Suppose we have three numbers c0, c1 and h, and a binary string S. We can flip any bit in S. We should pay h coins for each change. After some changes (possibly zero) we want to buy the string. To buy the string we should buy all its characters. To buy the bit 0 we should pay c0 coins, to buy the bit 1 you should pay c1 coins. We have to find the minimum number of coins needed to buy the string.So, if the input is like c0 = 10; c1 = 100; h = 1; S = ... Read More
A disaster is described as a sudden misfortune that is disastrous to an undertaking. Natural disasters contains all types of severe weather, which have the potential to pose an essential threat to human health and safety, property, demanding infrastructure, and homeland security.Natural disasters appears both seasonally and without warning, subjecting the nation to frequent time of insecurity, disruption, and monetary loss. These resources serve to prepare IHEs for several natural disasters, such as winter storms, floods, tornados, hurricanes, wildfires, earthquakes, or any combination thereof.There are specific natural disasters can severely damage the computer system directly, or avoid its operations. These ... Read More
A physical threat is a potential cause of an incident that can result in loss or physical harm to the computer systems. Physical security is represented as the security of personnel, hardware, programs, networks, and data from physical situations and events that can support severe losses or harm to an enterprise, departments, or organization. This contains security from fire, natural disasters, robbery, theft, elimination, and terrorism.Physical threat to a computer system can be as an outcome of loss of the entire computer system, damage of hardware, damage to the computer software, theft of the computer system, vandalism, natural disaster including ... Read More
Physical security is an important part of a security plan. It forms the basis for several security efforts, such as data security. Physical security defines the protection of constructing sites and equipment (and all other data and software contained therein) from theft, vandalism, natural disaster, man-made catastrophes, and accidental damage (e.g., from automatic surges, extreme temperatures, and spilled coffee).It needed solid building construction, appropriate emergency preparedness, reliable power supplies, adequate climate control, and appropriate protection from intruders. Risk assessment process recognizes the organization’s vulnerabilities. It can need the vulnerabilities list to set priorities on resources required.Every improvement of an identified ... Read More
Suppose we have two numbers a and b. Amal and Bimal are playing a game. First each of them writes an integer from 1 to 6, then a dice is thrown. The player whose written number got closer to the number written on the paper, he wins that round, if both of them has the same difference, then that is a draw. If Amal writes the number a, and Bimal writes b, then we have to count the number of possible ways the Amal will win, number of possible draw and number of ways Bimal can win.So, if the input ... Read More
Share buyback is the process by which a company repurchases its own shares from the investors. It results in a decrease in the total number of outstanding shares which in turn increases the value of shares.Companies may tend to buy shares back for a host of reasons. Some of the reasons for share buyback are as follows −Too Much Cash with Very Few Investment OpportunitiesMature companies that have with too much cash on their books but too few opportunities to invest money can resort to share buyback in order to increase the value of shares. The expense in the form ... Read More
Physical security is represented as the security of personnel, hardware, programs, networks, and data from physical situations and events that can support severe losses or harm to an enterprise, agency, or organization. This contains security from fire, natural disasters, robbery, theft, destruction, and terrorism.There are several elements of physical security which are as follows −It can be alternative physical security strategies should be performed. When appropriate, consider the need of window bars, anti-theft cabling (with alarm when cable is disconnected from system), magnetic key cards, and motion detectors.It can be prepared for fire emergencies with suitable automatic non-water fire fighting ... Read More
It has been observed that most shareholders prefer the stability of dividend payouts. The firms may choose to pay dividends in regular intervals to satisfy the needs of the shareholders. Although the amount of dividend paid may change a little from year to year, payouts made every year is usually considered a wise policy.There are three forms of stability of dividends −Constant Dividend Per ShareConstant PayoutConstant Dividend Per Share Plus Extra dividendNow, let's analyze each of these forms in detail.Constant Dividend Per ShareIn some countries, companies prefer to pay dividends which are a portion of the paid-up capital. It is ... Read More
A risk treatment plan should be recognized for all risks identified. Identified risk can be and is generally managed by several approaches such as Risk transfer, risk avoidance, risk reduction and risk acceptance.Risk Acceptance − Risk acceptance is called by the name of risk retention. It is easily accepting the identified risk without creating any measures to avoid loss or the probability of the risk happening. It contains a decision by management to accept a given risk without more mitigation or transfer, for a period of time.This appears in two classes of circumstances. For risks that are too low to ... Read More
Book Building is a method of pricing the shares in the market. There are usually two types of share pricing methods −The Fixed Priced Method −The price of shares when issued remains constant and fixed. The price is usually mentioned before the IPO and the investors are aware of the fixed price of each share.The Book Building Method − There is no fixed price. Instead, there are limits (a lowest and the highest price) in which the shares are traded. When the IPO takes place, the issuers of the securities adjust the price depending on the demand of the shares ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP