Explain the different types of the computer processors and some popular operating systems? what is a super- class??
As a content creator, why do you think these input and output devices are needed for your content?
So, what are some of the heuristics that you may employ to improve the design of your system?
Discuss about the techniques to implement blockchain and the challenges in implementation to solution in the Banking industry.
116. File storage system is one of computer system’s a. hardware b. operating system c. resources d. compilers
Transcribed Image Text: The standard deviation of the y(t)=3
sin(20?t) is:
O 1.0606.
2.1213.
O 1.6062
O 2.2123.
Computer science: Give reason why the delays in the applet correspond to the delays in the message segmentation.
The character that separates tokens is known as a __________. a. partition b. literal c. delimiter d. symbol
Explain RDBMS, its data model, its data storage structures, and the way the relationships are built in RDBMS.
write a small example of code that shows the functionality of jquery and explain the code of it
Write a c++ code, using 2 nested loops that produce the following output: 1 2 3 4 5
What is the importance of Computer Literacy. What are the benefits of Technology in Education, Economy and Society.
138. Repeater function in the …………………. layer. a. Physical b. Data link c. Network d. None of these
Recognize and distinguish between the primary tools and methodologies that will be used throughout the system development process.
Calculate the sum of odd natural numbers 1+3+5+7+……………. .+n using while loop. Take n as input from user.
In python Create a program that takes a number and determines the factorial of the number using recursion.
Which of followings is the same as s[0:-1]? Select one: a. s[0:len(s)] b. s[-1] c. s[:] d. s[:len(s)-1]
Write a program in kotlin to find the sum of all the numbers present in the given string.
computer graphics topic A particular text index value is chosen with the function Choices: setTextIndex() settextindex(ti) SetTextIndex(ti) setTextIndex(ti)
What considerations should you take into account when thinking about the benefits and downsides of dispersed data processing?
How do someone proceed if they have forgotten the power-on login and the administrator password on a system?
1082_A_2_OS Why interrupt disabling is not a valid solution to the critical section problem in a multiprocessor system?
What exactly is the internet and how does it work? Using the internet, what things can you accomplish?
Natural Language Processing Can you give me reference papers on predicting stock market price movement using Reddit data?
Distinguish between compilers and translators. Describe an algorithm to sum 2
values whose answer should not exceed 10
Hadoop And BigData Data base in ve. Transcribed Image Text: Describe the process of creating database in ve.
Comparing Windows Defender with another anti-malware software to demonstrate the differences between the two programs is a challenge.
Give any example/s in which you would use the 3D tool to deal with the audience. And how?
Transcribed Image Text: The behaviour of the instances
present of a class inside a method
is defined by.
None Transcribed Image Text: The Registry contains all the
configuration data and can be
accessed directly using
??????
What is normalization? What are some of the problems caused by incomplete or improper normalization of the database?
Write a SQL query to find the second highest salary from the table Employee( Eno, EName, Salary, Department).
Transcribed Image Text: Compare between Repeaters and Bridges
in term of:
A. OSI Layer
B. How it operate?
223. What is the name of the first hacker’s conference? a) DEFCON b) OSCON c) DEVCON d) SECCON
a) Explain the classification of user manuals, online assistance, and tutorials. b) Describe online tutorials, demos, and guidelines.
Elaborate the factors that need to be considered for successful strategic alignment of an organisation and project management
Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
What is the best way to determine if an email message warning about a virus is a hoax?
Which part of a Nehalem chipset connects directly to the processor, the North Bridge or the South Bridge?
With the use of two instances, explain the distinction between internal and external fragmentation. Make use of illustrations
What is the relationship between cohesion and coupling in software design, and how do they affect one another?
A valid C++ arithmetic expression with no parentheses is evaluated from left to right. Select one: True False
The question is, how do you handle security in an office that has shared resources like a printer?
Write a program to give the examples of operators. * Arithmetic Operators * Logical Operators * Relational Operators
177. Another name for white-box testing is ___________ a. Control testing b. Graybox c. Glassbox d. Black box
Write a function prime() that returns 1 if its argument is a prime number and returns 0 otherwise.
Draw a flowchart for computing the sum of the first N natural numbers without using any standard formula.
511. Which mode bit is used to indicate kernel mode a. 0 b. 1 c. 2 d. 3
82. Windows XP was succeeded by a. windows 7 b. windows 2000 c. windows ME d. windows Vista
class Main { public static void main(String args[]) { System.out.println(fun()); } int fun() { return 20; } }
Write a program in C++ to take input a string and find its length without using inbulit function.
Use the insertion sort to sort the list in Exercise 38, showing the lists obtained at each step.
True or False : To fill a GridView control, you must create a data adapter and a dataset.
Write a C++ to take input 7 integers and find maximum of all of the them.Print the maximum
2.2 Print the string given below 10 times in Scala programming language. “Scala is a useful programming language.”
New dimensions were added to the Internet of Things thanks to Fog Computing. Explain and justify this assertion.
Please help with the following: Give the descriptiotn of the following commands in Linux adduser deluser history grep
Which logic programming languages may be used for what? Relational Database Management Systems Expertise-based systems Natural language processing
Assuming that myArray contains references to Double objects, ——————— occurs when ————– the statement “myArray[0] = 1.25;” executes.
I need the answer as soon as possible. Using Python Generate an identity matrix of order 4 .
In F95 language write a program take input two integers from user and print their product in output.
Write SQL query to find the minimum marks obtained by any student in the table:Result(RollNo, Name, Class, Marks)
Question 4 Is unit testing possible or even desirable in all circumstances? Provide examples to justify your answer.
in java Why we prefer event delegation model and its component in GUI programming. Explain with appropriate examples.
(Don’t copy) webscraping to retrieve the first 10 result from dogpile search engine in Python, show the code.
196. An interrupt occurs when the timer count reaches to a. 0 b. 1 c. 2 d. 3
255. Environment for execution of programs is provided by a. inputs b. outputs c. operating system d. memory
Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
100. A two-layer switch is a ______. a. repeater b. bridge c. router d. none of the above
Interfaces are used to define stronger is-a relationships because one class can inherit multiple interfaces. Ture or false
If item price*item quantity is a computed field in Oracle, how does it compare to the table field?
Transcribed Image Text: python program
to find gcd
take user input
I am beginner to programming help me
Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
What should you replace if the brightness or contrast adjustments were malfunctioning on a laptop? led display explain?
Transcribed Image Text: The worst-case time complexity
of Merge Sort is
O(n)
O(n2)
O(n logn)
O(log n) O
write a program that reads the height in centimeters and then converts the height to feet and inches.
Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
What is the difference between a test criteria and a test requirement in the context of software engineering?
Consider a flow chart which has 7 decision boxes . What may be the cyclomatic complexity of this?
describe a scenario where the use of IoT for home automation is utilised in the field of safety.
What are some of the governance issues to consider when migrating from on-premise servers to an IaaS architecture?
From Dynamic programming d. In dynamic programming, the technique of storing the previously calculated values is called __________.
