b. Rational Unified Process, Infosys c. Rational Unified Process, Microsoft d. Rational Unified Process, IBM

36. RUP stands for____________ created by a division of ____________. a. Rational Unified Program, IBM b. Rational Unified Process, Infosys c. Rational Unified Process, Microsoft d. Rational Unified Process, IBM

Take 5 charater inp?t‘ Print the string. ser and add them7f§ Transcribed Image Text: Take 5 charater input from user and add them to a empty string.
Print the string.

Transcribed Image Text: Part B
What are the big-0 notations for the following functions? Show your proofs
(BI) 4n3 + ??2+ 2n – 5
(B2) ? logn +?? — 15

Weight process and conditions of all mobile app platforms for developing a rapid prototype and pitch your idea. Discuss your options and suggest the best platform for developing the prototype.

Transcribed Image Text: To join the internet, the computer has to be
connected to a
?.
internet society
O b. different computer
c. internet service provider
d. internet architecture board

Q_1 Students need to answer 8 out of 10 questions in mathematics exam. In how many ways can a student choose 8 questions if the first three questions are mandatory?

Write a program to take Input a value x from user and print x 5 without using pow() function. Given x 5 lies in range of integer. In C language.

Computer Engineering lab Please write a a php scripts with html to merge two arrays. Please use the inline php inside the html. Solve AsAP only in php and html

255. The process of developing a software product using software engineering principles and methods is referred to as____________. a. Software Engineering b. software Evolution c. System Models d. Software Models

Q3: write a C++ program to find by using function. Transcribed Image Text: y = X + .
Q3: write a C++ program to find
n!
by using function.
CCCCCCCO

Identify any three protocols that are insecure or vulnerable to attack, taking into consideration the fact that the organization’s users depend heavily on the network to conduct their daily business.

Define the characteristics that are necessary to test-driven development. In the event that you wanted to utilize it as a teaching tool at your institution, how would you change it?

In Python: What gets printed by executing the following code? Transcribed Image Text: What gets printed by executing the following code?
def main () :
list1=[‘a’,’b’,’fadi’]
list2=[‘c’,20]
list3=list1[:2]+list2[:1]
print(list3)
main()

Transcribed Image Text: Which of the following do you use to check the number of rows affected by an
|UPDATE
statement?
Answers:
a, SQL%FOUND
b. SQL%NOTFOUND
SQL%COUNT
C.
d. SQL%ROWCOUNT

Using a loop statement, write a segment of code (Not a complete program) to compute and display the product of all the numbers between 1 and 10 inclusive
nt: 1*2*3*4*5*6*7*8*9*10=3628800

Which of the following structures describes the design of tables, columns, and relationships between tables in a database? 1. database schema 2. table template 3. relationship diagram 4. relational model

If physical security and information technology (IT) security are to be implemented, controlled, and maintained in an ordered and consistent manner, when do they need to collaborate to do this?

Solve completely and explanatory Question 2 Transcribed Image Text: •2. Considering all 4 1/0 ports, what would be the
total number of I/O pins available on the intel 8051
chip?

C++ Draw the flowchart and create a program that will accept the length value in meters and print its equivalent in yards. The conversion values are 1meter=100cm 1ft=12in 1in=2.54cm 1yd=3ft

If two classes are defined “Parent” and “Child” then which is the correct type upcast syntax in C++? a) Parent *p=child; b) Parent *p=*child; c) Parent *p=&child; d) Parent *p=Child();

Transcribed Image Text: Q2
(a)
Create an assembly program to prove Last In First Out (LIFO) method in STACK for
8086 using TEN (10) memory address or TEN (10) data.

Transcribed Image Text: The execution of SUB AL, BL is performed by
O a.
BIU
O b. both EU and BIU
O . EU
O d. neither EU nor BIU

Using a Smart Meter IoT example, describe the deployment and operational perspective, resources, services, virtual entities, and users in an IoT system. Describe the many characteristics and limitations of IoT.

How to make a file upload faster on the server like Google drive from a PHP Application? what type of change do I need to do on WHM as well?

What is the solution for this question Transcribed Image Text: Select the header of a method that
accepts two integer parameters and
returns their fraction as a double
value. *

class Output { public static void main(String args[]) { int x = 3.14; int y = (int) Math.abs(x); System.out.print(y); } } The output of the above Java code is ?

A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose? Error detecting protocols explain?

Write a function called max_digit that takes any integer x and returns the maximum digit in the number x. E.g., if x = 4585, then the function will return 8.

Transcribed Image Text: What is the value of X?
ed
float X = 28 / 8.0 + 2;
out of
O 4
question
O 6.0
O 5.5
O 5.0
CO

1) The simplified version of the Boolean function,
F(x,y,z)=
x’y’z+x’yz+x’yz’+xy’z’+xyz+xyz’
, can be written as:

2) The simplified version of the Boolean function,
F(x,y,z)=
x’y’z+x’y’z+x’yz+x’yz’+xy’z’+xyz’
, can be written as:

Create the logic circuit diagram for NOT [(x AND y) OR z]. Create the image in logic.ly or draw on paper clearly and take a photo. Please explain the steps

Determine whether the given identifier is valid or not. If it is not, change it to make it valid 1)S.W.A.T 2)doubleOf3 3)7Hundred 4)_student_age 5)yenTo$ 6)hoursPerWeek 7)&&timeCheck&& 8)patient–height 9)totalCount 10)speed limit

1- Which of the following refers to a visual guide that clearly identifies the location of the main webpage elements? a. Sitemap b. HTML Text editor c. Hyperlink d. Wireframe

Transcribed Image Text: What is conditional probability?
If we know that P (A) = 1/4, that P(B) = 1/2, and that P(B|A) = 1/2, what is P (A|B) ?
%3D

None Transcribed Image Text: Identify the machine learning algorithm that
belongs to the reinforcement learning
algorithms.
Choose an answer
A Q-learning algorithm
Naive Bayes
C K-nearest neighbors
Apriori algorithm
B

Write a assambly program that compares days of a week and also show the message of invalid day. How switch selection works in this scenario. assembly language program in emu8086

Given this DFA, how do I convert to regular expression using Arden’s Theroem? Please show all work Transcribed Image Text: b
a,b
A
D
a
b
a
B
a
C

200. The five components that make up a data communications system are the message, sender, receiver, medium and a. protocol b. Code c. connecting device d. both a and b

Which of the following is a significant e-commerce function? encrypting orders using SSL b. putting things in a shopping cart c. purchasing and selling goods d. none of the above

What is the output of the following code segment? s=1; while(s < 4) ++s; Write("{0} ", s); a. 1 b. 4 c. 1 2 3 4 d. 2 3 4 Please help with the following: What do the following commands do in the Linux cmd line: stat (to be practised in conjunction with touch) touch (-d -t -m -a) pwd Which of the stack operations must be supported in a linked list implementation ? push and pop push and peek pop and peek push, pop, and isEmpty all of them True or False. “Suppose a web page consists of images and texts. A client will send one request message and receive four response messages, if the user requests that webpage.” Using a Smart Meter IoT example, describe the deployment and operational perspective, resources, services, virtual entities, and users in an IoT system. Describe the many characteristics and limitations of IoT. Transcribed Image Text: 1. Compares the features and capabilities of .PNG, .GIF, and .JPEG formats ? 2. What is page description language? Give an example of a page description language? Transcribed Image Text: The GIF image file format is a. vector image file format O b. all of them O. HDR image file format O d. color indexing file format What is it about paperwork that is so critical to a successful criminal investigation? Make a list of the bare minimum non-computer-specific documentation that is needed for a particular case. Transcribed Image Text: The Max flow on edge E-T that can be. used to achieve total max flow is Select one: ? ?.2 b. 1 ?. 3 d. 4 2. 28. ___________ is a type of transmission  impairment in which the SIgnal looses strength due to The resistance of the transmission medium. a. Attenuation b. Distortion c. Noise d. Decible Which of the following are common methods for gaining support for Linux? a. HOWTO documents at www.tldp.org b. a local Linux User Group c. Internet newsgroups d. all the above 4 ROM electrically erasable, uses standard system voltage for erasing and programming, allowing it to be reprogrammed inside a typical system: ???????? factory-programmed ROM field-programmable ROM Flash memory boot-block flash PROGRAMMING LANGUAGE: C++ CODING. Given the comment, write the equivalent c++ code Transcribed Image Text: lla statement that test of the gender is f, thus sets maternity_leave identifier to true; Short notes placed in different parts of a program explaining how those parts of the program work are called . 1. comments 2. reference manuals 3. tutorials 4. external documentation Which of the following is a significant e-commerce function? encrypting orders using SSL b. putting things in a shopping cart c. purchasing and selling goods d. none of the above please solve this important, thanks Transcribed Image Text: Question 2: State down the algorithm to calculate the factorial using FOR LOOP and compare your work another algorithm of your choice. Q 1. What are all the different types of logic families, Explain any one of the given schematics Two input nor gate using RTL Two input Nand gate using D Transcribed Image Text: A. Write a program in FORTRAN 90 to compute the value of s from the series below: s = x + x2 + x3 + + x30 is Transcribed Image Text: The symmetric closure of the relation R={(1,1),(1,2),(2,2),(2,3),(4,4)} on the set {1,2,3,4} is: Select one: O a. {(1,1)(1,2),(2,1),(2,2),(2,3)(3,2),(4,4)} O b. R O c. {(1,1),(1,2),(2,1),(2,3),(3,2),(4,4)} O d. {(1,1),(2,2),(3,3),(4,4)} In CSS3 which of the following selector is used to select and style when you place mouse over it? a. focus b. hover c. mouse d. all of the mentioned mobile programing,android studio,java Transcribed Image Text: To import Room class from android, which from the following is correct O Import android.room.Room O Import androidx.room.Room O Import java.room.Room O Import java.util.Room Javascript A __________ loop looks at a comparison and repeats until the comparison is no longer true. Group of answer choices a. do while b. loop c. while d. for When a partition on a hard drive has been formatted with a file structure, the same system must be used in all partitions on the hard drive. True or false? What is Big Data? What is a NoSQL database? What are Web 2.0 applications, how are they related to Big Data, and why can’t these applications use a relational database? Transcribed Image Text: 1. Alcohol dissolved in water is an example of a solution. a. solid in liquid b. liquid in liquid c. gas in liquid d. liquid in gas True or false Transcribed Image Text: Dijkstra’s algorithm can be used to calculate the shortest path from the source node,1, to every other node in the graph below: 5 6. I need the answer as soon as possible Transcribed Image Text: Prove that PCP with two lists x = (01, 1, 1), y = (01°, 10, 1′) has no solution. If S = {1, 2, 3, 4, 5 }, A={2 ,4 } B={1, 3, 5 } C= {2, 5}. The sets corresponding to event (A’ or C) is Blank 1 The task of machine learning may involve the expertise of several individuals, each with a special role. Identify these roles and summarize their activities towards this goal of machine learning. Transcribed Image Text: 3. Draw a flowchart that will display the first n Fibonacci series. Sample output: Enter n: 10 0, 1, 1, 2, 3, 5, 8, 13, 21, 34 5. Snapshot of the dta in the database at a given instant of time is called a. Database Schema b. Database Instance c. Database Snapshot d. All of the above Transcribed Image Text: Salesforce Assignment: SOQL Create an Inline Salesforce object query language to find the Account Name and contact Name where the Account Name is equal to the Tes?’. Question 4 Is unit testing possible or even desirable in all circumstances? Provide examples to justify your answer. Question 5 Why is a highly coupled module difficult to unit test? You are given the following assembly language statements: MOV AX,387 SHL AL,2 What will be the values in AL, AH, and AX registers (in decimal) after executing the above code? I am beginner in c language and when I running a program that print hello I am beginner in c on console . I am getting error please help me 3 Transcribed Image Text: In the encoding scheme, the bit duration is not divided into 2 halves a. Biphase O b. Pseudo Ternary O c. Polar RZ O d. Manchester consider the value of a=13and value of b=36 a=a+b b=a+b c=a+b d=a+b+c print (c) print (d) what is answer for the statement print(c)? what is answer for the statement print(d)? As an example, consider a packet that is transmitted from one end system to another. Indicate in detail each of the four types of delays that a packet may encounter. Write a program that sort an integer array in descending order.Make your own comparator for the sort STL function and use that. Given array: {1,12,-4,2,13,9} Show output after sorting. C++ Create a currency converter program in C++ which takes input value of currency A from user and prints the converted value in currency B. Given: 1 A = 123 B. What are the four most crucial characteristics for software development? Please share your thoughts on what other four qualities should be included in the software development process to increase performance. Transcribed Image Text: 12 Simplify the following expression in Product of :Sum F= A’B’C’D’ + A’B’C’D + A’B’CD’ + A’B’CD B O A O ‘A’B ‘AB No Correct Answer O C code which returns the largest of the 6 integer number array according to integer array sent into it and the array length. Also include minimum, sum and average functions. Computer Science: A common cause of nonlinearity in advertising response models is a declining marginal effect, in which each additional ad obtains less exposures than the prior ad.True or False. The UDP protocol is a messaging protocol. Token-based protocols like TCP are known as byte-oriented protocols. Which protocol, UDP or TCP, should an application employ to safeguard the message’s boundaries? Handley is in problem. Since its school teacher gives work to. m to find his to take user input for a string in c language and print that on console Look for 5 examples of expressions (Infix as ex. A * B + C) then design the Binary Representation Tree including the Prefix, and Postfix expression based on binary tree A printed document reader which scans the characters and then encodes them in a computer-compatible code for direct transmission to the computer is called Kurzweil Data Entry Machine (KDEM) explain? Handley is in problem. Since its school teacher gives work to. m to find his to take user input for a string in c language and print that on console Aside from being a major improvement over previous data management techniques, database systems also offer a number of disadvantages. Take a look at some specific examples of these significant disadvantages. Write a program whose inputs are three integers, and whose output is the smallest of the three values. Ex: If the input is: 7 15 3 the output is: 3 1. Which among the following function can be called without arguments? a) void add(int x, int y=0) b) void add(int=0) c) void add(int x=0, int y=0) d) void add(char c) Give the declaration for two variables called count and distance. count is of type int and is initialized to zero. distance is of type double and is initialized to 1.5. Asymmetric vs symmetric encryption methods both have advantages and disadvantages. What factors need to be taken into account when making a decision on the kind of encryption to be used? Transcribed Image Text: Which is the correct syntax of postfix unary operator for ++ (increment) operator? Select one: a.void operator++(int notused) b.void operator + (int notused) c.void operator+() d.void operator++() how to make a madlibs game with wpf gui and c#. There must be three forms and one gets picked randomly with the inputed words into one of the forms. I need the answer as soon as possible Transcribed Image Text: 12. The memory address of the last location of 8 Kbyte memory chip is FFFFH. Find the starting address. 121. In categories of data modeling, the low level data models are also called a. conceptual data models b. physical data models c. triggered data models d. logical data models Transcribed Image Text: Write a java program to insert a word in the middle of another’ string. Example the given string is Hello World. Output Hello I am Rdj World Without using any pre-defined method. Don’t copy from internet Two array is given and you check whether these array is equal or not in java. Without using any pre-defined method As an example, consider a packet that is transmitted from one end system to another. Indicate in detail each of the four types of delays that a packet may encounter. A ball is thrown with an initial velocity of 70 km per second, at an angle of 35° with the horizontal. Find the vertical and horizontal components of the velocity. Write a program in Php programming language and you have to take a number from user and you take the reverse the number and print the reverse of that number Write a function called max_digit that takes any integer x and returns the maximum digit in the number x. E.g., if x = 4585, then the function will return 8. Find the N, Z, OV, DC, C flags and value stored in RAM address 0x010 for the followings: MOVLW 0xE9 MOVWF 0x10, 0 MOVLW 0xED MOVLB 0 ADDWF 0x10, 1 45. Internet explorer is used to a. access the internet b. explore the system resources c. perform maintenance on the hard disk d. navigate file and folders on the computer Look at the following code, which is the first line of a class definition. What is the name of the superclass? What is the name of the subclass? class Canary(Bird): Transcribed Image Text: Q3: Answer briefly Give the main difference between design (1) and design (2) Planning Analysis Design Analysis Design prototype Design Implementation Implementation System 2 END OF TEST Transcribed Image Text: ?Breadth-first search is considered to be optimal when there is less number of nodes all step costs are unequal all step costs are equa None of these Handley is in problem. Since its school teacher gives work to. m to find his to take user input for a string in c language and print that on console Transcribed Image Text: A person who infringes on a copyright can face up to 5 years in federal prison and a fine of $250,00. Select one: O True O False Python Automation Script: write a python automation script that scrape a website: “https://www.goodreturns.in/gold-rates/delhi.html” get the latest gold rate and change from previous day, and print the result on the screen. In C++ language write a program to take input two boolean values from the user and in output print the logical AND and logical OR of both the input values. Instruction: Present a specific example for divisibility tests and demonstrate it. A. Methods for divisibility by 13. Method 1. (Same as method 1 for divisibility by 7) Method 2. (R+4L) As an example, consider a packet that is transmitted from one end system to another. Indicate in detail each of the four types of delays that a packet may encounter. Transcribed Image Text: Write a python program to accept 4 numbers P,Q,R,S as input from user if first 3 numbers are odd, Calculate Z=((7.5*PR)+ (4.25*Q$))/3.5, Otherwise calculate Z=((RP *0.5)/S ) 214. The probability of failure-free operation of a software application in a specified environment for a specified time. a. Software Reliability b. Software Quality c. Software availability d. Software Safety Transcribed Image Text: Explain the difference between flowchart And the pseudocode And give an example and solve it by two methods So the example includes a sentence if loop assigment None Transcribed Image Text: What layout manager should that you use so that every component occupies the sarme size in the container? a Gridlayout a BorderLayout any layout a FlowLayout ARM Assembly: I am trying to write a program to find the mean of 10 unsigned integers. I primarily need help defining the array in the data area. Thank you. Transcribed Image Text: Draw a typical frame diagram (not frame format) used in a network. This means what a typical frame should have when you send to a destination. 13. Write a Splunk query that would return the average of given field in a request included in an index over a period of time with a span of 15 seconds. Q- Explain these Abstract class VS Concrete Class Interface (OOP) VS Interface ( GUI) External Interface VS Internal Interface Aggregation VS Composition Polymorphism VS Inheritance Subject: Software Design and Architecture What method can you use to test memory on a Windows XP system by using the Memory Diagnostics tool without having to install Windows 7 or Vista on the system? Generate an intermediate representation of the given expression. How can it be represented using indirect triples? (a – b) * + ((b/d) * (c-a)) note: subject: compailer concepts deptt: cs/It What are the four most crucial characteristics for software development? Please share your thoughts on what other four qualities should be included in the software development process to increase performance. Only___________ data members of a class can be accessed by a derived class. a. Private and public b. Public and protected c. Private and protected d. Private, protected and public Solve it , only if you are really very very good in maths. Otherwise i will downvote. Computer science Transcribed Image Text: sin (n cosº x) 43 Evaluate lim 2 Aside from being a major improvement over previous data management techniques, database systems also offer a number of disadvantages. Take a look at some specific examples of these significant disadvantages. How does a vulnerability scan assess the existing state of security? What is the most widely used vulnerability scanner? Is it an application that companies look for on employment sites? Please output the operational result of the following command: sorted (set(‘You need Python.’))[2]. (Directly write down the corresponding characters, without any symbol or mark like single quotes or double quotes) 105. CPU is the main part of the computer system is an abbreviation of a. common processing unit b. central processed unit c. central processing unit d. common processed unit Data Structures 1 Transcribed Image Text: Use the template to show the different operation of Queue DS, by using: a) Queue interface (from JCF). — –> ONE JAVA CLASS (TEST)

