Egendefinerte tester

malloc by harshehe

This is one of the big areas where C likely diverges from languages you already know: manual memory management.

Other languages uses reference counting, garbage collection, or other means to determine when to allocate new memory for some data—and when to deallocate it when no variables refer to it.

And that’s nice. It’s nice to be able to not worry about it, to just drop all the references to an item and trust that at some point the memory associated with it will be freed.

But C’s not like that, entirely.

Of course, in C, some variables are automatically allocated and deallocated when they come into scope and leave scope. We call these automatic variables. They’re your average run-of-the-mill block scope “local” variables. No problem.

But what if you want something to persist longer than a particular block? This is where manual memory management comes into play.

You can tell C explicitly to allocate for you a certain number of bytes that you can use as you please. And these bytes will remain allocated until you explicitly free that memory89.

It’s important to free the memory you’re done with! If you don’t, we call that a memory leak and your process will continue to reserve that memory until it exits.

If you manually allocated it, you have to manually free it when you’re done with it.

So how do we do this? We’re going to learn a couple new functions, and make use of the sizeof operator to help us learn how many bytes to allocate.

In common C parlance, devs say that automatic local variables are allocated “on the stack”, and manually-allocated memory is “on the heap”. The spec doesn’t talk about either of those things, but all C devs will know what you’re talking about if you bring them up.

All functions we’re going to learn in this chapter can be found in <stdlib.h>.

AFFC - Cersei 4 by poschti

After yet another group presents her with a dwarf's head that is not Tyrion's, Cersei walks together with Qyburn to meet the small council. The new Master of Whisperers indicates that he has prepared the "skull" in an ebony box for delivery to Prince Doran, but no mention is made that it belongs to Gregor Clegane.

Pycelle is near apoplectic upon hearing that Qyburn has been raised to Lord and has replaced Varys on the council, and Cersei makes it clear how unfit she considers the old Grand Maester. Cersei has finalised her appointments, placing men she considers to be meek and loyal and giving them the titles used in the Free Cities, thinking that she will have no "masters" with her in the small Council.

The council first discusses the unrest in Sunspear and Prince Doran's letter that he imprisoned the Sand Snakes. Cersei notes that they are sending Balon Swann to Dorne with Gregor Clegane's head as has been promised, but she does not mention that Balon will have another task as well.

We also learn that Tyrion's High Septon has died in his "sleep", and the council brings up the continuing influx of "sparrows" into King's Landing, stirring up the populace with their preaching of "doom and demon worship". But Cersei cares not, nor does she care who becomes High Septon, provided he "pronounces an anathema upon the Imp."

The next topic is a letter by the Lords Declarant in the Vale of Arryn, but the Queen Regent decides not to intervene directly on Littlefinger's behalf, but only send a letter warning these Lords that no harm must come to Lord Petyr.

When the subject of rebuilding the fleet comes up, Cersei is adamant against making any pact with the ironborn, stating, "Their turn will come, once we have dealt with Stannis." Aurane Waters will get his fleet of dromonds however, and Cersei will find the coin by deferring the crown's debt to the Faith of the Seven and to the Iron Bank of Braavos until the end of the war. Pycelle warns her against this route, cautioning that it would be foolish to make an enemy of the Iron Bank, but the decision is made regardless.

The council also discusses the prudence of making someone pay for the Red Wedding so as to appease all the "sparrows"; and in the mean time offering whomever succeeds the sure-to-die-soon Lord Walder Frey a chance to rid himself of unwanted brothers, half-brothers and nephews.

On the topic of the North, the council indicates that Stannis may soon be confronted by Roose Bolton's army, once his bastard son hits Moat Cailin from the north, allowing the Lord of the Dreadfort passage through the Neck. Cersei mentions that Wyman Manderly has taken Davos Seaworth captive, after the latter was sent by Stannis to treat with him.

Lord Manderly seeks the favor of the Iron Throne, and the queen will recommend that he can achieve that favor if he beheads Stannis's Hand. When Sansa is mentioned, Cersei shocks the council into silence with a violent tirade about how she plans to deal with the girl once she is found.

