subject

Application logs are useful in analyzing interaction with an application and may also be used to detect suspicious activities. A log file is provided as a string array where each entry represents a money transfer in the form "sender_user_id recipient_user_id amount". Each of the values is separated by a space. • sender_user_id and recipient_user_id both consist only of digits, are at most 9 digits long and start with non-zero digit amount consists only of digits, is at most 9 digits long and starts with non-zero digit • Logs are given in no particular order. Write a function that returns an array of strings denoting user_id's of suspicious users who were involved in at least threshold number of log entries. The id's should be ordered ascending by numeric value. Example logs = ["88 99 200", "88 99 300", "99 32 100","12 12 15") threshold 2 The transactions count for each user, regardless of role are: ID Transactions 99 32 There are two users with at least threshold - 2 transactions: 99 and 88. In ascending order, the return array is ('88', '99'). Note: In the last log entry, user 12 was on both sides of the transaction. This counts as only 1 transaction for user 12. Function Description Function Description Complete the function processLogs in the editor below. The function has the following parameter(s): string logs/n): each logsli) denotes the ith entry in the logs int threshold: the minimum number of transactions that a user must have to be included in the result Returns: stringl): an array of user id's as strings, sorted ascending by numeric value Constraints • 1sns 105 • 1 sthreshold sn • The sender_user_id, recipient_user_id and amount contain only characters in the range asci['O'-'9'). • The sender_user_id, recipient_user_id and amount start with a non-zero digit. • 0 < length of sender_user_id, recipient_user_id, amounts 9. • The result will contain at least one element

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 00:00
11. is the ability to understand how another person is feeling. a. authority b. sympathy c. empathy d. taking a stand
Answers: 1
question
Computers and Technology, 22.06.2019 16:30
You have inserted new slides based on a word outline. how do you format these new slides to match the powerpoint presentation formatting? a. select all slides in the presentation and click format on the home tab. b. select the new slides and click reset on the home tab. c. select all slides in the presentation and click reset on the home tab. d. select the new slides and click format on the home tab.
Answers: 2
question
Computers and Technology, 23.06.2019 04:00
In a word processing program, such as microsoft word, which feature to you choose the desired picture enhancement?
Answers: 2
question
Computers and Technology, 23.06.2019 09:30
Given a link with a maximum transmission rate of 32.8 mbps. only two computers, x and y, wish to transmit starting at time t = 0 seconds. computer x sends filex (4 mib) and computer y sends filey (244 kib), both starting at time t = 0. statistical multiplexing is used, with details as follows packet payload size = 1000 bytes packet header size = 24 bytes (overhead) ignore processing and queueing delays assume partial packets (packets consisting of less than 1000 bytes of data) are padded so that they are the same size as full packets. assume continuous alternating-packet transmission. computer x gets the transmission medium first. at what time (t = ? ) would filey finish transmitting? give answer in milliseconds, without units, and round to one decimal places (e.g. for an answer of 0.013777 seconds you would enter "13.8" without the quotes)
Answers: 3
You know the right answer?
Application logs are useful in analyzing interaction with an application and may also be used to det...
Questions
question
Mathematics, 16.03.2020 20:22
question
Mathematics, 16.03.2020 20:22
question
Mathematics, 16.03.2020 20:22
Questions on the website: 13722367