered from 0 to N 1. Then follow N 1 lines, each specifying a network connection by two numbers a and b which means that computer a is connected to computer b and vice versa, of course (0 a, b < N). Output For each test case in the input, print one line containing the optimal TTL as specified above. Sample Input Sample Output
22 This page is intentionally left (almost) blank. 22
ACM International Collegiate Programming Contest 2005
International Collegiate acm Programming Contest 25 event sponsor ACM International Collegiate Programming Contest 25 South American Regional November -2, 25 Contest Session (This problem set contains
Moving on! Not Everyone Is Ready To Accept! The Fundamental Truths Of Retail Trading!
Moving on If you re still reading this, congratulations, you re likely to be in the minority of traders who act based on facts, not emotions. Countless others would have simply denied the facts, and moved
6.042/18.062J Mathematics for Computer Science. Expected Value I
6.42/8.62J Mathematics for Computer Science Srini Devadas and Eric Lehman May 3, 25 Lecture otes Expected Value I The expectation or expected value of a random variable is a single number that tells you
Third Southern African Regional ACM Collegiate Programming Competition. Sponsored by IBM. Problem Set
Problem Set Problem 1 Red Balloon Stockbroker Grapevine Stockbrokers are known to overreact to rumours. You have been contracted to develop a method of spreading disinformation amongst the stockbrokers
Ian Stewart on Minesweeper
Ian Stewart on Minesweeper It's not often you can win a million dollars by analysing a computer game, but by a curious conjunction of fate, there's a chance that you might. However, you'll only pick up
MILO AND THE MAGICAL STONES By Marcus Pfister
1 Questions and Activities MILO AND THE MAGICAL STONES By Marcus Pfister Milo lives happily with other cliff mice on a small island. The mice love their island because it provides them with food and shelter
Gaming the Law of Large Numbers
Gaming the Law of Large Numbers Thomas Hoffman and Bart Snapp July 3, 2012 Many of us view mathematics as a rich and wonderfully elaborate game. In turn, games can be used to illustrate mathematical ideas.
STUDENT S PACKET FOR THE SCIENCE FAIR PROJECT
STUDENT S PACKET FOR THE SCIENCE FAIR PROJECT SCIENCE PROJECT STEPS 1. Choose a topic. Be sure it interests you. Don t pick one because you think it will be easy. Talk it over with your parents and when
Task: ASC Ascending Paths
Task: ASC Ascending Paths You are visiting the Royal Botanical Gardens. In the gardens there are n intersections connected by m roads. The intersections are numbered from 1 to n. Each road connects two
Random Fibonacci-type Sequences in Online Gambling
Random Fibonacci-type Sequences in Online Gambling Adam Biello, CJ Cacciatore, Logan Thomas Department of Mathematics CSUMS Advisor: Alfa Heryudono Department of Mathematics University of Massachusetts
Statistics and Probability
Statistics and Probability TABLE OF CONTENTS 1 Posing Questions and Gathering Data. 2 2 Representing Data. 7 3 Interpreting and Evaluating Data 13 4 Exploring Probability..17 5 Games of Chance 20 6 Ideas
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with
Bus Rider Activities
1. To easily divide campers into two teams or groups, split down the middle of the bus, so that the campers on one side of the aisle are one team, and those on the other side are the second team. But if
A beautiful sunny day in July; I m walking on a street in the middle of a city, being surrounded by
A Trip to Cambridge By Iina Lahti A beautiful sunny day in July; I m walking on a street in the middle of a city, being surrounded by stunning old buildings. Colleges and churches seem to be in every corner,
UNTOLD MAP SECRETS. Are you a MyAdvertisingPays member? Great!
UNTOLD MAP SECRETS The Guide for online marketing newbies Are you a MyAdvertisingPays member? Great! Do you know that you can earn money by using the advertising system of MyAdvertisingPays but you have
German Collegiate Programming Contest 2015. Problems
German Collegiate Programming Contest 015 June 0th Problems A A Journey to Greece B Bounty Hunter II C Cake D Carpets E Change of Scenery F Divisions G Extreme Sort H Legacy Code I Milling machines J Souvenirs
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY
FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY LINDSEY R. BOSKO I would like to acknowledge the assistance of Dr. Michael Singer. His guidance and feedback were instrumental in completing this
German Collegiate Programming Contest 12. Juni 2010
German Collegiate Programming Contest 12. Juni 2010 The Problem Set No Title Page A Absurd prices 3 B Cheating or Not 5 C Counterattack 7 D Field Plan 9 E Hacking 11 F Last Minute Constructions 13 G Lineup
Sin #1 - Not Establishing a Clear and Realistic Goal
A s a B2B lead generation tool, search engine marketing (SEM) is all the rage everyone wants a piece of the pie. Unfortunately, countless companies lose time and money trying to cash in on the alluring
Keyword Research: Exactly what cash buyers, motivated sellers, and private lenders are looking for online. (and how to get in front of them)
Keyword Research: Exactly what cash buyers, motivated sellers, and private lenders are looking for online. (and how to get in front of them) 52 Keywords + How To Guide More Traffic. More Leads. Keywords
C H A P T E R Regular Expressions regular expression
7 CHAPTER Regular Expressions Most programmers and other power-users of computer systems have used tools that match text patterns. You may have used a Web search engine with a pattern like travel cancun
University of Hull Department of Computer Science. Wrestling with Python Week 01 Playing with Python
Introduction Welcome to our Python sessions. University of Hull Department of Computer Science Wrestling with Python Week 01 Playing with Python Vsn. 1.0 Rob Miles 2013 Please follow the instructions carefully.
Too Good for Drugs Grade 5
Dear Parent: Our class is participating in Too Good for Drugs, a prevention program designed by the Mendez Foundation to teach skills for living healthy, drug-free lives. We are excited about this opportunity
BettyNet: Getting Started Guide
BettyNet: Getting Started Guide www.dentbetty.com Welcome! Welcome to BettyNet, the DentBetty network! This guide will help you get up and running as quickly as possible. Got questions? No problemo! Just
A simple algorithm with no simple verication
A simple algorithm with no simple verication Laszlo Csirmaz Central European University Abstract The correctness of a simple sorting algorithm is resented, which algorithm is \evidently wrong" at the rst
Congratulations! By purchasing this ebook you now have access to a very simple, yet highly profitable system to make TAX FREE profits with horse
Congratulations! By purchasing this ebook you now have access to a very simple, yet highly profitable system to make TAX FREE profits with horse racing. You also acquired RESELL Rights, so feel free to
EXAMPLE PRESENTATION SCRIPT. The following is an example script for the Are You Credit Wise? presentation.
EXAMPLE PRESENTATION SCRIPT The following is an example script for the Are You Credit Wise? presentation. (Slide 1) Hi, my name is and I m a Junior studying. I m here today to talk about smart money management.
Copyright (c) 2015 Christopher Small and The Art of Lawyering. All rights reserved.
Copyright (c) 2015 Christopher Small and The Art of Lawyering. All rights reserved. 1 In this special report, I ll be sharing with you the ten biggest mistakes that lawyers make when marketing their law
SNP Essentials The same SNP story
HOW SNPS HELP RESEARCHERS FIND THE GENETIC CAUSES OF DISEASE SNP Essentials One of the findings of the Human Genome Project is that the DNA of any two people, all 3.1 billion molecules of it, is more than
Welcome to UC Berkeley! We are so glad you came to visit us, and we hope you have a great time on our campus! This little packet is for YOU, to help
Welcome to UC Berkeley! We are so glad you came to visit us, and we hope you have a great time on our campus! This little packet is for YOU, to help you discover some of the fun stories and amazing places
Paper Airplanes & Scientific Methods
Paper Airplanes 1 Name Paper Airplanes & Scientific Methods Scientific Inquiry refers to the many different ways in which scientists investigate the world. Scientific investigations are done to answer
(Refer Slide Time: 01.26)
Discrete Mathematical Structures Dr. Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture # 27 Pigeonhole Principle In the next few lectures
report in association with: The State of B2B
2012 report in association with: The State of B2B Lead Generation: 2012 Results WHAT S INSIDE Introduction & Methodology pg 03 Lead Sources & Volumes pg 11 Who s Using CRM pg 04 Lead Response Times, Volumes
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
Date. Hello, Good Afternoon and Welcome to Pegasus Racing! I cordially invite you to join me...