Customers using AWS services must patch operating systems on which of the following services? Lambda DynamoDB Fargate EC2
What form of storage retains data and programmes even when the computer system’s electric power is switched off?
I need the answer quickly Transcribed Image Text: Q3) what is the difference between multiplexer and demultiplexer?
Explain
Q5: Make an application that save information. That information will be further used in activity for necessary action.
which of the following devices is used to connect different network segments and manage the traffic between them?
Why is it cheaper to identify and repair an issue early in the system development lifecycle than later?
Why is it necessary to have a cooling system in a computer? What are the various cooling techniques?
Why is it good idea to hash password stored in a file that to encrypt the password file?
Can you tell me about the disadvantages of cloud computing for teachers and students? Is there a solution?
A network of computers based upon internet style techno logy that is completely within an organization is called______________.
Write a JavaScript program to find the number of elements which presents in both of the given arrays.
Q-102 While creating external tables in hive how to serialise null to ”. true/false. a)
What does it mean when we say that an algorithm A is asymptotically more efficient than algorithm B?
The other text on the page will seem to its if an element is specified with float: right;.
the legal, social and professional issues that may emerge from the use of cookies in a web application.
Can you help me find the result of the following statement in Python? (1, 2) in zip(range(4), range(2,6))
Computer Engineering lab Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
In your own words, explain three major categories of e-commerce and give a practical example in each case?
In C++ Ask a user to enter any real number and determine the square of that real number.
Short Answers type questions: Q. What is The Short form of Home Theatre Personal Computer in Computer Science?
ASK, PSK, FSK, and QAM are examples of ________ conversion. a. digital-to-digital b. digital-to-analog c. analog-to-analog d. analog-to-digital
1. Explain CRM in food and berevage company.
2. Explain why CRM important in food and berevage company.
MATLAB plot a 3D rose flower in matlab of red background color and cyan as color of rose
What is meant by terminals, non-terminals, variables in CFG? Why we used the concept of first() and follow()?
What does it mean to define a system model? What factors should be considered while creating basic models?
Discuss the effect of conventional SDLC versus agile development on the final information system’s implementation, support, and security.
Write an oop program to represent(average function) as friend function between two classes (positive class and negative class)
C++ language is mandotry we have two complex number is given take them from user and find difference.
How is a relationship between entities indicated in an ERD? Give an example using the Crow’s Foot notation.
Transcribed Image Text: Design a Turing Machine for the language L1 = { ww’ |we {a, b}’ }
1. story of Sense Response Application 2. Features of Sense Response application 3. Advantages of sense response application
What is the relationship between cohesion and coupling in software design, and how do they affect one another?
Write a function bool chkAge(int) which returns true if age is above 18 otherwise return false. In c++
The network layer, in reference to the OSI model, provide the virtual circuit interface to packet-switched service explain?
Consider the following hyperthetical search space and trace using depth-first-search algorithm on it to wherethe goal is 13
The union of any set with the empty set is always the set itself. Select one: True False
4 Technology readiness is one of the various relevant user-oriented e-government factors. Select one: a. False b. True
Transcribed Image Text: A constraint is a limit that is placed on the
data.
Select one:
True
False
Can you tell me about the disadvantages of cloud computing for teachers and students? Is there a solution?
I need the answer quickly Transcribed Image Text: Q3) what is the difference between decoder and encoder? Explain
Computer science Any thg wrong will upvote Discuss how copy propagation can be done using data flow equation.
Complete the function given below: int square (int x) { // Return square of x } C++ language.
Some files cannot be deleted using rm command because of the permissions associated with it. ???????? true false
Give the English language description of the set represented by the regular expression (aa + b)*(bb + a)*
Examples of how search engines and online directories are utilized in e-commerce are given in the following paragraphs.
Which version of 802.11 technologies can use two antennas at both the access point and the network adapter?
Write matlab code to plot Y = x 3 -1 Where x= 0:0.01:1. Also attach screenshot of output.
How would you transfer the entered data from the form to the database associated with the Web site?
T/F Q. By default if any regular file is created, the number of link is displayed as 1.
442. For system usage, operating systems provides users with convenient a. Application b. Program c. Process d. Interface
Explain the steps in the fetch–decode–execute cycle. Your explanation should include what is happening in the various registers.
21. Entering point of the windows is a. START button b. log in screen c. CPU d. desktop
Please provide correct and detailed answer wrong answer will be downvoted directly understood!! Transcribed Image Text: NEA Pes
Transcribed Image Text: To generate histogram graph, we can use the function
histograph0
None of these
histogram)
hist)
Which window in Control Panel is used to require a Windows password to wake up a sleeping computer?
A group of magnetic tapes, videos or terminals usually under the control of one master is Cluster why?
Short Answers type questions: Q. What is The Short form of Virtual Local Area Network in Computer network?
What is ‘Eight Way Symmetry’ of a circle? How does it help in minimizing the calculations for pixels?
ASSEMBLY Which register does the product get stored into if you say: mul BX BX:EX EAX EDX DX:AX
Consider the several techniques taken in developing the Windows and Android operating systems. Contrast these two operating systems.
Transcribed Image Text: What function do you use to concatenate one string to another?
atoi()
strcpy()
atof()
strcat()
Explain how, according to the OSI model, the network layer provides the virtual circuit interface for packet-switched services.
Is it true or false? The phrase read file refers to a file from which data is read.
Transcribed Image Text: 7. Manage open and closed ports on the
server from the client terminal (remember
ssh).
221. _____________ Conducted at developer’s site. a. Alpha Testing b. Beta Testing c. Unit testing d. System testing
When it comes to protecting personal information and dealing with data breaches, what are the current statutory requirements?
161. VM is an abbreviation of a. versatile machine b. versatile memory c. virtual machine d. virtual memory
Transcribed Image Text: Implement circular queue using C++ to perform the following
a) Enqueue-
b) Dequeue-
c) Display-
Correct and detailed Answers will be given ?else down voted Discuss in brief the main features of HTTP
Ruby Write a Program to check a given number is greater than 2 or not using if-else statement
Which command is used to find the host name of a computer when you know its IP address?
29)The letters [ a, e, o, u, i ] are vowels of English language. Select one: True False
A devices that links two homogeneous packet-broadcast local networks, is a. hub b. bridge c. repeater d. gateway
What are the number of memories required of size 16*4 to design a memory of size 64*8 ?
How many characters are specified in the C++ ASCII scheme? i) 64 ii) 128 iii) 256 iv) 24
When it comes to microprocessor and system design, how have power supply and dissipation limitations influenced the process?
Provide a list of some prominent messaging applications. They seem to be using the same protocols as SMS.
Transcribed Image Text: 3. Find the output F for each set of inputs.
1
1
1
0 1
In SQL, what is the purpose of the LIKE operator? Give an example to back up your claim.
Correct and detailed Answer Will be UP VOTED else DOWN VOTE Write about access control in file system.
Can you tell me about the disadvantages of cloud computing for teachers and students? Is there a solution?
114. Which of the following is not an analog-to-analog conversion? a. AM b. PM c. FM d. QAM
Is it true or false? The phrase read file refers to a file from which data is read.
