Linked lists are collections of data items "lined up in a row"-- insertions and deletions can be made anywhere in:________
a. linked list.
b. Insertions and deletions are made only at one end of a stack, its top.
c. Insertions and deletions are made only at one end of a queue, its tail.
d. Binary trees facilitate high-speed searching and sorting of data.

Answers

Answer 1

Answer:

a. linked list

Explanation:

a b c are all correct statements..... but

insertions and deletions can happen anywhere in a linked list. Not Stack, Not Queue.


Related Questions

Consider a Rational class designed to represent rational numbers as a pair of int's, along with methods reduce (to reduce the rational to simplest form), gcd (to find the greatest common divisor of two int's), as well as methods for addition, subtraction, multiplication, and division. Why should the reduce and gcd methods be declared to be private.

Answers

Answer:

There is not a reason for the two methods to be private unless you want to only allow objects of the class Rational to have access to these methods.  Perhaps your professor has a particular reason for requiring it to be set up as such.

Explanation:

The use of the private space simply restricts access to either variables or methods contained within the space to the class object that is associated with the variable or methods.

The use of the public space allows the method or variable to be accessed from anywhere within the program.

Note, if using class inheritance, classes that inherit from the Rational class will not be able to access the private functions.

The preferred means of creating multithreaded Java applications is by implementing the ________ interface. An object of a class that implements this interface represents a task to perform.

Answers

Answer:

Runnable.

Explanation:

Java is an all round programming language which is typically object-oriented and class-based. It was designed by James Gosling, developed by Sun microsystems and released officially on the 23rd of May, 1995. Java programming language is designed to have only a few implementation dependencies as possible because it was intended to be written once, and run on any platform.

Java makes concurrency to be available to software developers through the application programming interface (API) and the language. Also, it supports multiple threads of execution, by making each thread have its respective program counter and method-call stack, which then allow concurrent executions with other threads.

The preferred means of creating multithreaded Java applications is by implementing the runnable interface. An object of a class that implements this interface represents a task to perform. The code is public void run ().

what is a good electric fan for your room?​

Answers

Answer:  a box fan

Explanation:

the get you really cold easily and its easy to turn off and on

Which statement is false? Select one: a. A class is to an object as a blueprint is to a house. b. Classes are reusable software components. c. Performing a task in a program requires a method. d. A class is an instance of its object.

Answers

Answer:

A class is an instance of its object

Explanation:

How I to turn this ''loop while'' in ''loop for''? var i = 0; while (i < 20) { var lineY = 20 + (i * 20); line(0, lineY, 400, lineY); i++; }

Answers

Answer:

for(i = 0; i<20;i++){

lineY = 20 + (i * 20);

line(0, lineY, 400, lineY) }

Explanation:

First declare and initialize the variable i. You have not specified the data type of i so if the data type of i is integer i.e. int then you should declare i variable in the for loop as for(int i = 0; i<20;i++)

So the given while loop has a variable i which is initialized to 0. Then while(i<20) means that while loop executes until the value of i exceeds 20. If this while condition is true then the two statements inside its body will execute. The two statements are: lineY = 20 + (i * 20);

line(0, lineY, 400, lineY);

The value of i ins incremented after each iteration i.e. i++

So while loop has the following syntax"

1) initialization;  ---->  i = 0

2) while(condition) {  ----> i<20

3) loop body ----->  lineY = 20 + (i * 20); line(0, lineY, 400, lineY);

4) increment or decrement loop variable  } ----> i++

For loop has the following syntax:

for( initialization of loop variable ; condition; decrement/increment loop variable)  {

loop body }

Here:

initialization  ---->  i = 0

condition        ----> i<20

loop body     -----> lineY = 20 + (i * 20); line(0, lineY, 400, lineY);

increment or decrement loop variable  ---->  i++

Identify the statement below which is true. Cloud computing eliminates the need for companies to own their own software and servers. Cloud computing is a control technique for system availability. Cloud computing eliminates the need for backup of applications and data. Cloud computing refers to the practice of storing application files and backup data on satellites "in the clouds."

Answers

Answer:

The answer is "Cloud computing is a control technique for system availability".

Explanation:

The term cloud computing provides on-demand computer network services, which including storing data (information) and computing resources, without client-specific active management. Its definition is often used to identify network infrastructure for several web users, that's why the above choice is a correct and wrong choice can be described as follows:

It also needs in businesses with using their apps and servers but can't be removed, that's why it is wrong  It does n't  only one the satellites, that's why it is wrong  It is used for storing data not for removing, that's why it is wrong.

Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O. b. Tubes are synchronized communication channels between threads. c. A filter stream provides additional functionality, such as aggregating data bytes into meaningful primitive-type units. FilterInputStream and FilterOutputStream are typically extended, so some of their filtering capabilities are provided by their concrete subclasses. d. A PrintStream performs text output. System.out and System.err are PrintStreams.

Answers

Answer:

The answer is "Option b".

Explanation:

Tubes were streams among processes, that are interconnected. It is coordinated ways to communicate between threads, that's why the only option b is wrong, and the correct choice can be defined as follows:

In option a, the byte-based I/O the input and output stream abstract class is used, that's why it correct. In option c, It is used to provide additional functionality, that's why it correct.   In option d, It is used to provide the text output.

Find dy/dx and d2y/dx2. x = t2 + 5, y = t2 + 5t dy dx = Correct: Your answer is correct. d2y dx2 = Correct: Your answer is correct. For which values of t is the curve concave upward? (Enter your answer using interval notation.) Changed: Your submitted answer was incorrect. Your current answer has not been submitted.

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

Given value:

[tex]x = t^2 + 5......(1)\\\\ y = t^2 + 5t........(2)[/tex]

To find:

[tex]\bold {\frac{dy}{dx} \ \ \ and\ \ \ \frac{d^2y}{dx^2} = ?}[/tex]

Differentiate the above equation:

equation 1:

[tex]\frac{dx}{dt}= 2t.......(1)\\[/tex]

equation 2:

[tex]\frac{dy}{dt}= 2t+5[/tex]

Formula:

[tex]\frac{dy}{dx}= \frac{\frac{dy}{dt}}{\frac{dx}{dt}}\\\\[/tex]

[tex]\boxed{\bold{\frac{dy}{dx}=\frac{2t+5}{2t}}}[/tex]

To calculate the [tex]\bold{\frac{d^2y}{dx^2}}[/tex] we Differentiate the above equation but before that first solve the equation:

Equation:

[tex]\frac{dy}{dx}=\frac{2t+5}{2t}[/tex]

    [tex]=\frac{2t}{2t}+\frac{5}{2t}\\\\= 1+\frac{5}{2t}\\\\=1+\frac{5}{2} t^{-1} \\[/tex]

Formula:

[tex]\bold{\frac{d}{dx} \ x^n = nx^{n-1}}[/tex]

[tex]\frac{dy^2}{dx^2}= 0+\frac{5}{2} (-1 t^{-2})\\\\[/tex]

      [tex]= -\frac{5}{2} t^{-2}\\\\= -\frac{5}{2 t^2} \\\\[/tex]

[tex]\boxed{\bold{\frac{d^2y}{dx^2}=-\frac{5}{2t^2}}}[/tex]

Answer:

d2y dx2

Explanation:

Unspecified a. typical IPv6 prefix used to indicate the network portion of the address. /64 b. IPv6 address represented as ::/128 (compressed form) and cannot be assigned to an interface Unique local c. Unique, internet-routable IPv6 address (dynamic or static) Loopback d. Used to communicate with other devices only on the same IPv6 subnet.

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given statements there are some mistype errors so, in the explanation section, we define the question with their suitable answer.

In choice A:

The Internet Protocol version 6 (IPv6) Prefix Length is being used to identify however many bits are already in the network part of its Global Unicast IPv6 address. It uses the number 64 for employed to recognize the network part of the very first 64 bits, that's why in Option A answer is "/64".

In choice B:

An IP address is used to represent 8 classes, in which each representing 16 bits, in the representation IP address it uses:: that is unspecified, that's why in Option B answer is "Unspecified".

In choice C:

The global unicast is a single connection on each sender and receiver, it specified from each network address, through one position upon its network to the other, that's why in Option C answer is "global unicast".

In choice D:

The link-local is used to communicate with other devices with the same IPv6 subnet, that's why in Option D answer is "link-local".

Please find the attachment of the question:

Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective data______program.
a. data structuring.
b. data privacy.
c. data recovery.
d. data piracy.

Answers

Answer:

b. data privacy

Explanation:

one of the importance jobs is establishing an effective data privacy program inorder to keep tracks of sensitive information or documents and how it is collected, stored, and use.

Data privacy which is also refer to as information privacy is the aspect of information technology that deals with the capacity of an organization in safeguarding the information received.