In the uneasy silence that follows, Cersei also remarks that Lord Bolton possesses Arya Stark and that her marriage to his bastard should appease the north, keeping to herself the fact that "Arya Stark" is really a "steward's whelp" provided by Littlefinger.

Next they debate the fact that the Night's Watch might be joining its might to Stannis, especially now that Jon Snow is their Lord Commander. The council decides to warn the Watch that the crown will stop sending men to the Wall, but Qyburn suggests that they do send 100 men.

Cersei picks up on Qyburn's reason for suggesting ostensibly an act of goodwill, and interrupts him to indicate that the men sent will really be assassins ordered to remove Eddard Stark's bastard.

Back in her apartments, Cersei learns from Taena that Dorcas fancies Osney Kettleblack, and also hints that she herself likes dangerous, scarred men. Cersei tries to learn the name of Taena's old flame, but the Myrish woman is evasive.

When Osney arrives, Cersei butters him up with an offer to join the Kingsguard and a chance to bed her again, provided he accomplishes a couple of tasks. First, Cersei wants him to seduce, and hopefully bed, Queen Margaery; this will enable Cersei to execute her lawfully.

Second, she plans to send him to the Wall as "punishment" for his treason with Margaery, but in reality he will lead a group of men to assassinate Jon Snow. She assures him that the men would not be required to serve in the Watch after they complete their task, and promises him a lordship, should he accomplish both missions.

Later that night, Cersei asks Lady Taena to remark to Margaery that she has a secret admirer, but not to let out Ser Osney's name unless the girl probes.

P3 -TRIGGERS VI by yingisiwa

To counter the risk of social engineering threats at Rotomyne’s Mayland processing plant, one of the most direct measures is to ensure that all employees are thoroughly trained on identifying and avoiding such tactics. This is especially critical given that the same employee failed to identify the threat on two occasions; first by disclosing sensitive data during the phone call, and then again by responding to a fraudulent email with a seemingly genuine address. All staff, particularly those with access to sensitive operational data, should undergo comprehensive training before being granted system access, with refresher sessions held annually. This training should stress that no external party, even those appearing to be legitimate authorities like the Mayland Environmental Regulatory Authority, has the right to request confidential information without proper internal verification and high-level approval. Employees should be made accountable for any unauthorized access attempts made using their credentials to reinforce the need for heightened vigilance and confidentiality.

To strengthen these measures, Rotomyne’s internal audit team at the head office can verify that every employee across all plants, in all countries, has undergone the required annual training and assess its overall effectiveness. This assessment should be comprehensive, covering both local and international operations. Additionally, conducting simulated social engineering scenarios, such as email-based phishing attacks, can serve as practical tests to gauge employee responses

globally. These exercises will provide valuable feedback and help inform future training sessions, ensuring that employees at every Rotomyne facility are well-prepared to identify and resist real- world social engineering attempts. The Internal Audit team from the head office can lead this initiative to ensure consistency and thoroughness across all regions.

Another vital control is limiting access to sensitive information. Access controls within Rotomyne’s systems must be robust, ensuring that each employee is granted access only to the data relevant to their specific duties. This means administrative staff should only have visibility over information necessary for their roles, while confidential operational data such as processing activities must remain restricted. Each employee should clearly understand their scope of responsibility and be aware of the level of information they are authorized to share. It is also highly questionable that an administrative assistant assumed the responsibility of disclosing such sensitive information for regulatory purposes without proper verification, indicating a gap in understanding and enforcement of access policies. Strengthening these access permissions and ensuring employees know the boundaries of their duties will help mitigate the risks of data leakage, especially through social engineering.

Establishing a formal reporting system for employees to flag any suspicious calls, emails, or other interactions is also crucial. This system should ensure that any unusual contact is swiftly escalated to the cybersecurity team for investigation, enabling prompt action. Employees must be trained to avoid responding to unfamiliar email requests, clicking on suspicious links, or sharing sensitive data via email without internal verification. Implementing protocols for reporting potential phishing emails will raise awareness and encourage caution.