Transcribed Image Text: 18
The strategy that is used to allocate the smallest hole that is big enough is called:
None of the answers
Worst fit
First fit
Best fit

2.1 What can be the consequences of a condition at an interface under which more input can be placed into a data-holding area than the capacity allocated, overwriting other information?

Choose one topic from this week’s reading (for example, how to report time) and discuss the coding guidelines. Include compliance considerations, types of procedures, and the rules associated with coding.

Transcribed Image Text: When and why would you and would you not use one of the following:
• Twofish
• Blowfish
• Message Digest
• Secure Hash Algorithm
• RIPEMD

74. When programmer makes a mistake in sequence of given instruction, error occurs in a program which is a. system error b. logical error c. described error d. unidentified error

Write  use cases scenarios for each following functionality: (a) Room reservation (b) Changing the properties of a room (for example, from non-smoking to smoking) (c) Customer check-in (d) Customer check-out

Transcribed Image Text: What is the output of the following code fragment?
int i = 3, j = 5;
if (i = j)
cout << "Same"; else cout << "Different"; Transcribed Image Text: Write a statement that defines a named constant named SPEED. The constant’s data type should be int, and its value should be 75. const int SPEED 75; Subject code – rcs507 What is the 16-bit compiler allowable range for integer constants? A) -3.4e38 to 3.4e38 B) -32767 to 32768 C) -32668 to 32667 D) -32768 to 32767 None Transcribed Image Text: QI) Write a program to enter a number from the keyboard then print “YES” if the number is divisible by (3 and 5), otherwise print “NO”. Which one is the result of BCD addition? (4 )10 + (6) 10 = ( ? ) BCD ( 00010000 )2 ( 00010001 )2 ( 00100000 )2 ( 00001010 )2 str is a String object. Write Java statements that finds the number of the white-space characters in str. Write only the Java statements that performs the above task, nothing else. Transcribed Image Text: QUESTION 3 When identifying Tables in a query, you should All of these Identify the Server Instance None of these Identify the schema Identify the Set Theory In Linux with chmod, you can change permissions for a specific level of users add the execution bit for the group and leave all the rest unchanged True or False Transcribed Image Text: Rewrite a and b in index notation, and rewrite c and d in direct notation. a. k O m + Y™N b. tr(Q)(A·x) c. X¡BjkYk d. XmAikYmBxj Computer science lab Please write a a php scripts with html to merge two arrays. Please use the inline php inside the html. Solve AsAP only in php and html No plagiarims Transcribed Image Text: When we type a reference, we design a pattern for using the reference. Explain down what a topics that can be included in a pattern? Write a program in JavaScript and make a function and a second function which check the pass argument is of function type or not. You can use instance of oprator Inductive learning involves finding a hypothesis that agrees well with the examples. Ockham’s razor suggests choosing the simplest consistent hypothesis. The difficulty of this task depends on the chosen representation.(True/False) Please provide Handwritten answer Transcribed Image Text: Research Object Oriented Programming. What are its basic features? Why is it so popular? What is your experience in programming an OOP language? Python Program to Print the Fibonacci sequence [taking no of terms from user | | Transcribed Image Text: Python Program to Print the Fibonacci sequenceltaking no of terms from user 187. The mode in which each station can send and receive data but not at the same time is called a. Half Duplex b. Simplex c. Full Duplex d. Duplex Transform the scene in the world coordinate system to the viewing coordinate system with viewpoint at (1;1;2). The view plane normal vector is(-4;2;5) and the view up vector is (1;4;0). Dim inventory As IO.StreamReader is a declaration statement for a procedure-level variable named inventory. The variable will be used to read data from a sequential access file. True or False In ____________ technique, The I/O module and main memory exchange data directly without processor involvement. a. Random memory access b. Direct memory access (DMA) c. Programmed I/O d. Interrupt-driven I/O Structure : defines how data are structured, e.g., files, relations, objects. Integrity rules : define how data are kept correct and consistent. Operators : define how data are manipulated . The UDP protocol is a messaging protocol. Token-based protocols like TCP are known as byte-oriented protocols. Which protocol, UDP or TCP, should an application employ to safeguard the message’s boundaries? How to create a four-dimensional array (3, 3, 3, 3) with 81 components using MATLAB and use nested loop to assign random values (of 1, 2, 3) to each component? Transcribed Image Text: What is the output after executed the following statements int x-2, y-5; cout<<((x>>1) & y )< % > C
A – S S %
C – < The address decoder ensures that only one IC is active at a time to avoid a bus conflict caused by two ICs writing different data to the same bus. why? When it comes to downloading and uploading files, both HTTP and FTP may be utilized. Include at least one commonality and one difference between the two procedures in your response. Transcribed Image Text: QUESTION 1 Consider the following hypothetical search space and trace using the depth-first-search algorithm on it where the goal is node 13 (10) (11) 13 (14) (15) (DiscreteMath) Transcribed Image Text: Let E1 = {a}, E2 = {a, b} and N be the set of natural numbers. Using a bijective function, prove that | 2*| = |N|. Transcribed Image Text: Question: Generate 10 opportunities for innovation based on an area of your own personal passion. Use can use any method of generating idea discussed in class. Answer: Write a program in C++ language to sorting the 1D array size 8, (descending). Assume the array as float a [8] = {4.3, -2.2, 33, 51, -39.5, 2.9, 6.5, 78}. Solve it fast fast plz Transcribed Image Text: Write a single java program by taking two variables num1 and num2 with values of your own and perform Addition, Multiplication, division. Hello help me writing a program that takes the text file name from the user and reads the contents of that file. File123.txt Data: Welcome to programming. We are programmers. Q. No2. Provide two arguments each explaining why delays should be kept short for everyday tasks of a user, using short-term and working memory as the basis for your argument 43. Ctrl + Alt + Del is a. an invalid key combination b. recognized by windows only c. used to close the active window d. used to refresh a program How does TACACS+ work? In what settings is it most likely to be found? What are its advantages and disadvantages? When would you recommend using it over RADIUS or Kerberos? Write a java program to find the sum of odd elements in an array; [15, 20, 3, 31, 40, 60] oddsum = 15 + 3 + 31 total = 49 Question 5. a. Data 01110001101010100 is received where receiver uses odd parity. Is the data corrupted. Justify your answer b. Give steps of ARP mapping from IP to MAC address. not copy but own Asymmetric encryption methods, such as those used in public key cryptography, provide many benefits. What is the process by which the public key encryption is implemented? Transcribed Image Text: A Click Submit to complete this assessment. Question 25 A category of lexemes is O1. Identifier O 2. Rule O 3. Grammar O 4. Sentence EN ET/1-/TV 17. ________ is a type of transmission impairment in which the signal loses strength due to the resistance of the transmission medium. a. Attenuation b. Distortion c. Noise d. Decibel Which tag is used to define the list items in two of the different types of lists? (Only provide the opening tag as the closing tag is optional in HTML5) Provide the output for the given C++ code about sizes #include using namespace std; int main() { cout << sizeof(char); cout << sizeof(int); cout << sizeof(float); return 0; } Transcribed Image Text: Explain how to create a new node holding data “34” and making it part of the list. Clarify with the help of pictorial representation of the process No plagiarism Transcribed Image Text: When we type a reference, we design a pattern for using the reference. Explain down what a topics that can be included in a pattern? Transcribed Image Text: When 3223110 is converted to floating point notation, the biased exponent is A. 0000 11102 O B. 1000 11002 O C. 0000 11112 O D. 1000 11012 Cse System testing and logic based testing Demonstrate by means of truth tables the validity of the following theorems of boolean algebra Associate Laws ( A+B) + C= A+ (B+C) ?????? to format a partition 1 of disk 2 we use the command ???????? mkfs –t vfat /dev/sdb2 mkfs –t vfat /dev/sdb1 mkfs –t vfat /dev/sda2 mkfs –t vfat /dev/sda1 Transcribed Image Text: Select the value that is equivalent of Single Precision Floating Point (SPFP) presented in hexadecimal “OX3E600000 “: O +(0.00111)2 O +(0.0011)2 O +(110.00)2 O +(1100.0)2 O +(0.001111)2 7. An inter-task dependency in which two tasks must finish at the same time is referred to as a. Start-to-finish (SF) b. Finish-to-finish (FF) c. Finish-to-start (FS) d. Start-to-start (SS) Write a program in c to calculate the power of a number (a^b)  and you have to take the base and the power from the user and print the result. Consider yourself the iTunes store’s database administrator. How could you utilize predictive analysis to figure out which musicians and films will be the most popular in the next year? Polymorphism? Q2: write a program with visual basic code to give the evaluation for different marks as follows. Excellent 90-100 Very good 80-89 Good 70-79 Medium 60-69 Pass 50-59 Fail 0-49 Transcribed Image Text: The user interface screen which performs specific action in application is ed O a. Activity out of O b. ART question O c. xml O d. ADB Code a JavaScript callback function for the Array.map method to evaluate an array of integers identify the integers that are Prime numbers return the Prime numbers in the new array Write  use cases scenarios for each following functionality: (a) Room reservation (b) Changing the properties of a room (for example, from non-smoking to smoking) (c) Customer check-in (d) Customer check-out Explain the below figure Transcribed Image Text: Ready queue P3 P7 PO P9 P1 Memory CPU Bus PC P3’s code Data IR registers P7’s code SP Process status info Flags in 80886 microprocessor  Write an ALP to evaluate x.(y +z) where x = 10H, y = 20H and z = 30H and store the result in a memory location 54000H. 65. Whose role is it to determine the requirements and design for a database? a. Database analysts b. Database administrators c. Both A and B. d. Neither A or B. A digital system has a clock generator that produces pulses at a frequency of 80 MHz. Design a circuit that provides a clock with a cycle time of 50 ns. i need the answer quickly Transcribed Image Text: Q11 Write oop program to read 10 numbers and find the summation of first five numbers, and multiplication of second five numbers 1) A ___________ is a line of code inserted into a script or application that executes in response to an event. a) Trojan b) Virus c) Logic Bomb d) Worm Transcribed Image Text: 1. Apply Strassens’s algorithm to compute the product of the following matrices. Show all the steps clearly. 1 3 A 7 6. B = 4 2 8. Using a Smart Meter IoT example, describe the deployment and operational perspective, resources, services, virtual entities, and users in an IoT system. Describe the many characteristics and limitations of IoT. List some of the phrases that are incompatible with the OSI model of thinking. Nothing in the code dictates that the functioning of one layer requires the knowledge of another. professionals, thank you for your time. Otherwise, downvoting is unnecessary because of the already-existing solutions. Interaction with a computer Provide examples of cutting-edge designs combining menus with direct user interaction. How would you manage the flow of data between client and server apps when building a multimedia streaming network application for a client-server communication paradigm? What tools will you use? q16 Transcribed Image Text: Write a recursive function which implements the following mathematical recurrence: f(0) = 2 f(1) = 3 f(n) = 3 * f (n-1) – 2 * f(n-2) Discuss the most frequent causes of risk in IT projects, as well as strategies for dealing with them. Explain how to estimate risk using decision trees and Monte Carlo analysis. 223. The probability that a software application is operating according to requirements at a given point in time. a. Software Reliability b. Software Quality c. Software availability d. Software Safety Please provide Handwritten answer with explanation Transcribed Image Text: Following is the K-map table for y(A, B) = B’ : ? ? A0 1 A 0 1 True O False Examine the significance of database backups, as well as their unique features. methods of recoupment After that, go through the steps that must be included in back-up and restoration strategies. T/F 1. Only constant values are applicable in switch structure. 2. In switch character constants are automatically converted to float values. 3. One switch statement can can multiple default statements. Subject: Database Transcribed Image Text: Q- Write the responsive code for following output ,First div is spread on full screen. nt : Use Bootstrap The first div The second div This is for my computer information systems class Transcribed Image Text: 50 Which type of storage media is the cheapest? O DVD O Magnetic tape RAID O Blu Ray Su Transcribed Image Text: Modelling of the requirements is achieved by using Select one: a. Use Case Model Ob. Waterfall Model O c. Spiral Model O d. No modelling is performed USE OF TERNARY OPERATOR IS MUST ELSE I DISLIKE Write a program to take user input for two number and then find which number is greater The langauge is JAVA Transcribed Image Text: For a given data rate, direct-sequence systems, compared to standard RF systems, use Omuch less bandwidth Omuch more bandwidth Oabout the same bandwidth Oapprosimately double the bandwidth Transcribed Image Text: Explain the difference between flowchart And the pseudocode And give an example and solve it by two methods So the example includes a sentence if loop assigment Transcribed Image Text: H, W, Qil\ Implement F (A, B, C, D) = E 1, 3, 4, 8,15 by using multiplexer (8*1) if ABD selection switches, and C is inputs? Jacob want to find the average of the nuneric character present in alphanumeric string. Your task is to help him and take out him from this problem. Use kotlin language. In Octave: Find the solution of the quadratic equation 6x 2 + 8x – 2 = 0. Note: Use quadratic formula and not any function. Attach code and Output Screenshot. Transcribed Image Text: Find the truth table of this circuit and write the function: a) NOT A OR NOT OR Y C b) NOT AND OR NOT Y OR C The preferred method today of bot herders for command and control of zombies is to use. a. Internet Relay Chat (IRC) b. e-mail c. Hypertext Transport Protocol (HTTP) d. spam Why do many systems have a distinct cache for code and data, and how does the hardware determine if bytes of code or bytes of data are present in memory? An explanation accompanied by an illustration What is the need for software engineering in the first place? No overstatement can be made about how important it is in software development. 153. If communication software can be called the “traffic cop” of a micro communication system, then what should the modem be called? a. Link b. Park c. Bridge d. Interface Create a class of Company having private data members. Make all constructors along with setter getter. Also make a print function that can print all the information of that company. What optimization algorithm is not considered as bio-inspired algorithm ? Select one: a. Stochastic gradient descend b. Ant colony optimization c. Particle swarm optimization d. Differential evolution e. Genetic algorithm Project work is most successful in an organizational culture where all of the following characteristics are important except ______________________. a. member identity b. group emphasis c. risk tolerance d. control b) Print the given string 8 times along with line number.Print line number first and then the given string. Line number goes from 1-8. String: “Learning Loops.” In Ruby language. 1. Consider the header of this class: public class AList implements iList Which type of class is AList? (A. Interface class, B. Derived class, C. Base class, D. Generic Class) 1. Explain what a consensus protocol is and the problem that it solves. 2. Explain the main differences between PoS and DPoS. Explain the advantages and disadvantages of each one. 405. Allocation and deallocation of memory spaces are maintained by a module of operating system known to be a. Memory management b. Storage management c. System management d. File management You have sent a file from Host A to Host B, in which format that file will be received at Application layer? a. Packets b. Segments c. Data d. Frames One of the major components of a PC is the Central Processing Unit (CPU) which can be best described as: The area where all of the processing takes place explain? A process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication. What is the process here called ? Network in which each computer is either acts as server or a client is called a. dedicated server network b. peer-to-peer network c. metropolitan area network d. local area network 87. Current version of the Macintosh operating system is called a. Max OS System I b. Mac OS System X c. Mac OS System Y d. Mac OS System N Transcribed Image Text: Salesforce Assignment: SOQL Create an Inline Salesforce object query language to find the Account Name and contact Name where the Account Name is equal to the Tes?’. Transcribed Image Text: Understand the following picture and describe iterative queries. Server2 (Root Server) Recursive Query Resolver Query Query Response Server3 (Root Server Cliont1 Server1 terative Queries Server4 (Root Server) What language does the following grammar accept? S -> ABC A -> aA A -> a B -> bBb B -> bb C -> cCd C -> cd {Please solve}