Common concerns with backups are disk failure, lack of redundancy, and the necessity of future growth of disk capacity. Which backup method adresses these concerns and has multiple levels of use depending on how you want to prioritize features like performance, capacity, or reliability

Answers

Answer:

RAID Array

Explanation:

Backups are needed in the IT industry to take care of some harm that can affect data resulting in its lose. RAID is the acronym for Redundant Array of Independent Disks. RAID combines multiple physical disks into a large virtual disk. It has different levels which range from 0, 1, 5, 6, and 10. RAID has a high degree of optimizing the data capacity of a backup device and its different levels prioritize features like performance, capacity, and reliability.

It also accommodates the future growth of disk capacity and reduces to the minimum the risk of data loss. It is very useful in ensuring data storage.

Which of the following is true? a. Pseudocode is used to describe an algorithm. b. Pseudocode is not an actual computer programming language. c. Pseudocode is used to describe executable statements that will eventually be translated by the programmer into a program. d. All of the above.

Answers

Answer:

Correct answer is:

d. All of the above

Explanation:

First of all, let us learn about a pseudo code:

Pseudo code: It is an implementation of any algorithm written with the help of annotations and text using in simple English. (So, point a. is true)

It is written in English so its syntax is not like any actual programming language. (So, point b. is true)

Pseudo code describes what each line of pseudo code will do so the code writing becomes easier simply by translating the pseudo code to actual programming language syntax i.e. point c. is true.

Hence, point "d. All of the above" is true.

Advantages of Pseudo code :

It makes the readability of the program idea/approach better.Code writing becomes easier for the programmer.

Correct answer is:

d. All of the above

Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.

Answers

Answer:

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

Explanation:

Below are the options

A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

C) Create all new regional folders and move the reports to the respective region folder with subscribe access.

D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region

In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime

Hence, the correct option is B.

Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.

From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.

Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.

Learn more about folders on:

https://brainly.com/question/20262915

How to do this question , please answer quickly , I’ll give branliest

Answers

Answer:

First you analyze all the data that your program needs. You can do this by drawing UML diagrams or whatever you find convenient.

In your case you'll model an item, a stock, supplier and user. You may not end up implementing all of that, but it's good to get a feel for the extent of your assignment.

You can then define use-cases, i.e., tasks or flows through your program, in your case these would simply be the tasks of your 5 menu options. You can write down what happens to the modeled data for each of those flows.

The combination of the use-cases and data modeling will make clear what data structures you'll actually need. For example, the role of the supplier name is unclear. From the requirements it doesn't say if that has to be stored somewhere.

Note that we haven't talked about programming yet at this stage. This is your analysis.

Then you choose a programming language and start implementing. Test corner cases and unexpected input (like empty lists, quantities of zero and negative).

What is the best use of a line chart? (A.)to show parts of a whole while emphasizing specific data,(B.)to compare and contrast discrete categories of data,(C.)to display data that changes over time(D.)to display data points that are unconnected and distinct

Answers

I think the answer to the question is C

The ___________ button represents the start of a hyperlink in Table of contents.

Answers

Answer:

An LS button

Explanation:

It appears on the (structure line 3)on the structure line, place your cursor in the white field to the right of the E button (Recall that the E button represent the entry test).

A string array:
A. Stores an actual string in each of its elements.
B. Can only provide access to strings of a certain length.
C. Is actually an array of pointers.
D. Is always less memory efficient than an equivalent double-subscripted array.

Answers

Answer:

C :Is actually an array of pointers

Explanation:

Here, we want to choose which of the options fit best as the answer to the question.

The correct answer here is that the string array is an array of pointers

A string array is used to store string of characters. The term array is an indication of the fact that it is a collection

How do I make my kali Linux faster in my virtual box?

Answers

Answer:

If you run any operating system as a VM, it is going to be slower than if you were to run it as a native OS. You can, however, make a VM run faster by allocating more CPU cores and RAM to it in your hypervisor's (such as Virtualbox or VMWare) settings menu for your VM.

does that make sense?

What VM are you using? if your using virual box then try adding more RAM to it. I use VMware player 16 and its REALLY fast so try that. Also, go on online and look up this guy called network chuck.

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud

Answers

Answer:

D) A private cloud

Explanation:

Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.

Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.

Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.

urgent ..algorithm and flowchart to check weather a number is odd or even ???​

Answers

Answer:

if it's 0 then the number is even.else number is odd

Explanation:

if it's divisible by 2.then the reminder will be 0,

then the number is even.

thanks

Answer:

Hello!!!

I'm not sure about first one but second is correct one.

no. means number (i didnt had place so)

so, i hope it helps you a little....

Escribe todas las posibles combinaciones que pueden haber entre 4 bits.

