X274: Recursion Programming Exercise: Cannonballs Spherical objects, such as cannonballs, can be stacked to form a pyramid with one cannonball at the top, sitting on top of a square composed of four cannonballs, sitting on top of a square composed of nine cannonballs, and so forth.

RequireD:
Write a recursive function that takes as its argument the height of a pyramid of cannonballs and returns the number of cannonballs it contains.

Answers

Answer 1

Answer:

The function in C is as follows:

#include <stdio.h>

int C_ball(int height){

if(height == 1) {

       return 1;}

   return (height * height) + C_ball(height - 1);}      

int main(){

   int n;

   printf("Height: ");

   scanf("%d",&n);

   printf("Balls: %d",C_ball(n));

   return 0;

}

Explanation:

The function begins here

#include <stdio.h>

This defines the function

int C_ball(int height){

If height is 1, return 1

if(height == 1) {

       return 1;}  

This calls the function recursively

   return (height * height) + C_ball(height - 1);}

The main begins here

int main(){

This declares the height as integer

   int n;

This prompts the user for the height

   printf("Height: ");

   scanf("%d",&n);

This calls the function

   printf("Balls: %d",C_ball(n));

   return 0;

}


Related Questions

1.An algorithm used to find a value in an array is called a ______________.
2.A search algorithm returns the element that we’re searching for, rather than the index of the element we’re searching for.
A.True
B.False
3.Suppose we used our searching algorithm to look for a specific element in a list. The algorithm returned -1. What does this mean?

A.Our algorithm found the element we were looking for which is -1.
B.Our algorithm did not find the element we were looking for.
C.Our algorithm found the element, but could not determine the index.
D.Our algorithm found the element at index -1.

Answers

Answer:

1.search 2.False 3.Our algorithm did not find the element we were looking for.

Explanation:

An algorithm used to find a value in an array is called a:

Search

A search algorithm returns the element that we’re searching for, rather than the index of the element we’re searching for is:

False

If we used our searching algorithm to look for a specific element in a list and the algorithm returned -1. The thing which this means is:

Our algorithm did not find the element we were looking for.

What is Algorithm?

This refers to the use of well defined instructions to execute a particular problem in sequential order.

With this in mind, we can see that algorithm is used to search for particular items and when the item is not found, then there would be a return of -1 because the element was not included in the array.

Read more about algorithms here:
https://brainly.com/question/24953880

For current events, what type of sources would we use to learn about them?

A”Scholarly journals

B”News sources (broadcast, web, print)

C”Books

D”Reference works (encyclopedias, almanacs, etc.)

Answers

Answer:

B. News Sources (broadcast, web, print)

Explanation:

To learn about current events the most ideal sources of reference are News sources, either broadcast, web or print.

For example, if you're seeking breaking news or stories that are developing in the business world, the following sources are News sources you can turn to as sources of reference: CNN Business, Forbes, Bloomberg's Business Week, Fortune and other relevant Business News Media outfits.

Fyroff consultants, a leading software consulting firm in the United States, decides to launch an Enterprise Resource Planning (ERP) solution. The company chooses the brand name Fyroff Enterprise for the new solution. However, when the company attempts to register the domain name, it finds that a small unknown firm is already registered under the same domain name. The small firm is now attempting to sell the domain name to Fyroff. Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?
a. cybersquatting
b. logic bombing
c. cyberbullying
d. bot herding
e. cyberstalking

Answers

Answer:

The correct answer is a. cybersquatting

Explanation:

Cybersquatting is the registration of a domain name that corresponds to the denomination of a brand or name, with the main objective of obtaining some economic benefit from its sale to the owner and legitimate owner of the brand. Cybersquatting can range from making money by parking domains (buying names that are then "parked", that is, left unused but generating advertising revenue based on the visits they receive) to redirecting users to another website In order for it to get more traffic, that is, with cybersquatting it is generally intended to sell the registered domain names to the legitimate owners or interested parties, at a price well above the cost of registration or also to use the domain taking advantage of the recognition associated with the legitimate owner to obtain commercial advantages, as clients in the network.

Create a new Java program called MyInfo. Create one or more method(s) that pass the following information as parameters and prints it when the method is called. Full name Middle Initial Age Major GPA Once completed, paste code.

Answers

Answer:

Answered below

Explanation:

//Program in Java

class MyInfo{

public static void main (String args []){

myFullName("John", "Doe");

myAgeMajorGPA(20, "Biology", 4.3);

}

public void myFullName(String initialName, String middleName){

System.out.println(initialName);

System.out.print(middleName);

}

public void myAgeMajorGPA(int age, String major, double GPA){

System.out.println(age);

System.out.println(GPA);

System.out.print(major);

}

}

What are the uses of computer in educational setting?

Answers

Answer:

Quick Communication & Correspondence

Explanation:

Another main advantage of using computers in the education field is the improvement in the quality of teaching-learning process and communication between students & teachers. For this, they use Microsoft PowerPoint to prepare electronic presentations about their lectures.

Answer:

there are different uses of computer in education setting fact from its application include

E learninginstructional materialE examease of communicationstorage

Which of the following is not a type of degree of freedom?
A. Twisting
B. Linear movement
C. Rotation
D. Bending

Answers

Answer:

Option (B) Linear movement will be the answer.

A spinner is divided into 4 equal sections colored red, green, blue, and orange. Ennis spins the spinner. What is the probability that he dont not spin orange?

Answers

the probability would be 3/4

Write a program that asks for the number of units sold and computes the total cost of the purchase. Input validation: Make sure the number of units is greater than 0. Use output (stream) manipulators: 2 digits after the decimal point g

Answers

Answer:

Explanation:

The following code is written in C++, it asks the user for input on number of units sold and places it in a variable called units_sold. Then it asks for the package price and places that value in a variable called package_price. Finally it multiplies both values together into a variable called final_price and adjusts the decimals.

#include <iostream>

#include <iomanip>

using namespace std;

       int main()

       {

       // Variables

       int units_sold,

       final_price;

       // ask user for number of units sold

       cout << "\nEnter number of units sold: ";

       cin >> units_sold;

       

       //ask for Package price

       cout << "\nEnter Package Price: ";

       cin >> package_price;

       // Total amount before discount

       final_price = units_sold * package_price;

       cout << setprecision(2) << fixed;

       cout << endl;

       return 0;

       }

what are the groups located within developer tab? check all that apply.

Controls
References
Code
Protect
Add-Ins
Macros​

Answers

Answer:

controls, code, protect, and add-ins!

Explanation:

edge 2021

The following segment of code is meant to remove the even numbers from an ArrayList list and print the results:

int counter = 0;
while(counter < list.size())
{
if(list.get(counter) %2 == 0)
{
list.remove(counter);
}
counter++;
}
System.out.println(list.toString());
The method as written, however, is incorrect. Which ArrayList(s) list would prove that this method was written incorrectly?

I.
[1, 2, 3, 4, 5]
II.
[2, 4, 5, 6, 7]
III.
[2, 4, 6, 8, 10]
IV.
[2, 5, 6, 7, 8]
III only


II and IV


II only


I and IV


II and III

Answers

Answer:

II and III

Explanation:

I took the quiz and got this wrong, but it gives you the answer afterwards, just trying to help everyone else out.

Answer:

II and III

Explanation:

Order the steps to autofilter data

Answers

Answer:

Select the data you want to filter.

Click Data > Filter.

Click the arrow. ...

Choose specific values: Uncheck (Select All) to clear all of the check boxes, and then check the boxes for the specific value(s) you want to see.

Explanation:

1. Select the data you want to filter.

2. Click Data > Filter.

3. Click the arrow. ...

4. Choose specific values: Uncheck (Select All) to clear all of the check boxes, and then check the boxes for the specific value(s) you want to see.