Transcribed Image Text: Question 4) Sort the following list in alphabetical order using bubble sort algorithm? Show
all the steps of your solution?
[XH, WS, ÖA, ÜT, ?K, ÜY, IT]

Why do you think language is full of high-level abstractions? What are the ramifications of using high-level abstractions? What are some alternatives to the use of high-level abstractions? Be specific

If no node was encountered more than once, then the set of nodes and elements that we have passed through is defined as a closed path.

Select one:
True
False

Transcribed Image Text: Write a function that prints the sum of the values in the list. Use python
Sample Input
Sample Output
1-> 2 -> 5 -> 3-> 8
19

Given a string str, find the minimum numbers of deletions from the string such that all the substrings of the modified string are unique. Sample Input: “abcdad” Sample output: 2

Transcribed Image Text: 1- (123)s +(65)s = (?)s
2-(1740)s-(1234)s-(?)s
3-(16)s-(23)s.(10)s-(?)s
%3D
4-(356)s – (43)s = (?)s
5- (4457)s -(3210)s = (?)»
6-(123)s – (65)s – (12)s = (?)s
%3D
%3D

Transcribed Image Text: Which of the following relationships
models the following statement:
“Personal bank account is one type of
the general accounts” *
O Dependency
Association
O Generalization
O Realization

When it comes to a security service, which protocol layer is the most appropriate? Indicate in your response if the service seeks to maintain anonymity or whether it does not.

Make a program in java that takes the student control Enter name Enter Subject Enter five notes Average Relations between classes (association, aggregation, composition, inheritance), Simple inheritance and multiple inheritance

What is the solution of this problem? Transcribed Image Text: Given the following expression: !z
&& !x && !y. Which operand is first
evaluated?
!z && !x
!x && !y

in c++ how would i sort an array in ascending order by the last digit of the element for example [105, 234, 511, 48, 96] would be sorted to [511,234,105,96,48]

Sort the following using counting sort algorithm 3 4 5 2 3 1 6 3 2 1 5 5 2 4 1 show the steps on a piece of paper

Transcribed Image Text: IS THE MECHANISM THAT ENSURES THAT ONLY ONE PROCESS IS DOING CERTAIN EXECUTION AT ONE TIME.
Select one:
a.MUTUAL EXCLUSION
b.CRITICAL SECTION
c.RACE CONDITION
d.COMPETING PROCESSES
DOO

84. In the disk packs, the tracks are divided into smaller block of information containing large amount of information called a. blocks b. cylinder c. sector d. all of above

If something is true the inference system also proves it to be true. This property is called_ 1.completeness 2.Soundness 3.Both Soundness and Completeness Note: Select one answer between those 3

Computer science lab Please write a a php scripts with html to merge two arrays. Please use the inline php inside the html. Solve AsAP only in php and html

Identify any three protocols that are insecure or vulnerable to attack, taking into consideration the fact that the organization’s users depend heavily on the network to conduct their daily business.

Transcribed Image Text: What is the minimum number of bits needed in a PN sequenCe if we used
FHSS with total bandwidt=D100 KHz and channel bandwith=4 KHz
C10
abed paN

Transcribed Image Text: After the execution of the following program the content of the
register with address 410 is 59H:
ORG 410H
DATA DB ‘X’
Select one:
O True
False

The search should be done in this order: breadth first, depth second, and so on Which data structure would be best for implementing it? Choose one: a.Queue b.List c.Set d.Stack

C#Write a method MyMethod which takes an int parameter named x. This method calculates the sum of integers from 1 to x and returns the sum. Use a for loop.

Transcribed Image Text: What is the reflexive transitive closure R* of the relation
R = {(a,b), (a, c), (a, d), (d, c), (d, e)}? Draw a directed graph representing
R*.

Extend your discussion of whether a waterfall approach is suitable for the project by analyzing the waterfall methodology’s advantages and disadvantages in respect to the project mentioned in the article.

i need the answer quickly Transcribed Image Text: The statement “Text1.Backcolor = VBRE%” means
that, the color of background of text1 is changed
to Red.
Select one:
True
O False

Transcribed Image Text: Write a C++ program to read a 2D array of a[5][6], then count the number of 3 in each row and store the
result in 1D array.

Transcribed Image Text: QUESTION 15
An RDBMS is based on
O A semantic model for representing data
O None of these
O Predicate logic
O All of these
Set theory

Write Python Program .
 Input two integer A and B by user. 
Print A and B  in different line
Swap Numbers
Print A and B after swap in different line

Instructions: Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. TF Dynamic Web pages commonly use databases.

Transcribed Image Text: Write a java program to insert a word in the middle of
another’ string.
Example the given string is Hello World.
Output Hello I am Rdj World

Transcribed Image Text: In software copyrights, what gets copyrighted?
Select one:
a. Expression of idea, not idea itself
b. The idea itself
c. Expression of idea and the idea itself

recommender system that recomends games,  we have more than 1000 games in the catalogue and for each user there are 200 relevant games. which metric evaluation is best and why?

, I am trying to find a PowerShell script to return all disabled users including date disabled on Active Directory within a certain time period. Can someone please assist? Thanks

Transcribed Image Text: To understand what the system” .4
stakeholders expect from the system” is
:the definition of
Feasibility study O
Requirements elicitation and
analysis
Requirements specification
Requirements validation O

When it comes to a security service, which protocol layer is the most appropriate? Indicate in your response if the service seeks to maintain anonymity or whether it does not.