Using definition method (and not the limit theorem) show that 4n^2 – 12n + 8 belongs to O(n^3).
Comparing Windows Defender with another anti-malware software to demonstrate the differences between the two programs is a challenge.
Transcribed Image Text: 6. 4. The output of the operation: >>format
long >>200/6 *
33.3333
33.333333333333336
33.3333333333333
3.333333333333334e+001
Transcribed Image Text: You can say that NULL value is equal to Zero.
Select one:
O True
False
Explain a 4-bit arithmetic circuit alongwith its function table. Answer must include diagram of 4-bit arithmetic circuit too.
Transcribed Image Text: Explain the following instructions.
SETC, ROLC, SHR, COM, JNZ,TEST, XOR, JC, JNE, LOOPE, XCHG, INC
So, what are some of the heuristics that you may employ to improve the design of your system?
A high-level programming language is made from of terms named. instructions in binary mnemonic devices instructions important phrases
What is the name of the protocol that is responsible for determining a particular IP address’s physical address?
What is Statistical Process Control? With what purpose is it used for? Pls explain breifly with an example.
SQL keyword —————- is followed by the selection criteria that specify the rows to select in a query.
Draw a 5 × 5 grid graph. How many edges does the n × n grid graph have?
A six – digit card field used for postal ZIP codes is defined as A numeric field explain?
float f = 12.5F; int i = (int)f; System.out.println(“f is ” + f); System.out.println(“i is ” + i);
The network layer, in reference to the OSI model, provide the virtual circuit interface to packet-switched service explain?
157. The associated R function is dlogis (x, location = 0, scale = 1) is for _________ distribution.
With suitable illustration, discuss the relationship between processes and threads and how a process is created in Windows.
Transcribed Image Text: To check if the requirements can be.17
:implemented is
Validity
Verifiability O
Completeness
Realism O
A network is a collection of technologies that link computers. What are the basic components of a network?
Explain why collision is an issue in a random-access protocol but not in reservation or channel partitioning protocols.
Give an overview of the different kinds of data-hiding techniques that offer distinct difficulties to law enforcement authorities.
1082_A_1_OS Explain why favoring short jobs in CPU scheduling would be beneficial to the responsiveness of interactive processes.
What are the most important components of the operating system, and could you please explain them? Briefly stated:
What exactly are the objectives of authentication? Compare and contrast the advantages and disadvantages of different authentication techniques.
Requirements prioritizing and negotiation is a step of requirements elicitation and analysis. You’ll have to explain it eventually.
List the reasons why a company may need firewalls for physical security measures in order to be successful.
Which of the following takes less memory space? a. int b. long c. float D. byte to. double
Explain the concept of a memory hierarchy. Why did your authors choose to represent it as a pyramid?
Write a Java program that uses the while loop to produce the following output: ***** ***** ***** *****
In Manchester and differential Manchester encoding, the transition at the middle of the bit is used for __________.
Using your own suitable example code and diagrams, explain how the following database concepts are implemented: Stored Procedure.
Given a 100-MHz clock signal, construct a circuit using T flip-flops to generate 50-MHz and 25-MHz clock signals.
Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
When it comes to security, what are the Distinguish between the advantages and disadvantages of various authentication methods.
Cloud Security: How are regions and availability zones used to improve the resilience, availability, and performance of applications?
i need the answer quickly Transcribed Image Text: R2
R1
Detector
Rx
R3
Lx
Fig. 2.1 Maxwell’s Bridge
What is the most compelling argument to move data to the cloud? What is your main security concern?
The WBS chart provides an idea of how to set up the computer with a piece of software.
Any four commonly used networking applications should be mentioned. What role do they play in education and research?
In PHP, all classes must have a constructor method that may be written. Is this true or false?
Examine the benefits and drawbacks of enterprise-based solutions in terms of exploitation. the usage of ICT in businesses
Because of how data is kept, distributed and centralized version control systems differ. Version control offers two advantages:
Which command is used to find the host name of a computer when you know its IP address?
What exactly is the internet and how does it work? Using the internet, what things can you accomplish?
Transcribed Image Text: Working With BIIG-DATA
DESCRIBE the structure of mapred-site.xml configuration file in pseudo – distributed mode?
Tala Code (f?f INun WO – hehdew” 5 1;15 Transcribed Image Text: for
Jawa
Code
even
between
75
Provide an example of two computer breakthroughs that have aided in the improvement of the efficiency of e-commerce.
Design a sequential circuit that detects the serial input sequence of ‘10011’. And implement the circuit on software.
A cursor can store One or more rows Zero rows Only one row Not more than 10 rows
APIPA and DHCP are contrasted. What are the benefits of integrating both of these protocols into a network?
Is it necessary for each State Diagram to have a self-transition? Give arguments to back up your response!
Explain how, according to the OSI model, the network layer provides the virtual circuit interface for packet-switched services.
What do you mean by multimedia systems? Explain the challenges faced by multimedia sytem and it’s desirable features?
What factors should a company consider when adopting an ERP system? How can it avoid outgrowing the system?
Definition of Virtua l-8086 The technique of matching a method call with the appropriate method is called mode-matching.
Explain the benefits of Cleanroom Software Engineering. Demonstrate the significance of Statistical Usage Testing in Cleanroom Software Development.
Transcribed Image Text: read nextdouble();
QUESTION 4
The “equal to” comparison operator in Java is
===
QUESTION 5
Write a program in JavaScript to check a number is even or odd. And the number is given
What will be the output of given code: for(var i = 1; i++ < 3; i++){ console.log('H'); }
What exactly are the objectives of authentication? Compare and contrast the advantages and disadvantages of different authentication techniques.
Scanner method ————— reads characters until it encounters a newline character, then returns those characters as a String.
What type of ?le stream object do you create if you want to read data from a ?le?
Virtual reality strives to create this type of experience. a. electronic c. LCD b. immersive d. liquid crystal
‘When should law enforcement agencies intervene in IR or DR?’ What are the issues with law enforcement presence?
Sub:-Flat Construct a NFA in which triple ‘1’ is followed by triple ‘0’ over ? = {0, 1).
What form of storage retains data and programmes even when the computer system’s electric power is switched off?
Which difference does the exFAT file system file assignment table and the FAT32 file system file system have?
Exercise 1: (Algorithms and Flowcharts) To find Area of Circle (Provided A= 3.14 * R *R, R= Radius)
After applying De Morgan’s theorem to expression ((x+y)’)’ it will be simplified to x’y Select one: True False
Explain how to resolve conflicts and problems as part of the DBA’s end-user support services to your customers.
Why must programs written in a high-level language be translated into machine language before they can be run?
Transcribed Image Text: java
to subtraction two square shape matrix
take these entries and size from user
input
An interface control that is connected to a data source should be appropriately labeled using the correct terminology.
Subject : Artificial Intelligence Depth-First Search is implemented in recursion with FILO data structure. Select one: True False
Write a C++ to print the sum of only odd numbers in the range 1 to 99(both inclusive).