Finally, Rotomyne should invest in a threat-monitoring system that keeps track of potential cyber risks, particularly email-based attacks. This system should include regular consultations with cybersecurity experts and ongoing discussions at the board level to maintain a proactive stance on evolving threats. By combining early detection with continuous staff training and awareness programs, Rotomyne can significantly reduce the risk of social engineering incidents at its processing plants

P3 TRIGGERS - XII by yingisiwa

One primary concern is the potential for unauthorized access to the robots and their control systems. If cybercriminals gain access, they could manipulate the robots to either disrupt surveillance activities or cause intentional damage, leading to operational inefficiencies and safety hazards. For instance, an attacker could exploit vulnerabilities in the system to execute a Distributed Denial of Service (DDoS) attack, overwhelming the central command center with traffic and rendering it unable to respond to legitimate monitoring needs. This could lead to delays in identifying and addressing hazardous situations, such as excess heat or harmful emissions, thus compromising safety protocols.

Another vulnerability lies in the data transmitted between the robots and the central command center. This data stream may contain sensitive information regarding operational protocols and environmental conditions. Hackers could use techniques such as man-in-the-middle attacks, intercepting communications between the robots and the command center. By gaining control over these communications, they could issue unauthorized commands to the robots, resulting in unwanted actions or data manipulation. Such intrusions could not only disrupt operations but also create false alarms, diverting resources away from genuine threats. Additionally, attackers might deploy ransomware attacks, encrypting vital operational data and demanding payment to restore access.


To effectively mitigate these risks, we should implement a multi-layered security approach that includes stringent access controls. Limiting access to the central command center and the robots to only authorized personnel will help reduce the risk of unauthorized manipulation. Employing strong authentication measures, such as two-factor authentication and encryption of sensitive communications, can further enhance our security posture and protect against data breaches. By implementing strong security measures, including intrusion detection systems, regular software updates, and employee training, we can mitigate the risks associated with unauthorized access and ensure the reliable operation of our robotic surveillance technology.


Moreover, the automation of these robots increases reliance on software and algorithms, which may be susceptible to vulnerabilities, bugs, or malicious code. If the software controlling the robots is compromised, it could lead to erratic behavior, malfunction, or even a complete

shutdown of surveillance operations. Such a scenario could be particularly disruptive, as it may not only cause the surveillance to stop but could also necessitate a pause in overall mining operations, especially since both the robots and the brine extraction processes are automated. This could result in significant downtime, affecting productivity and potentially leading to financial losses.

The risk of compromised software emphasizes the importance of implementing robust software development practices, including secure coding standards and comprehensive code reviews. Regular updates and stringent testing protocols are essential to ensure that vulnerabilities are identified and addressed before they can be exploited. Moreover, employing redundancy in critical systems could help mitigate the impact of a software failure, allowing for quick recovery and minimizing operational disruptions. Ensuring that software undergoes rigorous testing in simulated environments can help catch bugs and vulnerabilities early in the development process.


Additionally, establishing a comprehensive incident response plan is crucial. This plan should outline procedures for detecting, responding to, and recovering from potential cyber incidents, ensuring swift action to minimize impact. Regular security audits, employee training on cybersecurity awareness, and ongoing monitoring of the robots and command center systems will also play vital roles in maintaining the integrity and security of our automated surveillance operations. By proactively addressing these vulnerabilities and implementing robust controls, we can safeguard our monitoring system and enhance the overall security of the Porrland brine mine.

P3 TRIGGERS - III by yingisiwa

Swift Recovery and Minimizing Operational Downtime

A comprehensive Cyber Incident Response Plan would enable Rotomyne to respond quickly and effectively to any cyber-attacks targeting its integrated OT and IT systems. In the scenario where the attack disrupts the control of machinery at a brine mine, a well-prepared CIRP could help Rotomyne identify and isolate the affected systems, contain the breach, and restore operations promptly. By having predefined procedures in place, Rotomyne can significantly reduce downtime, ensuring that production delays are minimized and key customer commitments, such as those to VoltMotion, are still met. Rapid recovery would not only protect revenue streams but also reinforce the company's reputation for reliability in the face of potential threats.


