A ScreenTip for command does not include which of the following? Provide a link to a command’s help subject Command’s alternative location Command shortcut on the keyboard A description of the command’s function
None Transcribed Image Text: Q2) A 128 line 16w cache is provided with a 64 kw Main
Memory configuration of a system. What are the tag and word
bits for performing Associative Mapping?
Transcribed Image Text: Write the required HTML and CSS code to create the following list.
01. Home
02. I.T. Department
O IT diploma
o Networking
a. SISCO
b. E-Security
Database
03. Business Studies
Transcribed Image Text: Verify that the program segment
a := 2
b:= a + c
is correct with respect to the initial assertion c = 3 and the final assertion b = 5.
TCP is a lightweight Transport-layer protocol that is used to communicate between applications. It lacks many of the same characteristics as UDP, such as dependability and flow control. is it true or false
19. Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is a. 101 b. 105 c. 103 d. 107
I need the answer as soon as possible Transcribed Image Text: 1) Give two reasons that make the constants are very useful in visual basic.
2) Write two examples of valid variable names.
Do a comparison between PMBOK and Agile method. Compare by looking at theory and make observations on – Quality – Risk – Time to complete – Productivity – Flexibility for change – Cost
Transcribed Image Text: Sum WORD 1000q, 10O0b, 1000h, 10d
variable1 = ($-Sum)
.code
main PROC
Mov EIP, eax
Mov bl, ‘?’
Mov variable1, AX
Mov (5/3), ebx
Movsx ebx, SUM
MOV AL, AH
In Assembly What is the value of the carry flag if you store a 6 into the AX register, and compare it with a 7, like so?: Mov ax, 6 Cmp ax, 7
Transcribed Image Text: QUESTIONZ
What is the heuristic evaluation (e) for XO game? Calculate the e value for the following with X as MAX and O as MIN.
O 00
a.
b.
olox
In the headlines, describe a current security breach involving either access control or authentication. Has it had a negative effect on the company’s operations? Are there any specific damages that the business suffered?
Write a C++ function (along with the helper functions) that deletes all occurrences of a word from a given string. The code should follow the exact function declaration given: void deleteWords(char*inputString, char*word, char*destString);
Do a comparison between PMBOK and Agile method. Compare by looking at theory and make observations on – Quality – Risk – Time to complete – Productivity – Flexibility for change – Cost
Define the following function Transcribed Image Text: 2. int findLargestEven(int array[], int size);
– returns the largest even element in the array list
– if there is no even number, it returns -1
Write a recursive function body to find the nth term of Fibonacci Series. [Write only recursive function body . No need of main ( ) code ]
int fib(int x)
{…..
……
}
None Transcribed Image Text: In Android Studio create a layout as shown.
Requirements
1. ImageView without border
2. TextView
3. Button
4. Checkbox
5. RadioButton
6. Switch
??xtView
BUTTON
CheckBox
O RadioButtan
Bwitch
The telephone network, which is the oldest and most well-known kind of (wired) communications network, operates on the packet switching concept. It is the most widely used mode of communication today. True \False
For displaying your idea and thoughts for a presentation which view you will use in MS PowerPoint Select one: a. Slide Sorter View b. Slide sorter View c. Normal View d. Outline View
Write a program in julia language to find the radius of circle that can formed using given x and y and found after making a separate function The x and y are given
What command can you use at the CLI to temporarily borrow the privileges of the most powerful account in a Linux system? a. sudo b. root c. rm d. switch users e. chmod
What concerns do you have about the database’s creators, in your opinion? When it came to making this vital resource available to the general public on the internet, who did you turn to?
24 Transcribed Image Text: Explain and compare the two types of Sliding window ARQ protocols with suitable diagrams diagrar.
(Answer the question in separate sheet, scan and upload along with other descriptive answers)
Transcribed Image Text: What gets printed after executing the following code?
void main () {
string s1 “Hello\”C++\””;
cout <
using namespace std;
int main()
{
float i = 123.0f;
cout << i << endl;
return 0;
}
needs you to give the three traversals of a tree, including pre-order, in-order and post-order traversals. Review these three methods Please show me how to do this and explain to help me prepare
Microkernels attempt to provide as small a kernel as possible, putting much of the operating system support into additional modules. What do you feel are the minimum services that the kernel must provide?
Describe how web caching will minimize the requested item receipt wait. Will web caching minimize the time delay for all items a user requests or only for certain objects? Why does this happen?
Transcribed Image Text: (b)
Consider the relation Employee(Ename,Pname,Dname) with the data.
Employee
Ename
Pname
Dname
smith
John
smith
Y.
Anna
smith
Anna
smith
Y.
4John
Justify that this relation has the MVD Ename??Pname.
Transcribed Image Text: QUESTION 13
The following code displays
for (int i
3; i > 0; i–) {
%3D
System.out.print ((i * 2) +
O 64
O No print out
642
O 42
Program a clock using the 6 displays on an FPGA. Use quartus. The Leftmost displays are hours, the rightmost are seconds and the middle two are minutes. Use counters, state diagrams and timer.
Draw and explain a heterogeneous network diagram of three WAN’s, five LAN’s and 4 MAN’s with the help of routers, switches, hubs and also connect 10 PC’s with each network using MS visio
Please I need to resolve the question quickly Transcribed Image Text: Quiz:-
A router receives a packet with the destination address 201.35.20.18.
Show how the router finds the network address of the packet.
I need the answer as soon as possible Transcribed Image Text: Q5\ write c++ program using visual studio
to check the value of z even or odd,
positive or not ? Z=Ln(x)*2 *
Java Question 10: Transcribed Image Text: What is the timne complexity of the Balloon Sort algorithm under the
situation that the data are arranged randomly? *
O Logarithmic
O quadratic
O Linear
Exponential
In software development, a variety of models are used, with each model having a varying level of significance based on the application. Please sort those models into categories based on your own tastes.
In a nutshell, compare Bitcoin, Coinjoin, Zerocoin, and Zerocash in terms of their transaction fees. 1) The anonymity features that are offered 2) How easily they can be deployed in the real world.
Assume you’re studying a hospital administration system; for each of the following modifications, provide an example (that is relevant to this project): The application domain has shifted. A shift in the problem domain
Identify two to three (2-3) privacy-invading information technology tools. Next, examine the most common ways that the tools you’ve found could be used to commit computer crimes. Give a justification for your response.
Q:
State the differences between write bus cycle in memory in and read in
Input/Output. Transcribed Image Text: Q:
State the differences between write bus cycle in memory in and read in
Input/Output.
What is meant by Early Binding and Late binding in the Polymorphism? Transcribed Image Text: Types of Polymorphism
Sitesbay.com
Compile Time
Run Time
Polymorphism
Polymorphism
(Static or Early Binding)
(Dynamic or Late Binding)
Create a Python Program (not yet created here in bartebly) that utilizes an Engineering Formula (use any formula from any discipline) and all of the following structures: Lists and Dictionaries Functions Program Modularization
A processor can support a maximum memory of 4 GB, where the memory is word-addressable (a word consists of two bytes). The size of the address bus of the processor is at least___(bits)?.
Balanced tree is one of the data access techniques in database. How does it work? How data can be inserted in? How data can be deleted from it; how data can be updated?
Transcribed Image Text: The following loop stops when x is equals to 10 or 20.
Write the missing code in the space provided below.
{
bool t=true;
int x;
while (t)
int>>x;
}
Transcribed Image Text: When data is encapsulated, which is the correct order?
O Data, frame, packet, segment, bit
Segment, data, packet, frame, bit
Data, Segment, Packet, Frame, Bit
Data, segment, frame, packet, bit
Transcribed Image Text: Make a layout in Android Studio as shown in the blueprint
shown below:
Requirements
1. Imageview
2. Three Textviews with their
names as (Name, DOB, Country)
3. Button
4. Progressbar
Write a program in C++ that uses a single-dimension array to store 10 numbers input by a user. After inputting the numbers, sort and print the 10 numbers in descending order.(Using C++ only)
5-d. With the aid of appropriate diagrams, discuss the types of Database models and explain the most prevailing model. Justify which of the models would be used to implement an enterprise-wide database system.
Transcribed Image Text: What is a purpose of a Use Case.8
?diagram
Show the components of the
system
Show the constraints of the
system
Show the functional requirements
All of the above O
Transcribed Image Text: Make a layout in Android Studio as shown in the blueprint
shown below:
Requirements
1. Imageview
2. Three Textviews with their
names as (Name, DOB, Country)
3. Button
4. Progressbar
40. The portion of physical layer that interfaces with the media access control sublayer is called a. physical signalling sublayer b. physical data sublayer c. physical address sublayer d. none of the mentioned
Transcribed Image Text: What gets printed after executing the following code?
void main () {
string s1 “Hello\”C++\””;
cout <
{
S=s+a;
cout<<"a="< XY | id
Y –> id
Check whether the given grammar is LL(1) or not.
X and Y are Non Terminals, ‘id’ is a Terminal.
Recognize the distinctions between the concepts of vulnerability, danger, and command and control Describe the importance of important information systems in your organization. What are the best [authentication and access control] security tools?
List the physical storage media that are installed on the computers that you use on a regular basis. Include a description of the speed with which data on each medium may be accessed.
Transcribed Image Text: For a binary transmission link, the uncoded E/No ratio is 9 dB and matched filtering with polar
transmission is used. The bit error rate is
-6
3.7×10
3.3×10
2.5×10
3.92×10
Limit the answer from 3 sentences only. 1. How can the input devices be recognized by the computer system? 2. How come both hardware and software are needed to build a computer system?
Can anyone draw it for me? Transcribed Image Text: II.
Draw the circuit diagram of the following:
1. (?B+ C’)
2. ??? + A?’C+ A??” +A??
3. (??CD+ E’E
4. ?B’ + A’?
Transcribed Image Text: What gets printed after executing the following code?
void main () {
string s1 “Hello\”C++\””;
cout <
part should be:
a) ignored
c)changed
b) checked also
d) did nothing.
CREATE A C++ PROGRAM THAT THE USER WILL INPUT 2 NUMBERS (A & B) AND THE OUTPUT IS TO GET THE REMAINDER OF A/B WITHOUT USING A MODULO (%) AND DIVISION (/) OPERATOR.
Identify two to three (2-3) privacy-invading information technology tools. Next, examine the most common ways that the tools you’ve found could be used to commit computer crimes. Give a justification for your response.
Transcribed Image Text: Consider a system in which the 32kb
memory space is implemented using
(4 *4 )kb EPROM memory type. the
number of device
8.
O 16
32
O none of above
39. For the best Software model suitable for the project, in which of the phase the developers decide a roadmap for project plan? a. Software Design b. System Analysis c. Coding d. Testing
What is the purpose of the ip ospf priority command? Explain, using your own words , why Network Address Translation “NAT” for IPv4 is important (at least two reasons). Support this with examples.
Answer clearly. An explain it deeply. Transcribed Image Text: 2. To access the services of operating system, the interface is provided by the
a) System calls
b) API
c) Library
d) Assembly instructions
Given a singly linked list delete node at k-th position without using loop. For example Input : list = 9->8->3->5->2->1 k=4 Output : 9->8->3->2->1 Input : list = 0->0->1->6->2->3 k=3 Output : 0->0->6->2->3
The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server. a. limited b. vast c. distributed d. none of the above
Write a Javascript function named array_replace to replace all occurences of a given number with a specified number in an array of integers. Prototype: function array_replace(arr, oldVal, newVal){ //Write your code here }
What is the ip ospf priority command used for? Explain why Network Address Translation (NAT) for IPv4 is necessary in your own words (at least two reasons). Give instances to back this up.
1.Perform the following binary arithmetic: 01011100 + 00011111 . Express your answer in decimal 2. Perform the following hexadecimal arithmetic: 7F3 + 41D 3. Perform the following hexadecimal arithmetic: A4 + 27 *
Microkernels attempt to provide as small a kernel as possible, putting much of the operating system support into additional modules. What do you feel are the minimum services that the kernel must provide?
A network with bandwidth of 11 Mbps can pass only an average of 21,000 frames per minute with each frame carrying an average of 11,000 bits. What is the throughput of this network?
Create an integer array of size 10 and fill it with random values in range 0 to 999. Find the frequency such that a random number generated in less than 500. Language- C++
Threads are a fundamental unit of CPU utilization that form the basis of multi-threaded computer systems. Explain in detail the purpose of threads. Be sure to elaborate on multicore systems and parallel programming.
Object Oriented Software Engineering (OOSE) is accepted to be the most efficient group of proponents in field of Software Engineering. The most prominent among the OOSE Methodologies is UP. Explain the concept UP.
Transcribed Image Text: In an ARRAY based implementation of binary trees, for any element stored in position n, it’s left child is stored in array at which
position ?
2(n+1)
2n+1
2n+2
2(n+2)
Transcribed Image Text: 4. Y = 60252.5
Find the equivalent of Y in binary, octal, and hexadecimal bases.
Calculate and show the Y number translated into a 32-bit Single Precision floating point number.