Name the type of swing controls used in the frame below. Transcribed Image Text: ID
Password
Login
Clear
What is the most significant difference between homogeneous and federated distributed database systems, and why is it important?
The time it takes to search for a specific item in a non-sorted array is seconds on average.
Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
In PHP, all classes must have a constructor method that may be written. Is this true or false?
User-defined ordinal types are beneficial when working with ordinal data. An associative array possesses many benefits and disadvantages.
Define and explain Machine Learning.How is it being used in analytical CRM?Use an example to elaborate your point?
Referring to the lecture on complement systems, how are complement systems similar to the odometer on a bicycle.
How are you going to apply the underlying concepts of mathematics in real life scenarios? give one example
Complete the function given below: int square (int x) { // Return square of x } C++ language.
Provide several examples of how or why you might need to apply Boolean operators (AND, OR, NOT, XOR).
Q
Which of the following is NOT a Software?
A) Compiler
B) Adobe
C) Microsoft Office
D) Drivers
Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
Transcribed Image Text: :Narrator is an application in the
Windows Ease of Access. O
Personalise. O
Windows Accessories.
How is multiplexer implemented in computer memory. I have the diagram ,i need explanation only. Please very fast
Transcribed Image Text: In a UP project, each iteration ends with a stable executable.
Select one:
a.FALSE
b.TRUE
Gain a better understanding of cloud computing and other related subjects, as well as social networking blog sites.
147. Foundation of software engineering is a. source layer b. process layer c. single layer d. cell layer
How do you know if a condition should be checked at the top or bottom of a loop?
python Transcribed Image Text: Is
def add_one(x):
return x+1;
equivalent to
add_one= lambda x: x+1
True
O False
83. Which of the following is not the Networking Devices? a. Gateways b. Linux c. Routers d. Firewalls
What part of a filename does Windows use to know which application to open to manage the file?
186. A data dictionary is created when a __________ created. a. Instance b. Segment c. Database d. Dictionary
None Transcribed Image Text: We have several methods to Automatically Fill
numbers in the Microsoft word
o 2:14
Explain which type of firewall software is installed on a system running the Windows Server operating system ?
What does it mean to define a system model? What factors should be considered while creating basic models?
What programs can be created using C++ Programming Language? Can C++ programming be used to create a website?
behavioral patterns provide guidance on the way in which classes interact to distribute responsibility Select one: True False
Transcribed Image Text: Q 04: Explain Software Engineering Practices with respect to Barry Boehm’s W HH Principle?
Answer:
General purpose computers are those that can be adopted to countless uses simply by changing its program why?
Which version of 802.11 technologies can use two antennas at both the access point and the network adapter?
Transcribed Image Text: plot3(X,Y,Z,LineSpec) creates the plot using the specified line style,
* .marker, and color
True
False
What is voting technology, and why is it so important? In what way does this affect computer networking?
Intermediate storage is any kind of storage that is used to store data between stages in its processing.
Transcribed Image Text: Write a java program to check whether a
string starts with ‘Java’ and false otherwise.
MCQ: Which among the following provides the strongest wireless security? a. WPA b. WEP c. WPA2 d. SecuredWPA
What factors should a company consider when adopting an ERP system? How can it avoid outgrowing the system?
Find any errors in the following program. // This program does nothing int main { return 0; }
MATLAB/OCTAVE Transcribed Image Text: 1. Using script file in MATLAB/OCTAVE,
a) Sketch the graph of y = x3
What is the value of L? L=Math.floor(2.7) * Math.min(-6, -3) a. -12 b. 18 c. -9 d. -6
None Transcribed Image Text: 2: Implement the following function using 4-ta 6decoder : F(A,B,C, D) = Em(0
*,1,4,5,8,15)
The device that can both feed data into and accept data from a computer is Input-Output device why?
When is it essential that a class have to define a copy constructor in C++ class and why?
Find FIRST and FOLLOW from the following grammar S?aAB I bAl E A?aAB I E B? bBl E
How much free space on the hard drive is required to install a 64-bit version of Windows 7?
Convert the following decimal number into 8 bits signed binary and also hexadecimal numbers. Decimal Number : -1
With modeling equation and algorithm/flowchart describe the importance of Boundary Value Problem by providing one application as example?
what Practical and common-sense measures can be adopted by DBA to ensure that the database system is secure?
Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
I need the answer as soon as possible Transcribed Image Text: 2: using function, apply the multiplication table.
Transcribed Image Text: All jQuery selectors start with.
…..
a. [S]
b.
O. $()
O d. $}
Transcribed Image Text: Playback Features allow the user to control the content and flow of information
False
True
Write pseudo-code algorithms for each of the matrix operations (matrix addition, scalar multiplication and product of two matrices)
Write an algorithm and program (in C++ language) for Round Robin Process Scheduler, also explain its scheduling technique?
When using DSL to connect to the Internet, the data transmission shares the cabling with what other technology?
Think about ER diagram for using QR code in university library system for students and librarian and reationalships
In PHP, all classes must have a constructor method that may be written. Is this true or false?
A hospital has enlisted your services as a computer programmer to come up with an interactive information system.
Create a program that takes a number and finds the binary equivalent of the number without using recursion.
Which of the following is not part of the three-sphere model for systems management? a.Business b.Information c.Technology d.Organization
The output of a two – input nand gate is HIGH , when the any of inputs are
draw a flowchart to find if a number is positive, negative, or zero using if else-if else structure
In Hardware description language Show a welcome phrase and a counting day every second on the serial screen
Matlab Write a program to generate a matrix of 4 row and 3 columns with random filled enteries.
Discuss the effect of conventional SDLC versus agile development on the final information system’s implementation, support, and security.
Tell me about one of the contributions that Alan Turing has made to the field of computer science.
Transcribed Image Text: Question 7
Write in your own words the difference between direct delivery and indirect delivery.
Please state at least two key differences between white-box testing and black-box testin. Also define what they are.
In Fortran programming language: 1. Take input two integers x,y from user and print their sum in output.
which suitable countermeasures should be implemented to minimize the risks posed by recognized vulnerabilities in the network architecture?
The logical unit that receives information from outside the computer for use by the computer is the _________________________
20. Which of this is not a network edge device? a. PC b. Smartphones c. Servers d. Switch
Transcribed Image Text: even numbers from 11 to 100. Using For
Q1/ Write a program to print
statement)
Communications in switched networks happen in three ways: unicast, multicast and broadcast. Explain each of them in brief.
Which version of 802.11 technologies can use two antennas at both the access point and the network adapter?
What do you mean by the screen and reports concept in the object-oriented database and logical design database?
Consider the following hyperthetical search space and trace using depth-first-search algorithm on it to wherethe goal is 13
In PHP, all classes must have a constructor method that may be written. Is this true or false?
Transcribed Image Text: 4. Show with a truth table that the following is true:
A+ AB = A+B
Transcribed Image Text: 4-
void (double a)
cout<<"" a = ";
cout<0
T(n}:
In a typical banking organization how would you classify the various workers using a typical pyramid organizations structure.