Answer:

Select any cell in the data range > Click the data tab > Go to the sort & filter group > Click filter and select proper controls

Explanation:

i got it right lol :)

____ a device receiving a process variable

Answers

Answer:

Transmitter

Maybe this is the answer or the question is wrong.

Explanation:

In the world of process control, a Transmitter is a device that converts the signal produced by a sensor into a standard instrumentation signal representing a process variable being measured and controlled.

The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis_ but there is a large variety of best practices that do not appear to be in place. Which of the following would be BEST to ensure all systems are adhering to common security standards?
A. Configuration compliance
B. Patch management
C. Exploitation framework
D. Network vulnerability database

Answers

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

When text is used as a Hyperlink, it is usually underlined and appears as a different color.

Question 3 options:
True
False

Answers

True it usually shows up with a blue underline

In this laboratory, we are going to maintain a username-password system by storing the usernames and passwords in a file. The file will consist of a single username and password per line with a space in between.
1. Begin by creating a class PasswordFile which has the following interface:
class PasswordFile
public:
PasswordFile(string filename); // opens the file and reads the names/passwords in the vectors user and password.
void addpw(string newuser, string newpassword); //this adds a new user/password to the vectors and writes the vectors to the file filename bool checkpw(string user, string passwd); // returns true if user exists and password matches
private:
string filename; // the file that contains password information
vector user; // the list of usernames
vector password; // the list of passwords
void synch(); writes the user/password vectors to the password file
The constructor accepts a filename, and reads the file one-line at a time and adds values to the vectors user and password. The function addpw adds a user/password pair to end of each vector.
2. Now create a password.txt file with some entries such as:
jsmith turtle
madams apple
Also create a main program to test your classes :
int main() PasswordFile passfile
("password.txt");
passfile.addpw("dbotting","123qwe");
passfile.addpw("egomez", "qwerty");
passfile.addpw("tongyu", "liberty");
// write some lines to see if passwords match users

Answers

Answer:

Explanation:

ok i will do it for ya

Very large storage system that protects data by constantly making backup copies of files moving across an organization's network is known as ...

Answers

Answer:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

Explanation:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

What is File system failure?

File system failure refers to disk-related errors that may be due to corrupt files,  disk integrity corruption, file execution policies, bad sectors, etc. These errors may prevent be causing users from accessing or opening files. The first line of defense against a file system failure is a well-defined set of proper system backup and file maintenance procedures.

These errors can be encountered in files such as images, documents, PDFs, movies, etc. In order to protect and provide defense against file system failure, it is important to manage proper backup and file maintenance procedures.

Therefore, RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

You can learn more about file system at:

brainly.com/question/14312784

#SPJ2

As Jane was setting up her projector, she realized that the images on the screen appeared blurred. How would Jane sort out the issue by herself?
A.
check that the monitor is connected properly with the projector
B.
adjust the distance between the screen and the projector
C.
make changes in the system settings
D.
adjust the focus

Answers

it would be D, adjust the focus
The answer is D. Adjust the focus

When gathering the information needed to create a database, the attributes the database must contain to store all the information an organization needs for its activities are _______ requirements.

Answers

Answer:

Access and security requirements

What is a fundamental difference between the SAP platform and the AirBnB platform?

Answers

The fundamental difference between the SAP platform and the AirBnB platform is that;

SAP is an enterprise resource planning platform and AirBnb is a collaborative platform

SAP and AirBnB SAP ERP is defined as an enterprise resource planning software developed by the German company SAP SE. Thus, it is used to assist companies with the management of business areas involving finances, logistics and human resources.

Meanwhile AirBnB is collaborative platform that allows property owners to list their place as holiday accommodation in order to permit travellers to locate somewhere to stay when they are away from home and family.