Which of the following is a major function of e-commerce? a. using SSL to encrypt orders b. adding items to a shopping cart c. buying and selling goods d. none of the above
1.10 The hackers that perform distributed denial of service attacks on e?commerce sites: are they criminals, or are they heroes helping computer specialists discover faults within computer networks and systems? Motivate your answer.
C++ Data Structures Write the program that implement BST. Implementation must have the following definitions: • Insertion in BST • Searching in BST • Deletion of all kinds in BST • Display BST
Theory of computation Transcribed Image Text: Define a CFG that generates the language over the alphabet E = {a,B,0} defined by the regular
expression: B(a + B) *a@a(a + B + 0) *B.
java language Transcribed Image Text: Write a recursive method called add(int n). This method adds the integers from 0 to some value n. For example, the call to add(4) would return
10 (4+3+2+1=10).
Abstract data types In a paragraph, describe a real-world abstract data type that you can think of. Some of the examples we discussed in lecture were a mechanical throttle or a car’s engine.
1. Create the following output using nested For…Next loops: In visual Studio’s programming 1 6 11 16 2 7 12 17 3 8 13 18 4 9 14 19 5 10 15 20
print the American flag using ‘*’ and ‘=’ character using Java programming,there should be 15 rows in the flag to be printed and width of the flag is 46 ‘=’ characters at max
Transcribed Image Text: 5. Prove algebraically, the following:
a) (A + B’)(A’ + B) = AB + A’B’
b) AB’ + AB + A’ = 1
Use only basic theorems to prove them.
Liberty Stores is constantly evaluating opportunities for improving efficiencies in all its operations, including the commercial operations as well its charitable activities. What data mining technique would you use to categorize its customers?
QUESTION 57 Link layer uses IP for source and destination addresses True False QUESTION 58 SHA-1 is a Cryptographic hash function True False QUESTION 59 CRC is a cryptographic hash function True False
There should be a discussion on each of the Interrupt classes. Locate and note the first and last Interrupt occurrences, as well as any others that may have taken place along the way.
I need the answer as soon as possible Transcribed Image Text: Fortran
Write a program to make a number which
can store upto 16 bytes and also a number
which contains 8 bytes
Transcribed Image Text: Suppose that it takes 1 ms to send a packet,
and 20 ms one-way propagational delay between
sender and receiver. The slinding window size
4. What is the channel utilization.
What concerns do you have about the database’s creators, in your opinion? When it came to making this vital resource available to the general public on the internet, who did you turn to?
Write a MATLAB program to display 10*10 Matrix in which first 50 elements have values from 1-50 and next 50 elements have values from 50 to 1. Attach code and matlab output screenshot.
I need the answer quickly Transcribed Image Text: Q4: Write a C+ program to apply a swap function between two strings. You have to print the
output in the main body of program.
Use DeMorgan’s Theorems to simplify the following expressions: F = (B’D) (A’ + C’D) + (BC’+D’A) Transcribed Image Text: Use DeMorgan’s Theorems to simplify the following expressions:
F= (B’D) (A’ + C’D)+ (BC’+D’A)
text
________ are made up of a pattern of rectangles and boxes that store information about a product:
Select one:
a. 2D barcodes
b. RFID tags
c. 1D barcodes
d. Bar code reader
I need the answer quickly Transcribed Image Text: Write Python code to approximate the constant (T) -to five decimal digits- using
Machin’s formula shown below:
= 4 tan ) – tan(239)
1
‘(?
q23 Transcribed Image Text: The three main constructs of the entity-relationship modeling notation include each of the following
:except
attributes a O
data entities b O
relationships .c O
data flows .d O
A soft link, which is also known as a symbolic link, may be seen by using the ls -l command and looking for a @ sign in the filename. So, is it correct?
10000 kbytes of message in a circuit switching over 4-hop path with 100 ms propagation delay per hop with Bandwidth of 50 kbps and setup time 8000 ms, the total delay in ms.
don’t use others answers java Transcribed Image Text: 3. Given the Boolean expression in SOP form, fill in the truth table. Then draw the
logic circuit that represents the Boolean expression.
f =xyz+xyz+xyz
I need the answer as soon as possible Transcribed Image Text: Rust
Learn how to. Concate two string using push
method in rust.
Take any string as you want and print in last
Write a program in pascal language to print a string and the compiler should not close down its window till user enter any other key and after that it print the execution complete
Give outcome for given scenario:A source had sent five packets and suddenly pause the animation before those packets had reached its destination. Now kill the first packet’s ACK after it reaches its destination.
One of the important steps to change the kali settings to enable internet connection is: Run apatche2 Change ipv4 settings to manual Change IP address settings to DHCP Select Bridge as network adapter
i Discuss social engineering and describe five (5) impacts it has on modern business organization. Also, evaluate five (5) software security threats and how it affects return on investment of a business organization.
Transcribed Image Text: Refer to the frame and identify the source IPV4
address.
00-07-E9-42-AC- 28 00-07-E9-63-CE-53 192.168.1.5 192 168.1.7 1305 21
Trailer
User Data
a. 192.168.1.5
b. 00-07-E9-63-CE-53
O c. 192.168.1.7
d. 00-07-E9-42-AC-28
Using Python: Write a function area_of_circle(r) that asks the user for a radious r and returns the area of a circle of radius r. nt : The area of the circle is ?=??2A=?r2
IN C Using the parallel directives in OpenMP, parallelize the following for loop: Transcribed Image Text: a[0] = 0;
%3D
for (i = 1; i< n; i++)
a[i] = a[i-1] + i;
%3D
dont post copied content posted multiple times Transcribed Image Text: A signal with 60 milliwatts power passes through a device with an average noise of 6 microwatts. What is the
SNR and SNRdB?
Transcribed Image Text: An attacker gains access to an organization by impersonating an employee’s spouse.
Which security element should the organization address in its security policy?
Tailgating
O Pretexting
O Passwords
O Phishing
In IPSec architecture, ___________________ includes an identifier for approved encryption and authentication algorithms. a. Authentication Header ( AH ) b. Key Management c. DOI-Domain of Interpretation d. Encapsulating Security Payload ( ESP )
SUBJECT :- PERL Dear experts U KW 100% thn Answer dnt wrong explanation else I will down voted Transcribed Image Text: Explain in brief about unless and until
statements with syntax and examples.
Transcribed Image Text: 4. You are given statements below. Explain where retrieving a value from the
RAM or storing a value to the RAM occurs.
int x = 10;
double y = x;
What should programmers be especially aware of when programming with loops? Requires User input They should follow an if-then-else Ensure execution never results in an infinite loop Should not be used in functions
Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. T F Normalization is used to minimize data redundancy.
Create a C++ function to check whether a given fraction is proper or not. Numerator and denominator is passed as a pair {int Num, int Deno} to the function and function prints “Proper”/”Improper”.
CREATE A C++ PROGRAM THAT THE USER WILL INPUT 2 NUMBERS (A & B) AND THE OUTPUT IS TO GET THE REMAINDER OF A/B WITHOUT USING A MODULO (%) AND DIVISION (/) OPERATOR.
What is the output of the following code? Transcribed Image Text: #include
using namespace std;
int main(){
int n=3, x=1;
for(int i=-1; i
Write a program in matlab to plot the circular helix x(t) = sin t, y(t) = cos t, z (t) = t where the belongs from 0 to 30 with Increment of 1.
Transcribed Image Text: Make a layout in Android Studio as shown in the blueprint
shown below:
Requirements
1. Imageview
2. Three Textviews with their
names as (Name, DOB, Country)
3. Button
4. Progressbar
I need the answer as soon as possible Transcribed Image Text: Suppose x 5. After the statement y x++; executes, y is 5 and x is 6
Select one:
O True
O False
Find the next three terms of the following number pattern?
1.)
1, 1, 2, 3, 5, 8,__, __, __?
2.) 2, 4, 16,__, __, __?
3.) 8, 27, 64, 125, __, __, __?
Write C Program Code to simulate Worst-Fit memory management Algorithm for the following Process. Number of Blocks: 6 (B1=6, B2=8, B3=10, B4=15, B5=20, B6=4) Number of Process: 5 (P1=1, P2=12, P3=17, P4=10, P5=6)
There are a number of requirements engineering CASE systems, and you’ll need to know how well (if at all) they enable automated consistency analysis for validation and verification of requirements in this area.
Matlab draw the surface color filled function(cos(x+y)= 2 where x 0to 107 y = x Remember 3d surface will form , code and output is required ,output must be in pc or laptop
Transcribed Image Text: v Question Completion Status:
QUESTION 2
In system development, when the test data will be carried out by the client?
System analysis
Logical design
Physical design
System acceptance
QUESTION 3
Java I am beginner in java my program is to take 2 number from user and given that these number is of int type . i have to find remainder and print this
Transcribed Image Text: Find the time complexity of the following code
int b = 0;
for (j = 0; j< n; j++) {
for (i = n; i >j; i–) {
b=b+j+i;
}
121. RAID level 2 refers to? a. Disk arrays with striping at the level of blocks b. Disk mirroring with block striping c. Memory style error correcting code d. Block interleaved distributed parity
The ……………… is a client server attack it exploits some of the page rendering features that are existing in the web browsers. user interface redressing cross-site request forgery cross-Site Scripting denial of service
Transcribed Image Text: Question 5.
Represent (Draw) the integer -266 ( using tows complement &
32 bits integer) and the word “Comp230” in computer memory,
(use odd parity). Show your work in details.
Transcribed Image Text: Q3: IF Rauto=1000 and its operands is (50) HEXA A=OF ,C=1D what is the
result after execute the following programs
3. LOAD (Rauto) +, A
4. LOAD _ (Rauto), C
Transcribed Image Text: Models such as the event table and use case diagrams are effective models to understand and describe
Select one:
O a.business processes
O b.system flows
c.business events
O d.information repositories
When building a classification model, which of the following is a good measure of the model’s performance on new observations?
Testing set AUC
Testing set ASE
Training set AUC
Training set ASE
check_circle
chapter 14 a. Describe a UML class diagram. b. Describe a class, an object, and the relationship between them. c. Describe what is meant by the identity, state, and behavior of an object.
Transcribed Image Text: Write
a program to initialise a 3 X2
array
of
to the Vallues below, then Calculate the Sum of each row of the array
5 10 15
6 3
2.
Discuss the key metrics for static testing and Path testing and demonstrate how static testing and Path testing saves project managers costs by justifying this in the light of savings to cost ratio?
The telephone network, which is the oldest and most well-known kind of (wired) communications network, operates on the packet switching concept. It is the most widely used mode of communication today. True \False
Transcribed Image Text: In
you model other.8
systems in the environment of the system being
* .developed
System context model O
System interaction model O
System structural model O
System behavioral model O
Transcribed Image Text: Make a layout in Android Studio as shown in the blueprint
shown below:
Requirements
1. Imageview
2. Three Textviews with their
names as (Name, DOB, Country)
3. Button
4. Progressbar
None Transcribed Image Text: 18
In Revit what does the view control bar do?
1/8″ – 1-0″
Modifies objects in view
Saves project
Creates multiple view tiles
Options for changing the view display
Transcribed Image Text: Even though the EXIT clause can be used in any type of loop, it is considered good
form to use the EXIT clause only in basic loops.
Answers:
Yes
No
What does it mean when you say a field is calculated? In a SQL query, how should I use it? What’s the best way to name a computed field? provide a few examples
Plot this x[n] in matlab Transcribed Image Text: Week-4 Fundamental-III
1. Let x[n] = r[n] – r[n-5] – 5u[n-10] where r[n] and u[n] are unit ramp and step inputs (in
%3D
discrete-time domain):
Discuss the IT-related challenge(s) you have experienced in a University lecture hall during a lecture, giving reasons for the challenge(s) and how the challenge(s) could be resolved. (Please do not use chegg answers)
What is the value of this boolean expression: (!(( true || undefined) && (false || “0”))) a. It doesn’t run because there’s a syntax error. b. false c. undefined d. true e. null
Should be described and shown how RISC and CISC architectures are used in computer applications Assembler language should be used to code basic memory locations and addressing operations, as well as timing graphs.
For 64 point FFT algorithm, a) Calculate number of stages. b) Calculate total number of blocks. c) Calculate total number of butterflies. Note: Show your detailed calculations for each part of the question.
Which one of the following is marketed the same way as the web sites’ banner advertising? Select one: a. traditional advertising b. mobile apps’ advertising c. SMS advertising d. None of these answers
When building a classification model, which of the following is a good measure of the model’s performance on new observations?