Strengthening OT Security and Reducing Vulnerabilities

One of the primary benefits of implementing a CIRP is the ability to address the vulnerabilities inherent in OT systems, which were traditionally not designed with cybersecurity in mind. Since Rotomyne’s lithium extraction relies on automated processes, integrating OT with IT opens up new potential attack vectors. A CIRP tailored to these integrated environments would include regular security assessments and penetration testing to identify weak points in the OT systems, as well as segmentation of critical control systems to limit access from external networks. By addressing these vulnerabilities, Rotomyne can bolster its defenses and reduce the likelihood of future cyber-attacks that disrupt production.


Forming a Specialized Cyber Incident Response Team (CIRT)

A critical component of an effective CIRP is the establishment of a dedicated Cyber Incident Response Team (CIRT). For Rotomyne, this team would need to include IT specialists, OT engineers, and cybersecurity experts who understand both the technical and operational aspects of the company's automated mining systems. The CIRT would be responsible for monitoring systems in real-time for signs of cyber intrusions, conducting forensic investigations to assess the extent of any breach, and coordinating the recovery process. This cross-functional team would ensure that both IT and OT systems are protected, and in the event of a breach, the response is swift and comprehensive, minimizing both operational and financial impacts.


Implementing Advanced Monitoring and Response Technologies

In addition to forming a CIRT, Rotomyne could benefit from integrating advanced monitoring technologies such as AI and machine learning into its cyber defense strategy. These technologies can monitor OT and IT systems continuously, identifying unusual patterns or anomalies that may indicate a cyber-attack in progress. By automating the detection and initial response to potential threats, Rotomyne can prevent further escalation of attacks and limit damage to its operations. These technologies can also aid in streamlining lithium extraction processes, offering faster, more reliable production methods that mitigate the operational impact of cyber threats.


Crisis Communication and Transparency with Stakeholders

An often overlooked but crucial aspect of a CIRP is the communication plan. In the event of a cyber-attack, Rotomyne needs to ensure clear communication with internal teams and external stakeholders, including key customers like VoltMotion. The CIRP should include predefined communication strategies that provide regular updates on the breach, steps being taken to resolve the issue, and how future incidents will be prevented. Transparent communication reassures customers and partners that Rotomyne is effectively managing the situation,

maintaining trust, and reducing the risk of long-term reputational damage. This transparency would also demonstrate to regulators that Rotomyne is committed to cybersecurity best practices, strengthening the company's compliance stance.


By implementing these elements within a robust CIRP, Rotomyne can significantly mitigate the risks associated with cyber-attacks targeting its integrated OT-IT systems, ensuring operational continuity and preserving critical relationships with customers like VoltMotion

Spanish testtt by user110617

soy una persona muy independiente, trabajadora y de confianza
soy capaz de trabajar sola y en equipo
soy muy bien en multitareas y resolución de problemas a través de desafíos difíciles
me gusta ser creativa y organizada con mi trabajo

no tengo experiencia laboral pero estoy dispuesta a aprender
intentaré cumplir con sus expectativas en lugar de trabajo
espero saber de usted pronto

Spanish testtt by user110617

Soy una persona muy independiente, trabajadora y de confianza. Soy capaz de trabajar sola y en equipo.
Soy muy bien en multitareas y resolución de problemas a través de desafíos difíciles.
Me gusta ser creativa y organizada con mi trabajo.

No tengo experiencia laboral pero estoy dispuesta a aprender.
Intentaré cumplir con sus expectativas en lugar de trabajo.
Espero saber de usted pronto,

Spanish testtt by user110617

Estimado señor/señora:

Vi su anuncio de trabajo que me interesan mucho

Me llamo Marika Lipczewska. Tengo Catorce años. Vivo en Dyce, Aberdeen, en el noreste de escocia. He vivido toda mi vida.

Voy al instituto Dyce. Estoy en cuatro año de secundaria. Soy fluida en inglés y cercí en un hogar polaco. Además, estoy estudiando español y japonés. Se me dan bien las lenguas extranjeras y sacó buenas notas de español.

Soy una persona muy independiente, trabajadora y de confianza. Soy capaz de trabajar sola y en equipo! Soy muy bien en multitareas y resolución de problemas a través de desafíos difíciles. Me gusta ser creativa y organizada con mi trabajo.