Read more about management tools at; https://brainly.com/question/17493537

It is desired to create a mortgage estimator by writing a program containing a function. The user inputs the amount of loan (L), the loan term in number of months (W, and the annual interest rate (D in the script. The script then makes use of a function that accepts these values as inputs through its argument and calculates and returns the monthly payment and the total payments over the life of the loan. The monthly payment and the total payment could be calculated using the following expressions:
monthly payment 1-(1+ 1 112) N I/12 total payment Nxmonthly payment
Note that the interest rate must be expressed in decimal; for example, if the interest rate is 8% it must be entered as 0.08 Test your program for several scenarios and submit the results with the program listing.
The values of L, I, monthly payment, and total payment should be written to a file as shown below:
Interest Loan Amount Interest Months Monthly Payment Total Payment
0.06 10000 36
108 120000 0.05
0.07 85000 48
0.08 257000 240
0.05 320000 120

Answers

Answer:

In Python:

L = int(input("Loan Amount: "))

N = int(input("Months: "))

I = float(input("Annual Interest Rate: "))

monthly_payment = round(L/((1 - (1 + I/12)**(-N))/(I/12)),2)

total_payment = round(N * monthly_payment,2)

 

f= open("outputfile.txt","a+")

f.write(str(L)+"\t\t"+str(I)+"\t\t"+str(N)+"\t\t"+str(monthly_payment)+"\t\t"+str(total_payment)+"\n")

Explanation:

The next three lines get the required inputs

L = int(input("Loan Amount: "))

N = int(input("Months: "))

I = float(input("Annual Interest Rate: "))

Calculate the monthly payment

monthly_payment = round(L/((1 - (1 + I/12)**(-N))/(I/12)),2)

Calculate the total payment

total_payment = round(N * monthly_payment,2)

Open the output file

f= open("outputfile.txt","a+")

Write output to file

f.write(str(L)+"\t\t"+str(I)+"\t\t"+str(N)+"\t\t"+str(monthly_payment)+"\t\t"+str(total_payment)+"\n")

Analyzing Types of Graphics
In which situation would a floating image be more useful than an in-line image?
O You want the image to stay within a specific paragraph of text.
O You want the image to come from a gallery of photos in your camera.
You want the image to be on the final page no matter what happens to the text.
O You want a screen-capture image of a software program on your computer.

Answers

Answer:you want the image to be on the final page no matter what happens to the text.

The situation that a floating image be more useful than an in-line image when you want the image to be on the final page no matter what happens to the text.

What helps in float image?

The use of Cascading Style Sheets is known to be a float property that often functions to help place images on a web page.

Conclusively, given the situation above, that a floating image be more better than an in-line image only if you want the image to be on the final page no matter what occurs in the text.

Learn more about Graphics from

https://brainly.com/question/25817628

What Is the Purpose of a Web Browser? *

Answers

A web browser takes you anywhere on the internet. It retrieves information from other parts of the web and displays it on your desktop or mobile device. The information is transferred using the Hypertext Transfer Protocol, which defines how text, images and video are transmitted on the web.

Answer:

This is your answer. If I'm right so,

Please mark me as brainliest. thanks!!!

What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
O email address
O web address
O UNC path
O All will be automatically converted.

Answers

Answer:

UNC path seems to be the answer

Answer:

UNC path

Explanation:

Select the true statement about network protocols.A protocol determines how the sending computer notifies the receiving computer about the presence of compressed data.A protocol determines how it will be executed on every networked device.A protocol determines how the sending device notifies the receiving device that there is data to be sent.A protocol is not required for all data transmissions.

Answers

Answer:

A protocol determines how the sending device notifies the receiving device that there is data to be sent.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A protocol can be defined as a standard set of rules established by the regulatory agencies to determine how data are transmitted from one network device to another.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

A protocol determines how the sending device notifies the receiving device that there is data to be sent, regardless of any difference in terms of structure or design.