Testing set AUC
Testing set ASE
Training set AUC
Training set ASE
check_circle
Write a program in C language To input array of 10 elements from the user and implement following functions 1) Sort an array 2) Find out the mean 3) Find out the median
Construct a single Python expression which evaluates to the following values, and incorporates the specified operations in each case (executed in any order). (d) Output value: ‘comp10001’Required operations: tuple indexing dictionary lookup .lower()
When a lengthy procedure is replaced with a macro containing the procedure’s code, the compiled code size of the programme is often increased if the macro is executed several times. True or False
Transcribed Image Text: 2. Using C++ programing Language, create a program that will compute for the quotient of the
two numbers: 6.8 and 4.2
Give Screenshot of your program with the output console
Write a function named Quotient with 2 Integer parameters (originally from text boxes) and a Double return type. The function should calculate the first parameter divided by the second and return the result
3. If a packet arrive with an M-bit value is ‘1’ and a fragmentation offset value ‘0’, then it is ______ fragment. a. First b. Middle c. Last d. All of the above
Transcribed Image Text: Q5. Find the time complexity of the following code
int b = 0;
for (j = 0; j< n; j++) {
for (i = n; i >j; i–) {
b=b+j+i;
Wireless transmissions have altered the Internet itself in a fundamental way. We now use the Internet in very different ways than we used it a few years ago. For example, provide an example.
Compare and contrast the idea of abstraction with the help of real-world examples from the world of computer science. To expound on the idea of abstraction and explain its significance in software engineering
This problem strategy begins with the result and applies a set of mathematical operations in reverse order to arrive at the answer Trial and error Working backwords Searching for patterns Guess and check
40. The portion of physical layer that interfaces with the media access control sublayer is called a. physical signalling sublayer b. physical data sublayer c. physical address sublayer d. none of the mentioned
Make a list of technologies that have become indispensable to your life. Imagine the consequences if any of these technologies should fail you. What can you do to protect yourself against such failure?
Transcribed Image Text: This type of member function may be called from a function that is a member of the same class or a
derived class.
static
private
protected
O None of these
Do you agree that “for a P2P file-sharing software, there is no notion of client and server sides of a contact session”? Whether or not this is the case, what are the reasons?
Asap Transcribed Image Text: The access time of cache is 100 us, the access
time of main memory is 90 us, and hit ratio is
95%, then access efficiency related to cache is
Java Program find a^b where result is big number greater than long range how to output the result. i had 10 min please do fast please don’t copy from internet else i downvote
print the American flag using ‘*’ and ‘=’ character using Java programming,there should be 15 rows in the flag to be printed and width of the flag is 46 ‘=’ characters at max
Please explain how Internet technologies are being used in the development of a process in one of the company’s functional areas. Provide an example and assess its monetary worth in the business world.
Define what is critical infrastructure problem and what is attribution problem in security. How can a state actor confront and collaborate with other states and private entities to overcome these two security issues?
A soft link, which is also known as a symbolic link, may be seen by using the ls -l command and looking for a @ sign in the filename. So, is it correct?
Transcribed Image Text: 12
Consider the following T flip flop timing diagram: What type of clock trigger is used?
Clk
OFalling and Rising
Falling Edge Trigger
O Rising Edge Trigger
No Correct answer
We discussed the problem of local minima in EM for Bayes nets and in training of deep neural networks. Why is it a problem in for one of them and not the other?
What is the purpose of submitting an ARP query in a broadcast framework? What is the purpose of submitting an ARP response in a frame with a MAC address of a specific destination?
None Transcribed Image Text: 1. Find root V80 using Newton Raphson method.
2. Write a program to find the roots of the following equation using N-R method:
F(x) = exp (x) -3 x
329. A technique that allows more than one program to be ready for execution and provides the ability to switch from one process to another. a. multitasking b. multiprocessing c. multitasking d. multiprogramming
One of the important steps to change the kali settings to enable internet connection is: Run apatche2 Change ipv4 settings to manual Change IP address settings to DHCP Select Bridge as network adapter
What is the answer of this? Transcribed Image Text: 1: txt =???
2: print(txt)
Program output:
“Quotes” are useful.
Type in the string value for the variable txt to produce the output above.
Transcribed Image Text: The keyword length indicates *
O the largest array value.
the number of elements in an array.
the largest index in an array.
the memory size of each array element
Demuestre, usando las reglas de deduccion natural, los siguientes secuentes Transcribed Image Text: 4. {P= (Q = R), P = Q, P} F R.
5. {P= Q, R=Q, P A R} F Q.
Explain briefly what firewalls, intrusion detection systems, and intrusion prevention systems (IPSs) are used for and how they function. What, in your opinion, are the pros and disadvantages of each of these technologies?
How can i model case study for car factory or biscuit factory in queuing system with full probability and which Kandle notation I need to design for factory and how i apply it??
C++ Transcribed Image Text: User enters a string that contains only 0,1,2.
Write a program in CPP to take input the
string from user and find the character with
max frequency among 0,1,2|
Transcribed Image Text: Which statement transfer execution to different parts of your code based on the value of an
expression?
O a. if-else-if
O b. switch
O c. Nested if
O d. if
For a system with single level of cache, define Tc= first-level cache access time= 0.2ns; Tm = memory access time= 0.8ns; H= first-level cache hit ratio. Compute the time for Ta read operation.
Google Chrome is an example of a multithreading-based operating system in which all threads are generated inside one process. The benefits and drawbacks of this multithreading technique for the program should be explained.
The MAC address of my PC is 18-6B-2C-99-DD-7A (in hexadecimal format). Write this out as a 48-bit binary value. Your answer should consist of 48 values, each of which is 0 or 1.
A ScreenTip for command does not include which of the following? Provide a link to a command’s help subject Command’s alternative location Command shortcut on the keyboard A description of the command’s function
Transcribed Image Text: Quèstion 20
Which of the following methods performs the initializations in applets that would be performed in a constructor for a regular Swing GUI ?
O run()
init()
paint()
destroy()
Write a program to take input a char variable and an integer(in range 1 to 256) from user and print the value of ASCII value of char – Value of integer in output.
_____ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models. (180) a. Enterprise software b.CAD software c. Public-domain software d. A software suite
45. Baud means? a. The number of bits transmitted per unit time b. The number of byted transmitted per unit time c. The rate at which the signal changes d. None of above
In the study of the characteristics of the term “Cycle”, we also studied that of the term “System”. List ten (10) characteristics that any System irrespective of the field will possess or exhibit.
Write an assembly language program that allows user to input one digit number and determines if it is even or odd then displays a message indicating whether the number is odd or even.
Computing confidence intervals for the classification accuracy of a binary classifier makes use of an approximation. a. What approximation is used? b. What is the requirement to ensure that the approximation is reasonable?
I need the answer as soon as possible Transcribed Image Text: Which one of the following represents a class in Python?
O tuple
O str
O All of them
O int
O list
Write a program that generates two integers under 100 and prompts the user to enter the sum of these two integers. The program then reports true if the answer is correct, false otherwise.
I need the answer as soon as possible Transcribed Image Text: Please read the following questions carefully and then elaborate on cach of them.
5-Describe Basics of spread spectrum & spreadi ng sequences.
. Create a class called StudentAge. This class should allow the student to enter name and date of birth. After that, determine student age. Lastly, display student name, date of birth and age.
By python only Transcribed Image Text: 1. Make a program in while loop to display numbers
from 40 to 10 in reverse order with decrement of 2.
2. Share screenshot of coding only.
What will be the output of the following program in C++? #include
while((
)<=(n-i)){
S=S+i;
}
cout< using namespace std; int main () { int cin; cin >> cin; cout << "cin: " << cin; return 0; }
102. A process of software development where requirements are broken down into multiple standalone modules of software development cycle a. Waterfall model b. RAD model c. Evolutionary process model d. Incremental process model
b) The Bus Ticket reservation System is a web-based application that facilitates customers to reserve bus tickets. With the aid of a diagram, discuss FOUR (4) functions of the Bus Ticket Reservation System.
Suppose list1 is [4, 2, 2, 4, 5, 2, 1, 0], Which of the following is correct syntax for slicing operation?
a.
print(list1[:-2])
b.
print(list1[:2])
c.
all of the these
d.
print(list1[0])
(Python3)
Transcribed Image Text: In a Linux system, threads on the ready queue of a given core are selected randomly to move to the run state when a
dispatch transition occurs.
True
O False
Transcribed Image Text: ADC to UART
Program the PIC24HJ microcontroller so that the UART displays:
• integer ADC 12 bit value acquired from AN5,
• the approximate voltage that is applied to AN5,
Do you agree that teachers should possess a set of competencies to be able to deliver quality instruction to their students as per respect to the ICT integration for education? Explain your answer.
(a) How does the hourglass structure of the Internet allow for innovations and technological advances? Illustrate with an example.
(b) Name the types of software used by various functional units in an enterprise.
If every vertex in a graph has the same degree, it is called d-regular. Let’s say k and n are both odd numbers. Prove that there are no k-regular graphs with n vertices.
Why is it that in so many systems, the cancel button in a dialog box appears to be unresponsive? What quality aspects do you think were ignored in these systems? Please answer ASAP
Rewrite the following code using while loop statement instead of for loop statement in C++.
#include
using namespace std;
int main()
{
int factorial(1);
cout << "find factorial " << '\n';
for(int i=1;i
Write a function named Quotient with 2 Integer parameters (originally from text boxes) and a Double return type. The function should calculate the first parameter divided by the second and return the result
Challenges faced by Zomato are – 1.) Building a dish database , 2.) Spam Control, 3.) Lower server latency for out geographical widespread traffic. Explain these three points briefly with relevance to ZOMATO.
Microkernels attempt to provide as small a kernel as possible, putting much of the operating system support into additional modules. What do you feel are the minimum services that the kernel must provide?
Write an algorithm and draw the flow chart for a software solution that can accept any number from the user and print onto screen wither the number is a prime number or not.
You learned about several software process models. Describe the process model that you think it is the best model and explain five different reasons which lead you to think it is the best.
If your computer seems slow, list at least two things you could do to try to speed it up without resorting to purchasing an entirely new system. Explain your possibilities with priorities sequence.
Transcribed Image Text: Information such as your recent work experience, education, photo, and specific skills that you
have are stored in LinkedIn as part of your
O background
O profile
O update page
Using C++ Programming language: Assume you define a vector in the following way: vector
What is the ip ospf priority command used for? Explain why Network Address Translation (NAT) for IPv4 is necessary in your own words (at least two reasons). Give instances to back this up.
Write a code in matlab which enables a user to input the coefficients of a quadratic q(x) = ax 2 + bx + c and plot the function q(x) for x = sin(y)
Write a c++ program to Take 20 integer inputs from user (all dynamically) and print the following: number of positive numbers number of negative numbers number of odd numbers number of even numbers
45. Baud means? a. The number of bits transmitted per unit time b. The number of byted transmitted per unit time c. The rate at which the signal changes d. None of above
Transcribed Image Text: Dim s = 0
Dim x = 3
Do Until x > 10
s += x
x += 2
Loop
MsgBox (s)
O 10
O 14
O 13
O 24
Transcribed Image Text: Time ler
write a java code to print the content of a binary tree in in-order.
Note: suppose you have access to the root node [ Node rootNode]
A BI
Transcribed Image Text: Write Python Program .
Input two integer A and B by user.
Print A and B in different line
Swap Numbers
Print A and B after swap in different line
Question:- How can we check if the below diagram of the linked list has a loop or not. Also, explain your answer with the full algorithm. Transcribed Image Text: 1
2
3
4
What is the definition of a calculated field?
What is the best way to utilise one in a SQL query?
How do you give a calculated field a name? provide a few instances
Q2 a) What could be the issues with e-payment systems? why is standardization required for e-commerce payment systems? b) What is meant by the terms Crowd Sourcing and Technology mining? Explain with example.
Please solve Quickly ?++ Transcribed Image Text: Arrange the following flowchart to obtain the result in
below series
M+..
.+0+1+2+3+5+8
start
End
No
Yes
B=sum
A=B
sum=0, A=0, B=1
B<=M
print sum
sum=A+B
Transcribed Image Text: The minimum number of comparisons needed to find the Simultaneous Min, Max values of n odd elements is
?. (3n/2) -2
O b. 3(n-1)/2
O . 2n-1
O d. (3n-2)/2
Transcribed Image Text: Let A :=
{0* 1″|n > 0}. And B := {w\wis an even number}. Show that
A
int main()
int i=7;
do
{
for(int j=7;j<9;j++)
cout<
return 0;
}
RSA algorithm is used by choosing two wo prime numbers, say p = 7 and q = 17. If the public key is e = 5, then the value of ‘d’ is ?
Write a program that uses printf to display this: * * * * * * * * * * * * * * * * * * Filename: printf1_your family name.c (Ex: printf1_alfonso.c)
I need help drawing a picture in python turtle with code. Please enter a code for python turtle (application used is thonny) that will draw a bird’s eye view of a pizza! Thanks!
Write a C++ program in which user enters a 8 digit roll no. And program tells him the seat number for him. Given: Seat number is equal to last 2 digit of RollNo.
Transcribed Image Text: What does the following expression represent?
Do not perform any calculations: even something like 2 + 3; rather just write out what it represents without doing any arithmetic calculations.
WI
Transcribed Image Text: ?What is the result of the following code
public class HelloWorld{
public static void main(String []args){
int sum1 = 10.0 + 50;
System.out.println(sum1);
}
}
60
60.0
10.50
Error O
Transcribed Image Text: 4
If a computer specified as a 256-bit processor and can execute up to 1024 instructions. What
will be the size of Addressbus, Databus, Memory Length, AC?
Enter your answer
Use html and css to develop a registration form with the following fields: Name,phone number, email and gender. Use an external Javascript code to validate if one or all the fields are empty.
Consider yourself a software tester. You have a calculator that you use for testing. Which of the various kinds of testing would you prefer? To test the calculator, list any five possible scenarios.
Java Question Transcribed Image Text: Question 1)
1. Write a console programme that reads in firstName (String), sureName (String), age
(int) and salary (double) through the keyboard and prints them on the screen.
None Transcribed Image Text: Which of the following are OK names to use for a variable? If not, explain
why?
1. SUM
2. GRAND TOTAL
3. MyValue
4. 16Candles
5. SUM23
6. YEAR%
Transcribed Image Text: An organization is granted a block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted?
Select one:
a. 32
O b.8
OC. 16
O d. 27
Create a C++ program that take an array of 10 inputs from the user and generate the sorted out put using the following Algorithms; ? Bubble Sort ? Insertion Sort ? Selection Sort
ARP queries are submitted in a broadcast architecture because they are more efficient. What is the purpose of submitting an ARP response in a frame with a MAC address of a single destination?
Explain about part classification and coding system. Describe coding structure of MICLASS system, KK-3 and DCLASS coding system Assign codes to any five parts with different manufacturing features using these three coding methods
Please solve Quickly ?++ Transcribed Image Text: Arrange the following flowchart to obtain the result in
below series
M+..
.+0+1+2+3+5+8
start
End
No
Yes
B=sum
A=B
sum=0, A=0, B=1
B<=M
print sum
sum=A+B
Please quickly quickly i need help in 15 minutes Transcribed Image Text: 29. Which of the following are examples of non-functional requirements [Multiple Answers] *
Usability Requirements
Programming language
Process standards
Execution speed
None Transcribed Image Text: Q.1- Make the right choice for the followings:
1. 8086 processor could be interfaced with
memory locations.
a) 1 M
c) 20 M
b) 1 K
d) 256 K
I need the answer as soon as possible Transcribed Image Text: Q5\ write c++ program using visual studio
to check the value of z even or odd,
positive or not ? Z=Ln(x)*2 *
Transcribed Image Text: Part B:
What will be the output of the last two lines of the following code?
Int x- 10:
Int *yptr:
yptr – &x;
*yptr +- 3;
Yptr +- 3;
Please solve Quickly ?++ Transcribed Image Text: Arrange the following flowchart to obtain the result in
below series
M+..
.+0+1+2+3+5+8
start
End
No
Yes
B=sum
A=B
sum=0, A=0, B=1
B<=M
print sum
sum=A+B
Explain briefly what firewalls, intrusion detection systems, and intrusion prevention systems (IPSs) are used for and how they function. What, in your opinion, are the pros and disadvantages of each of these technologies?
For an array with 15 elements, how many iterations are required to sort
the elements using selection sort algorithm?
D 14
(b) 15
(c) 12
(0.5)
04
(d) 16
Data structures and algorithms.
Identify two to three (2-3) privacy-invading information technology tools. Next, examine the most common ways that the tools you’ve found could be used to commit computer crimes. Give a justification for your response.
Computer Architecture: Give the decimal and hexadecimal values of the machine instructions for the following sample instructions: beq $t0, $s1, 1000 lbu $s0, 100($t2) j 2000 lui $t1, 100 bne $t2, $s2, 1000
DMA transfers 8 bits in 1 CPU cycle at regular intervals. For a 2 Mhz processor, if CPU uses 0.7% processor cycles for DMA, determine the data transfer rate in bits per second.
The session layer in the OSI model is responsible for dialog control and synchronization. Which Internet model layer do you believe is in charge of these responsibilities? Give an explanation of your response.
Computer Science A list of variables is given as (5, 3, 27, 8, 22, 13, 20, 12, 18, 14, 11, 7). Write a python code to display equal frequency and equal width binning.
Give a pseudocode description of an insertion into a hash table that uses quadratic probing to resolve collisions, assuming we also use the trick of replacing deleted entries with a special “available” object.
What exactly are graphs in Microsoft Excel? What exactly is the significance of graphs in Microsoft Excel? What are some of the most common types of graphs that are used in Microsoft Excel?
Transcribed Image Text: What gets printed after executing the following code?
void main () {
string s1 “Hello\”C++\””;
cout <
I need the answer as soon as possible Transcribed Image Text: Suppose x 5. After the statement y x++; executes, y is 5 and x is 6
Select one:
O True
O False
Why might early adopters of an IBM Systems Solutions information technology system be ready to pay more for a closed-end lease of the necessary servers and other gear than for an outright purchase?
Many network experts believe that with the rise of the Internet, it has become more critical to move toward standardized data link layer protocols. Are you in agreement or disagreement? Justify your stance.
Fill in the blank spaces with the appropriate bits as found in 8051 microcontroller: Timer Mode Bit Timer Mode M1 M0 Split Mode 13 bit Mode 8-bit auto reload mode 16 bit Mode
Identify two to three (2-3) privacy-invading information technology tools. Next, examine the most common ways that the tools you’ve found could be used to commit computer crimes. Give a justification for your response.
P is the class of language that are decidable in polynomial time Transcribed Image Text: (a) Show that class P is closed under union.
(b) Show that class P is closed under concatenation.
Transcribed Image Text: The circuit of the given figure realizes the function
(with figure*)
A
C
-Y
E
Select one:
O a. AB+C+DE
b. AB+C. (D+E)
O c. (A’+B’).C+ (DE)
o d. A’+B’+C’+D’+E’
Discuss the key metrics for static testing and Path testing and demonstrate how static testing and Path testing saves project managers costs by justifying this in the light of savings to cost ratio?
I need the answer as soon as possible Transcribed Image Text: What is the parity bit for the following sequence given that even parity is used?
Sequence
= 01101101111101
O cannot be determined
Transcribed Image Text: Draw a Flow Chart to calculate the squares of the Odd numbers between 1 to 100.
Draw a Flow Chart to calculate the square root of a given Five numbers.
A 3-foot-tall monkey is in a room where some bananas are suspended from the 8th floor ceiling. He would like to get the bananas the room contains two stackable movable climbable 3-foot-high crates
In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text a. polyalphabetic b. mono alphabetic c. transpositional d. multialphabetic
Write C Program Code to simulate Worst-Fit memory management Algorithm for the following Process. Number of Blocks: 6 (B1=6, B2=8, B3=10, B4=15, B5=20, B6=4) Number of Process: 5 (P1=1, P2=12, P3=17, P4=10, P5=6)
Q3. IF PC= 682 , AR=123 , DR=A2BF, IR= 5672, then execute the following M[AR] ?DR IR? M[AR] Determine the value of IR after the execution and comment on the type of addressin
How we can force a log switch? a) By using ALTER SYSTEM LOG b) By using ALTER SYSTEM SWITCH LOGFILE c) By using ALTER SYSTEM SWITCH LOGS d) By using ALTER SYS LOGFILES
Identify two to three (2-3) privacy-invading information technology tools. Next, examine the most common ways that the tools you’ve found could be used to commit computer crimes. Give a justification for your response.
Transcribed Image Text: What is a full adder? Using full adder, draw the block diagram of 3-bit binary adder.
B I
= ?
E?
Maximum file size: 250MB, maximum
?
?
II
?
I need the answer as soon as possible Transcribed Image Text: Q 02: Why the need of
Software Engineering
arises?
Portability,
Interoperability,
Reusability
are
the
different
characteristics
of
a
good
Software
Engineer. Explain?
It is desired to design a circuit to multiply the signed 3-bit number A with the signed 3-bit number B. How many bits should be the output of this circuit to be designed?
120. RAID level 1 refers to? a. Disk arrays with striping at the level of blocks b. Disk mirroring with block striping c. Memory style error correcting code d. Block interleaved distributed parity
c++ program to display this pattern, use for loop Transcribed Image Text: 1 2 3 4 5 5 4 3 2 1
123 4
1 2 3
4321
321
12
21
1
1
Describe how web caching will minimize the requested item receipt wait. Will web caching minimize the time delay for all items a user requests or only for certain objects? Why does this happen?
Create a generic function max that gives the maximum value of three generic type arguments that are passed to it. Then test this function by calling it with char, int, and float type.
In C++ assume that qty and salesReps are both integers. Use a type cast expression to rewrite the following statement so it will no longer perform integer division. unitsEach = qty / salesReps;
25. What are global locks ? a. they synchronize access to local resources b. they synchronize access to global resources c. they synchronize access to local and global resources d. none of above
Transcribed Image Text: Are the two grammars with respective productions
S ? aSb|ab| A,
and
S ? a Ab|ab,
a Ab|A
A
equivalent? Assume that S is the start symbol in both cases.
16. What is a shell ? a. It is a hardware component b. It is a command interpreter c. It is a part in compiler d. It is a tool in CPU scheduling
Transcribed Image Text: 4
6 2
5.
What is the resulting expression read from this tree if the nodes are processed using post-order traversal?
Do not worry about adding parenthesis to the expression.
Transcribed Image Text: 1
The simplified Boolean function in
SoP, which is obtained from
F (A.B, C) – ? (2,3, 4, 5, 6, 7) is:
%3D
None
?? + A’B’
A’B’
A’B’C’
??
Design a circuit that implements function p below using AND, OR, and NOT gates. DO NOT change the form of the equation. Transcribed Image Text: f (io,i, i2, ) = i>(i?ih + ?o?)
Solve completely and explanatory Question 1 Transcribed Image Text: •1. Based on the differences stated between a
Microprocessor and Microcontroller, Give two
examples of systems where they can be found in
each case.
155. The disk platters mounted on a spindle and the heads mounted on a disk arm are together known as ___________ a. Read-disk assemblies b. Head–disk assemblies c. Head-write assemblies d. Read-read assemblies
Assume that the data is transferred using a 4B5B bit synchronization and error detection code (4 net bits transferred using 5 bits). what is the physical layer gross bit rate? Show all calculations
Transcribed Image Text: Complete the table below to convert the decimal number 216 to binary. Use as many rows as you need.
n div 2
n mod 2
n
The binary number is
412. System’s performance can be improved by designing it with a. More than one storage media b. More than one I/O devices c. More than one CPU d. More than one logic unit
Most software engineering courses require their students to complete a substantial project as part of their final grade. Describe how the agile technique could be extremely beneficial to the students in this situation.
A ScreenTip for command does not include which of the following? Provide a link to a command’s help subject Command’s alternative location Command shortcut on the keyboard A description of the command’s function
52. The concept in which extra bit or byte is stored for record deletion and that extra stored bit is called a. insertion marker b. deletion marker c. modifying marker d. static marker
Include details on all three cloud computing models, SaaS, PaaS, and IaaS. While auditing Cloud technologies, you should bear in mind three things. Could use some help with this. Explain in detail, please!
A soft link, which is also known as a symbolic link, may be seen by using the ls -l command and looking for a @ sign in the filename. So, is it correct?
I need the answer as soon as possible Transcribed Image Text: Write a program in python to get extension
of file. Like you take user input and file find
the extension the file
6 Transcribed Image Text: Which one of the following represents the correct
structure of the web page?
Select one:
a.
O b.
c.
O d.
Microkernels attempt to provide as small a kernel as possible, putting much of the operating system support into additional modules. What do you feel are the minimum services that the kernel must provide?
There is a significant difference between Methodologies and the SDLC. Explain in your own words what the Software Development Lifecycle (SDLC) is and how it relates to the methodologies used in software engineering.
Transcribed Image Text: How many license plates can be
made using either two or three
uppercase English letters followed
?by either two or three digits
20075200 O
20077500 O
20057200 O
20077200 O
How many pulses are needed to change the contents of a 8-bit upcounter from 10101100 to 00100111 (rightmost bit is the LSB)? Note: Copied answers from chegg/course hero will be downvoted,they are incorrect.
1. Identify any three primary dimensions that should be considered when designing a foreign information technology architecture. What is the first thing you should consider when thinking about building an international information system?
Please solve Quickly ?++ Transcribed Image Text: Arrange the following flowchart to obtain the result in
below series
M+..
.+0+1+2+3+5+8
start
End
No
Yes
B=sum
A=B
sum=0, A=0, B=1
B<=M
print sum
sum=A+B
Transcribed Image Text: is the process of controlling visibility of a variable or method.
O a. Polymorphism
O b. Access specifiers
c. Overriding
O d. Code re-usability
Jump to…
dullah Aldhuhli (Log out)
Create a class called Name that represents a person’s name. The class should have fields representing the person’s first name, last name, and middle initial. (Your class should contain only fields for now.)
QUESTION 7 Which of the following allows Windows to update in the background and place hardware devices in their lowest power states? a. bernate b. Modern Standby c. Hybrid Sleep d. Away Mode
Modems are used for a variety of purposes. Tell us about the possibilities of employing amplitude modulation to send data across long distances. Describe how frequency modulation may be used to convey data.
Write a c++ program to Take 20 integer inputs from user (all dynamically) and print the following: number of positive numbers number of negative numbers number of odd numbers number of even numbers
Transcribed Image Text: 1. Simplify the following logic equation:
F = ab’c + abed’+ ab’cd’ + acd
Also draw the circuit before and after
simplifications, and comment on savings on number of
gates.
Transcribed Image Text: If the default mask for network was 255255.255.0
and after subnetting had become Subnet mask 255.255.255.192
How many subnets in this example?
Select one:
a. 4
b. 3
d. 192
write a program c ++ to find the sum of the following series? Transcribed Image Text: Write a program to find the sum of the following series.
sum 1+
51
71
+
(2n+1)
Problem 4 Transcribed Image Text: Write a program that splits a 4-digits integer number into thousands, hundreds, tens, and ones. For
example, 7375 is 7 thousands, 3 Hundreds, 7 Tens and 5 Ones.
java Transcribed Image Text: 5. The following JavaFx code is called as event
Model
Button btOK = new Button(“OK”);
QKHandlerClass handler = new QKHandlerClassO:
btOK.setOnAction(handler);
a. Window
b. Display
c. Delegation
d. Dialog
Using the IP 135.11.2.96/12, efficiently figure out the network addresses of the following host configuration: 2021, 1022, 511, 450, 127, 60, 32, 12, 10, 8, 6, 4, 3, 2. Upload the tree picture.
print the American flag using ‘*’ and ‘=’ character using Java programming,there should be 15 rows in the flag to be printed and width of the flag is 46 ‘=’ characters at max
After the execution of the following program the content of MYREG is : MYREG EQU 40H MOVLB 4H MOVLW 0H MOVWF MYREG, 1 Select one: a. 40H b. 1H C. 0H d. 4H
Demonstrate how to typecast int variable to float explictly. Print the float variable. In JAVA. Transcribed Image Text: Demonstrate how to typecast int variable to float explictly.
Print the float variable. In JAVA.
Transcribed Image Text: B
C
E
J
D F H ?
M
G
Figure Q1
Determine the result of Preorder Traversal.
Determine the result of Inorder Traversal.
Detemine the result of Postorder Traversal.
Transcribed Image Text: Which of the following is a type of threat that
prevents legitimate users from accessing the
system?
a. Data loss
b. Disruption of service
c. Information threat
d. Identity theft
There are a number of requirements engineering CASE systems, and you’ll need to know how well (if at all) they enable automated consistency analysis for validation and verification of requirements in this area.
Modems are used for a variety of purposes. Tell us about the possibilities of employing amplitude modulation to send data across long distances. Describe how frequency modulation may be used to convey data.
What is the role of solid state devices in aviation? Please explain your answers in association with safety, security, and convenience that comes with solid state technology. Answer in at least 10 sentences.
Do you agree or not that internet of things (IoT) devices must be secure to protect individuals’ privacy? Why and why not? Please post your answer here in not more than 100 words.
provide an overview of the most critical elements of the a.NET security guidelines Use resources like as the Microsoft.NET security website, the OWASP GitHub page, and any other trustworthy resources you come across.
In a nutshell, compare Bitcoin, Coinjoin, Zerocoin, and Zerocash in terms of their transaction fees. 1) The anonymity features that are offered 2) How easily they can be deployed in the real world.
Assume you’re studying a hospital administration system; for each of the following modifications, provide an example (that is relevant to this project): The application domain has shifted. A shift in the problem domain
Think of an example of two classes where one class is a special case of the other, and write declarations for both classes, with the special case being written as a derived class.
Programming language is: C ( Please write with comments): Two Programs: Transcribed Image Text: Write a program to add two numbers using pointers
Second program to search an element in array using pointer
For the dictionary containing the letters a,b,c,d,e,f,g,h and the numbers 012345, write the extended Backus–Naur form (EBNF) grammar of the expression that accepts all strings starting with abc and ending with a digit
What is the ip ospf priority command used for? Explain why Network Address Translation (NAT) for IPv4 is necessary in your own words (at least two reasons). Give instances to back this up.
I need the answer as soon as possible Transcribed Image Text: Rust
Make a string variable using new keyword
then add a anything string to that created
string and then print this string
Transcribed Image Text: Find the complexity of an algorithm that determines a COVID patient between n
Normal people using big O notation.
O 0(1)
O(n log n)
O O(n)
O(n^2)
O(log n)
O(n!)
Transcribed Image Text: Which one is correct for C programming integer types?
O a. Sizeof(short<=sizeof(int)> =sizeof(long)<=sizeof(long long)
Ob.
Sizeof(short<=sizeof(int)<=sizeof(long)>=sizeof(long long)
O C. Sizeof(short<=sizeof(int)<=sizeof(long)<=sizeof(long long)
O d. Sizeof(short>=sizeof(int)>=sizeof(long)> =sizeof(long long)
Oe.
Sizeof(short> =sizeof(int)<=sizeof(long)<=sizeof(long long)
We had 2 strings Str = “Hello kiara” Str2 = “Hey kiara” And you have to compare both string using if-else block and print the statement according to that. In Elixir programming language
Please answer the question in the screenshot. The language used is Java. Transcribed Image Text: For the given function, please indicate the tightest upper bound using big-O notation.
f(n) = 4n2 – 5n
Transcribed Image Text: Which of the following is a member of the language given by the regular expression below?, where e
denotes the empty string.
(0 U 1)*1(010*1)*
00
111011
01010100111
1010010
1001101
For a day, monitor your queries on a search engine. Suppose someone had access to those queries, knew they came from you, and knew your name. What would these queries reveal about you?
class isNaN_output { public static void main(String args[]) { Double d = new Double(1 / 0.); boolean x = d.isNaN(); System.out.print(x); } } What will the given code prints on the output screen.
I need the answer as soon as possible Transcribed Image Text: Rust
Make a string variable using new keyword
then add a anything string to that created
string and then print this string
1.) A medical receptionist can log into the computers at work to update patient demographic and financial information, but because of her assigned ________, she cannot access the clinical side of the system.
f the edge weights of a connected weighted graph are distinct, the graph must have a unique minimum spanning tree”. Is this statement true or false, briefly explain why in a few sentences.
Transcribed Image Text: Q4 A/ For the system below, check the following tests (linearity, time variant
or time invariant, Static or dynamic, Causality) with write the procedures of
solution:
y [n] = 4nx[n]
In software development, a variety of models are used, with each model having a varying level of significance based on the application. Please sort those models into categories based on your own tastes.
One of the most basic decisions to be made about developing a system is the order in which software components will be built or acquired, tested, and deployed. Identify four possible development orders.
in c++, Over load unary pre fix operator that first take a vale ,decrement it first then multiply it with other two number and display result that reflect the effect of decrement operator.
Transcribed Image Text: Which one of the following criteria is applied to make sure values are defined and used appropriately?
O Def use values
Producer consumer criteria
Variable value criteria
Data flow criteria
Please solve quickly in java 01 6.2.1 16-Bit Data Transfer Move the contents of one 16-bit variable Value to another 16-bit variable Result. Sample Problems Input: Value = C123 Output: Result = C123
I need the answer as soon as possible Transcribed Image Text: Q1
in
in c++
Q1/ write a program to draw a truth table of the following logic circuit:
BD
1 Add file
What is the meaning of the term “computer security? “? When it comes to Information Security, what role does it play? What are information security attacks? Which attacks cause data/information loss and destruction?
Solve the initial value problem below by Modified Euler Method for h=0.0001 (step size). dy/dx =0.5(1+x) y2 Initial Condition: y(x0=0) = 2 Domain: 0 < x < 0.2 I need to matlab code
45. Baud means? a. The number of bits transmitted per unit time b. The number of byted transmitted per unit time c. The rate at which the signal changes d. None of above
Write a C++ program in which natural numbers from 1 to 20 are pushed inside a stack data structure and then they are printed in reverse order. Output: 20 19 18 ……… 1
2a. If a computer runs at 12.8 GHz, what is the period of its clock signal?
2b. If the period of a periodic pulse train is 125 nanoseconds, what is the signal’s frequency
Write a C code that finds the numbers of the Fibonacci sequence in a sequence entered by the user. Note that dynamic memory functions must be used if arrays are to be used.
Transcribed Image Text: 3. Write a short Python function that takes a sequence of
integer values and determines if there is a distinct pair of
numbers in the sequence whose product is odd.
Computing And Software Systems Transcribed Image Text: It is permissible to place a password in code only when that code lives on a
secure server that no end users have permission to access.
Transcribed Image Text: 4. Write a C++ program to count total number of negative elements in an array.
5 Write a Cat program to cony all elements from an array to another array
Describe the following regular expressions: 1) a (a+b)*abba 2) (0+1)* 1 (0+1)* 11 (0+1)* Prove the following language is not regular: L = a n b n c m , where n>=1, m<=7
110. Goals for the design of the logical schema include a. avoiding data inconsistency b. being able to construct queries easily c. being able to access data efficiently d. All of the above
I need the answer as soon as possible Transcribed Image Text: What is the parity bit for the following sequence given that even parity is used?
Sequence
= 01101101111101
O cannot be determined
True or False: If methodA() contains an equals() method that overrides the one in the Object class, assertEquals() will utilize the version of equals() in methodA() in our JUnit test for methodA() ().
Consider yourself a software tester. You have a calculator that you use for testing. Which of the various kinds of testing would you prefer? To test the calculator, list any five possible scenarios.
52. This is ordinary telephone twisted pair wire, one of several physical media specified in the IEEE 802.3 standard for Ethernet local area networks (LANs). a. 10BASE-T b. 10BASE-F c. 5BASE-T d. 100BASE-T
Write the mathematical expression given below in expression coded in the computer language format. Transcribed Image Text: /xyz +-
+ (5x + 2)
1
1+
1
x +
y +-
z + 3
What exactly is the problem with IPv4 addresses? What is the suggested remedy to this problem? In your opinion, how has it worked out thus far? Describe a specific element of the circumstance.
When it comes to limiting access, how do hospitals of various sizes use permission, authentication roles, and mitigation techniques? These four security measures may help reduce the chance of being hit by ransomware.
Each of the following is a characteristic of cybercrime except a. targeted attacks against financial networks b. exclusive use of worms and viruses c. unauthorized access to information d. theft of personal information
Sub:-Computer organization Note:- explain with dia need clear explanation interrupt requests and priority Transcribed Image Text: With a neat diagram explain the implementation
of interrupt priority using individual interrupt-
request and acknowledgment lines.
Scenario – “Generate ERD of Use Case Diagram” Task to do: i. Identify Entities with atleast 10 attributes per Entities. ii. Identify all relationship from the given Scenario iii. Generate Entity Relationship Diagram
True or False: If methodA() contains an equals() method that overrides the one in the Object class, assertEquals() will utilize the version of equals() in methodA() in our JUnit test for methodA() ().
Transcribed Image Text: WHICH OF THE FOLLOWING MEMORY PARTITIONING TYPES ALLOCATES THE SAME AMOUNT OF MEMORY EQUAL WITH THE SIZE OF THE PROCESS?
Select one:
a.BUDDY SYSTEM
b.EQUAL-SIZED PARTITION
c.UNEQUAL-SIZED PARTITION
d.DYNAMIC PARTITION
There is a significant difference between Methodologies and the SDLC. Explain in your own words what the Software Development Lifecycle (SDLC) is and how it relates to the methodologies used in software engineering.
write an algorithm must. Simulate/dry run your algorithm on it and provide step-by-step updates of values in used data structure(s) considering “A” as source and “J” as destination. Transcribed Image Text: E.
H.
By using a health band as an example of the modern world, demonstrate the opportunities and benefits of a loT-based solution to M2M. What are the key M2M and loT characteristics to compare?
Using Java, Write a method named isEven that accepts an int argument. The method should return true if the argument is even, or false otherwise. Also write a program to test your method.
7 Transcribed Image Text: ?, b
(1)
b
a
a.b
a,b
(2)
b
92
a
7. Give the languages accepted by the dfa and nfa in the above 6 (1) and 6(2),
respectively.
Considering the Right to be Forgotten, do you favor European style regulations for sites such as Google, or US-style self-regulation? Justify your answer. Use at least one hypothetical example to prove your point.
157. _________ is the time from when a read or write request is issued to when data transfer begins. a. Access time b. Average seek time c. Seek time d. Rotational latency time
Q: A bit stream 1011000 is transmitted using the standard CRC method. The divisor is 1011. What is the actual bit string transmitted? Also find out whether, there is an error or not?
Transcribed Image Text: You want to create a website to tell story for children; the best website organization you can use
is
O erarchical Organization
O Linear Organization
Random Organization
O Structural Organization
In LISP, the function returns t if
Please help with this question in python
Write a python function that accept a string as input and calculates number of upper case letters and lower-case letters. Make use of python debugger module
In map coloring problem, which of the below is used to select region based on minimum remaining colors? a. Constraint Graph b. List containing available colors Note: Select 1 answer from 2 options.