No tengo experiencia laboral pero estoy dispuesta a aprender
Intentaré cumplir con sus expectativas en lugar de trabajo

Espero saber de usted pronto,
Marika Lipczewska

Emotions by picklerick72

Emotions can carry you, find your heart, find yourself, and most importantly find someone that will always, always be there for you.

Life by picklerick72

To create a man, one must grow up. To create a boy, one must be born. Life's cycle is quick, but slow when we are young.

Systems of the Body by jacobcarlson

Central Nervous System: Includes the brain and spinal cord; controls most bodily functions.
Peripheral Nervous System: Includes all nerves outside the brain and spinal cord.
Somatic System: Controls voluntary movements of skeletal muscles.
Autonomic System: Manages automatic functions like heartbeat and digestion.
Sympathetic System: Activates the body and expends energy (usually during stress).
Parasympathetic System: Calms the body, conserving energy and slowing the heartbeat.
Endocrine System: Releases hormones to regulate hunger, reproduction, and long-term changes like puberty.
Pituitary Gland: The “master gland” that controls growth and is directed by the brain to release hormones that influence other glands.
Adrenal Glands: Release stress hormones like adrenaline.

Brain Structures by jacobcarlson

Medulla: Controls basic functions like breathing and heartbeat; part of the brainstem.
Cerebrum: Responsible for higher-order functions like thinking and voluntary movement.
Cerebellum: Helps with balance and coordination; processes sensory input.
Limbic System: Handles emotions and basic drives.
Amygdala: Controls emotions like fear.
Hypothalamus: Manages survival instincts: fight, flight, hunger, and reproduction.
Cerebral Cortex: Thin layer of neurons responsible for higher-level thinking and sensory processing.
Frontal Lobe: Handles planning, decision-making, and voluntary movements.
Motor Cortex: Controls voluntary movements.
Sensory Cortex: Processes sensory input and relays it to the body.
Parietal Lobe: Processes touch and body position.
Occipital Lobe: Processes visual information.
Temporal Lobe: Processes sound and auditory information.
Glial Cells: Support and protect neurons; act as the glue of the brain.

Neurotransmitters by jacobcarlson

Acetylcholine: Enables muscles, learning, and memory.
Dopamine: Enables movement, learning, and emotion
Serotonin: Sleep, arousal, hunger, mood
GABA: Inhibitor neurotransmitter, it stops another neurotransmitter from bonding to the dendrite
Glutamate: Involved in memory; excitatory
Endorphins: Natural opium of the body; a painkiller

TT 2 11/19 by user110544

In the property preservation industry, speed and accuracy are essential when managing complex tasks such as documenting cubic yard measurements (e.g., CYD=3.14 * r^2 * h for cylindrical containers), maintaining compliance with HUD standards, and preparing detailed invoices. Professionals must provide precise evidence for every load progression, including clear, labeled, time-stamped photos of containers at empty, 25%, 50%, 75%, and 100% full, with dimensions such as length, width, and height included for all hauling equipment. Failure to properly label case numbers (e.g., Case#123@Address), or to provide accurate dump receipts, can lead to severe payment deductions or rejection of claims entirely. Additionally, vendors must ensure that debris is free from prohibited items, such as vegetation, oversized limbs, or unapproved appliances, and that it is tightly compacted to minimize void spaces—overloading or poor compaction is unacceptable. Emergency situations like mold greater than 5 square feet or flood depths exceeding one foot require immediate reporting, with precise documentation submitted promptly. Multitasking is critical, as professionals must juggle multiple responsibilities, including cross-verifying compliance with regulations, resolving escalations, and completing work on time, all while adhering to strict deadlines. Missteps in any aspect of this process—whether in measurements, documentation, or communication—can result in significant financial penalties. The ability to type rapidly and flawlessly without glancing at the keyboard is a key skill for success in this demanding and detail-oriented field.