Computer science lab Please write a a php scripts with html to merge two arrays. Please use the inline php inside the html. Solve AsAP only in php and html

(CP10): The number of tokens in the following C code segment is switch(inputvalue) { case 1 : b = c * d; break; default : b = b++; break; }

Describe each of the following sets. a. {x ? R|?5 < x < 1} b. {x ? Z|?5 < x < 1} c. {x ? Z?|?5 < x < 1} Transcribed Image Text: Used a Decoder that include (3-inputs) to implement a Full subtractor; write down all possible of truth table and an complete designed circuit: * 1 Add file What does traffic congestion mean? Discuss the TCP congestion management algorithm. You must be aware of the difference between congestion control and flow control. Flow control is accomplished via how. 5. Which model is not suitable for large software projects but good one for learning and experimenting? a. Big Bang model b. Spiral model c. Iterative model d. Waterfall model Transcribed Image Text: Write a delay subroutine program for SAP-II computer to introduce a time delay of 1 millisec using only one register. Let the system frequency is 2 MHz. 3. Which project is undertaken as a consequence of a specific customer request? a. Concept development projects b. Application enhancement projects c. New application development projects d. Application maintenance projects Evaluating Sorts Given the following array: 41, 32, 5, 8, 7, 50, 11 Show what the array looks like after the first swap of a Selection Sort in ascending order. Implement the program in c++ Transcribed Image Text: 4. Implement basic functions of queue, i.e., enqueue, dequeue, front and rare by considering: enqueue 1, enqueue 2, enqueue 3, dequeue, dequeue. No plagiarism Transcribed Image Text: When we type a reference, we design a pattern for using the reference. Explain down what a topics that can be included in a pattern? q7) In which of the following Queue insertion and deletion can be done from both the ends. a. Circular Queue b. Linear Queue c. Priority Queue d. Double Ended Queue identify any five disciplines involved in designing and developing a mobile application for children with an autism spectrum disorder. Motivate the importance of the involvement of each of these disciplines. Transcribed Image Text: Q10/the minimum sum- of- products for the following function is F(A,B,C,D,E)=Em(0,3,5,7,9)+Ed( 2,4,6,10,15)using Quine – McClusky method : * ?B’?A?’D+A’B’C+A’CDE A’BC’D’E+A’B’E’+A’B’D+A’B’c None of them O A’CDE+A’BC’D’E+A’B’E’+A’B’D+A’B’C ‘?’?’+?’?’?’+A’B’ D+AB’C A key feature of hybrid IDPS systems is event correlation. After researching event correlation online, define the following terms as they are used in this process: compression, suppression, and generalization. Q2.Why is it that in so many systems, the cancel button in a dialog box appears to be unresponsive? What quality aspects do you think were ignored in these systems? python i knew it is very basic question but i am not able to solve take two input from user then print both in same line without using + operator None Transcribed Image Text: Except for the . function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result IF O AND O OR O How much of an effect do you think the GDPR privacy legislation will have on your code and overall software application? Is there a good reason or a bad reason? Aside from being a major improvement over previous data management techniques, database systems also offer a number of disadvantages. Take a look at some specific examples of these significant disadvantages. 76. Program which is readily available for computer users as a part of software package is classified as a. library program b. program library c. software library d. directory library Is it true that a mode switch between two threads within the same process involves less work than a mode switch between two threads in different processes? Elaborate your answer. Discuss how computer technology may help sectors including education, restaurants, shopping malls, and online shopping, among others. How will you utilize these technologies if you wish to establish these businesses? Using Excel, or a spreadsheet of your choice, create a degrees Fahrenheit to degrees Celsius conversion table for the following temperature range: from 50F to 130F in increments of 5F Many businesses now store all of their critical data on the cloud. Is this a good concept, and if so, why? How essential is it to keep in mind (? Examine the significance of database backups, as well as their unique features. methods of recoupment After that, go through the steps that must be included in back-up and restoration strategies. Create the code that will allow you to define a variable that will be used to read data from a sequential access file. inFile is the name of the variable. How many levels are there in the Internet protocol stack? What function do the various levels play? How does a router manage the many layers of the Internet protocol stack? What is the definition of a computer network? What are the many components that make up the system? List the objectives for establishing a computer network in a concise manner. Transcribed Image Text: 1. Find a pda that accepts the language : (anb2n :n>= 0}
2. Show the sequence of instantaneous descriptions for the acceptance of aabbbb by the pda.

Transcribed Image Text: What, in general terms, is the distinction between computer
organization and computer architecture? List and briefly define
the main structural components of the computer and the
processor.

Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. Data___________refers to the accuracy of data.

397. Operating systems’ module that allocates memory space to programs in need of that resource, is known as a. Command management b. Resource management c. Memory management d. Integration management

Design a user manual for Snack Vending machine keeping audience and communication guidelines in mind Note: do not copy paste answer from chegg  and answer should be long with pictures

There can be significant problems if the database is not checked or outdated information is inserted in the database. What problems might occur if a student database is not maintained?

Q_2 The English alphabet contains 5 vowels and 21 consonants. Find the number of 5-letter words (with or without any meaning) composed of 3 different consonants and 2 different vowels.

Please tell me in step by step what this for loop does n = 0 for i in range(10): for j in range(10): n = n + 2 print n

Can someone help me explain how ETL strategy is used when migrating data a missing data to a Data Warehouse ? Probably better with a process flow . Thank you.

What is the issue with the following lock variables in term of concurrency. 1. while (FLAG == FALSE); 2. FLAG = FALSE; 3. critical_section(); 4. FLAG = TRUE; 5. noncritical_section();

Transcribed Image Text: What is conditional probability?
If we know that P (A) = 1/4, that P(B) = 1/2, and that P(B|A) = 1/2, what is P (A|B) ?
%3D

can i insert the mathematical equation in Microsoft word * QO ves B O o Transcribed Image Text: can i insert the mathematical equation in
Microsoft word *
YES
NO

Q3: write a C++ program to find by using function. Transcribed Image Text: y = X + .
Q3: write a C++ program to find
n!
by using function.
CCCCCCCO

Q3. Parse the input string bbbcbba with bottom-up parsing using the stack method. Transcribed Image Text: S? abs
S – bcS
S ? bbS
S ? a
S ? cb

Q.3) write Java program that will draw horizontal line using the symbol & which consist of 7 and just like the figure below: & & & & & & &

Transcribed Image Text: IN RESOURCE ALLOCATION GRAPHS; THE GRAPH EDGE DIRECTED FROM PROCESS TOWARDS A RESOURCE INDICATES THAT THE RESOURCE HAS NOT BEEN
GRANTED YET.
Select one:
a. TRUE
b.FALSE

Many people think that cloud computing may lower overall computing costs and improve “green computing” (environmental friendly). Why do you think this is the case? Please explain why you disagree.

write all functions f: {1,2} -> {a,b,c,d} (in two line notation) how many functions are there how many are surjective how many are injective how many are bijective please help

I need the answer as soon as possible Transcribed Image Text: Php
Write a program to print the fins the square
roots of 0,626,7262,8282,929,020,415 and
print them in separate lines

Upgrade an existing 2008 server to a 2016 server. What are the areas that will be considered for implementation? Make a list of any four actions you can think of.

Write MATLAB program to take input height and radius of a cylinder from user and print the volume in output. Show output screenshot of command window else I will dislike.

T/F 1. Only constant values are applicable in switch structure. 2. In switch character constants are automatically converted to float values. 3. One switch statement can can multiple default statements.

None Transcribed Image Text: ???? ?????
The elements ofthe set {x: x is an integer such that x² – 3 = 0} is { v3, v-3 }
Ture
False O

The search should be done in this order: breadth first, depth second, and so on Which data structure would be best for implementing it? Choose one: a.Queue b.List c.Set d.Stack

Discuss with examples the main difference between system programming and application programming and explain in your own words how each of these can be carried out in the computer system.

Question 4: Write a JAVA program to take input an integer num from user and in output print the value of num + num 2 + num 3 in output.

What is the difference between the sum of odd numbers and the sum of even numbers from 1 to 50?

nt: The difference between two consecutive numbers is always 1.

What is printed in the piece of code below ? Transcribed Image Text: int sum =0;
for (int k=1; k<4; k++){ sum += k; cout << sum « endl; } Transcribed Image Text: (e) If the max value of the counter is Ox00394391 and the bus clock frequencyis 24 MHz, what is the interrupt period? Darnbe how the intemuni timar Which among the following can be an example of Aggregation relation? a. Car and Passengers b. College and Department c. Vehicle and Engine d. Person and Leg Clear my choice Transcribed Image Text: Simplify the following Boolean function ?using Karnaugh Map F = XYZW + XYZW + XYZW + XYZW + XYZW + XYZW + XYZW + XYZW + XYZW What role will artificial intelligence (AI) have in determining the future? What Artificial Intelligence (AI) software programs are currently in use? Is the idea of artificial intelligence a scary one? Suppose that you pick a bit string from the set of all bit strings of length ten. What is the probability that the bit string has more 0s than 1s? Write Java code to: a: Create a Deque object containing all integers from 1 to 20. b: Display the front and rear elements c: Display all elements in reverse order. Transcribed Image Text: Question 4) Sort the following list in alphabetical order using bubble sort algorithm? Show all the steps of your solution? [XH, WS, ÖA, ÜT, ?K, ÜY, IT] Write a progprogram in python language that take a string from user and print that and then take a integer and from that position remove the element from the string q5 c programming Transcribed Image Text: 5. Write a recursive function to generate nth Fibonacci term in C programming. How to generate nth Fibonacci term in C programming using recursion. What are the four most crucial characteristics for software development? Please share your thoughts on what other four qualities should be included in the software development process to increase performance. Data management techniques such as spreadsheets and paper-based records offer a number of advantages that database systems do not. Take a look at some real-world examples of these serious flaws. _____ is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements. a. Project management b. Program management c. Project portfolio management d. Requirements management I need the answer as soon as possible Transcribed Image Text: 2. Write a program which find N terms of the series X. X= 22 +5 +2+ +5 +26 +57+… Transcribed Image Text: (b) Give the inorder and postorder traverses of the following tree: E Your answer: Inorder traverse: B F E Postorder traverse: G K Preorder traverse: L L What are multivalued attributes,and how can they be handled within database design? Transcribed Image Text: STORE ORDER ORDER LINE PRODUCT places con tains is written in emdoys EMPLOYEE DEPENDENT has 156. The disk controller uses ________ at each sector to ensure that the data is not corrupted on data retrieval. a. Checksum b. Unit drive c. Read disk d. Readsum Transcribed Image Text: 15 What extra gate should be used to implement a function using an active- low decoder in Maxterms (PoS) format? O NOR OR None O NAND AND Transcribed Image Text: Q14: Write C++ program to find e from the following series: e = 1 +x+ (x2 / 2!) + (x3 / 3!) + … (xª / a!) Transcribed Image Text: Create a programming flowchart that identifies the five numbers with variables A, B, C, D, and E. Then, display the average value, minimum value and maximum value. Which of the following Domain Name System (DNS) attacks substitutes a fraudulent IP address for a symbolic name? a. DNS replay b. DNS poisoning c. DNS masking d. DNS forwarding After reviewing the CVE site, discuss the importance of detecting and protecting against system or software vulnerabilities. Also, discuss how hackers exploit system and software vulnerabilities to conduct an attack. With the aid of a diagram(s), explain the importance of applying the concept of Work Breakdown Structure (WBS) in managing a typical software project using any SDLC of your choice. Identify any three protocols that are insecure or vulnerable to attack, taking into consideration the fact that the organization’s users depend heavily on the network to conduct their daily business. There are 2 ways computers represent fractional numbers (floating point), namely in ordinary form and in scientific form. Following the SCIENTIFIC form, convert this 16-bit fraction to its decimal: 1101101000111001 Transcribed Image Text: 2. Implement the following functions: i) i1) void hollowTriange (int height) void pyramid (int height) ** *** ** # ## ## ### ### #### #### #### #### What will be the Output of the below code: public class Demo{ public static void main(String[] arr) { public static void main(String arr) { } Choices: a) Nothing b) Error Use python only. *Print elements of all the Nodes of a tree using Post-order Traversal and *Write a method which will return a copy (new tree) of a given tree FDM and TDM are used in communication to _______________ Increase the bandwidth of the path Reduce error in signals Increase the strength of the signal Effectively use the available bandwidth Transcribed Image Text: Which of the following types of operation does NOT alter the state of an object? O a. Iterator O b. Constructor O c. Selector O d. Modifier Question What causes one level (Level 0 to Level 5) be assigned as lower hierarchy than another? For instance, why would the web server be arranged lower than hard disk? Using C++ !! Transcribed Image Text: 3. Write C++ program to find the factorial of n: n! =n * n-1 * n-2 * n-3 * … * 2 * 1 i need the answer quickly Transcribed Image Text: Q5\ write c++ program using visual studio to check the value of z even or odd, positive or not ? Z=Ln(x)*2 * Question 4 Is unit testing possible or even desirable in all circumstances? Provide examples to justify your answer. Question 5 Why is a highly coupled module difficult to unit test? Transcribed Image Text: Salesforce Assignment: SOQL Create an Inline Salesforce object query language to find the Account Name and contact Name where the Account Name is equal to the Tes?’. What, in your opinion, is wrong with this nested for loop? for(int x = 0; x < 10; x++){ for(int x = 10; x > 0; x–){ System.out.println(x); } }

9. TRUE OR FALSE IF FALSE, change the bold highlight into a correct answer. Transcribed Image Text: 9. The relation with the directed graph shown below is an equivalence relation.

Computer science Do sum of product Demonstrate reduction of the following functions using KV chart: F(A, B, C, D) = pi(4, 5, 6, 7, 8, 12, 13) + d(1, 15)

106. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents. a) Keylogger b) Worm c) Virus d) Cracker

Why is it that in so many systems, the cancel button in a dialog box appears to be unresponsive? What quality aspects do you think were ignored in these systems?

Create a currency converter program in C++ which takes input value of currency A from user and prints the converted value in currency B. Given: 1 A = 123 B.

What is known as the list of records called blocks that store data publicly and in chronological order a. Block Chain b. Crypto Currency c. Signature Hash d. Bitcoin Nodes

Consider an array of 6 elements (keys should be alphabets in your name). Apply quick sort steps manually, and show the changes in array till your whole array is sorted.

Discuss how computer technology may help sectors including education, restaurants, shopping malls, and online shopping, among others. How will you utilize these technologies if you wish to establish these businesses?

In ____________ technique, The I/O module and main memory exchange data directly without processor involvement. a. Random memory access b. Direct memory access (DMA) c. Programmed I/O d. Interrupt-driven I/O

Transcribed Image Text: Write a Java program which moves 5 disks from Pole 2 to Pole 3 recursively for the Towers of Hanoi problem.
Display each move on the screen.

Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose? a. Fax b. Modem c. Scanner d. Keyboard

– What social networks and institutions are you involved in? Do you belong to any virtual networks? What are the functions of those networks, and how can they help you?

133. In database schema, the database snapshot is also called a. current set of entity b. current set of instances c. current set of entity d. current set of objects

None Transcribed Image Text: Write a program to a plot a tangent on
circle you should take cordinate of
center of circle and point of intersection
from user
In matlab

In a step by step format, write an elaborate algorithm that can be used to delete the third element in a double linked list containing at least 4 integer items.

(a) With the aid of a practical example (two tables), explain the SQL statement below: SELECT FIRST_NAME, LAST_NAME, SCHOOL_FEE 4 FROM STUDENT, FEE_PAYMENT WHERE STUDENT.STUDENT_ID = FEE_PAYMENT.STUDENT_ID ORDER BY FIRST_NAME

Assembly Transcribed Image Text: Write a program in assembly language to introduce a time delay of 1 sec
using a register pair. Let the system clock frequency is 3 MHz.