…… functions always used operators Arithmetic operator O Reference operators O Text sequence operator O Transcribed Image Text: . functions always used operators
Arithmetic operator O
Reference operators O
Text sequence operator O
Transcribed Image Text: (b) (i) Describe the difference between parametric, implicit and explicit curve
representations.
(ii) Express the unit circle centred at position (1, 2), using parametric, implicit and
explicit curve representations respectively.
Transcribed Image Text: Write a C program to calculate the value of y as following:
(n is a real number given by user)
5, 2i + cos n+2
y = 2
i+1
i=-3
HCI What category of users are those who make use of College Information Management System (CIMS) for the first time? (Choose one) a. Casual User b. Novice c. Expert User d. Regular User
A regular TV set can be hooked up to a computer so as to received computer signal instead of a television program. This hooking up is achieved with the help of a adapter
Modems are used for a variety of purposes. Tell us about the possibilities of employing amplitude modulation to send data across long distances. Describe how frequency modulation may be used to convey data.
Explain briefly what firewalls, intrusion detection systems, and intrusion prevention systems (IPSs) are used for and how they function. What, in your opinion, are the pros and disadvantages of each of these technologies?
I have a program in C that does not run to completion. When debugging, it says “terminated with signal SIGSEGV, segmentation fault. Program no longer exists.”Help in repairing this program would be appreciated.
Write a go procedure that makes turtle 0 turn left 10 degrees at a time until its heading is less than 180 degrees. Your code must use a loop (loop, repeat, or while).
True or False: If methodA() contains an equals() method that overrides the one in the Object class, assertEquals() will utilize the version of equals() in methodA() in our JUnit test for methodA() ().
Assembly language please Transcribed Image Text: what will be the value of accumulator, CY and AC flags after the
execution of the following program:
MVI A, 38 H
ADI 87 H
DAA
HLT
You want to view the contents of autoexec.bat on the screen using the “type” command, but it scrolls by too quickly, what switch do you use to make it pause? type c:\autoexec.bat|more. explain?
i need the answer quickly Transcribed Image Text: if these numbers are existing in the following cells: A1=5, B1=3, C1=17. the result
of the equation: SQRT(Sum(A1:C1)) will be:
O 21
*?xcel
8.
25
Define a class template named Alice that takes a single type parameter. Make Alice a friend of all instances of a template class named Friendly. Give Alice member functions that demonstrate its friendship.
PYTHON POP/PUSH (STACK AND QUEUE)- ATTACHED Transcribed Image Text: With illustrations, distinguish between Stack and Queues and write
an algorithm for
insertion and deletion in stack and queue (PUSH Operation/POP
Operation) using python
A ScreenTip for command does not include which of the following? Provide a link to a command’s help subject Command’s alternative location Command shortcut on the keyboard A description of the command’s function
Transcribed Image Text: Make a layout in Android Studio as shown in the blueprint
shown below:
Requirements
1. Imageview
2. Three Textviews with their
names as (Name, DOB, Country)
3. Button
4. Progressbar
Q 03: There are different models used in the Software development, keeping in mind the importance of every model according to the application being used. Kindly classify those models based on the preferences.
Transcribed Image Text: 1’s.
While grouping 1’s in k map, we cannot make of group of
Select one:
O a. 2
O b. None
O c 3
O d. 4
O e. 1
python program to merge 2 dictionary given by 2 way? nm beginner in python Transcribed Image Text: python program
to merge 2 dictionary given by 2 ways(|, **)
I am beginner in python
In a leaky bucket system if the output rate is 5 KB/sec and input burst of 50 KB/sec for 10 sec and 10 KB/sec for 50 sec then bucket size in KB is…..
Python. Please, help me to write a program that takes three straight lines of type ax + by + c = 0 and checks if the given straight lines are in general position.
Transcribed Image Text: Consider the value of a=34 and value of b%3D60.
a=a+b
b=a+b
C=a+b
d=a+b+c
print(c)
print(d)
What is answer for the statement print(c)
What is answer for the statement print(d)
hp
What exactly is the problem with IPv4 addresses? What is the suggested remedy to this problem? In your opinion, how has it worked out thus far? Describe a specific element of the circumstance.
Stuck on this C++ code. Any help. Thanks Transcribed Image Text: 5) Write an overload function max that takes either two or three parameters of type double
and returns the largest of them.
Google Chrome is an example of a multithreading-based operating system in which all threads are generated inside one process. The benefits and drawbacks of this multithreading technique for the program should be explained.
Please answer the question in the screenshot. The language used is Java. Transcribed Image Text: The best-case running time of insertion sort is better than that of Merge sort.
O True
O False
Transcribed Image Text: Part B:
Take two points from user that defines a point location in 2D Cartesian co-ordinate. Write a c program using functions
to convert this point location to polar coordinates.
Rewrite this if/else if code segment into a switch statement: if (a >=1 && a <=3) x=10; else if (a == 4) x=20; else if (a >=5 && a <=7) x=30; else x=40; Write a MATLAB program to display 10*10 Matrix in which first 50 elements have values from 1-50 and next 50 elements have values from 50 to 1. Attach code and matlab output screenshot. database course: Q. Which normal form requires that, no non-key attribute should functionally depend on a part of the primary key? 3rd Normal Form 4th Normal Form 2nd Normal Form 1st Normal Form You have the network 81.1.2.0Links to an external site. with mask 255.255.255.128Links to an external page. How many useful host addresses do you have available? Group of answer options 126 256 128 64 Transcribed Image Text: Question 7 What is the returning value of the following statement? SELECT SUBSTR (‘Hello World!”, 8,2) FROM dual; a. Wo O b. ello Wor c. rl O.rl O d. or Transcribed Image Text: Question 9 What SQL key word would you use to remove duplications within the result set. O a. REMOVE DUPLICTAE O b. UNIQUE O C. NO DUPLICATE O d. DISTINCT In what ways do the four different Nmap port scanning types interact with the three-way handshake? Is there a better Nmap port scan type? (Show that you understand by using your own words) Write a C++ function to take a string as parameter and return an integer which is the length of string passed as input. int length (string); Test your code for the string “Assignment”. complete the twelve maximum functions in the editor such that given an integer nit return 12 when n is less than 12, or The value of n, when n is greater than 12 Arithmetic adder / subtractor logic disable. (a) List the procedures you will apply in the design application. 8-bit BCD full adder Design the circuit. Please explain its one. Implement with AND, OR, NOT. Transcribed Image Text: After the execution of the following program the content of the working register is.11H: MOVLW OH ADDLW 8H ADDLW 9H Select one: True False earch O # @ G DELL Describe (in words as well as graphically) the interaction framework introduced in Human Computer Interaction. Show how it can be used to explain problems in the dialog between a user and a computer. Write a program in pascal language to print a string and the compiler should not close down its window till user enter any other key and after that it print the execution complete Transcribed Image Text: Design one system with apply the electrical transducer in the system. Explain about the concept and function of the transducer in the system. (Student can choose any type of transducer). Transcribed Image Text: Q2/ Write a program to find the maximum number at block 100 bytes number start at Physical Address 0A500H then store this maximum number at DS OB0OH and offset 220H. Compare the features of C#, Python and C++ programming languages. Use Google trends to analyze the popularity of these languages among the programmers in Middle East region. Provide screenshots to justify your results. Google Chrome is an example of a multithreading-based operating system in which all threads are generated inside one process. The benefits and drawbacks of this multithreading technique for the program should be explained. i need the answer quickly Transcribed Image Text: Q2:Write a program that read 1d array of size (10) and a number then find how many the number is repeated in the array. * Theory of computation Transcribed Image Text: Describe in English the set accepted by the finite automaton whose transition diagram is as shown in Fig. 5.15. 0,1 1 92 93 Fig. 5.15 Finite automaton None Transcribed Image Text: B/ Write a matlab code to find sum all elements of a vector, if the vector is the following: M=[5, 7, 15, 0 ,55, 100,11,23] using control statement. 1-2 Do not copy paste from Internet I will downvote if u will do that How to redirect a page to another page, use of RequiredFieldValidator and importance of Server.UrlEncode() in asp.net.Explain with proper coding Transcribed Image Text: Branch Table BranchNo Name B001 Location 567, Kileleshwa 890, Karen 894, Rongai Kileleshwa BO02 Karen ???? Rongai i). Write appropriate SQL statement to display all staff who work at BranchNo “BO02” Using a standard DLX 5 stage Multicycle pipeline and MIPS give 2 example that would lead to a potential Write After Write Hazard. Explain in details why it would lead to a WAW hazard. A Layer 3 IPv4 packet does not contain which of the following? Protocol No. 1 MAC Address of the Source IP Address of the Destination Time to Live (D) (TTL) Checking for Errors (Checksum) Being a Network Administrator you are install a new computer lab for 30 computers, write down the basic required software/hardware component for your lab just write the name and which type of Network lab Name the attack that is carried out by placing code in the form of a scripting language into a Web page that is interpreted by a client browser CSRF XSS SQL injection broken authentication Assume G1 is a 32-bit unsigned global variable. We wish to write code that increments G1 if G1 is less than 35. Draw a flowchart of the process. Write the code in both C Theory Of Automata Transcribed Image Text: 2. Prove that language L={ w E (a+b)*:|w\b# |w\a } is not regular using Pumping Lemma. Note that |w|a denotes the number of a’s in the string w. Transcribed Image Text: 16 To be able to use the database, we have to give a namespace in our application we write: * O imports system.oledb.data import system.oledb.data none O import system.oledb O import.sysetm.ole.db Write definition of the following method in max nLog(n) time; write the name of both implemented algorithms. bool Search (int ary[], int counter, int num) nt: first of all sort the array and then Assume that the overhead is 40 Byte per packet (header, trailer, interpacket gap). What is the net bir rate or total throughput (at a reference point between the physical layer and data link layer)? Which of the following aspects of a database management system (DBMS) is not given to ensure database integrity? A. Transaction processing in real time B. Logging protocol C. Locking protocol D. Points of commitment Urgent Help Needed ASAP!!! Transcribed Image Text: Which of the following is the correct name for the unary operator in C and C++? O interpolating operator O inferencing operator dereferencing operator defacing operator MacBa Subnetting IP Networks – Given the address block 192.168.30.0/24, create an IP addressing scheme that would allow for 2 subnets with 126 host IP addresses per subnet. Compute for the first two subnets only What may be a convenient method to open and obtain the handle of a file in Pythonwithout bothering ourselves with properly closing the same file, which corresponds to rendering theindicated file handle defunct? Explain. MATLAB Run the script with the given codes and screenshot your output and codes Use conditionals to compare which of the two random numbers from 1 to 100 is greater (or are they equal?). Transcribed Image Text: 5. Construct a single graph G that satisfies the following 3 conditions. i. G has exactly 4 nodes. ii. G is a non-simple graph. iii. G is a weakly connected graph. Being a Network Administrator you are install a new computer lab for 30 computers, write down the basic required software/hardware component for your lab just write the name and which type of Network lab 49. A security issue in the transport layer occurs when: a.the checksum algorithm detects an error b.The information becomes corrupted by non-transmission error c.a virus is spread d. the packet is lost in transmission Transcribed Image Text: 3. The expression, acot(x), in matlab is equal to * X, x in radian cotx, x in radian O tanx, x in degree x, in degree O cotx, x in degree The attribute of a link button control defines the Web page that will display when the control is clicked. None of the above a. PostBackUrl b. PostBack c. Url d. none of the above Transcribed Image Text: Assume different members and methods of a real world class is grouped or embedded into a single element. This is called in Object-Oriented Programming language Select one: a.Inheritance b.Polymorphism C.Encapsulation d.Abstraction In powerpoint, automatic movement of the slides is done with the help of. Select one: a. All other options are wrong b. Rehearse timing feature c. Transition feature d. Animation feature Clear my choice I need the answer as soon as possible Transcribed Image Text: Which of the following development.30 processes has the advantage of ?getting user feedback early Waterfall O Incremental O Spiral C Reuse oriented O Explain using example schedules that the phantom issue may occur when key-value locking is used. -> Explain with example schedules that key-value locking, when used, might mean that the phantom issue could go unnoticed.
***python only*** What is the output? def mystery1(x, y): mystery2(x+y) if x
Provide two real-world instances of how menus are used in your application, as well as the reasoning behind why you would choose to utilise a menu over allowing the user to enter in text.