Type Test 111924 by fusezoid

poiuytrewqazxcvbnmmkoiuytrewqazxcvbnmkoiuytrewqaz

TT 2 11/19 by user110544

In the property preservation industry, speed and accuracy are essential when managing complex tasks such as documenting cubic yard measurements (e.g., CYD=3.14 * r^2 × h for cylindrical containers), maintaining compliance with HUD standards, and preparing detailed invoices. Professionals must provide precise evidence for every load progression, including clear, labeled, time-stamped photos of containers at empty, 25%, 50%, 75%, and 100% full, with dimensions such as length, width, and height included for all hauling equipment. Failure to properly label case numbers (e.g., Case#123@Address), or to provide accurate dump receipts, can lead to severe payment deductions or rejection of claims entirely. Additionally, vendors must ensure that debris is free from prohibited items, such as vegetation, oversized limbs, or unapproved appliances, and that it is tightly compacted to minimize void spaces—overloading or poor compaction is unacceptable. Emergency situations like mold greater than 5 square feet or flood depths exceeding one foot require immediate reporting, with precise documentation submitted promptly. Multitasking is critical, as professionals must juggle multiple responsibilities, including cross-verifying compliance with regulations, resolving escalations, and completing work on time, all while adhering to strict deadlines. Missteps in any aspect of this process—whether in measurements, documentation, or communication—can result in significant financial penalties. The ability to type rapidly and flawlessly without glancing at the keyboard is a key skill for success in this demanding and detail-oriented field.

TT 2 11/19 by user110544

In the property preservation industry, speed and accuracy are essential when managing complex tasks such as documenting cubic yard measurements (e.g., CYD=3.14 × r² × h for cylindrical containers), maintaining compliance with HUD standards, and preparing detailed invoices. Professionals must provide precise evidence for every load progression, including clear, labeled, time-stamped photos of containers at empty, 25%, 50%, 75%, and 100% full, with dimensions such as length, width, and height included for all hauling equipment. Failure to properly label case numbers (e.g., Case#123@Address), or to provide accurate dump receipts, can lead to severe payment deductions or rejection of claims entirely. Additionally, vendors must ensure that debris is free from prohibited items, such as vegetation, oversized limbs, or unapproved appliances, and that it is tightly compacted to minimize void spaces—overloading or poor compaction is unacceptable. Emergency situations like mold greater than 5 square feet or flood depths exceeding one foot require immediate reporting, with precise documentation submitted promptly. Multitasking is critical, as professionals must juggle multiple responsibilities, including cross-verifying compliance with regulations, resolving escalations, and completing work on time, all while adhering to strict deadlines. Missteps in any aspect of this process—whether in measurements, documentation, or communication—can result in significant financial penalties. The ability to type rapidly and flawlessly without glancing at the keyboard is a key skill for success in this demanding and detail-oriented field.

TT - 11/19 by user110544

In the Pr0perty Pr3servat!0n 1ndustry, compl!ance w!th mult!lay3red guid3lines is param0unt, requiring att3nt!on-to-detail at 100% capacity and seamless execution of tasks such as w1nter1zat10n, debris removal (e.g., 25 cubic yards per truck), lawn maint3nance (minimum 18" encroachment rule), and secur1ng vacant prop3rt!es using HUD-appr0ved measures (e.g., 6' x 8' plywood for board-ups). VENDORS MUST ADHERE TO STRICT PHOTO DOCUMENTATION, including b3f0re-and-after shots (TIME-STAMPED w/ dd/MM/yyyy HH:mm:ss format) and load progression using placards labeled EMPTY, 25%, 50%, 75%, 100% FULL! FAILING to mark receipts with Case#0001@Address results in $$$ deductions or total R3JECTION! For accurate invoicing: Line-itemize each l0ad w1th CYD (Cubic Yardage), l3ngth (L), w1dth (W), and height (H); miscalculations (e.g., missing 0.5 CYD) may l3ad t0 P3nalty#007. HANDL3R MUST inspect d3bris for PROHIBITED ITEMS (e.g., b!ohazards, 9' tre3 l1mbs, 3lectr!cal w1res) while cross-ver!fy!ng compl!ance via HUD’s checklist! Emerg3ncy scenaR10s such as MOLD (≥5 sq.ft.), FLOODING (@ Basement Depth: >1.2 ft.), or STRUCTURAL RISKS (!!CRITICAL!!) demand 24/7 REP0RT!NG t0 CLIENT! Mult!tasking becomes NON-NEGOTIABLE when juggling escalations, communicat1on via multi-channel port@ls, and ensuring SAME-DAY complet!on despite ALLOCATION OF L!MITED R3SOURCES!!! REM3MBER: 1 ERROR 1N DOCUM3NTATI0N = 0% PAYM3NT!!! ***SYST3MATIC WORK ONLY!***

Calculadoras ERROR by morango83

Dos calculadoras científicas distintas pueden arrojar resultados diferentes de un mismo enunciado. Generalmente se presentan en operaciones con divisiones /.

