subject

Quarter Final Sample Test: 1 Greedy puppy
Tuzik is a little dog. But despite the fact he is still a puppy he already knows about the pretty things that coins are,
He knows that for every coin he can get very tasty bone from his master. He believes that some day he will find a
treasure and have loads of bones.
And finally he found something interesting. A wooden chest containing N coins! But as you should remember,
Tuzik is just a little dog, and so he can't open it by himself. Actually, the only thing he can really do is barking. He
can use his barking to attract nearby people and seek their help. He can set the loudness of his barking very
precisely, and therefore you can assume that he can choose to call any number of people from a minimum of 1. to a
maximum of
When people come and open the chest they divide all the coins between them in such a way that everyone will get
the same amount of coins and this amount is maximal possible. If some coins are not used they will leave it on the
ground and Tuzik will take them after they go away. Since Tuzik is clearly not a fool, he understands that his profit
depends on the number of people he will call. While Tuzik works on his barking, you have to find the maximum
possible number of coins he can get.
Input
The first line of the input contains an integer T denoting the number of test cases. Each of next T lines contains 2
space-separated integers: N and K, for this test case.​

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 17:20
What is the best assassins creed game?
Answers: 2
question
Computers and Technology, 24.06.2019 05:30
Why is hard disk space important to an audio engineer? why are usb ports and firewire ports useful for an audio engineer? explain in 2-3 sentences. (3.0 points) here's a list of different audio software: ableton live apple inc.'s garageband apple inc.'s logic studio digidesign's pro tools propellerhead sofware's reason sony creative software's acid pro steinberg cubase steinberg nuendo choose one of the software programs listed above, and then go to that software program's web site. read about what the software program is used for, and then write 4-5 sentences about what you learned. (10.0 points) which type of software license is the most limiting? why? explain in 2-3 sentences. (3.0 points) when sending a midi channel voice message, how can you control the volume of the sound? explain in 2-3 sentences. (4.0 points)
Answers: 1
question
Computers and Technology, 25.06.2019 09:20
Problem 3: (hand) write the member function implementations for the class hand, which simulates a hand of 2 cards, into the file hand.cpp. the relative strength of 2 hands are determined by the following rules: • a pair (two cards of the same number) is the strongest hand. • two cards of the same suit is the next strongest hand. • two cards of different numbers and suits is the weakest hand. • within the same kind of hands, the stronger hand is determined by the larger number. • if two hands are of the same kind and the larger numbers are the same, the stronger hand is given by the hand whose smaller number is larger. • if all above fails, the two hands are of equal strength. i.e., all suits are of equal strength. • 2 is the weakest number. an ace is stronger than a king. you are using a single deck of cards. so a hand of a♥a♥ is impossible. here are some examples:
Answers: 3
question
Computers and Technology, 25.06.2019 10:00
Which of the following methods could be considered a “best practice” in terms of informing respondents how their answers to an on-line survey about personal information will be protected? the investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents’ ip addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed. respondents are informed that investigators will try to keep their participation confidential; however, confidentiality cannot be assured. the investigator uses the informed consent process to explain her institution’s method for guaranteeing absolute confidentiality of research data. respondents are informed that a research assistant will transfer all the research data to a password-protected computer that is not connected to the internet, via a usb flashdrive. the computer is located in a research team member’s office.
Answers: 2
You know the right answer?
Quarter Final Sample Test: 1 Greedy puppy
Tuzik is a little dog. But despite the fact he is st...
Questions
question
Mathematics, 23.08.2019 00:40
Questions on the website: 13722361