Constants such as 250, 400, 5.5, and so on can be put into the source location of the Allen-Bradley MOV instruction instead of a memory address containing the value to be transferred. True \sFalse
The values generated by the Random class are not really random. Instead, they are determined by a formula that only makes the numbers appear as if they were random. Question 29 options: True False
20- ?????? Use the Alpha-Beta pruning algorithm to prune the game tree in Problem (attached image) assuming child nodes are visited from left to right Transcribed Image Text: ??X
MIN
?AX
(10
MIN
(10
Write a C++ function (along with helper functions) that prints out all the prime numbers in a given array of integers. The code should follow the exact function declaration: void printPrimes(int array[], int arr_size);
Given a sorted array: int arr[] = {-5,-2,-1,1,5,8,12,18}. Square every element of the array such that squares are also in sorted order. Print the square array. Do it in linear time and space complexity.
program € an arraylist from user d iterate over this using iterator and print Transcribed Image Text: java program
take an arraylist from user
and iterate over this using iterator and print each value
Transcribed Image Text: Consider the plaintext PLAINCIPHERTEST, arrange it to 3*5 matrix and rearrange R1 to R3, R2 to R3, C1 to C2. What will be the ciph
text produced?
TRESTLAPINICPHE
TRESLTPAINICPEH
RTESTPLAINCIPHE
TRESTLPAINICPHE
471. Effective overlap of operations of CPU and I/O devices, requires a proper mix of a. I/O bound jobs b. CPU bound jobs c. Memory bound jobs d. Balance of CPU and I/O jobs
What exactly are connection pools? What are their advantages in application architectures? What are some of the advantages? Are there any possible disadvantages? What are some of the major drawbacks of utilizing connection pools?
Clear handwriting please Transcribed Image Text: Consider a 4 bit right shift register containing (1000) as shown, what will be in the register after 4 clock pulse?
Explain.
1
A BId
?
?
II
#include
return a, b-a
return a+b, b
you can call the above function as
Select one:
a. x1,x2,x3,x4=f(10,20)
b. x1,x2,x3=f(10,20)
c. x1=f(10,20)
d. x1,x2=f(10,20)
When a relation is partitioned on one of its properties by: a. Hash partitioning, what factors could cause skew? What about range partitioning? What can be done in each scenario to lessen the skew?
MCQ: To hijack a session, an attacker is observing and monitoring the session’s traffic of the victim which is known as ________________. a. Command injection b. Passive attack c. Active attack d. Brute forcing
Transcribed Image Text: The best understanding of computer architecture is
by dividing the computer system into levels
depending on:
O a. Serial procedure
O b. Top-down procedure
O c. Down-top procedure
d. Parallel procedure
Write matlab to explain with graph on line style property means using different color at different instance of line and print the results. You can consider 9 lines to explain the line property neatly
In a class there are five students and each student undergoes five courses. Write a C program to find out the average marks secured by each student and the overall average of the class.
15. Which of the following column properties would be used to specify that cells in a column must contain a monetary value? a. Null status b. Data type c. Default value d. Data constraints
#include
return x;
else
return myfun(x+3)+3;
}
Transcribed Image Text: Given the following:
int a[5] = {2, 4, 6, 8, 10};
int *p = &a[1];
What is the value of p[1]?
Select one:
?. 10
?. 6
?. 4
d. 8
Use only text (A-Z/a-z) characters in this article. Write the C program of the program that discards other characters from the char array, run the code and show output. (isalpha will not be used)
When it comes to routers, are MAC addresses really where packet routing happens? Then explain how it works; if you said no, describe what device you’d need to do it and how it functions.
Instructions: Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. T F Most operating systems today use a graphical user interface.
A double sided magnetic disk pack has six disks. Can you tell how many surfaces of this pack are normally used? A. 10 B. 12 C. 6 D. 9 E. None of the above
I need a python program to reverse string. You can use any string you want and try now not to do the program using recursion just give a simplest source code you can make.
Write a C++ function to take input two positive integers from the user and return true if the last digit of both numbers is same, else return false.Also test the function inside main function.
Show that 100n 3 + 50n 2 + 75 is in 0 (20n 3) by finding a positive K that satisfies the equation (100n 3 + 50n2 + 75) / 20n 3 $ K.
Network Assessment i. Illustrate the processes of detecting rogue devices, detecting malicious connections, and viewing network topologies to identify network weakness. ii. Explain how to interpret the output of network scans to identify weaknesses.
What are the two types of services that the Internet makes available to its users via its applications? What are some of the key characteristics that differentiate each of these services from the others?
Write A c++ code to read a single sentence from input.txt and write to output.txt. Output.txt should be same as input.txt. Input.txt: Line Number 1 Line Number 2 Line Number 3 Line Number 4
Transcribed Image Text: How do you initialize an array in C?
O a. int arr[3] = (1,2,3,4,5);
O b. int arr(3) = {1,2,3};
c. int arr[3] = {1,2,3};
O d. int arr(3) = (1,2,3,4);
When a control has the __________, it accepts keyboard input from the user. text b. tab order c. focus d. input allocator input allocator input allocator input allocator input allocator input allocator input allo
Create a generic function max that gives the maximum value of three generic type arguments that are passed to it. Then test this function by calling it with char, int, and float type. C++
Transcribed Image Text: Information processing
-Definition of Information
-Explain types of information
processing
E.g access submission sorting
-Applications of IP
-Advantages and disadvantages of
ip
-Processing errors of ip
E.g rounding, Truncal, cancelling
12:11
2. Write a Java program that takes input an positive integer from the user and prints the largest integer but not larger than the base-2 logarithm of that number. Enter Number: 2200 Output: 11
Write an assembly language coding for the following output: Transcribed Image Text: CA. C:\Windows\System32\cmd.exe – Hello
Microsoft Windows [Version 10.0.19041.928]
(c) Microsoft Corporation. All rights reserved.
C: \Users\wanhazimah\Desktop\Masm>Hello
:: Message :
~-Congratulations!~-
OK
Cancel
CONSIDERING C LANGUAGE TRUE OR FALSE A linear search is useful for ordered lists where the middle element is examined to reduce the search space by half if the element is not found yet
To find a single object in a bigger collection of data, such as an array, several methods called as have been devised. a. seek procedures b. request techniques c. traversal procedures d. algorithmic search
Constants such as 250, 400, 5.5, and so on can be put into the source location of the Allen-Bradley MOV instruction instead of a memory address containing the value to be transferred. True \sFalse
I need the answer as soon as possible Transcribed Image Text: Q4: Convert the numbers with suitable value in details:
1- (11011101001011111)=(. Jul he
2- (1101111000)Gray%-(.. (. ho
3- (FB1) (- aray, ( .ho
Assume you are a systems analyst working on a comprehensive test plan. Describe the testing methods you want to use in your strategy. Will you be using real or simulated data? Explain your response.
Suman Patel saves the same amount of money on a consistent daily basis. She is interested in knowing how much money she saves in a certain month. Decide on the output and input parameters.
8. Hardware RAID implementations permit _________; that is, faulty disks can be removed and replaced by new ones without turning power off. a. Scrapping b. Swapping c. Hot swapping d. None of the mentioned
TOPIC : Computational Science and Numerical Methods QUESTION: The length of a rectangular piece of land is measured to be 145 ft ( 4 in. What are the relative errors in this measured value?
in80886 microprocessor Transcribed Image Text: Q) 1. Answer the following:
A. Write a program that counts the number of 0’s in a word store at the location 4000H and
writes it in to BL.
65. Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ? a. 4 b. 8 c. 15 d. 16
There are no various degrees or categories of support for abstract data types in contemporary language compilers. Therefore, there must be one definition of abstract data types. Provide an example to illustrate your point.
Java Transcribed Image Text: Which of the following is the correct output for the following code?
int k=6,a=-1;
k%=a;
if(k%6==1)
k–;
System.out.println(k);
? ?. -2
O b. 0
? ?. -3
O d. -1
(Intro to Python) Q1. Given a string S with even length: Write an expression to print out the first half of the string Write an expression to print the second half of the string
Go to https://youtu.be/BB2O4VCu5j8 and watch the discussion regarding Data mining concepts and a case study about using R to apply data mining operations. Summarize your finding about this case study in couple of paragraphs.
Discuss potential possibilities for companies to increase or alter their database use. Consider how a database administrator handles issues like as security, access, and data protection for a business and its consumers or clients.
I need the answer as soon as possible Transcribed Image Text: Q1
in c++
Q1/ write a program to draw a truth table of the following logic circuit:
BD
using iostream
1 Add file
No plagarism please! Write your own answer. Correct and detailed answer will be Upvoted else downvoted. Thank you! Q. What query would help you find if a customer purchased from you more than once?
Help me doing the question below: Use Android Studio #21. Create a XML layout in Android Studio IDE for the following requirements. Linear layout TextView (text = CalenderView Demo) CalenderView Button (text = Next)
Too Many Networks While attempting to connect to the wireless network at your job, you notice that five different wireless networks are available. How can you determine the network to which you should connect?
PLZ help with the following: IN JAVA Any change to graphics being displayed on the screen requires a call to the method ____________ to update the graphics. paint repaint update all of the above
Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so? a. Star b. Ethernet c. Token-Ring d. Server-based
Transcribed Image Text: H.w2: the following figure shows an array representation for a binary
tree:
L
X
W
E
A
H
M
Draw this tree
Traverse the tree using Depth-First Traversal and Breadth-First
Traversal
For application software users, what is the ideal storage medium for storing and backing up their data? Describe your option in terms of cost, speed, and capacity for a single (1) suitable application program.
Which of the below statements is equivalent to $add += $add? a) $add = $add b) $add = $add +$add c) $add = $add + 1 d) $add = $add + $add + 1
Transcribed Image Text: on 8
Select the method which is not a default activity life cycle method
red
O a. onPaused()
d out of
O b. onDestroyed()
question
O c. startActivity()
O d. onCreate()
Transcribed Image Text: 1. Convert each of the following decimal numbers into an 8-bit binary including a
sign bit using 2’s complement
Numbering Decimal number Binary
?. -20
b. -64
?. -80
d. -128
We can check changes in transmitting data by implementing ? a. DES b. SHA-512 c. CMAC d. DES and SHA-512 e. SHA-512 and CMAC f. None of them Give explanation of incorrect answer also
1. Create a Python Program that utilizes a pythagorean theorem and and all of the following structures: Sequential Structures Decision Structures Repetition Structures String Methods Text File Manipulation Lists and Dictionaries Functions Program Modularization
c++ programming Transcribed Image Text: Given the code:
void c(int n) {
if(n<2) {
cout << n <<"";
return;
}
c(n/2);
cout <
1. 10000 – 111 =
2. 1010101 + 10101 =
3. 11010 x 11 =
4. 101011 divided by 10 =
5. 11001 – 111 =
(Our lesson is LOGIC CIRCUITS AND SWITCHING THEORY)
Transcribed Image Text: Which of the following software process models insists on understanding user requirements before any coding
and software development begins?
a. Transformation model
Ob. Spiral model
C. Agile model
d. Waterfall model
A Layer 3 IPv4 packet does not contain which of the following? Protocol No. 1 MAC Address of the Source IP Address of the Destination Time to Live (D) (TTL) Checking for Errors (Checksum)
Give a state diagram for a non-deterministic pushdown automata NPDA that recognizes the following language: A= {w ? {a, b}? | the length of w is odd and the middle symbol is b }
A website has a global customer base and users have reported poor performance when connecting to the site. Which AWS service will improve the customer experience by reducing latency? DirectConnect ElastiCache CDN EC2 AutoScaling
11. The two types of streaming techniques are : a. progressive download & real time streaming b. regular download & real time streaming c. real time & virtual time streaming d. virtual time streaming
Write which logic gate the logic expression ?? + ?? is. Show clearly using Boolean Algebra that this expression can only be constructed using “and not” gates. Do not skip any step without proof
Assume there are two sets of radio buttons on a form. Why are the sets need to be enclosed in their own group boxes? Do the same problems apply to check boxes in groups?
Say we have a 256 bit adder. Using subword parallelism, how many addition operations of varying lengths can we perform? (Look in the slides). Then describe in your own words what subword parallelism is
Transcribed Image Text: 5. Construct a single graph G that satisfies the following 3 conditions.
i. G has exactly 4 nodes.
ii. G is a non-simple graph.
iii. G is a weakly connected graph.
156. In database management system, the current set of instance or database snapshot is also called a. mathematical operators of schema b. logical operators of schema c. extension of schema d. intension of schema
Write the various definition of software testing defined by the practitioners and researchers. Also, prove the statement software testing is a process that detects important bugs with the objective of having better quality software.
23 Transcribed Image Text: Give any four characteristics (properties) of radio waves. Compare radio waves with microwaves and infrared waves.
(Answer the question in separate sheet, scan and upload along with other descriptive answers)
What are the two types of services that the Internet makes available to its users via its applications? What are some of the key characteristics that differentiate each of these services from the others?
Transcribed Image Text: 10. True or false? In R Tidyverse, the following code
ggplot(data = grain_yields, aes(x = fertilizer, y = yields, color=species)) + geom_point()
creates a bivariate dot plot.
O True
O False
Transcribed Image Text: Write a python code for a reducing that creates a single string from a list of strings:
words=[‘Programming’, “in ‘, ‘Python ‘, ‘is ‘, ‘easy!’]
Output:
‘Programming in Python is easy!”