Utiliza los (paréntesis) en exceso. Las divisiones son prácticamente fracciones y se visualizan mejor si la calculadora permite su escritura; la idea es visualizar y ubicar bien cuál es el numerador (al que dividen) y cuál es el denominador (el que divide).

Veamos un ejemplo de una operación que normalmente se escribiría así: 60/3*(3+1). ¿Cuál es el numerador/denominador aquí?

Una forma de interpretarlo es que al 60 le están dividiendo todo lo demás, es decir, numerador=60 y denominador=(3*(3+1)). Su escritura en la calculadora sería 60/(3*(3+1))

O al 60 sólo lo divide el 3 y el resultado se multiplica en lo demás: numerador=60 dividido por denominador=3, el resultado se multiplica por (3+1). Su escritura en la calculadora sería (60/3)*(3+1)

En la primera da 5 y el la segunda da 80.

La "regla" prioriza la multiplicación * y la división / sobre la suma + y la resta -; pero no hay jerarquía entre la multiplicación * y la división /.

Saber cuál es el planteamiento "correcto" dependerá de dónde salió la operación.

AFFC - Jaime 2 by poschti

An honor procession flanks Lord Tywin's casket as it heads west, led by many of the Lannister bannermen. Jaime Lannister falls in with his uncle Kevan, and they discuss the raid on Saltpans. Jaime cautions his uncle not to try and take on Sandor Clegane or Beric Dondarrion, and that he would have made a good Hand. Kevan rejects him coolly, and lets Jaime know he knows about the relationship of the twins, Jaime and Queen Cersei Lannister.

As Jaime returns to King's Landing, he looks upon the encamped Lannister army, which will soon board the Redwyne fleet to lay siege to Dragonstone. He finds his sister in her solar as Grand Maester Pycelle delivers news that Ser Bronn has named Lollys's bastard newborn "Tyrion". Jaime realizes that his sister may try to have Bronn killed for this jape, and he recalls the look on her face the night of Tommen's wedding when the Tower of the Hand was aflame.

This called to mind the madness of King Aerys and the way he would become aroused by fire. Jaime recalls Aerys's rape of his wife the evening he had Lord Chelsted burned alive. Jaime had the guard of the queen's bedchamber when she was screaming for her husband to stop. When Jaime said that they were sworn to protect her too, his partner that night, Ser Jonothor Darry, replied, "We are, but not from him."

Jaime asks to speak with Cersei alone, and asks her why she keeps Lady Taena around all the time, knowing that she is a spy for Margaery. Cersei responds that Taena is more her spy, considering that the Queen Regent can do more for the Merryweather family. Jaime cautions that she doesn't truly know the woman, but Cersei remarks that she may make Taena's husband the Hand. After Jaime asks her about the rumor that she plans to name Aurane Waters her new master of ships, he recommends that she would be better off naming Paxter Redwyne.

But Cersei will not put any Tyrell vassals on her small council. Cersei also defends her choice of Qyburn, a disgraced and twisted maester, to join the council. Cersei's growing paranoia and brutality are becoming more evident and Jaime retorts, "You are seeing dwarfs in every shadow and making foes of friends. Uncle Kevan is not your enemy. I am not your enemy." However, Cersei throws him out of her solar in fury.

In the White Sword Tower, Jaime speaks with Ser Loras Tyrell, asking him what he knows of certain famous Kingsguard. Loras is well-versed, but when the Lord Commander mentions some lesser-known Kingsguard, the Knight of Flowers does not recognize their names. Jaime points out that all of them served well, perhaps even better than the famous knights.

Loras remarks that the great Kingsguard knights will always be remembered as heroes, but Jaime reminds him that the most infamous will also be remembered. And then there are those who are not easily classified, of which he offers as an example Criston Cole, the Kingmaker.