When a transitory application is running, where does it save the segment address of the current environment string?
Write the working principle, design, circuit diagram and precaution of R-S Latch Flip Flop and D Flip Flop
Write the pseudocode of the algorithm for finding the diameter of the graph and estimate its time complexity
Write a Java program to get and display information (year, month, day, hour, minute) of a default calendar
What is the name of the protocol that is responsible for determining a particular IP address’s physical address?
IN ASSEMBLY Declare an array of byte and initialize it to the first 5 letters of the alphabet.
Q) How many 128 × 8 bit RAMs are required to design 32 K × 32 bit RAM?
Execute and show the python code to demonstrate Sum(P+N),Subtract(P-N), Multiply(P*N) where P = [4,6,8,10] and N = [1,3,5,7]
Remarks should be placed only before functions and before classes in our code. the truth or the lie:
provide an explanation for the current trend of digital device convergence and how it relates to mobile devices
C++ Program to calculate the given series. (1) + (1+2) + (1+2+3) + (1+2+3+4) + … + (1+2+3+4+…+n)
In F95 language write a program take input two integers from user and print their sum in output.
Transcribed Image Text: Calculate the kinetic energy in Joule, of a car of mass 1700kg travelling at 90km/h.
Computer Science: Discuss the type of data transformations needed to build the data mart for the given company.
Risk is an important factor in cloud computing environments. Additionally, note down the plans for managing these threats.
Take input three strings from user and print the resultant string after concatenating all the three. In C++.
Definition of Virtua l-8086 The technique of matching a method call with the appropriate method is called mode-matching.
Transcribed Image Text: Which are exampleS of software
Operating system
Language Processor
Video Games
Mouse
doide
Harddrive
Modem
What is the best way to determine if an email message warning about a virus is a hoax?
Some tools and techniques used in the system development process will have to be identified and briefly discussed.
Short Answers type questions: Q, What is The Short form of Power On Self Test in Computer Science?
Requirements prioritizing and negotiation is a step of requirements elicitation and analysis. You’ll have to explain it eventually.
Write a ja program to check whether two given integers, whether one is positive and another is negative.
Transcribed Image Text: Write a program C++ to find the minimum
number into int array.
uo 9:58 /
_________ is the next-generation bidirectional communication technology for web applications. a. Socket b. WebSocket c. Port d. Interface
What’s the name of the structure that has modules that are ordered? Can you show me an example
INFORMATION SECURITY Discuss the emergence of insider threats and how you would go about defending against these attacks.
JavaScript program to convert object to string and also check whether this is converted into string or not
The other text on the page will seem to its if an element is specified with float: right;.
Discuss physical security, the primary physical security threats and how are they manifested in attacks against the organisation.?
as computers work, they generate heat. Discuss the types and importance of cooling systems in the computer system
For what reason should you use new instead of the old operator when creating instances of a structure?
Examples of how search engines and online directories are utilized in e-commerce are given in the following paragraphs.
@ wrong And plagiarism contents will downvoted Write the methodology involved in computing the keys in SSL/TLS protocol.
Why does a system need non-blocking I/O? What are the differences and similarities of nonblocking and Asynchronous I/O?
57. Which is not a type of data management technology? a. Relational b. Rational c. Object-oriented d. Dimensional
Identify the key components of technology infrastructure that must be in place for e-commerce and m-commerce to work.
Which process is client and which is the server for a contact session between a pair of processes?
110. Program flowcharts are part of a. operation chart b. process chart c. algorithms flowchart d. system flowchart
The DateTime.TryParse method will successfully convert the string “8/22/1990” to a DateTime object. Question 45 options: True False
“Using payloads of TCP and UDP segments, the signature-based IDSS and IPSS inspect into the payloads.”True or False.
None Transcribed Image Text: Q2) Write a program to solve the following equation:
xa3 + ya? + z*
Short Answers type questions: Q. What is The Short form of Voice Over Internet Protocol in Computer Science?
In F95 language write a program take input two integers from user and print their sum in output.
With the aid of diagram,analyze and evaluate the booting process when a computer is turned on. NB: avoid
What is the relationship between the words data, information, and decision-making in the context of an information system?
22. The following mathematical operations are supported in “Normal” mode: 22.1. Addition 22.2. Subtraction 22.3. Multiplication 22.4. Division
What are the various kinds of languages accessible in the DBMS and can you provide examples of each?
9. A _____ Contains fields of data about one entity. a. Record b. File c. Fields d. Document
Computer Science: Discuss the type of data transformations needed to build the data mart for the given company.
class Main { public static void main(String args[]) { System.out.println(fun()); } int fun() { return 20; } }
Describe the implications for customer service and server skills when using a single-line, single-server, single-phase waiting line system
How do you relate the following terms in the context of an information system: data, information and decision-making.
Pseudocode can only be added to a script before the script has been executed. A.) True B.) False
239. Multitasking is known as modern a. New Theme b. Old Theme c. Effective Theme d. Central Theme
How to protect network against phishing attack what are the steps to protect from these attacks in future
Take input a number from user and print the number of non-set bits in it. Please answer asap.
None Transcribed Image Text: bläi 4
mobiles and computer modems are
* example of transceiver
True
False O
In PHP, all classes must have a constructor method that may be written. Is this true or false?
36. Beowulf clusters of the computer system are linked through a. LAN b. WAN c. PAN d. TAN
When putting together a software team, there are several factors to consider. How do you properly allocate tasks?
If You Have An Issue With Your Page, How Do You Debug It, What Tools Do You Use?
31. erarchical model is also called a. Tree structure b. Plex Structure c. Normalize Structure d. Table Structure
Recognize and distinguish between the primary tools and methodologies that will be used throughout the system development process.
Transcribed Image Text: Mention any 4 widely used networking software. How are they useful in
education and research?
Discuss the differences between a Binary Tree and a Heap. Include in your discussion the efficiency of operations.
What are the three circumstances in which it is recommended that relations be denormalized prior to database implementation?
Why is it necessary to have a cooling system in a computer? What are the various cooling techniques?
Which of those methods would be most likely to be effective for random file access, in your opinion?
List the reasons why a company may need firewalls for physical security measures in order to be successful.
Name at least three tunneling protocols that are used for IPv6 packets to travel over an IPv4 network
Cloud Security: How are regions and availability zones used to improve the resilience, availability, and performance of applications?
Transcribed Image Text: Q1)A) Check weather that bisection method can find
approximation root for f(x)=1+e* =0 ,[0,1], e=0.01
Write in Pseudocode C Create an algorithm to calculate N of the first odd number using recursive technique.
Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ######
Write a function of each CPU component: 1- Instruction Register: 2-Address generator: 3-Segment register: 4-Stack segment: 5-pointer register:
Is it necessary to restrict some websites from children’s access? Anyone responsible for children’s activity on the Internet?
Q3: Perform a tree like dry run on recursive fibonacii series while n=10, also find out recursive equation.
Q5 Does electronic commerce as a new distribution channel cause disintermediation or reintermediation or both? Justify your answer.
Find the stages of datapath and control (Execution sequence) for ADD R1,R2, R3; R3 <= R1 + R2. 5- Which HTML 5 element specifies an independent, self-contained content? a. Article b. Details c. Main d. Summary An operating system intended for use on microprocessor based systems that support a single user is CP/M why? Which of the following order of highest precedence in Expression? a. / b. * c. + d. () 28)The internal morphological structure of the word INDEPENDENTLY is prefix + root + suffix. Select one: True False A computer program that instructs other programs to perform a particular type of operation is System software explain? Explain DDoS attack on server . Write and explain top 5 DDoS attacks on 2021. (In simple words) Design models show: Select one: a. objects b. All mentioned answers c. relationships between entities d. object classes What does it mean to define a system model? What factors should be considered while creating basic models? Create/Produce one short discussion based on your understanding of the role of software quality assurance during software development. Which of the following processes the Visual Basic code in a Web page? personal computer Web server b. Which command is used to find the host name of a computer when you know its IP address? Create a Hamming code (k, n) = (7,4) for the detection and correction of errors in word codes 2. Perform the following hexadecimal arithmetic: 7F3 + 41D 3. Perform the following hexadecimal arithmetic: A4 + 27 Consider the following hyperthetical search space and trace using depth-first-search algorithm on it to wherethe goal is 13 Write a Program in C++ to calculate the radius of circle. (radius= ? r2 , ? = 3.14) Examples of how search engines and online directories are utilized in e-commerce are given in the following paragraphs. What form of storage retains data and programmes even when the computer system’s electric power is switched off? Is there any motivation for a mobile network operator (MNO) to continue investing heavily in its network infrastructure? An input device used to convert pictures into a digital form is known to be Digitizer devices why? What form of storage retains data and programmes even when the computer system’s electric power is switched off? Write SQL CODE to add a new column called “Student_Nationality” in the Student table, using datatype varchar (255). JAVA column average /*for example, if table has: 123 456 789 Your method should return: 4.0, 5.0, 6.0 Designing logic circuits and writing instructions to enable the microprocessor to communicate with peripheral is called interfacing why? Computer Engineering lab Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ###### explain what is difference between “Buffering”, “Spooling” and “Caching” in a single-user system. Support your answer with exapmles. How would you describe CentOS in terms of server operating systems and how does it differ from Ubuntu? Define a DFA that accepts the language L defined by the regular expression: aa* + aba* + b*. Unipolar, bipolar, and polar encoding are types of _______ encoding. a. line b. block c. NRZ d. Manchester Objects in Object Oriented Programs have _________ and __________. OOP, structures properties , behaviors structures, objects classes, objects 3. Terrorism continues to be a serious global security challenge.How can Clustering be used to avert terror incidences? Write a typedef statement that makes the name TenInts an alias for an array that holds 10 integers. Write a C++ program using Do…WHILE loop to generate the figure below. ****** ***** **** *** ** * What is the basic idea of using a prototyping model in the process of developing a Software product? The first machine to successfully perform a long series of arithmetic and logical operations was: Mark I why? Write a python program to find the sum of array you can use inbuilt method also if needed What type of methods are two or more methods that share the same name but have distinct parameterLists? The Apriori algorithm is inefficient. Suggest any three ways that we can put in place to improve it. Ubuntu’s system date and time may be changed by a regular or standard user by using what command? 5b. Which of the following is the scope resolution operator? i) . ii) * iii) :: iv) ~ relational schema and intigrity constraints for student supervision system .also write constraints and assupmtions for student supervision system. None Transcribed Image Text: 18.CALL 1781 2712H is : a. Near call b. Far call c. Indirect call Describe the applications of voice recognition in a succinct manner. What impediments do speech recognition and production face? Transcribed Image Text: How many tests are needed in combinatorial coverage when there are 4 clauses? 16 8. APIPA and DHCP are contrasted. What are the benefits of integrating both of these protocols into a network? Hardware and software may be used to restrict computer access, but not a policy. What’s the deal here? 119. One that is not a type of memory is a. cache b. ROM c. RAM d. compilers Tell me about one of the contributions that Alan Turing has made to the field of computer science. ii) Take input two strings from user and concatenate both strings and print them in output. Python language The UDP Service characterized by: a. being connectionless b.its user authentication method c. reliability d.it unlimited message size Acoustic perception Explain what advantage the unit sone has over phon in describing the loudness/loudness of a sound. What theoretical perspectives and steps can be used to prepare you for postgraduate training or a job search? Computer Science LAB Print a big ‘C’:(static) ###### ## ## # # # # # ## ## ###### What are the most important components of the operating system, and could you please explain them? Briefly stated: A high-level programming language is made from of terms named. instructions in binary mnemonic devices instructions important phrases None Transcribed Image Text: Q5 write the equivalent code to the replace function in string class. ? AV% _______________software helps a customer manage all aspects of customer encounters, including marketing, sales, distribution, accounting, and customer service. what are your thoughts about whistle-blowers and/or employers monitoring Facebook posts (including social media rants and political viewpoints)? Transcribed Image Text: Show the language L = {a”b*c”: n > 0, k > 0} is not regular.
1) With the exception of one, all of them are widely used wireless standards. 802.11a, 802.11b, 802.11ac, and 802.11ab
Databases: Describe the three types of anomalies that can arise in a table and the negative consequences of each.
Please solve Quickly ?++ Transcribed Image Text: The output is:
{
int x=40,y=30,z=80;
if(x
45. Static programs of the computer system are stored in a. RAM b. ROM c. hard disk d. CD
Convert the given number to decimal form by expanding in powers and by using the calculator shortcut. 3EBsixteen _+_+_
Can personal privacy become an issue when the physical and digital worlds merge via the use of intelligent systems?
Define the general name for an attribute and provide an example of how it’s utilized in a relationship model
q8) Graph is an example for ________________ type of data structure. a. Linear b. Circular c. Sequential d. Non-Linear
I need C/C++ AND JAVA PROGRAM FOR THIS PATTERN.. DON’T ANSWER IN JUST 1 LANGUAGE OTHERWISE WILL DOWNVOTE .
Which tool consists of programming environments such as integrated development environments (IDE), an in-built modules library, and simulation tools?
I am learning loops in python Write a program to print hello world using loop 10 times in python
is the term used to describe the process of making an instance of one class a member of another.
47. Software evolution does not comprises: a. Development activities b. Negotiating with client c. Maintenance activities d. Re-engineering activities
Windows operating system is an example of Select one: a. System Software b. Hardware c. Peripherals d. Application Software
Write a JavaScript program to find a value which is nearest to 100 from two different given integer values.
Businesses that engage in electronic data interchange (EDI) with each other are called trading partners. Select one: True False
Write an Assembly language instruction(s) to add the content of the memory location with address 250 to the Accumulator.
What does the term “scalability in the cloud” mean? Scalability is one of the main benefits of cloud computing.