"I m One Of The UK s Top Horse Racing Tipsters & I m Going To Show You My Closely Guarded Secrets Of How I Make Thousands From Horse Racing So You Can Too!" Date Hello, Good Afternoon and Welcome to Pegasus
Monitoring the team s performance
Monitoring the team s performance Why does your team need to be monitored? How can performance be monitored? You should ensure that you monitor only what is really important. In the two BS2 sessions Making
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Static IP Routing and Aggregation Exercises
Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts........................................
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
3 Some Integer Functions
3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple
COACHING FOR BEHAVIORAL CHANGE
Y CHAPTER ONE COACHING FOR BEHAVIORAL CHANGE By Marshall Goldsmith My mission is to help successful leaders achieve positive, long-term, measurable change in behavior: for themselves, their people, and
SIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 [email protected] 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
Crickets and Bugs. Bodies Bingo. Make bingo cards with activities or jokes in the spaces. Each person goes up to another one and tells the joke or
Bodies Bingo Make bingo cards with activities or jokes in the spaces. Each person goes up to another one and tells the joke or does the activity with the other person. Activities can include hopping, laughing,
Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
The Secret of Cell Phones By R. Howard
The Secret of Cell Phones The Secret of Cell Phones By R. Howard Maria was very excited: her parents were finally going to buy her a cell phone. Most of her friends had already been given a cell phone
! Insurance and Gambling
2009-8-18 0 Insurance and Gambling Eric Hehner Gambling works as follows. You pay some money to the house. Then a random event is observed; it may be the roll of some dice, the draw of some cards, or the
2011-0920 UM Online Practice Programming Contest September 20, 2011
2011-0920 UM Online Practice Programming Contest September 20, 2011 Sponsored by: University of Michigan Rules: 1. There are a few questions to be solved any time during the tryouts contest. 2. All questions
KTH Challenge 2012. Problems
Stockholm, 3rd March 2012 Problems A Spam Filter B Birds on a Wire C Lifting Walls D Toilet Seat E Pub-lic Good F Xor Maximization G Restaurant Orders H Three Digits This page is intentionally left (almost)
Generating Marketing Leads Via Marketing Forums
Generating Marketing Leads Via Marketing Forums Before you can begin what I call forum sniping or forum marketing, you are going to need to search out two or three forums and become a member of them. I've
Computer Science. Lake Brantley High School. Seth Reichelson
Computer Science At Lake Brantley High School Seth Reichelson Biographical Data TEACHING EXPERIENCE 2010 Current Lake Brantley High School, Altamonte Springs Fl AP Computer Science, Honors Physics, Engineering
USER S MANUAL. Tote & Go Laptop 2003 VTECH. Printed in China 91-01584-008
USER S MANUAL Tote & Go Laptop 2003 VTECH Printed in China 91-01584-008 Thank you for purchasing the VTech Tote & Go Laptop learning toy. Tote & Go Laptop is a powerful high-tech learning device with a
How to Outsource Without Being a Ninnyhammer
How to Outsource Without Being a Ninnyhammer 5 mistakes people make when outsourcing for profit By Jason Fladlien 2 Introduction The way everyone does outsourcing is patently wrong, and this report is
The Taxman Game. Robert K. Moniot September 5, 2003
The Taxman Game Robert K. Moniot September 5, 2003 1 Introduction Want to know how to beat the taxman? Legally, that is? Read on, and we will explore this cute little mathematical game. The taxman game
Excerpted from the book Scholarships 101: The Real-World Guide to Getting Cash for College. Copyright 2008 by Kimberly Stezala. All rights reserved.
Leave Luck in The Dust high school preparation Freshman year of high school Do your best and if necessary prioritize core classes over electives or activities. Strive for a B or better in all classes.
Formal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
Research paper of drug addiction >>>CLICK HERE<<<
Research paper of drug addiction. There are plenty of ways to do it. Research paper of drug addiction >>>CLICK HERE
Whole Life Insurance is not A Retirement Plan
Whole Life Insurance is not A Retirement Plan By Kyle J Christensen, CFP I decided to write this article because over the years I have had several clients forget how their whole life insurance fits in
Working with Youth to Develop Critical Thinking Skills On Sexual Violence and Dating Violence: Three Suggested Classroom Activities
Working with Youth to Develop Critical Thinking Skills On Sexual Violence and Dating Violence: Three Suggested Classroom Activities The Southern Arizona Center Against Sexual Assault s Rape Prevention
Field Hockey Tryout Secrets!
Field Hockey Tryout Secrets! Picking the best team from your tryouts! 2006 All Rights Reserved Field Hockey Tryout Secrets! The cuts can be tough; you have to make a decision between a quick power inner
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
How To Kit. Picture Bingo
How To Kit Picture Bingo Steps to Organizing a Picture Bingo Community Event 1. Find a space in the community to hold the event. (school, band office, nursing station, library, community hall) 2. Advertise
Using simulation to calculate the NPV of a project
Using simulation to calculate the NPV of a project Marius Holtan Onward Inc. 5/31/2002 Monte Carlo simulation is fast becoming the technology of choice for evaluating and analyzing assets, be it pure financial
12 Step Goal-Setting Process
12 Step Goal-Setting Process 1 Decide exactly what you want in every key area of your life. Start off by Idealizing. Imagine that there are no limitations on what you can be, have or do. Imagine that you
Sermon Promise in Unexpected Places Genesis 39:1-23, September 21, 2014
1 How many of you have your Be a Blessing stones with you from last week? For those of you who weren t here, these stones are to remind us of the promise that God made to Abraham when he was called to
Baltic Way 1995. Västerås (Sweden), November 12, 1995. Problems and solutions
Baltic Way 995 Västerås (Sweden), November, 995 Problems and solutions. Find all triples (x, y, z) of positive integers satisfying the system of equations { x = (y + z) x 6 = y 6 + z 6 + 3(y + z ). Solution.
SECURITY IN NETWORKS
SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
How to Study Mathematics Written by Paul Dawkins
How to Study Mathematics Written by Paul Dawkins Before I get into the tips for how to study math let me first say that everyone studies differently and there is no one right way to study for a math class.
Some Minesweeper Configurations
Some Minesweeper Configurations Richard Kaye School of Mathematics The University of Birmingham Birmingham B15 2TT RWKaye@bhamacuk http://webmatbhamacuk/rwkaye/ 31st May 2007 Contents 1 Introduction 2
C. Retirement Plans a. 401(k) and 403(b)
MODULE 3: SAVINGS/ SPENDING PLAN 3-3: Start Investing Cast List Darryl Terri Drew Murphy, 45-50 years old, white male Alicia Bianca, 40-50 years old, white female Synopsis Darryl and Terri discuss investment
Fun ways to group students
Fun ways to group students Tips for dividing into groups. Picture Cards: Hand out cards with images on such as strawberries, blueberries, blackberries and other such groups of things. Then get them to
An Interview with Berlin School President Michael Conrad for Media Marketing Magazine
An Interview with Berlin School President Michael Conrad for Media Marketing Magazine Author: Lea Stanković, Berlin School EMBA Participant, Class 10 I met Michael Conrad for the first time in Berlin in
Dear Friend: I have a very important question to ask you
Avoid the 7 Deadly Sins of Term Life Insurance What the Insurance Companies Don t Want You to Know Dear Friend: I have a very important question to ask you Do You Know What to Look For When Selecting a
THEME: DETECTING ACCOUNTING ERRORS
THEME: DETECTING ACCOUNTING ERRORS By John W. Day, MBA ACCOUNTING TERM: Transposition Error A transposition error occurs when two or more numbers are reversed or transposed for each other. For example,
How To Thrive & Succeed Selling Lots of Pre-Arranged Funerals Even in a Lousy Economy
How To Thrive & Succeed Selling Lots of Pre-Arranged Funerals Even in a Lousy Economy By David W. Dassow 2009 People will always Pre-Plan in good times or bad First, I ll give you my opinion about the
CAs and Turing Machines. The Basis for Universal Computation
CAs and Turing Machines The Basis for Universal Computation What We Mean By Universal When we claim universal computation we mean that the CA is capable of calculating anything that could possibly be calculated*.