Answers

Answer:

The answer is "[tex]\bold{2^n\ \ _{where} \ \ \ n \ is\ bit }[/tex]"

Explanation:

The Combinations could be produced by using n-bits [tex]2^n[/tex] . It s enables you to generate the 4-bit numbers that are:

[tex]\to 2^4 = 16[/tex] combinations.

for the 4-bit, the combination of 2 = 16, which are its possible combination and for the   10 variations  appropriate 16 combinations are used,  As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.

Does anyone know how to fix this problem My kali Linux is getting stuck on the failed to send host log message the first time I run it but when I reset it it gets fixed but I wanna stop it from freezing and getting stuck on that error message

Answers

Update it, or just get a new Linux

Answer:

Is

Explanation:

You should check with a person repairing computers or call him and ask him Wats the problem with your pc or laptop or computer. This is just a suggestion. U can also get what to do from sites in the internet.

Hope this helps....

Have a nice day!!!!

A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228-236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The static NAT stands for (static Network Address Translation), which enables the user to modify a single interpretation for a local second-order to the external environment addresses, and all IP and port numbers were also transcribed inside to random traffic as well as from outside with the internal traffic.

It is used to map network traffic by an internal IP address from a static external IP address. It provides a fixed conversion for actual addresses onto maps. It offers Internet access to the network equipment via a private LAN with such a private IP address which is not recorded.Please find the attachment of the ip address.

A 1kg block is being pushed against a wall by a force F = 75 N as shown. The coefficient of friction is

0.25. The magnitude of acceleration of the block is​

Answers

Answer:

37deg

Explanation:

Answer:

37n

Explanation:

What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information? a. LDAP poisoning b. LDAP injection c. Kerberos injection d. DAP hijacking

Answers

Answer:   b. LDAP injection

Explanation:

LDAP (Lightweight Directory Access Protocol ) Injection is defined as

an injection attack used by attacker to exploit web based applications by inserting LDAP statements based on user input. It may be possible modify LDAP statements through some techniques if an application fails to properly sanitize user input.

So, LDAP injection is the attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information.

Hence, the correct option is b. LDAP injection.

Answer:

dap

Explanation:

you suck 1v1 me epic Jayden rock star

Meaning of software

Answers

Answer:

Is a collection of data or computer instructions that tell the computer how to work.

Explanation:

what is the best phone company that sells long lasting battery life phones?​

Answers

Answer:

A lot of people won't agree with me, but I have had phones from a variety of companies and found Motorola phones to be by far the best.

Explanation:

Answer:

apple but sometimes the batterys be breaking  fast lol

Explanation:

By what decade were books readily available to the public across the United States and Europe? A. 1690 B. 1750 C. 1860 D. 1820

Answers

Answer: 1820

Explanation:

I believe the answer is the 1820, as the introduction of steam powered printing presses and steam powered paper mills significantly lowered the cost of books to decrease and significantly increased their circulation/availability.

hope this  helps

-lvr

Dr. Garcia is a business professor at a large state college. At the start of each workday, he opens a Web browser on his office computer and accesses the university’s Web site. From there, he logs into his institution’s "MyCollege" portal with his username and password. From the portal he can access his email, Web pages for each of his courses, and confidential information about the students he advises. Most likely, Dr. Garcia is using what kind of network when using the portal?

Answers

Answer:

b. Intranet

Explanation:

An intranet refers to the private network that used to sharing the information, for collaboration, connecting the servcies, etc. It can be accessed by only the users who are authorized to use it. Plus, it only used inside the outside organization

So according to the given situation, since Dr Garcia has his credentials that represents the confidential information so it is an intranet netwrok

Which of the following statements is true? A. Ethernet connections allow the most mobility for users. B. Maximum advertised connection speeds are for Wi-Fi connections only. C. Every computer user can expect the same Internet connection speed. D. The actual speed of a network can differ from the maximum advertised speeds. E. Wi-Fi is the best option for intensive Internet users who have high data

Answers

Answer:

A

Explanation:

Ethernet connections allow the most mobility for users

Employees often have more than one laptop-so one or both of them are always handheld. For this cause, companies turn to the versatility and scalability of wireless networks. It is convenient to grant workers connectivity through a wireless network, which they can use to connect several devices. Tablets, smartphones and laptops can all be connected to the network, which enables employees to access

Answer: D. The actual speed of a network can differ from the maximum advertised speeds