236. ___________ is done in the development phase by the debuggers. a. Coding b. Testing c. Debugging d. Implementation
ANSI-SPARC architecture defines three schemas found at each level of abstraction. Explain the role for each of those schemas
i need the answer quickly Transcribed Image Text: Q1: Draw a block diagram illustrating the Computer Components.
an modol
If we have limited amount of memory, describe how to use a memory-bounded A* search to find the solution.
a variable used to specify a change in state of another variable is called ? This is for python
216. ______________ is done in the development phase by the developers. a. Deployment b. Debugging c. Verification d. Validation
Does software engineering have a clear goal that can be summed up? What precisely do you mean by that?
Affects of Information Technology on Our Daily Lives and Society. Make a case for both sides of the issue.
How to write a algorithm program step by step in visual studio 2012. The subject is Programming in c.
Modeling requires introspection before construction can begin. Why instead of using other types of modeling, a mathematical model approaches.
Transcribed Image Text: Question 2
Define Components of HCI. Also explain all Components of HCI for University Management System
Transcribed Image Text: QUESTION 2
A measure is calculated based on the context of the cell?
O True
False
A(n) _______________ is placed on a hard disk drive by a website to track certain information about its visitors.
Provide state table, state equations for following moore state diagram: Transcribed Image Text: A
?
E
1
1
D
Is it feasible to condense the main objective of software engineering into a single sentence? What exactly is it?
152. For improving performance of the computer system memory used is a. RAM b. ROM c. cache d. cd
Create a form which have customer’s name, address and contact number & display it using POST() method. using php
Name one key improvement of wpa2 personal over wep. Name one key improvement of wpa2 entreprise over wpa2 personal
Compare and contrast DHCP and APIPA. What are the advantages of including both of these protocols in a network?
Transcribed Image Text: Which one of the following is not the example of operating system
Redhat
Windows
Oracle
Lollipop
Discuss five applications of data acquisition system in details. What are the advantages and disadvantages of data acquisition system.
How do I clear the keyboard buffer for a key that is about to be pressed in INT 16h?
I’m not sure what the purpose of system modeling is in software engineering, but I’m curious what it does.
Why is it important to check whether a file exists or not before trying to open it for input?
According to Google, it takes our inquiry just one nanosecond and delivers millions of relevant web sites in response.
150. IPv6 address have a size of a. 32 bits b. 64 bits c. 128 bits d. 265 bits
What is the most important function of a firewall system? What are the guidelines for using packet filtering software?
Define the word “firewall” in the context of network security and explain how it is employed in network designs.
224. A model that is the demo implementation of the system. a. waterfall b. prototype c. incremental d. agile
What is the physical security and computer security have to work together and be consistently implemented, regulated, and maintained?
Create a formula to determine the maximum number of nodes that may be inserted in an n-level binary tree.
266. Programs of the operating system usually end a. normally b. abnormally c. by default d. when error occurs
i need the answer quickly Transcribed Image Text: 3. List and define the major components of an expert system.
Computer science: List down the ways in which an e-commerce site can keep a purchase record for its customers.
C++ Write a program to find a Factorial of a number. Remember that. Number should be taken from user
What information is used by a process running on one host to identify a process running on another host?
complete with definition …………..includes desktops, laptops, PDAs and even cell phones helps user to input data for engineering system.
Ethernet is a LAN so it is placed in the second layer of the OSI reference model.True or False.
Transcribed Image Text: Discuss all possible defenses in RSA against Brute force attack
A- BI
= = E E
187. Beowulf clusters of the computer system are built using a. PCs b. tablets c. smart phones d. servers
In your opinion, what are the two most convincing reasons in support of the use of layered protocol architecture?
is it a graph and what are the advantages and disadvantages of its adjacency matrix and list of neighbors?
15 ?????? Inheritance of properties between frames? very similar to objects in_______. ???????? OOP Pascal Logo none of above
Hamming codes can be used for both single-bit error and burst error detection and correction. 1. True 2. False
The ISDN Internetworking Equipment devices are a. Terminal Adapters(TAs) b. ISDN Bridges c. ISDN Routers d. All of these
identify 5 weaknesses of modern-day computers. explain why you think they are weaknesses and suggest ways to solve them
Provide state table, state equations for following moore state diagram: Transcribed Image Text: A
?
E
1
1
D
Python Transcribed Image Text: Descriptors provide the developer with the ability to add managed attributes to
objects
True
False
The topic centered on the use of blockchain in the banking sector and the difficulties that come with it.
Define the following terms and give an example for each term: (i) class (ii) method (iii) message (iv) encapsulation
When you move a dynamic disk to a new computer, what status will Disk Management first assign the drive?
Identify the term required for computer output which is directly written to optical media instead of paper or microfiche?
Which of the following is an example of Best First Search algorithm? A* B* C* Both A* and B*
As a BSCS student, do you think it’s important for you to learn various computer language? **maximum 5 sentences
a) Construct the FA from the given Regular Expression a(a + b)*b + b(a + b)*a (a+b)* (aa) (a+b)*
Wht vlan’s contain huge network bits Transcribed Image Text: VLAN A
Prefix Size:
19
VLAN B
Network Mask:
255.0.0.0
A repeater takes a weakened or corrupted signal and …………… it. a. Amplifies b. Regenerates c. Resample d. Reroute
what is the 32 bit machine language (i.e. bit pattern) equivalent of the following MIPS instructions? lw $s4, 1280($s5)
Is this statement true or false? Individual variables are particularly well suited for storing and processing lists of data.
What Is The Difference Between C And C++ ? Would You Prefer To Use One Over The Other ?
Make speed and time members of the OS class integer values of the basic data type to compute distance.
None Transcribed Image Text: #include
using namespace std;
int main()
{char List[4][10]={“kareem”, “ahmed”, “ali”, “mohamed”};
cout< 6 ˆ 2 AndAlso True OrElse False. a. True b. False
Which SCSI version is referred to as Fast SCSI? Which version of SCSI is referred to as Ultra SCSI?
Transcribed Image Text: Calculate A+B, A-B, Ax B, and A+B for the following pairs of binary numbers.
10000, 1001
In order to accomplish what, every member of the software development team should take part in the planning phase.
Why is it vital to not pile boards on top of each other while you’re taking apart a computer?
What are the many kinds of storage available? Distinguish between the various kinds by having a discussion about them.
What is the purpose of the sqrt function? To utilize the sqrt function, which header file must be included?
So, what happens if more than one process has the same priority levels when it comes to CPU scheduling?
Have a look at the pros and cons of having a limited number of sectors on your hard drive.
Which of the following best explains why it is not possible to use computers to solve every problem ?
Check its connections to the computer and power source would you do first when troubleshooting a faulty monito why?
What are virtual computers, what do they allow you to accomplish with them, and what benefits do they provide?
What happens to the user application if there is no interrupt handler in the instruction cycle during an interrupt?
What safety precautions may be taken to minimize the risk of harm while using a cell phone, and how?
When transitioning from on-premise servers to an IaaS architecture, what are some of the governance concerns to watch for?
When you select Lee’s method for Routing, why should you? TALK ABOUT IT FROM A DESIGNER’S POINT OF VIEW
Why does a CAT-6 cable have a plastic core? Which two types of cabling are recommended for Gigabit Ethernet?
In java programming, Explain the definition and importance of code reduction by using features such as generics and collections?
Simplify the given Boolean Function using Quine McCluskey Tabular method Y (A, B, C, D) = ?m (0,1,3,7,8,9,11,15) ?
Which of the following accesses the seventh element stored in array? a) array[6]; b) array[7]; c) array(7); d) array;
What is the effect of SOXs on the need for organization to improve quality of data in database ?
Explain in detail how establishing a wireless network may be beneficial in the event of a disaster recovery situation.
Monte Carlo is a kind of simulation technique that uses random numbers to determine the development of a system.
The operating system and a user program hold two different perceptions of a virtual machine. Explain how they differ
16. Under MS-DOS, user communicates with the operating system by issuing a. commands b. instructions c. routines d. procedure
What is multifactor authentication and how does it work? What role does it play in protecting against stolen passwords?
The____________is a straightforward but extremely helpful technique for organizing data into sets of two-dimensional tables referred to as relations.
One of the following are valid step in SDLC framework? All of the above Software Design System Analysis implementation
Identify and describe a system that can be implemented through software and draw the architecture/activity diagrams of the system.
Shared memory access is made possible by multiprocessor systems. Clusters and grids don’t usually have these kinds of mechanisms.
Describe the steps that take place when a timer interrupt occurs, culminating in a context move to another application.
Describe the use of breakpoints and stepping through code when you are using an IDE like NetBeans for debugging
Transcribed Image Text: The function strcat() appends its first argument
to its second argument
Select one:
True
O False
Briefly explain the following in connection with the bottom – up research : i) planning ii) Design iii) Implementation
Does the DBMS or the user make the choice of which index to use to accomplish a given task?
Transcribed Image Text: 12
+28-12
12
14
?26
R26
46
70
12
4-012.
36
16
-16-|
54
106
82-
Give a precondition and a postcondition for the predefined function sqrt, which returns the square root of its argument.
Book Reference Barry B Brey 8th edition. llustrate how external hardware interrupt on INTR pin of 8086/88 is tackled?
Write a JavaScript program to find a value which is nearest to 100 from two different given integer values.
Transcribed Image Text: code in javascipt
that removes duplicate values from an array.
array is filled by manually I
In a chart of MS Excel, data labels represents the legend of data Select one: a. True b. False
Give the names and short descriptions of 10 global organizations in the fields of information technology and computer science.
Explain Software Configuration Management and Its need. The answer must include following details: Examples of tools used for SCM
The shared responsibility model and identity access management (IAM) are used to secure the cloud. What does this mean?
The constellation diagram of BASK has ______ dots. a. 2 b. 1 c. 0 d. none of the above
If any wrong will downvote Write about static allocation strategy. List some of the limitations of static allocation strategy.
5)Choose the correct result of the given python code.
exp=lambda:x=x+y
print(exp(2,3))
a.
3
b.
6
c.
5
d.
2
Any type of storage that is used for holding information between steps in its processing is Intermediate storage why?
List reasons why users might shut down computers or mobile devices regularly. Differentiate between sleep mode and hibernate mode.
Is it feasible to condense the fundamental purpose of software engineering into a single sentence? What exactly is it?
How much smaller would a 40 GB raw video file become if compressed at a compression ratio of 8?
Given array int arr[]= {4,16,7,19,-7,0}. Write a C program to find maximum and minimum value in the given array.
Write a PHP function to test whether a number is greater than 30, 20 or 10 using ternary operator.
In Python Programming Language:In the given array arr= [1,7,4,-6,2,18,9,16,13] find the sum of only odd values and print it
Java Write a program to take string as input then check whether the user entered blank string or not
Why do microcontrollers exist at all? Why not just use a normal processor and add all necessary peripherals externally?
What are three kernel components (in a windows operating system) that are the most significant in process control ?
Is it feasible to condense the main objective of software engineering into a single sentence? What exactly is it?
Transcribed Image Text: Under which programming situation, it is
better to use switch-case over if condition for
decision making
Number of S – boxes used in DES algorithm is …………… a. 4 b. 8 c. 16 d. 32
If a folder has 10 subfolders, what is the easiest way to change the permissions for all 10 folders?
Python program yo remove blank space from print statement Statement is print(“hehevgs”, “jevshsisvhshs”, ” Jsbshsyfwhe”) Remove the blank spaces
what is different between data management group data and data management ungroup data in math in the modern world?
What are the issues with company-wide networking? Describe the issues and possible solutions for some of them. check circle
Explain why most real-world problems are classified as constraint satisfaction problems? Provide three real-world examples to back-up your answer
Write a C++ to take input 7 integers and find maximum of all of the them. Print the maximum.
Can personal privacy become an issue when the physical and digital worlds merge via the use of intelligent systems?
47. In Object Oriented Model values are stored into __________ variables. a. Instance b. Local c. Static d. Global
The physical layer is responsible for a. line coding b. channel coding c. modulation d. all of the mentioned
Create a c++ program that is a linked list of ten integer numbers. Display the numbers in the list.
Describe a privacy problem that is so severe that it would cause you to discontinue your use of Facebook.
i need the answer quickly Transcribed Image Text: Write a C++ program that prints
the product of two matrices.
Explain the symbols that are used in data flow diagrams, as well as the principles that govern their usage.
Que. The signal sent to the device from the processor to the device after receiving an interrupt is ________.
Python: import pygame. drawing a house using class. main.py paint.py class sun(yellow circle) class house class window class background(blue)
Transcribed Image Text: in C
4.
Write a program to left rotate an array of integers by d times.
Only in lower case not in Upper case Java Write a program to print alphabet in lower case only
In last program I forget to talk about remainder and quotient. Take 2 numbers and find these in java
Compute the weakest precondition for the following assignment. a = 2 * (b – 1) – 1{a > 0}
Consider the following: 10.122.189.77/255.0.0.0. Which of the following is the equivalent? a) 10.122.189.77/32 b) 10.122.189.77/24 c) 10.122.189.77/16 d) 10.122.189.77/8
?????? Some files cannot be deleted using rm command because of the permissions associated with it. ???????? true false
a. What are the differences between the multi-step and simple income statement? b. Which provides better information for users?
Define the discounted payback period as the number of years required to recover the investment from discounted cash flows?
How do I clear the keyboard buffer for a key that is about to be pressed in INT 16h?
e Show that decidable languages are closed under the following operations: a. Set Difference b. Kleene Closure c. Shuffle
Transcribed Image Text: What is (5, 11) n (6, 15]?
What is (5, 11) U (6, 15]?
Submit answer
Differentiate between Queues and Stacks With the aid of a diagram, differentiate between Directed Graph and Weighted Graph .
None Transcribed Image Text: # include
using namespace std;
int main()
{float x=4,y36,z=3;
z-=(x-y++);
cout<
Is it possible for cloud computing to fulfill all of an organization’s requirements? concerns about the company’s IT infrastructure