1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.
MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet
If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C?
Problem 3 If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C? Suggested Questions to ask students about Problem 3 The key to this question
SPECIAL REPORT: 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT!
SPECIAL REPORT: 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT! 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT! Provided compliments of: FIRSTUSA DATA SERVICES, LLC 877-857-5045 [email protected]
MACM 101 Discrete Mathematics I
MACM 101 Discrete Mathematics I Exercises on Combinatorics, Probability, Languages and Integers. Due: Tuesday, November 2th (at the beginning of the class) Reminder: the work you submit must be your own.
Before you start, let s have a little fun. Grab a few crayons and a couple pieces of paper. Got it? Now, everyone draw a picture of Jesus.
OMEGA PART 1 You Will Literally Fall On Your Face and Cry Oh My God! www.kensingtonchurch.org/watch Before you start, let s have a little fun. Grab a few crayons and a couple pieces of paper. Got it? Now,
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
College of the Holy Cross CCSCNE 06 Programming Contest Problems
General Information College of the Holy Cross CCSCNE 06 Programming Contest Problems Your contest account contains sample data files named problemi.dat and problemi.out, i = 1,..., 6, which contain sample
IBM SPSS Direct Marketing 23
IBM SPSS Direct Marketing 23 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 23, release
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
Princeton University Computer Science COS 432: Information Security (Fall 2013)
Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable
STRING TELEPHONES. Education Development Center, Inc. DESIGN IT! ENGINEERING IN AFTER SCHOOL PROGRAMS. KELVIN Stock #651817
STRING TELEPHONES KELVIN Stock #6587 DESIGN IT! ENGINEERING IN AFTER SCHOOL PROGRAMS Education Development Center, Inc. DESIGN IT! Engineering in After School Programs Table of Contents Overview...3...
Connectedness and the Emotional Bank Account
Connectedness and the Emotional Bank Account Directions This is a self-guided activity that can be completed by parents, teens or both. It contains five parts and should take about 45 minutes to complete.
Empowering Your Ministry
Empowering Your Ministry 1 Ten Things That Will Empower Your Youth Ministry Programs 1. Have a clear vision. Spend time visioning for the highest quality program you can imagine and then create a plan
Lecture 3: One-Way Encryption, RSA Example
ICS 180: Introduction to Cryptography April 13, 2004 Lecturer: Stanislaw Jarecki Lecture 3: One-Way Encryption, RSA Example 1 LECTURE SUMMARY We look at a different security property one might require
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
136 CHAPTER 4. INDUCTION, GRAPHS AND TREES
136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics
Lowercase Letters Capital Letters Picture Cards
Lowercase Letters Capital Letters Picture Cards Notes: You may want to cut out the flashcards and mount them on heavier paper for durability and ease of use. Rather than drilling through the cards (boring
IBM SPSS Direct Marketing 22
IBM SPSS Direct Marketing 22 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 22, release