Write a program in python to take input a string print it in reverse order. Note: Do not modify the given string, you can use some other string for that.

Write a program to copy the data in data memory block (0x126 ~ 0x12A) to another memory block (0x226 ~ 0x22A) by using indirect addressing mode and show your flowchart.

When a partition on a hard drive has been formatted with a file structure, the same system must be used in all partitions on the hard drive. True or false?

Please help with the following: In Linux Give a description of what the following commands do and explore 1 option Command Description Exploredoptions cd ls alias touch cat more less

Enter a complete if statement that would detect an odd nu,ber that is 40 or ore in a variable named x. separte tokens with a single space. written in python

Computer science lab Please write a a php scripts with html to merge two arrays. Please use the inline php inside the html. Solve AsAP only in php and html

T/F 1. Only constant values are applicable in switch structure. 2. In switch character constants are automatically converted to float values. 3. One switch statement can can multiple default statements.

Which tool can create a build based on a trigger, such as committing to a version control system? Select one: a. Helm b. Jenkins c. Git d. Kubernetes e. UrbanCode

Q2

J need fast and correct Transcribed Image Text: model turns out to be a very crude version of the actual system.
O V-shaped
O Waterfall
O Prototype
O Agile

a) Encode the data 1011101 in even parity, by using Hamming code. Find out code word. b) Find Checksum for data bits 10101001 and 00111001. Detect error occurred or not

Python Automation Script: write a python automation script that scrape a website: “https://www.goodreturns.in/gold-rates/delhi.html” get the latest gold rate and change from previous day, and print the result on the screen.

I need the answer as soon as possible Transcribed Image Text: e products.
9. Software costs less to maintain than it does to develop.
a) True
6 False
double check

155. In categories of data modeling, the high level data models are also called a. triggered data models b. logical data models c. conceptual data models d. physical data models

USE OF TERNARY OPERATOR IS MUST ELSE I DISLIKE Write a program to take user input for two number and then find which number is greater The langauge is JAVA

in risc-v 2:Write an Assembly language code that takes in two numbers b and p, and returns the result of below expression. x= ((b+5) * (p-2) * 10) / 4;

I need the answer as soon as possible Transcribed Image Text: Q4
Q4/ Write a program to find a minimum number between fifteen (15) numbers.
1 Add file
with c++

ASAP Transcribed Image Text: a) Find (1100101-1000011) using 2’s complement.
b) Using these Pulse train draw the Timing Diagram of the function
F= XOYOZ
Here X=110001001 : Y= 100110010; Z=111000011

Transcribed Image Text: Q 1/B when calculating and showing the
* . mathematical equation it appears in
Auto sum tape O
formulas tape
table tools + +layout tape +FX formula

Wireless networks confront a number of issues as a result of their intrinsic features. Describe three of these issues in your own words and show how they affect the user?

Given an algorithm for constructing predictive parsing table. Apply this algorithm for the following grammar to obtain parsing table. S? iEtSS’ I a S’ ? eS’ la E ? b.

JAVA PROGRAMMING 1. Which of the five arithmetic operators can operate on string? 2. Assuming total is a variable, how else could you express in code total = total +2?

Which of the following is an application framework that an application can distribute? a. The Windows API b. The .NET Framework c. A legacy application d. The Universal Windows Platform

Please output the operational result of the following command: sorted (set(‘You need Python.’))[2]. (Directly write down the corresponding characters, without any symbol or mark like single quotes or double quotes)

I need the answer as soon as possible Transcribed Image Text: 12. The memory address of the last location of 8 Kbyte memory chip is FFFFH. Find the
starting address.

class Output { public static void main(String args[]) { int x = 3.14; int y = (int) Math.abs(x); System.out.print(y); } } The output of the above Java code is ?

A type of malware where users using social platforms are asked to click like or copy/paste advertisements and promise to earn money. a. Scareware b. Ransomware c. Spyware d. Adware

JAVA PROGRAM USES FOR LOOP TO PRINT TABLE Transcribed Image Text: N
1
2
3
2
4
8
16
6
7
8
9
10
64
128
256
512
1024
624

A printed document reader which scans the characters and then encodes them in a computer-compatible code for direct transmission to the computer is called Kurzweil Data Entry Machine (KDEM) explain?

Write a program in perl to demonstrate the use of until loop with example of printing capital alphabet and then find the line number and file name and package name

Aside from being a major improvement over previous data management techniques, database systems also offer a number of disadvantages. Take a look at some specific examples of these significant disadvantages.

What is the OSPF cost for T-1 link (bandwidth 1.544 Mbps) given the reference bandwidth of 100 Mbps? Note 1.544 Mbps = 1.544*1000000=1,544,000 bps and 100 Mbps = 100,000,000 bps).

Transcribed Image Text: Write a java program to insert a word in the middle of
another’ string.
Example the given string is Hello World.
Output Hello I am Rdj World

Computer science lab Please write a a php scripts with html to merge two arrays. Please use the inline php inside the html. Solve AsAP only in php and html

Suppose that you pick a bit string from the set of all bit strings of length ten. What is the probability that the bit string has more 0s than 1s?

information system experts classify information systemsin various ways (i) compare and contrast disparate systems as against enterprise application systems; and use practical examples, science or engineering to illustrate your answer.

Explain Function Point calculation process with sample values, step-by-step. (Don’t forget to define sources of values.) Explain the meaning of the number “Function Point”. (How can we use this number?)

Q7. Determine re, Zi, Zo, Ay: Transcribed Image Text: Q7. Determine re, Zi, Zo, Av:
P12V
3K2
68K2 ??
120k2
Vo
Viett
B = 140
%3D
Zi
Ho= 30kS
%3D

A ________ is typically responsible for translating business problems/requirements into information requirements and systems. A. Systems analyst B. Chief Data Officer (CDO) C. End User D. Chief Security Officer (CSO)

Write a program in lua programming language to iterate over the array using iterator and print the values. You can assume array of 11 enteries of string as its type

What is the correct order of operator precedence from the following options? +, seq[z],**, % **, [v, …], *, – seq[z], **, +, << d) [v, …], seq[z], +, ** What is the most popular application of in-order traversal in binary search trees ? Please don’t just copy and paste someone else’s answer it will result in automatic thumbs down. Need correct Answer any incorrect and plagiarism i will downvoted Define an XML schema. Show how an XML schema can be created. OR Write XML schema for library information system. Transcribed Image Text: Which of the following wireless security mode is required a RADIUS server authentication for wireless user? a. Enterprise O b. Personal O c. WAP2 d. Shared Key 1.why is security for PC networks a concern 2.how would you use biometrics to improve security of a computer network 3. What consequences does online shopping have on a society If an instruction takes 1 nsec and a page fault takes an additional n nsec, give a formula for the effective instruction time if page faults occur every k instructions Explain in your own words the RTN for one of the extended instructions (selection 4.12). Which of the control mechanisms would you choose if you were designing a CPU? Why? Asymmetric vs symmetric encryption methods both have advantages and disadvantages. What factors need to be taken into account when making a decision on the kind of encryption to be used? QUESTION 17 Twisted-pair cooper wire is still present in computer networks. True False QUESTION 18 With Cable Internet access, each subscriber gets more downstream bandwidth than upstream bandwidth. True False i need the answer quickly Transcribed Image Text: Write a program in C++ to find the total area of the following figure with a text definition for each space a find out what network system vulnerabilities exist Put in place suitable security procedures to deal with network vulnerabilities. Make sure the virtualization and cloud technologies is considered while making decisions. PLEASE HELP ! with explanation Transcribed Image Text: Why it would be good and, at the same time, bad to prove that P = NP (polynomial class equals NP class)? We have a string and your task is remove all the repeating  character to once and you can print the result in any order of characters. In Haskell programming language Write a python program to display the first and the last names from the following list. List is [ “Hulk”, ” James”, “Bond”, ” Iron-man”, “sliviya”, ” Captain” , “vision”] 157. The term that refers to the phase continues through the boundary of two signal elements is a. non coherent BFSK b. coherent BFSK c. Binary ASK d. Multilevel ASK What role, in the future, will Artificial Intelligence play? Do you currently have any AI software installed on your computer? Is there a need to be afraid about Artificial Intelligence? 17. ________ is a type of transmission impairment in which the signal loses strength due to the resistance of the transmission medium. a. Attenuation b. Distortion c. Noise d. Decibel Write MATLAB program to take input height and radius of a cylinder from user and print the volume in output. Show output screenshot of command window else I will dislike. What is the results of the source codes below? def rem(number): if number>10:
return “Sct”
else:
return “Hct”
rem(5)

a.
SctHct

b.
Hct

c.
HctSct

d.
Sct
Clear my choice

Is it possible to open several tabs on your browser at the same time? Creating a large number of TCP connections at the same time has both advantages and disadvantages.

A printed document reader which scans the characters and then encodes them in a computer-compatible code for direct transmission to the computer is called Kurzweil Data Entry Machine (KDEM) explain?

Can I get help with this two complements Transcribed Image Text: 1. Determine the two’s complement representation of the following numbers in
a 16 bit format
c. +32510
c. -200010

The hosted software model for enterprise software helps customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs. True or False?

1a.Distinguish between Queues and Stacks. Give real life examples of the use of queues and stacks.

1b. Distinguish between singly-linked lists and doubly-linked lists. Give examples to illustrate your answer.

Write the sequence of control steps required to multiply a number to the accumulator (AC) when the number is:
a) an immediate operand
b) an indirect address operand without displacement

Find the crc value and message sent for the data given below. Also verify the result at receiver’s end. Generator : x 3 + x + 1 Original Message: 1001000

c++ Create a function that receives a string representing a number in binary and returns this number in decimal. Example: int i= Decimal(“1010”); // must assign 10 to variable i

Write a C program that will provide an ATM user with the proper change for any dollar amount up to $200. Example: Run the code for $19, $55, and $200.

Provide an illustration of the issue that arises when a neural network has a high number of layers. Describe overfitting and how it may be prevented in the following paragraphs.

Edit question SIMULINK SIMULINK!!! Design and simulate Quadrature phase shift keying (QPSK) and Offset Quadrature phase shift keying (OQPSK) in Matlab & SIMULINK. Kindly share the block diagram and output!

6. In our designed register file, we can write one data at a time. But if we want to write two data at a time, what should we do ?

excel Transcribed Image Text: 4- What the result of the fallowing formula
=ODD (ROUNDDOWN (136.256;-1))
Your answer
5- What the result of applying the fallowing formula =ADDRESS (2;10;2)
Your answer

Transcribed Image Text: Question 3
Given the following binary tree, what is its height:
8
5
4
9
7
11
1
12
3
2
(A
6.
B
4
c) 5

Convert the following transition table into NDFA (transition diagram)and DFA(transition diagram) Transcribed Image Text: 1
{A}
{C}
{A,B}
{C}
?
?
1
??
C
??
??
??
??
??
A

Write  use cases scenarios for each following functionality: (a) Room reservation (b) Changing the properties of a room (for example, from non-smoking to smoking) (c) Customer check-in (d) Customer check-out

62. What is NIC used for? a. To remotely access PC b. To connect computer to a network c. It is used in junipers routers for gateway card d. None

i need the answer quickly Transcribed Image Text: if these numbers are existing in the following cells: A1=5, 81-3, C1-17. the rosult
of the equation: SQRT(Sum(A1:C1)) will be:
21
25

Which of the following is a significant e-commerce function? encrypting orders using SSL b. putting things in a shopping cart c. purchasing and selling goods d. none of the above

Which of the folowing is correct for break statement in python?

a.
terminate the loop.

b.
Not jump out of the loop

c.
Skip the statements

d.
None of Above

attached question Transcribed Image Text: 5.
1
2
3
1
3
3
8
2
5
1
2
4
Create adjacency list for the graph above.
2.
3,
2.
2.
2.

Transcribed Image Text: Which of the following activities is the core of the System analyst’s job?
Select one:
a.planning and executing information systems projects
b.Web development
c.end-user analysis
d.writing code

How important is it for an IT person to understand concepts such as cache memory, pipelining processors, the use of the bus, the fetch–execute cycle, and the use of registers?

What are some instances of computer-related criminal activity? The present legal framework is either too restrictive or overly burdensome. What new law has been enacted in the last several months?

Transcribed Image Text: Select one of the following that is not a subject of the vision document.
Stakeholders
Users and Goals
list of system s requirements
project risk
use cases

What does traffic congestion mean? Discuss the TCP congestion management algorithm. You must be aware of the difference between congestion control and flow control. Flow control is accomplished via how.

Write a function in C language which takes an integer as parameter and returns the sum of all non zero digits in the number passed as argument to the function.

Mohammed opened a store in Muscat City Center. He installed CCTV (security cameras) to monitor staff and customers. List and explain what are the possible ethical issues with this technology

Given a list of integers below. Write a Python program to remove and print every third number from a list of numbers until the list becomes empty. numbers = [1,2,3,4,5,6,7,8,9]

Subject: Discrete Structures Transcribed Image Text: Determine the degree of each vertex, adjacency list, distance matrix, eccentricity of each vertex, radius
and diameter of the following graph:
F
B
D

What is the role of design patterns in software engineering, and how can they be used effectively? Give examples of three different design patterns and a brief description of each.

1. a. Describe the concept of a Binary heap and the heap order property. b. Explain the use of the binary heap as an effective implementation for a priority queue.

Find out the Postorder Traversal of the binary tree below Inorder: 1 3 4 6 7 8 10 13 14 Preoder: 1 4 7 5 3 13 14 10 8

Generate an (n x m) multiplication table. use a nested-loop. sample output if applicable typical output might be: input value of n = 12 input value of m = 12

Find a CFG which generate the strings over the alphabet (0, 1) and does not contain equal number of 0’s and 1’s. Find the left most derivation, right most derivation.