It must ask the user to input the tuition for this year. Suppose the tuition for a university is 10000$ this year and increases 5% every year. In one year, the tuition will be 10500$. Write a Java program that displays the tuition in 10 years, and the total cost of four years’ worth of tuition after the tenth years

Answers

Answer:

Answered below

Explanation:

//Program in Java

int percentIncrease = 0.05;

Scanner scan = new Scanner(System.in);

System.out.print("Enter tuition: ");

int tuition = scan.nextInt();

double tenYearIncrease = (percentIncrease * 10) * tuition;

double tenYearsTotal = tuition + tenYearIncrease;

//Tuition in ten years

System.out.print(tenYearsTotal);

//Total four years after

double newTuition = tenYearsTotal;

double fourYearsIncrease = (percentIncrease * 4) * newTuition;

double fourYearsTotal = newTuition + fourYearsIncrease;

System.out.print(fourYearsTotal);

User ideas for ro blox?

Answers

Answer:

You can put random people, or something you like to do, like Soccer2347 (that was just an example) or your favorite animal, Horse990. But Rob lox has to approve it first

Explanation:

Answer:

You can do a lot of usernames despite the fact that a lot of them have also been taken already. You can do something like your favorite food, sport, etc, and combine it into a couple words, and then add numbers to the end if the name has been taken already.

There is a nickname feature too which let's you name yourself whatever you want.

Hi everyone,
for my undergraduate research project, I'm looking for an R code for agglomerative clustering. Basically, I need to know what happened inside hclust method in R. I have looked everywhere but don't find a proper way to combine 2 data points that have the smallest distance. I was stuck at developing a dissimilarity matrix after the first phase of dissimilarity matrix generation(literally I have generated the first dissimilarity matrix). I'm not specifying R, if anyone could give me a solution in any language I would gratefully accept that.

Answers

Answer:

Answer is being shown in the file to the link

You are the administrative assistant for the Psychology Department in your college, and they have assigned you to set up a small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users. For example, faculty will use the server to post and receive class assignments. Which edition of Windows Server 2016 is most appropriate for this situation?

Answers

Answer: Standard edition

Explanation:

Based on the information given in the question, the edition of Windows Server 2016 that is most appropriate for this situation will be the standard edition.

Since it's going to be fora small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users, the standard edition is appropriate.

Standard edition is ideal in a scenario whereby there's a non-virtualized environments or low density with regards to the population.

Bugs always seem to creep into programs and code. What strategies have you learned to find bugs more easily and crush them with a fix?

Answers

The process involves in  finding bugs as well as crushing them in a debugging process is extensive and this can consist of following process;

Examination of the error symptoms

 identifying the cause of it

 fixing of the error.

 This process is usually required a large amount of work, Although no precise procedure that is set in  for fixing all error, but some  useful strategies that use in reducing the debugging effort.

One of the significant part of this process is  localizing of  the error, which is figuring out the cause as well as the symptoms. Strategies that I have learnt in finding and fixing the error in the process of debugging includes;Incremental as well as  bottom-up program development; development of the program incrementally remains one of the most effective ways that can be used in localizing the error, often testing as the piece of code is added, so with this it will be easier to find the error since any error is from the last piece of code added.And also since the last fragment of the code will be small then searching for bugs won't take much time to find and debug.Bottom-up development helps in  maximizing  the benefits that comes from incremental development. With bottom-up development, after successful testing of a code, it's behavior will not change once another piece is added to it, since existing code will never replied on new part so it will be easier to trace error in the new code and fix it.Instrument program can be used to log information and there can be insertion of print statements.Instrument program using assertions; Assertions  can be used in checking if the program actually maintains the properties or  those invariant that the code relies on,     Because the program will definitely stops once the  assertion fails, and there is actuality that the point where the program reached and  stops is closer to the cause, as well as  good indicator of how the problem looks like , then the bug can then be fixed.breakpoints can be set in the program as well as stepping and over functions, then watching program expressions, as well as  inspection of  the memory contents at a particular point during the execution can give the needed run-time information.Backtracking: this option works in a way whereby one will need to start from the point that the problem occurred then go back through the code to to detect the issue, then the bug can then be fixed.Binary search: this is exploration of the code by using divide and conquer approach, so that the  the bug be pin down quickly.

Therefore, Bugs are treat to programs and they can be dealt with using discussed methods.