Explanation:

just got it correct on the test

Other Questions
car traveling on a flat (unbanked), circular track accelerates uniformly from rest with a tangential acceleration of a. The car makes it one-quarter of the way around the circle before it skids off the track.From these data, determine the coefficient of static friction between the car and the track what is the differences between amorphous solid and crystalline solid Even though cannabis use is legal in some states, it may not be allowed on a college campus in those states because:They are religious institutions They receive federal fundingThey have students under age 18They have lobbied to be exempt to protect students What is the ball's acceleration? Brad walked a total of 24 kilometers by making 6 trips to school. After 21 trips to school, how many kilometers will Brad have walked in total? Solve using unit rates. Which equation best represents the net ionic equation for the reaction that occurs when aqueous solutions of potassium phosphate and iron(II) nitrate are mixed? Question 8 options: 3Fe2+(aq) + 2PO43(aq) Fe3(PO4)2(s) 2K+(aq) + Fe(NO3)2(aq) 2KNO3(aq) + Fe2+(aq) 3Fe2+(aq) + 2PO43(aq) Fe3(PO4)2(aq) 2K3PO4(aq) + 3Fe2+(aq) Fe3(PO4)2(s) + (K+)6(aq) 2K3PO4(aq) + 3Fe(NO3)2(aq) Fe3(PO4)2(s) + 6KNO3(aq) Elements of a Flexible BudgetsPresented are partial flexible cost budgets for various levels of output.RequiredSolve for items "a" though "n"Rate per unit Units 1,000 1,500 2,000Direct materials $10,000 Direct labor 3,000 Variable overhead $3.00Fixed overhead Total $40,000 What can a firm do to increase productivity in the short run once its marginal product is zero? Increase the quantity of the input. Decrease the quantity of the input. Lower the price of its product. Raise the price of its product. Nothing, as more workers decreases total product. The people who responded to a survey reported that they had either brown, green, blue, or hazel eyes. The results of the survey are shown in the table. A 2-column table has 4 rows. The first column is labeled Eye Color with entries brown, green, blue, hazel. The second column is labeled Number of People with entries 20, 6, 17, 7. What is the probability that a person chosen at random from this group has brown or green eyes? StartFraction 3 Over 25 EndFraction StartFraction 7 Over 25 EndFraction StartFraction 13 Over 25 EndFraction StartFraction 17 Over 25 EndFraction what is cell? explain in your own word. For reaction: 2 C + O2 --> 2 CO2 If 5.50 g C was reacted with enough O2, what would be the volume (in liter) of the CO2 generated at STP? (0 C and 1 atm) An isotope of lead can be represented by the following symbol 82 PB. From this symbol, it can be deduced that one atom of the isotope has: A) 82 neutrons B) 82 protons C) 125 protons D) 207 protons plz tell me this solution Hermes International produces a Kelly handbag, named for the late actress Grace Kelly. Craftsmen stitch the majority of each $7,000 bag by hand and sign it when they finish. This is an example of _____ production. In Mordica Company, total materials costs are $42,000, and total conversion costs are $54,480. Equivalent units of production are materials 10,000 and conversion costs 12,000.A. Compute the unit costs for materials and conversion costs. (Round answers to 2 decimal places, e.g. 2.25) Materials cost per unit $ Conversion cost per unit $ B. Compute total manufacturing costs. (Round answers to 2 decimal places, e.g. 2.25) Total manufacturing cost per unit $ How does a price war affect customers? Flywheels are large, massive wheels used to store energy. They can be spun up slowly, then the wheel's energy can be released quickly to accomplish a task that demands high power. An industrial flywheel has a 1.5 m diameter and a mass of 250 kg. Its maximum angular velocity is 1200 rpm.How long does it take the flywheel to reach top angular speed of 1200 rpm? What is the circumference of a circle with a diameter of 100m. A 100m B 157m C 300 m D 314m Andrea walton is a 68-year-old woman in reasonably good health. she is 64 inches tall and weighs 180 pounds. she takes a daily multi-vitamin supplement and over-the-counter antacids for heartburn. her usual diet includes lean meat, chicken, fish, and fresh vegetables and seasonal fruit from her garden. she now reports having severe heartburn after a family reunion picnic over the labor day weekend, and over the past two days has experienced diarrhea and painful stomach cramps.1. Based on her history, which of the following is the most likely explanation for Andreas sudden onset diarrhea?a. her ageb. foodborne illnessc. being overweightd. the multivitamine. stress associated with the family reunion2. What is the most likely cause of Mrs. Treats heartburn?a. her ageb. foodborne illnessc. being overweightd. the multivitamine. stress associated with the family reunion A 0.12-kg metal rod carrying a current of current 4.1 A glides on two horizontal rails separation 6.3 m apart. If the coefficient of kinetic friction between the rod and rails is 0.18 and the kinetic friction force is 0.212 N , what vertical magnetic field is required to keep the rod moving at a constant speed of 5.1 m/s