18. What is a Software ? a. Software is set of programs b. Software is documentation and configuration of data c. Both a and b d. None of the mentioned

Transcribed Image Text: paste.
EXAMINATION 1
Question1 (25 marks) 300-500 words per discussion and avoid plagiarism.
Discuss the 5 specific examples of applications of systems designs and simulation with
examples.

The following equation using the Excel spreadsheet program, books an equation that does not find the value of 2 regardless of the input X, Y Transcribed Image Text: X+3
Y_4=Z

It has been estimated that the amount of digital data is doubling every two years. Discuss some technological and social implications and issues associated with this rapid growth of data.

None Transcribed Image Text: 6- Use Newton-Raphson method to solve the system
?3 +? — 1%3D 0
?? — ?+1%3D 0
with the starting value (xo,yo) = (1,0). Take n=4.

(DiscreteMath) Transcribed Image Text: Let E1 = {a}, E2 = {a, b} and N be the set of natural numbers. Using a bijective function,
prove that | 2*| = |N|.

Transcribed Image Text: Implement the following Boolean functions using (use only one De-mux for both
functions) appropriate De-Mux and decoder. (use block diagram of De-Mux and decoder)
F2(A,B,C,D)
E(0, 1,3,9,13)

Identify the classes of the following IP addresses by placing an A, B, C, D, or E next to the IP address: ____ 18.125.189.76 ____ 195.12.98.100 ____ 135.208.47.159 ____ 250.54.22.101

(i) Prove by cases for any given integer n,the number (n 3 -n) is even. (Ii)Prove by contradiction there are no integers x and y such that x 2 =4y+2.

List all the differences and its importance of File Management Programs, Diagnostic & Disk Management Programs, Antivirus Programs, Backup & Recovery Utilities, and Network & Internet Utilities as utility programs.

Write a program that displays the area and perimeter of a rectangle with the width of 4.5 and height of 7.9 using the following formula: area = width * height

Transcribed Image Text: HW3/
Use bresenham’s algorithm to digitize a line with endpoints (2,2) and
(7,5)
HW4/
Use integer bresenham’s algorithm to digitize a line with endpoints
(20,10) and (30,18)

T/F 1. Only constant values are applicable in switch structure. 2. In switch character constants are automatically converted to float values. 3. One switch statement can can multiple default statements.

23 Consider  f(n) =  5 n log n ,   and g(n)=  (n+5)    which of the following is true ???????? f(n)= O(g(n)) f(n)= omega (g(n)) f(n)= theta (g(n) g(n) = O(f(n))

Five channels of l00 kHz bandwidth each are to be multiplexed. What is the minimum connection bandwidth if a 10kHz guard band is required between the channels to avoid interference?

10. Multimedia files stored on a remote server are delivered to a client across the network using a technique known as : a. download b. streaming c. flowing d. leaking

Which of the following is the command that makes xmas scan on nmap happen every 15 seconds? A-)nmap -sX -sneaky B-)nmap -sU -paranoid C-)nmap -sT -aggressive D-)nmap -polite -t ??15

There are 2 ways computers represent fractional numbers (floating point), namely in ordinary form and in scientific form. Following the SCIENTIFIC form, convert this 16-bit fraction to its decimal:
1101101000111001

Transcribed Image Text: Assuming all numbers are signed words, write a
code in assembly to solve the following equation
CX
(DX* AX) % ( 2 * AX * – Var1)

Transcribed Image Text: Q4/ Write the Commands to get these results.
1. D=
1
1
1
2. ?-
1
6
3
5
7
4
3. X=
1
1
1
1

Which normal form requires that, no non-key attribute should functionally depend on a part of the primary key? 3rd Normal Form 4th Normal Form 2nd Normal Form 1st Normal Form

Python Automation Script: write a python automation script that scrape a website: “https://www.goodreturns.in/gold-rates/delhi.html” get the latest gold rate and change from previous day, and print the result on the screen.

Using a Smart Meter IoT example, describe the deployment and operational perspective, resources, services, virtual entities, and users in an IoT system. Describe the many characteristics and limitations of IoT.

Lighting methods Explain the three local shading methods Flat Shading, Gouraud Shading and Phong Shading. In each case, explain the calculation of the surface normals and the resulting image impression.

List some of the phrases that are incompatible with the OSI model of thinking. Nothing in the code dictates that the functioning of one layer requires the knowledge of another.

LaTeX must be used to write all boolean expressions and equations. A. Formulation: input: D3:0D3:0, output: VV, X1X1, X0X0 B. Write down the boolean expressions for the 4-to-2 Priority Encoder

Transcribed Image Text: 8
Simplify the following expression in
Product of Sum:
F= A’B’C’D’ + A’B’C’D + A’B’CD’ + A’B’CD
O No Correct Answer
O A’B’
O AB’
O A

The ______ scheme uses three levels (+V, 0, and -V) and three transition rules to move between the levels. a. 4B5B b. 2B1Q c. MLT-3 d. none of the above

Write a program in python to take input a string print it in reverse order. Note: Do not modify the given string, you can use some other string for that.

Introduce the Named Entity Recognition program and explain what it is intended to do. 2. Describe Hobb’s algorithm as well as centering algorithms in the context of the reference phenomena.

50. An interface that provides I/O transfer of data directly to and form the memory unit and peripheral is termed as a. DDA b. Serial interface c. BR d. DMA

When it comes to downloading and uploading files, both HTTP and FTP may be utilized. Include at least one commonality and one difference between the two procedures in your response.

Computer Engineering lab Please write a a php scripts with html to merge two arrays. Please use the inline php inside the html. Solve AsAP only in php and html

Computer Science: A common cause of nonlinearity in advertising response models is a declining marginal effect, in which each additional ad obtains less exposures than the prior ad.True or False.

Note:- wnt detailed Ans else downvoted Transcribed Image Text: Apply de Morgan’s theorems to the following expressions:
(a) F = A+BC + D(E+F)
(b) F = AB + CD+ EF

Transcribed Image Text: write a program in HTML to put ” final
Web programming 2021 exam ” as a
movement text with ( silver
background , slide , 4 loop)

Given below is a list of strings. Write a Python program to print the first and last element of the list in the output. Given list: color_list = [“Red”,”Green”,”White” ,”Black”]

(Python) Which is the correct answer? This loop is best when you want the loop to run X amount of times. a. loopX b. while c. for d. do while

Adding the necessary characteristics to any weak entity set will automatically transform it into a strong entity set. Why, however, do we have such a lackluster collection of entity sets?

What is the name of the device that converts computer output into a form that can be transmitted over a telephone line? a. Modem b. Teleport c. Multiplexer d. Concentrator

If physical security and information technology (IT) security are to be implemented, controlled, and maintained in an ordered and consistent manner, when do they need to collaborate to do this?

5 Transcribed Image Text: In the modified form of Amdahl’s Law
below, explain the origin of the N^(2T-2)
term:
?.
kBok schok SRAO (1–P+-)
N’
I serial
I overall
N2T-2

Please solve Transcribed Image Text: Which of the following could be inserted in a direct access table with 5
buckets, out of which 4 are occupied?
O -2
-45
23

Q: Analog-to-analog conversion, or analog modulation, is the representation of analog information by an analog signal. Then why we need to modulate an analog signal; when it is already analog?

90. The interactive transmission of data within a time sharing system may be best suited to a. simplex lines b. half-duplex lines c. full duplex lines d. None of these

Transcribed Image Text: Linux provides sophisticated facilities to schedule a job to run at a specified time of day
a. user
b. tty
C. at
d. none of these options

1. Identify what are the security risk for the application of Internet of things (IOT).
2. List and discuss how we can prevent IOT security risk using key base algorithms.

When running a scan on your computer, you find that a session has been established with a host at the address 208.85.40.44:443. Which protocol is in use for this session?

26. Which of the following is NOT an Advantage of Learning Java Programming? None of the Choices Object Oriented Platform Independent Robust Give an explanation for the answer. Thank you

_2_ command displays the process ID, the name of the user owning the process, the wall clock time at which the process started, and the command running in the process.

The purpose of testing is to demonstrate that a software works as it is supposed to. What’s to keep test subjects from knowing what a software is supposed to do?

29 In excel, which of the following is an example of relative reference. Select one: a. All of the above b. =$B4 +$C4 c. =$B$4 +$c$4 d. =B4 + C4

Write assembly code for the following: Transcribed Image Text: Aim: To perform the addition of two 8 bit numbers and store
the result using a 8085 microprocessor.
Platform required: sim8085.com

Q1: Draw the ASK signal? Q2: write a Matlab code to simulate a ASK modulation signal only. A. generate the following data (1001011). B. Tp= 2us. C. generate ASK signal.

– What social networks and institutions are you involved in? Do you belong to any virtual networks? What are the functions of those networks, and how can they help you?

1. Draw a picture of how a Stack and Queue is implemented with a single linked list. 2. Explain and create algorithms for adding and removing on Stack and Queue

An informal language that has no syntax rules and is not meant to be compiled or executed is called . 1. faux code 2. pseudocode 3. Python 4. a flowchart

Transcribed Image Text: – A TYT o
4- Generates a random decimal number between 1 and 10 with two decimal places
of accuracy (Examples are 1.23, 3.45, 9.80, and 5.00)

Which among the following could be the possible examples of concurrent process? a. Check marks and check grade b. Order and Deliver c. Accept and Reject d. Sit and Swim

In Java: Write a loop that iterates over a String t and counts, then prints the total number of a’s plus b’s, plus  c’s combined. (So, “athbdskjcksajfb” would be 5.)

What are some of the potential applications of cloud-based collaborative working? What are some of the benefits of collaborating in the cloud? Give a few instances to illustrate your point.

In Assembly Write assembly language instructions that calculate EAX * 21 using binary multiplication. Don’t use the mul or imul instructions. nt: 21 = 2 4 +2 2 +2 0

Explain completely with comments inside the code.Thanks in advance Transcribed Image Text: 16.Write a Java Applet program to display sum of two
numbers. The numbers must be passed as parameters

Using recursion, create a program that will allow a user to enter five numbers. The program will provide the sum of all five numbers using recursive methods. using java eclipse

Which of the following is a significant e-commerce function? encrypting orders using SSL b. putting things in a shopping cart c. purchasing and selling goods d. none of the above

29 – When you consider the significant numbers, which one is the result of (1,500 x 2.0) + (4.50/0.9) correct? a) 80.0 B) 80 NS) 8.0 D) 8.00 TO) 8

Transcribed Image Text: A(n).
is a method to estimate and schedule the tasks of a project.
Select one:
a.adaptive systems diagram
b.essential use case model
c.project charter
d.work breakdown structure

(DiscreteMath) Transcribed Image Text: Let E1 = {a}, E2 = {a, b} and N be the set of natural numbers. Using a bijective function,
prove that | 2*| = |N|.

implement other algorithms of data mining (e.g. k-nearest neighbors (KNN) for classification, AGNES method for cluster analysis), and compare with the close pattern and maximal pattern algorithms in your report.

Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. Data___________refers to the accuracy of data.

Transcribed Image Text: WHICH OF THE FOLLOWING REPRESENTS TOTAL AMOUNT OF RESOURCES NOT ALLOCATED TO ANY PROCESS?
Select one:
a.RESOURCE ALLOCATION MATRIX
b.AVAILABLE RESOURCE VECTOR
c.RESOURCE VECTOR
d.RESOURCE CLAIM MATRIX

23. Pointers are useful in a. Traversing a linked list b. Pointing mistakes in input data c. Locating a particular sector of a magnetic disk d. All of the above

The purpose of testing is to demonstrate that a software works as it is supposed to. What’s to keep test subjects from knowing what a software is supposed to do?

In order to better understand ICANN, its responsibilities and its future, there a few other acronyms to become familiar with,write them in full and explain them: DNS IANA NTIA TLD

I need the answer as soon as possible Transcribed Image Text: Write a program in java to find the semi
perimeter of rectangle and take breadth and
length from user

In Assembly DO NOT POST HAND WRITTEN ANSWER!!! THUMBS DOWN. Convert this code to assembly: If (var1 <= var2) Var2 = var2 – var1; Else Var2 = var2 + var1; The search should be done in this order: breadth first, depth second, and so on Which data structure would be best for implementing it? Choose one: a.Queue b.List c.Set d.Stack 9 Want a PowerPoint photo album slide show to play continuously? Select one: a. Use random slide transitions b. Launch an online broadcast c. Loop continuously d. All of these Consider yourself the iTunes store’s database administrator. How could you utilize predictive analysis to figure out which musicians and films will be the most popular in the next year? Polymorphism? Transcribed Image Text: Which of the following are TCP/IP protocols used at the Application layer of the OSI model? IP address Transport Control Protocol (TCP) Address Resolution Protocol ARP Telnet Using C++ programming language: Assume you have two string variables str1 and str2. Write just the if statement that would print which string is greater. Assume they are not equal. Transcribed Image Text: MOV DS, CS * true False MOV FR, BX * False O true MOV DS, FFFFH * O false O true MOV SS, FFFFH * true False The task of machine learning may involve the expertise of several individuals, each with a special role. Identify these roles and summarize their activities towards this goal of machine learning. Discuss one communication network in and beyond organizations. Make sure to include the functions of the chosen network and the benefits it can give you when utilized in the organization. What are  organizational factors that contribute to an unhealthy security culture in the organization? If so, how? Consider organizational data flow, work setting, work planning and control, and employee readiness. 127. Un authorised copying of software to be used for personal gain instead of personal backups is called a) program thievery b) data snatching c) software piracy d) program looting 62. Which of the following is used in the options field of IPv4 ? a. Strict source routing b. Loose source routing c. time stamp d. All of the above When you run a console application in an IDE, the IDE typically includes a window that simulates the ___________. You can use this window to view output and enter input. Asap Transcribed Image Text: Write a program in java to take a string from. User and replace the first character by #. Assume that string has at least one character 45. _______ refers to the structure or format of the data, meaning the order in which they are presented. a. Semantics b. Syntax c. Timing d. All of the above Michael Porter provides a five-point framework for assessing an organization’s competitiveness in any industry. With the aid of relevant examples explain how these forces can affect an organization. no plagiarism Network in which each computer is either acts as server or a client is called a. dedicated server network b. peer-to-peer network c. metropolitan area network d. local area network Aside from being a major improvement over previous data management techniques, database systems also offer a number of disadvantages. Take a look at some specific examples of these significant disadvantages. Write a program in lua to design a table and fill elements and you to perform these  operations Add elements to table Return max index Remove the value from table 398. Module of an operating system that is responsible for creation and deletion of processes is named as a. File management b. Program management c. Memory management d. Process management Transcribed Image Text: H.W write c++ code to read name and 5 degrees of two student and then print the name ,sum and average of them degrees using for loop? Citing practical examples from the field of computer science, compare and contrast the concept of abstraction. To emphasize the concept of abstraction, discuss the importance of abstraction in software engineering Which tool can create a build based on a trigger, such as committing to a version control system? Select one: a. Helm b. Jenkins c. Git d. Kubernetes e. UrbanCode 70. For a deadlock to arise, which of the following conditions must hold simultaneously ? a. Mutual exclusion b. No preemption c. Hold and wait d. All of the mentioned subject compiler design dont post copied answer will report and downvote dont answer if you dont know Transcribed Image Text: Explain the algorithm for construction of. Canonical LR parsing table Problem 1: Insert the following set of keys {1, 7, 6, 8, 0, 5, 2, 12, 3, 18} in an empty binary search tree in the order they are listed. Java programming- Prompt the user to enter an integer n, write a program to take input value of n and print the product of first n natural numbers. Given: 00}.
%3D
Find a grammar that generates language L = {b”a” : m > n, n2 0}.