Learn more at: https://brainly.com/question/15289374?referrer=searchResults

Creative Commons material often costs money to use.

True
False

Answers

Answer:

true

Explanation:

Other Questions
help please!!!!!!!!!!!!! plz plz plz help asap help please ill give brainliest The higher interest rate of a cash advance on a credit card with an existing balance can be eliminated by paying thecash advance back within four weeks.Please select the best answer from the choices providedA.B.F Answer all parts of the question that follows.a) Identify ONE way in which the outcome of the Second World War in Asia contributed to political change in Asian states in the second half of the twentieth century.b) Explain ONE example of a nationalist movement in Asia that used nonviolence to win independence.c) Explain ONE way in which nationalist movements in Asia were affected by Cold War ideological rivalries in the second half of the twentieth century. Proof Read My Essay.Imperialism EssayImperialism is the taking over of ones country for the conquest of territory. This is a way to show power to other countries and expand your countrys spheres of influence. In return, the people of the taken over country pledge allegiance to the motherland and do whatever the mother country wants in return for next to no benefits. Imperialism is a foul system used as a way to show power at the expense of smaller countries. The Age of Imperialism is an age of large countries getting more power and small countries losing all the power they had. Imperialism causes good for one country with major problems for another.Imperialism is good for the mother country in many ways. In Confessions of Faith, Cecil Rhodes tells of how great the Brits are and how he does good involving themselves with other countries due to the increase of Britans around the world. An African Proverb tells of how the Britains gained land from Africa and other countries. In a political cartoon, mother countries were able to get free resources from conquered countries. Imperialism helped the mother country with many problems. Imperialism is harmful to the conquered countries in as many ways as it is good for the mother country. The smaller countries get land taken away from them as shown in an African Proverb. The Proverb states that the larger countries took their land in exchange for more complex religion. In a political cartoon, it is shown that the mother country is laboring the conquered countries while they do no work. In An Anthology of West African Verse, a boy says his family was killed by the conquerors while he was forced to serve the conquerors. This shows that it is bad for the conquered countries.There are always two sides to the same coin with each situation. The mother countries also faced many challenges with the conquered countries. The conquered countries often rebelled, causing death on both sides. The conquered countries also got some good from being conquered. They were protected and had peace with other countries, as shown in The Economic History of India Under Early British Rule. This shows that while one country had the good and one had the bad. Both countries faced at minimum a small amount of good or bad.Imperialism while causing some amount of good in the conquered countries, was still a horrible situation for the country. Imperialism also caused impedance profits for the mother country. Most countries conquered did not get any good from it so it was bad for one country and good for another. This proves the point that imperialism causes good for one country with major problems for another. suppose that 12 dimes and nickels are worth 95 cents. how many dimes and nickels are there? use systems of equations to solve. A river 3m deep and 40 m wide is flowing at the rate 2km /h . how much water will fall into the sea in a minute. What was the variable in Redi's experiment?a swan neck flask that prevented air from getting ina straight neck flask to allow air to get inmeat sealed in jars that didnt have contact with airuncovered meat that had contact with air Select the horticultural professionals.floristfructarianarboristcultivarphlebotomistpomologist HELP!! The local Gas Station is selling 3.5 gallons of gasoline for $22.75. What is the unit price?PLEASE HELP ME!!!! Which of the following is MOST dependent on the ability to exchange currencies?A investing in capital goodsBprotecting domestic industriesencouraging entrepreneurshipDengaging in international trade Please answer the question above. If a man can stack 30 bricks in 6 hours at that rate how many bricks can he stack in 33hours 6(10 - w) when w = 7Show your work In context, the second sentence of the penultimate paragraph ("I don't know... manhood") serves as a transitional element that I need help fast Estimate 81/4 Your brother has just graduated from highschool and joined the marines. All of his friends who joined with him have received orders of deployment. He wants to know if he too will be deployed . What level of government handles this type of decision? Help Find the value of x in the figure. pls help with this problem