The assignment is: Determine the decimal value of the following unsigned binary numbers: A. 11000 B. 110001 C. 1111111 D. 1000000000 Please show the end result and please explain how you got the results.
in80886 microprocessor Transcribed Image Text: Q) 1. Answer the following:
A. Write a program that counts the number of 0’s in a word store at the location 4000H and
writes it in to BL.
Coding Hacks Given an integer, write an algorithm/code to find the square of the given integer without using a multiplication or division operator. Also, the use of the pow() [power] function is not allowed.
Name 3 application layer protocols using TCP and UDP each. Also explain with the help of diagram how transport layer provides transportation service to application layer. Note : Subject : Computer Communication and Networks
Write a program in C++ to find the Greatest Common Divisor (GCD) of two numbers iteratively. Sample Output: Input the first number: 12 Input the second number: 8 The Greatest Common Divisor is: 4
Give outcome for given scenario: A source had sent five packets and suddenly pause the animation before those packets had reached its destination. Now kill the first packet’s ACK after it reaches its destination.
what is the correct answe Transcribed Image Text: For which of these visibility modifiers, the attributes and methods can be accessed from
anywhere?
O a. Public
O b. Protected
O c. Void
d. Private
Use a recursion tree to determine a good asymptotic upper bound on the recurrence and Use the substitution method to verify your answer. ? (?) = 6 T ( (?/2) + 2) + 8?.
When a(n)__________ is provided for a parameter, it becomes possible to call the method without explicitly passing an argument into the parameter. a. local argument b. empty argument c. default argument d. expressional argument
None Transcribed Image Text: How can we continue source code
from one line to the next
by an asterisk *
O An ampersand & at the end of a line
O By using brackets
The message 11001001 is to be transmitted using the CRC polynomial x3 +1 to protect it from errors. The message that should be transmitted is : a. 110010011001 b. 11001001 c. 110010011001001 d. 11001001011
Please solve Quickly ?++ Transcribed Image Text: The escape character can be used to begin a new line
in C is \
escape character can be used to deletes the last
character is \
Transcribed Image Text: 8. [10 points] Draw a Circuit Diagram for the following:
?.
A
?
C
X
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Given the maximum lifetime of a segment is 30 sec and link capacity is 500Mbps, find the no. of bits required to avoid wrap around during this time? Need correct solution , else downvoted.
Create a C++ function to check two given input integer parameters and return true if one of the number is 50 or if their sum is 50. Also test the function inside main function.
Provide two real-world instances of how menus are used in your application, as well as the reasoning behind why you would choose to utilise a menu over allowing the user to enter in text.
Which of the following is used to insure the high quality of computer output? A. computer output microfilm B. output controls C. voice output systems D. liquid crystal display E. None of the above
Write a vb function named Quotient with 2 Integer parameters (originally from text boxes) and a Double return type. The function should calculate the first parameter divided by the second and return the result
How would you link endpoint devices and infrastructure devices in a local area network? What type of cable would you use to make the connection? What factors influence the selection of a cable provider?
Write a program to find the sum of 2 numbers and return their sum if both numbers are equal then return triples their sum. You must make another function and in scala programming language
None Transcribed Image Text: 20. The content of AL=
after execution the following code:
MOV AL,10101010B
ROL AL, 01
21.The content of AL=
— after execution the following code:
MOV AL,10101010B
ROR AL, 02
The way software and resources are purchased for their business customers has shifted in the introduction of their cloud platforms for technologies including As-A-Service (SaaS), Platform As-A-Service(PaaS) and Infrastructure-As-A-Service (Infrastructure As-A-Service) (laas).Cloud Calculation Explanation?
Which one of the following is correct ? a. Character – represented by One’s Complement b. Character – represented by Two’s Complement c. Integer – represented by ASCII d. Character – represented by Unicode
In java Create a class called StudentAge. This class should allow the student to enter name and date of birth. After that, determine student age. Lastly, display student name, date of birth and age.
Using Bubble Technique, Sort the following numbers in ascending order Given Numbers: 348, 14, 614, 5381, 47 Show code in C or C++. Output should be printed after each iteration/swap not Just sorted array.
To what extent do you think that the security of data in transit and storage must be ensured? What type of data integrity protection and user authentication protection is the most successful, and why?
Transcribed Image Text: What is the current marking of the Petri Net below?
P1
P5
P3
P2
P4
a. (2,1,2,1,2}
b. {2,1,3,2,1}
O . {2,1,3,0,2}
O d.(1,2,3,0,2}
e. (2,1,2,2,1}
f. None of the above.
Please solve Transcribed Image Text: Design FSM for implementing the below state diagram by using one JK and one D flip-flop.
a/b
00
01
b/d
a’/c
d’le
e/c b’le
e’ la
10
11
d/b
Explain using example schedules that the phantom issue may occur when key-value locking is used. -> Explain with example schedules that key-value locking, when used, might mean that the phantom issue could go unnoticed.
Solve this Transcribed Image Text: QUESTION 04:
Design a memory array using partial decoding method
Data = 32 bit
Address Bus = 36-bit address lines
Chip Size = 256 byte
Total Memory= 2 Kbyte
information Technology acts as an enabler during Business Process Analysis and Design. Give five examples (in five different areas in an organisation) of how IT is useful during this process. Please provide detailded answer
Do it quickly I don’t have my system right now so i need your help Write a program to take the upper limit and prints all numbers within the given range using recursive function.
Transcribed Image Text: Choose the array below which correctly represents the backing store for the following min heap.
55
26
25
57
62
(67
96
63
O [0,14,26,25,96,67,63,55,57,62]
O [0,14,26,96,67,25,63,55,57,62]
O [96,26,67,14,63,25,0,null,57,null,55,62]]
O [0,14,55,26,25,57,62,96,67,63]
import java.util.*; class Arraylist { public static void main(String args[]) { ArrayList obj = new ArrayList(); obj.add(“A”); obj.add(“B”); obj.add(“C”); obj.add(1, “D”); System.out.println(obj); } } What will the given code prints on the output screen.
Make a list of the physical storage media available on the computers that you use on a regular basis. Provide an indication of the speed at which data on each medium may be accessible.
Use Matlab
given that the decision boundary is represented by the formula “x1+x2 = 1”, plot the decision boundary on the plan for the point x1 = [-5 , 1.5] using a matlab script
In machine learning we learn from data. The data can have many instances and features (or attributes). However, we know that features can be relevant and irrelevant. Suggest how we can describe feature “usefulness”?
Write a Java program to convert minutes into a number of years and days. Test Data Input the number of minutes: 1234567 Expected Output : 1234567 minutes is approximately 2 years and 127 days.
Given an integer array of size 10 below, write a C++ program to take input an integer from user and find the frequency of that integer in the given array. int array[10] = {1,2,2,4,5,9,0,10,3,7}.
Transcribed Image Text: Which sorting algorithm functions by performing a series of swaps of adjacent elements?
O Selection sort
O Heap sort
O Insertion sort
O Merge sort
O Radix sort
O Bubble sort
Please solve Quickly ?++ Transcribed Image Text: The escape character can be used to begin a new line
in C is \
escape character can be used to deletes the last
character is \
Top-down and bottom-up approaches to information security vary in important ways. What’s the difference between bottom-up and top-down approaches? Make a side-by-by comparison of each idea to determine where it belongs in a company.
4. The method of communication in which transaction takes place in both directions,but only in one direction at a time, is called ? a. Simplex b. Four wire circuit c. Full duplex d. Half-duplex
With aid of a diagram, explain the stages the CPU goes through as it executes a program. What do you mean by computer generations? How you will elaborate the technological advancement in those generations.
Give a regular expression for the language of all strings over alphabet {0 , 1} that have exactly three non-contiguous 1s. (I.e., two can be contiguous, as in 01101, but not all three, 01110.)
Transcribed Image Text: 1. Create a Program that will display the following product
Note: Provide a screenshot of your program with the output console
Enter two Numbers: 10 8
10+8=18
10-8=2
10*8=80
10/8=1
10%8=2
Given an array of positive integers named arr, form a new array evenarr in which copy all the even elements of the array arr. Print the evenarr in output. int arr[8] = {12,5,7,10,23,45,4,86} c++
I need the answer as soon as possible Transcribed Image Text: 32. “The system shall provide all its services during the weekend”, is an example for
Functional requirement
Non-functional requirement
Domain requirement
External requirement
22. What is the value of x after the following statements are executed? int x = 5; switch(x) { case 5: x += 2; case 6: x++; break; default: x *= 2; break; }
PLZ help with the following IN JAVA When defining an inner class to be a helper class for an outer class, the inner classes access should be marked as: Public Private Protected Package access
Are there any differences between Trojan Horse, computer virus, and worm that you could explain? Thanks. There are some types of viruses that are notorious for using techniques that are designed to evade detection.
23 Transcribed Image Text: what is the output of the following code snippet
$ar=array (“n”, “b”, “R”);
$dep=Darray (“n”->”74″, “b”=>”G”, “R”=>”70”);
for ($i-1;$i<=l;$i++){
$j=(integer) $dep[ $ar[$i]];
echo ($dep [$ar[$j]]) ; }
Answer!
Jump to..
Transcribed Image Text: Use [ round, fix, ceil, floor ] commands to round the following numbers towards
integer numbers:
Before
After
1.3
1
1.5
1
1.9
2
11.9
11
-2.9
-2
-3.9
-4
3.4
In the diagram, whose memory address ranges are not represented by chips 1 and 2? The address lines in this diagram are A0 through A15, and CS stands for Chip Select. (From Gate, 2005)
93. Computer programming language which is based on problems and its solution is termed as a. advanced level programming language b. ordinary programming language c. high level programming language d. low level programming language
Operating Systems Question: There is the essential requirement to synchronize the processes to regulate the execution in sequence. Please justify the need of process synchronization. (Include all detailed explanation with flowchart diagrams if applicable)
Explain instances when the government may sanction individuals or organizations on issues in relation to improper use or consumption of arts. Include a photo as a proof. State a brief description about your source.
Why is there so much emphasis on error handling and identifying exceptions and handling them? Are there times when the cost outweighs the benefit? Provide a short (250 words) summary of the question above
Trace the following loops showing the generated output and the final value of i? Transcribed Image Text: for (int i = 5; i >= 1; i–)
Output:
System.out.print(i +
“);
Final value of i:
82. The term Complete for a UML has the same meaning as which of the following for an EER diagram? a. Overlapping rule b. Disjoint rule c. Total specialization rule d. Partial specialization rule
1. Explain why it is essential to choose the precise text size in graphic design me?
2. What is the importance each elements in graphic designs?
3. Why graphic design is important in businesses?
Cloud computing Which one of the following refers to the Distributed Computing, in which several sets of computers distributed on multiple geographical locations and are connected with each other to achieve a common goal?
Generate the three-address code for the following ‘C’ program fragment, switch(i+j) { case 1 / x = y + z ; default: c = c – 1 ; case 2: u = V+W; }
None Transcribed Image Text: iii. Consider the expression T|F^ T. In how many ways
can the expression be parenthesized so that the output is
F (false)?
a) O
b) 1
c) 2
d) 3
In this section, you’ll identify and explain the capabilities of a variety of requirements engineering CASE systems, including how effectively (if at all) they support automated consistency analysis for validation and verification of requirements.
Order the following functions by order of growth, that is, if a function f is listed before a function g then f(n)=O(g(n) Transcribed Image Text: » , nª,
4 log n
2 (logn)
4n²
Transcribed Image Text: Your charity organisation aims to optimise its
fundraising efforts. What type of data would be
relevant in accomplishing this objective? How
could business intelligence technologies be
utilised to analyse this data?
How would you link endpoint devices and infrastructure devices in a local area network? What type of cable would you use to make the connection? What factors influence the selection of a cable provider?
Transcribed Image Text: Find an Eulerian Circuit for the following graphi
e7
f
es
e1
e2
e12
e9
e10
e11
a
e5
e21
e19
e20
e6
e18
e3
e4
e16
e14
e13
e17
e15
The way software and resources are purchased for their business customers has shifted in the introduction of their cloud platforms for technologies including As-A-Service (SaaS), Platform As-A-Service(PaaS) and Infrastructure-As-A-Service (Infrastructure As-A-Service) (laas).Cloud Calculation Explanation?
Create an array with 20 elements having some duplicate members. Write a program to find the duplicate values in the array and show the number of occurrences for each value. Print your output. Java
Transcribed Image Text: (b)
D-
(?)
Y
F
(d)
Y
F Transcribed Image Text: 1. The following combinational circuit logic diagrams are given; find the output
function and truth table for each function.
Y
ARIES supports ___________ operations, which are physical in that the affected page is physically identified, but can be logical within the page. a. Physiological redo b. Physiological undo c. Logical redo d. Logical undo
write a function doubleVowel in Python that accepts a word as an argument and returns True if the word contains two adjacent vowels and False otherwise. Sample usage: >>> doubleVowel(‘apple’) False >>> doubleVowel(‘pear’) True
Transcribed Image Text: When an object is created, the method which has the same name as class called is
O a. Instance variable
O b. Object variable
O . Constructor
O d. Super method