What is the purpose of CAPTCHAs, and how do they work? Text-based CAPTCHAs, image-based CAPTCHAs, and audio-based CAPTCHAs are all supported. What are the security concerns associated with text-based CAPTCHA?

The search should be done in this order: breadth first, depth second, and so on Which data structure would be best for implementing it? Choose one: a.Queue b.List c.Set d.Stack

Transcribed Image Text: First, calculate the CPL and the diameter for the following network. How large
is the difference: diameter minus CPL?
O 0.95
O 0.70
O 1.05
O 0.85

49. ________ are used for short-range communications such as those between a PC and a peripheral device. a. Radio waves b. Microwaves c. Infrared waves d. none of the above

None Transcribed Image Text: the elements of the following sets {x: x is a real number such that x? = 1}
%3D
{-1; 1}
b O
a
{o}
c O

Write a program in C++ language to sorting the 1D array size 8, (descending). Assume the array as float a [8] = {4.3, -2.2, 33, 51, -39.5, 2.9, 6.5, 78}.

Why is it that in so many systems, the cancel button in a dialog box appears to be unresponsive? What quality aspects do you think were ignored in these systems?

Which of the following Assembly language instruction calls the SUB subroutine if the zero flag status is 1? a. CNZ SUB b. CALL SUB c. COZ SUB d. CZ SUB

Plan the implementation of the stories that describe the system requirements with this planning game. Why this technique may be problematic if software performance or dependability are important design criteria?

c) Prompt the user to enter an integer n and then swap the first and last digit of the number n, print the modified number in the output. Language: C++

Question 4 Is unit testing possible or even desirable in all circumstances? Provide examples to justify your answer. Question 5 Why is a highly coupled module difficult to unit test?

Which of the following will compile successfully?

1.) void final methodD(){}

2.) public final int void methodB() {}

3.) private void int methodC() {}

4.) final static void methodA() {}

Computer science lab Please write a a php scripts with html to merge two arrays. Please use the inline php inside the html. Solve AsAP only in php and html

48. Data which is used to test each feature of program and is carefully selected is classified as a. program output b. program input c. test data d. test program

Write a LinkedList holding CGPA of students to a text file “information”. Use the appropriate LinkedList type. You can use any file writing class in Java other than object class.

Pig Latin scripting language is not only a higher-level data flow language but also has operators similar to ____________ a) SQL b) JSON c) XML d) All of the mentioned

DO NOT COPY FROM OTHER WEBSITES Write your own answer Transcribed Image Text: b. Can a task in Real time system may have
multiple deadlines and multiple
execution time? -Explain

Computer Engineering lab Please write a a php scripts with html to merge two arrays. Please use the inline php inside the html. Solve AsAP only in php and html

NOTE: Assume you are using a MySQL database. – Provide the Java code to load the JDBC driver. – Provide the Java code to establish a connection to the database.

Wireless networks confront a number of issues as a result of their intrinsic features. Describe three of these issues in your own words and show how they affect the user?

Information Technology acts as an enabler during Business Process Analysis and Design. Give five examples (in five different areas in an organisation) of how IT is useful during this process.

What role will artificial intelligence (AI) have in determining the future? What Artificial Intelligence (AI) software programs are currently in use? Is the idea of artificial intelligence a scary one?

The hosted software model for enterprise software helps customers acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs. True or False?

Transcribed Image Text: A. Write a program in FORTRAN 90 to compute the value of s from the series
below:
s = x + x2 + x³ + ……
+x30

Transcribed Image Text: O Refactoring
8. Any constraint on the development process is: *
O Functional requirement
O External requirement
Product requirement
Organizational requirement
9. Requirements engineering is
(1 Point)

answer asap please  in 5 minutes What is the simplest form of the Boolean function F(x,y,z) = [ (x? + y? + z)? + (x + y?)? + z? ]?

A printed document reader which scans the characters and then encodes them in a computer-compatible code for direct transmission to the computer is called Kurzweil Data Entry Machine (KDEM) explain?

Transcribed Image Text: Question 19
Dijkstra’s algorithm solves what kind of problem for a non-negative weights Graphs?
Single-destination longest path.
Single-destination shortest path.
O Single-source longest path.
Single-source shortest path.

What will be the output of code given below: #include using namespace std; int main() { int i=5, j=2; printf(“%d %d”,i<>j); return 0; } Also explain me please.

Which tool can establish quality gates that must be met before an application is promoted to an environment? Select one: a. Kubernetes b. Jenkins c. Helm d. Git e. UrbanCode

Many businesses now store all of their critical data on the cloud. Is this a good concept, and if so, why? How essential is it to keep in mind (?

17. ________ is a type of transmission impairment in which the signal loses strength due to the resistance of the transmission medium. a. Attenuation b. Distortion c. Noise d. Decibel

Consider yourself the iTunes store’s database administrator. How could you utilize predictive analysis to figure out which musicians and films will be the most popular in the next year? Polymorphism?

The following is a dump of UDP header in hexadecimal format 5EFA00FD001C3297 What is the total length of user datagram? Is the packet from client to server or vice versa?

Transcribed Image Text: If the definition for “multimedia” is “a combination of media,” what is the best
definition for “hypermedia?”
Linked concepts
All of above
Separate media
Linked media O

A(n) _______ is a computer network that does not extend beyond the boundaries of a particular organization. Select one: a. Intranet b. Arpanet c. Extranet d. Internet Clear my choice

With IBM Cloud Private, you can choose the prescriptive development approach of Cloud Foundry, or the more customizable and portable approach of Kubernetes and Docker Containers. Select one: True False

mobile programing,android studio,java Transcribed Image Text: To access to the menu in android studio activity you need to inflate, which code is correct
Inflater().inflate(R.menu.main_menu, menu):
getMenulnflater(0.inflate(R.id.main_menu, menu):
getMenulnflater(0.inflate(R.menu.main_menu, menu):
getMenulnflater().inflate(R.menu.main_menu):

Why do many systems have a distinct cache for code and data, and how does the hardware determine if bytes of code or bytes of data are present in memory?

Transcribed Image Text: What is the output after executed the following statements
int x-2, y-5;
cout<<((x>>1) & y )< x = f();

In excel,the option to move the text automatically to next line is. Select one: a. Merge and center b. None of the above c. Bold and Italic d. Wrap text

Technology is advancing at a rapid pace, and new changes are inevitable. Identify and discuss five (5) recent computer or communication innovations that reflect the current level of computer development.

Use SQL and TAL Distributors database to complete the following questions: List the customer number, name, and balance for all customers. The balance should be rounded to the nearest dollar.

given a positive integer n, greater than 1, assign True to is_prime if n has no other factors other than 1 and itself. using python and for or range statements

A company starting out with a global focus, usually because of the international experience of its founders, is called a ________. multinational enterprise transnational company strategically allied company born-global company

Transcribed Image Text: Given a list titled ‘x’ that contains 5 integers, how can you add a new element
with value 0 to x?
O x.add(0)
O x[5]=0
O x.append(0)

Wireless networks confront a number of issues as a result of their intrinsic features. Describe three of these issues in your own words and show how they affect the user?

Java Transcribed Image Text: Which is the correct size of the data type double?
O a. 1 byte
O b. 8 bytes
O c. 4 bytes
O d. 2 bytes

Transcribed Image Text: For 8086 microprocessor, the stack segment may have a memory block of
a maximum of
32K bytes O
64K bytes O
16K bytes O
Option 4 O

A = signed (integer) 16 bit = &60 B = signed (integer) 16 bit = &70 D= signed (integer) 16 bit D= a* COS(b) solve floating point numbers with omron

Transcribed Image Text: In a data acquisition system, parameter storage module can be used to store the parameter values in the EEPROM memory IC.
Select one:
O True
O False

81. The process of finding some other position when hash address is occupied is classified as a. collision resolution b. address space resolution c. multiple hashing resolution d. chaining resolution

List and describe a type of database each from “Number of users “and “Database site location” categories. In addition, define what is data Anomaly and what could be its types?

This criterion is linked to a Learning Outcomeb. What is the difference between UDP and TCP? Why might you use UDP over TCP? Why might you use TCP over UDP?

In regards to computer architecture, certain storage structures aid in the processing of information. Briefly explain the relevance of each of these storage structures to the speed of information processing.

The height of a tree is the length of the longest root-to-leaf path in it. The maximum and minimum number of nodes in a binary tree of height 5 ?.

For the following three functions, write down truth tables for all of them and check if any two functions or all of them are equal or not. f=y?z?+x?y+x?yz? g=xy?+x?z?+x?y h=(x?+y?)(x+y+z?)

Write whole code in main func Transcribed Image Text: Write a C++ program to find factorial of
Write whole code in main function only.
a number n less than 15.

In c++ how is new object constructor used, im really confuse. I know that it is used for dynammic allocation and creates a runtime memory. can you provide some examples

Aside from being a major improvement over previous data management techniques, database systems also offer a number of disadvantages. Take a look at some specific examples of these significant disadvantages.

Minimum number of states in a DFA that accepts the language L= {w| w has an even number of a’s and each a is followed by at least one b}

When you use a range check, you always compare a variable to ______________ value in the range. a. the lowest b. the highest c. an end-of-range value d. the average

Transcribed Image Text: O True
O False
29. Objects are instances from classes *
O True
O False
30. In automated software testing, the checking of progran
(1 Point)
CAssertion

103. These are program designed as to seem to being or be doing one thing, but actually being or doing another. a) Trojan horses b) Keylogger c) Worm d) Cracker

Transcribed Image Text: Q5/Write a program which find Y:
x3 – 2 x
if 5>x>1
Y =
5x
if x= 0
1
if -1 > x 2-5
HINT: using functions.

Transcribed Image Text: 82 General
123 No specific formar
12
Number
2
Currency
3
Accounting
Short Date
Long Date
Time
:Select one
?. 2
b. 4
?. 1
d. 3

27. MPEG compression : a. stores the compression values of each frame b. stores the differences between successive frames c. stores multiple frames’ values together d. none of the mentioned

How important is it for an IT person to understand concepts such as cache memory, pipelining processors, the use of the bus, the fetch–execute cycle, and the use of registers?

We can make 60 different words consisting of 3 letters (without repeating the letter and regardless of its meaning) from the letters of the word (write).

Select one:
True
False

Essay form: In 5-10 sentences, with the help of Information, Communication, and Technology, how do you think ICT contributes to the Philippine economy during the presence of the COVID-19 pandemic?

Convert this PHP code to JAVASCRIPT $long_url = urlencode(‘yourdestinationlink.com’); $api_token = ‘462727’; $api_url = “https://google.com/api?api={$api_token}&url={$long_url}&alias=CustomAlias”; $result = @json_decode(file_get_contents($api_url),TRUE); if($result[“status”] === ‘error’) { echo $result[“message”]; } else { echo $result[“shortenedUrl”]; }

Given an integer in the program, write a program to check whether that number less than 10 or not. For sample output take number as 89. Use Kotlin programming language.

On a leased line installation a known good external modem shows no carrier detect light. Where is the problem most likely to be? In the phone line why? it is?

Q#1: Write the answers in your own words
What are the main purposes of MS Word?
What are the main purposes of MS PowerPoint?
How excel makes our life easy?

Transcribed Image Text: Having the set A={a,b,c,d} what would be a valid partition for A?
Select one:
O a. None is correct
O b. {a,{b,c},a}
O c.{{ab},c,d}
O d. {a,b.c,d}

How does a vulnerability scan examine the current security posture? What is the most popular vulnerability scanning engine? Is it an application that is requested by employers on job sites?

Python Automation Script: write a python automation script that scrape a website: “https://www.goodreturns.in/gold-rates/delhi.html” get the latest gold rate and change from previous day, and print the result on the screen.

Is the following UPC code valid or invalid?  Explain. Which credit card is invalid? 4682 7122 5002 6124 4266 9713 8660 4725 4071 2268 1437 0902 4271 8643 7155 6286

The usage of Computer Aided Engineering (CAE) for engineering design assessment has grown significantly. Analyze the integration of CAE in your project’s design cycle and provide an example of this

Karger’s Scheme is based on the identification of harmful logic in the subject and object attributes. Please describe how it may be used with a word processing software. Thank you.

None Transcribed Image Text: Q2B- plot these functions
1
using sub plot :x1=siny cosy,
x2=secy siny , x3=sin(y-O.5)
cosy , x4= tan(y-0.5),
x5=siny2 , x6=cosy3 , when
y=-2n to 2t

i need the answer quickly Transcribed Image Text: (B) Write a program to print the value of y, if there is no solution print (No root)
(z+2)2
y =
10-2x

Write a C++ program that takes a char array (char *) that take your name as input, a char pointer point it and convert lower to upper and vice versa.

