subject

Application logs are useful in analyzing interaction with an application and may also be used to detect suspicious activities. A log file is provided as a string array where each entry represents a money transfer in the form "sender_user_id recipient_user_id amount". Each of the values is separated by a space. • sender_user_id and recipient_user_id both consist only of digits, are at most 9 digits long and start with non-zero digit amount consists only of digits, is at most 9 digits long and starts with non-zero digit • Logs are given in no particular order. Write a function that returns an array of strings denoting user_id's of suspicious users who were involved in at least threshold number of log entries. The id's should be ordered ascending by numeric value. Example logs = ["88 99 200", "88 99 300", "99 32 100","12 12 15") threshold 2 The transactions count for each user, regardless of role are: ID Transactions 99 32 There are two users with at least threshold - 2 transactions: 99 and 88. In ascending order, the return array is ('88', '99'). Note: In the last log entry, user 12 was on both sides of the transaction. This counts as only 1 transaction for user 12. Function Description Function Description Complete the function processLogs in the editor below. The function has the following parameter(s): string logs/n): each logsli) denotes the ith entry in the logs int threshold: the minimum number of transactions that a user must have to be included in the result Returns: stringl): an array of user id's as strings, sorted ascending by numeric value Constraints • 1sns 105 • 1 sthreshold sn • The sender_user_id, recipient_user_id and amount contain only characters in the range asci['O'-'9'). • The sender_user_id, recipient_user_id and amount start with a non-zero digit. • 0 < length of sender_user_id, recipient_user_id, amounts 9. • The result will contain at least one element

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:30, lilpeepxliltracy
This technology is used to produce high-quality documents that look good on the computer screen and in print.
Answers: 1
image
Computers and Technology, 22.06.2019 18:00, ladyree8721
Which of the following physical laws can make the flow of water seem more realistic? a. motion b. gravity c. fluid dynamics d. thermodynamics
Answers: 2
image
Computers and Technology, 23.06.2019 04:31, legendman27
Jennifer has to set up a network in a factory with an environment that has a lot of electrical interference. which cable would she prefer to use? jennifer would prefer to use because its metal sheath reduces interference.
Answers: 1
image
Computers and Technology, 23.06.2019 20:00, emmaraeschool
Me ajude por favor , coloquei uma senha e não consigo tira-la no chorme
Answers: 2
You know the right answer?
Application logs are useful in analyzing interaction with an application and may also be used to det...

Questions in other subjects:

Konu
Mathematics, 26.02.2022 06:20
Konu
Mathematics, 26.02.2022 06:30
Konu
Social Studies, 26.02.2022 06:30