Output of following program: public class A { public static void main(String[] args) { } System.out.println(‘j’ + ‘a’ + ‘a’); Choices: a) java b) Something else (Other than simple concatenation)

Define simple and composite attributes, as well as single valued and multi valued attributes. b) Describe five drawbacks of utilizing database systems. c) Identify three possible reasons of transaction failure.

Subject : Artificial Intelligence Fuzzy Set theory defines fuzzy operators. Choose the fuzzy operators from the following. Select one: a. AND b. OR c. NOT d. All of the mentioned

Subject – computer networking The digital signal is to be designed to permit 160 kbps for a bandwidth of 20 kHz. Determine (a) number of levels and (b) S/N ratio.

Write C++ funtion GCD(int a, int b) having single line of code only in the function. Don’t answer if you can’t do it in one line else I will downvote.

Transcribed Image Text: 3 bits full adder contains
Select one:
O a. 4 combinational inputs
O b. 8 combinational inputs
O c 3 combinational inputs
O d. 6 combinational inputs

q7- Which of the following protocols allows secure web services communications on the application layer of the TCP/IP network stack? a. FTP b. DNS c. TCP d. IPSec e. HTTPS

Write a program in C++ language to sorting the 1D array size 8, (descending). Assume the array as float a [8] = {4.3, -2.2, 33, 51, -39.5, 2.9, 6.5, 78}.

Discuss the IT difficulties you have in the AIT Computer Lab(s), including the reasons for the challenges and potential solutions. In addition, talk about the lab’s topology and architecture (s).

Is this true or false? In a non-empty list, the get operation will return the item that has been in the list for the longest period of time, if any.

Forms contain various types of _______________, such as text boxes and buttons, which accept information from a web page visitor. a. hidden elements b. labels c. form controls d. legends

Suppose you are a cashier at a grocery store and you want to write a program that takes a purchase subtotal and calculates the total purchase cost, including 7% tax.

None Transcribed Image Text: Write a program to a plot a tangent on
circle you should take cordinate of
center of circle and point of intersection
from user
In matlab

Transcribed Image Text: Find the complement and the dual of the function given below and then
reduce it to a minimum number of literals in each case. f = [(ab)a][(ab)bl

– What social networks and institutions are you involved in? Do you belong to any virtual networks? What are the functions of those networks, and how can they help you?

When fields are made private, client programs cannot see them directly. How do you allow classes access to read these fields’ values, without letting the client break the object’s encapsulation?

Find out the Postorder Traversal of the binary tree below Inorder: 1 3 4 6 7 8 10 13 14 Preoder: 1 4 7 6 3 13 14 10 8

I forgot to mention in the previous question, please don’t use any inbuilt method Write a program in php to reverse the string. That strung must be taken from user

Examine the contrasts between the two schools of thought on the definition of “information technology.” (As part of your automation study) Which of these services would you employ, and why?

What is the purpose of selection of parent strings in genetic algorithms? Describe in 200-300 words the steps of two selection schemes covered in this module and explain their role.

Write the servlet program with html form to find out the average marks of the student. Take 5 subject marks and calculate the average by using NetBeand IDE with screenshots.

Incorrect answer will be reported,downvoted What is the time complexity of the following recurrence relation (use recursive tree method)? T(n) = 2T (n-1) + n, n ?2 T(1) = 1.

Write a class that maintains the top 10 scores for a game application, implementthe add and remove functions. use a singly linked list instead of an array. C++ C++ C++

17. ________ is a type of transmission impairment in which the signal loses strength due to the resistance of the transmission medium. a. Attenuation b. Distortion c. Noise d. Decibel

The hidden slides. Select one: a. Will able to see during presentation b. Both statements are correct c. None of the statements are correct d. Cannot be view during presentation

Can someone help me explain how ETL strategy is used when Implementing missing data to a Data Warehouse ? Probably better with a process flow and diagram . Thank you.

45. The three general methods for delivering content from a server to a client across a network are : a. unicasting b. multicasting c. broadcasting d. all of the mentioned

Modify the given R programming code to print numbers only upto 6. Transcribed Image Text: i <- 1 while (i < 10) { print(i) i i <- i + 1 FOR JAVA Write a program that asks user to enter a number until user enters -1. Then the program should display the sum of all entered numbers except for -1. None Transcribed Image Text: Write F95 code to generate 5*5 array where all elements of row i have value i. i.e. first row elements have value 1 and so on. List the eight most important principles to keep in mind while designing a user interface. What order would you put their significance in? Describe how you arrived at your conclusion. With the aid of a diagram(s), explain the importance of applying the concept of Work Breakdown Structure (WBS) in managing a typical software project using any SDLC of your choice. consider your home in today’s world. protecting it is vitally important. identify two emerging computer technology devices and systems that can offer additional or superior protection for our prime assets Define simple and composite attributes, as well as single valued and multi valued attributes. b) Describe five drawbacks of utilizing database systems. c) Identify three possible reasons of transaction failure. 19 Transcribed Image Text: For a telephone network, MODEMS are used that produce signals in the range. a. Voice Frequency O b. Optical Frequency C. Radio Frequency O d. Microwave Write a KOTLIN program if a given integer is 2-digit or not. Do not need to take input from user, take sample input as 109 and output should be “No”. which of the following words are legal variable names in C++, and which are not?  And why? x1 EvilDarkness PennslyvaniaAve1600 1600PennsylvaniaAve Bobby_the_Robot Bobby+the+Robot whatThe??? amount count2 count2five 5count main main2 2. The switching of the CPU from one process or thread to another is called ____________ a) process switch b) task switch c) context switch d) all of the mentioned Given two strings variables A,B of length 10 each. Write a fortran program to concatenate both string and print the concatenated string in output. A = “aaaaaaaaaa” B = “bbbbbbbbbb” Consider the grammar X –>XY |  id Y –> id Check whether the given grammar is LL(1) or not.  X and Y are Non Terminal , ‘id’  is a terminal

PROGRAMMING LANGUAGE: C++ Transcribed Image Text: cout « “|” <« setw(5) « setiosflags (ios::fixed) has an output of 534.26 « setprecision (2) « 534.264 « "|"< { if (err) throw err; console.log(result); });

2. Given a boolean expression below, find the value of the expression if the values of P = 1, Q = 0, R = 1. Y = P.Q + Q.(R+P+Q)

fmmkv a stnng from this mm y in O(1) ime Transcribed Image Text: java
we have an array of character
make a string from this array
in O(1) time
I

Transcribed Image Text: The device shown here is most likely a
D.
So
S.
EN
Select one:
O a multiplexer
O b. comparator
O c. parity generator
O d. demultiplexer

suppose the output of a show ip route is as figure 1 below. Explain each entry shown by each arrow. Transcribed Image Text: R 172.16.4.0/28 (120/2] via 209.165.200.226, 00:00:12, Serial0/0/o

Karger’s Scheme is based on the identification of harmful logic in the subject and object attributes. Please describe how it may be used with a word processing software. Thank you.

global climate changes what are the issue and the impact it has on our global society. give the role mobile technology can play in possible solutions to this global issue.

Wireless networks confront a number of issues as a result of their intrinsic features. Describe three of these issues in your own words and show how they affect the user?

What are the four most crucial characteristics for software development? Please share your thoughts on what other four qualities should be included in the software development process to increase performance.

What are the four most crucial characteristics for software development? Please share your thoughts on what other four qualities should be included in the software development process to increase performance.

1072_A_2_OS Transcribed Image Text: 2.
created too many zombie processes in a system (if permitted)?
How zombie processes are created in UNIX operating systems? What will happen if a user

Transcribed Image Text: 5. What is the output of the following java code?
File obj = new File (“C:\\Users\\t99\\Desktop\\java.txt”);
System.out.print (obj.getName ());
a. C:l\Users\lsoh9912\\Desktop\\java.txt
b. Desktop\ljava.txt
c. java.txt
d. java

Draw a quantum circuit that creates the equal superposition of 2 qubits. There should be a phase shift of pi when the qubits are equal. **If possible, include python code**

Four key organizational complements must be in place to ensure successful implementation and use of a new system. Which two of these components seem to be missing at your store?

As an alternative to a full mesh topology in DSF-R, a sysadmin can configure what type of topology that allows a central server to publish the data to spoke members?

2) Given a Clustering task, how you can evaluate the performance on the test set and how we would know if the clusters are correct. Explain any three possible solutions.

Write a paragraph explaining the importance of operating systems and if it is possible to interact with a computer without the need of an operating system in your own words.

I need the answer as soon as possible Transcribed Image Text: Is the following are correct C++ statement?
cout << "Programming with C+!'<< endl: Select one: O True O False char[]  W = { ‘U’, ‘N’, ‘I’, ‘O’, ‘B’, ‘K’}; What is the index value of B in the above array declaration? a. 4 b. 5 c. 14 d. 2 Determine whether each of the following is TRUE or FALSE, Justify your answer: Transcribed Image Text: vm () # (m div 3) ), domain is the set of integers. WA Transcribed Image Text: (d) Copy the three control polygons in Figure 1 into your answer script and sketch their Bezier curves. (i) (ii) (iii) O Start point O End point SDN (Software-Defined Network)! How do they work? What distinguishes them? What are their benefits and drawbacks? What would be your reason(s) for recommending an SDN for your school or business? Transcribed Image Text: Write a java program to insert a word in the middle of another’ string. Example the given string is Hello World. Output Hello I am Rdj World operating system multichoice question Transcribed Image Text: Most common OS are built in: O a. gh level languages O b. Clanguage O c. Asembly O d. A mix of languages. How would you stratify data by Who, What, Where and When in order to help identify the cause or causes of this problem? Why did you choose these stratification factors? What is the difference between the Clustering and Deviation methods in data mining? Explain it to me thank you. I have no idea about it and it is my report Transcribed Image Text: In HTML

; the
used to set the name
and location of the script that will
process the form.
action attribute
process attribute
method attribute
href attribute

Solve it fast fast plz Transcribed Image Text: Write a single java program by taking two variables num1 and num2 with
values of your own and perform Addition, Multiplication, division.

lang : JAVA Transcribed Image Text: The following keyword is not a part of exception handling in Java?
O a. finaly
Iv
O b. throws
Oc try
O d. catch

Determine the order of graph traversal using BFS starting from F with clockwise direction! Transcribed Image Text: Given following graph:
F
C
I
A
(D)
G
K)
E
H
J.

Given the contents of the Scoreboard (capacity=5) as {[”Kristoff”, 75], [“Anna”, 72], [“Elsa”, 67], [“Olaf”, 64]}, it would need how many movement/s or shift/s to accommodate the GameEntry [“Samantha”, 75]?

________ is normally referred to as mB/nB coding; it replaces each m-bit group with an n-bit group. a. Block coding b. Line coding c. Scrambling d. None of the above

I need the answer as soon as possible Transcribed Image Text: 2. if statement that sets the variable fees to 50 if the flag variable max is set to
true.

132. Software designed to provide a specific capability for use by many different customers is termed as a. embedded software b. scientific software c. engineering software d. product line software

115. In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and a. asynchronous port b. synchronous port c. crossover cable d. PC

Why do many systems have a distinct cache for code and data, and how does the hardware determine if bytes of code or bytes of data are present in memory?

Question 4: Write a JAVA program to take input an integer num from user and in output print the value of num + num 2 + num 3 in output.

As an example, consider a packet that is transmitted from one end system to another. Indicate in detail each of the four types of delays that a packet may encounter.

168. The complete description of database which is described in design phase and is changed rarely is called a. schema b. structure c. path of design d. data cycle scheme

If you’re building a simple network, is it better to utilize static or dynamic routing routes, and why? What is the reason behind your preference for one over the other?

Transcribed Image Text: Which of the following Object-Oriented Programming concepts binds the code and data together and keeps them secure from the outside world?
Select one:
a.Inheritance
b.Encapsulation
C.Anstraction
d.Polymorphism

What does traffic congestion mean? Discuss the TCP congestion management algorithm. You must be aware of the difference between congestion control and flow control. Flow control is accomplished via how.

subject compiler design dont post copied answer will report and downvote dont answer if you dont know Transcribed Image Text: Explain the algorithm for construction of. Canonical LR parsing table

Disceret mathematics Transcribed Image Text: b) [*+.
{1,2,3,4} . Find the symmetric and reflexive closures of R.
ek) Let R = {(1,2), (1,4), (2,3), (3,1), (4,2)} be a relation on

The numbers A and B are 4 bits. Design the circuit that selects the smaller of these numbers and displays it on the 7-segment display using the necessary integrated circuits.

Transcribed Image Text: Q1) a-write a program to perform ( 6E – 4C ). (use SUBWF instruction)
b- show if the result is positive or negative uing the curry flag

213. If a subscriber needs to provide free connections for other subscribers, it can request the a. 800 service b. 900 service c. wide-area telephone service d. digital data service

JavaScript provides structured error handling in the form of try, catch and finally block. Explain the purpose of each. Provide sample coding for each. a) Try b) Catch c) Finally

Wireless networks confront a number of issues as a result of their intrinsic features. Describe three of these issues in your own words and show how they affect the user?

Discuss with examples the main difference between system programming and shell scripting and explain in your own words how each of these can be carried out in the computer system.

Write a regular expression for a language over alphabet L = {a, b, c} accepting all strings start with abc and ending with cba. Convert the given regular expression DFA.

Write a program in C that will print largest and the second largest elements of an array. Array size will be 10 and the input will be taken from user.

Solve it by using Octave / matlab program Transcribed Image Text: 1. Using script file in MATLAB/OCTAVE,
c) Sketch y = Inx and y = e* on the same graph.

18. What is the best data type definition for Oracle when a field is alphanumeric and has a length that can vary? a. VARCHAR2 b. CHAR c. LONG d. NUMBER

Draw a dataflow diagram at the context, level-1 and level-2 to describe how information systems are maintained in an organization’s timekeeping biometric systems and employees while generating a salary slip.

When can you tell if a stack is full? A. When TOP = NULL B. When overflow occurs C. When TOP = MAX – 1 D. When TOP = MAX

Describe in what scenarios and how you use each of the following objects in order to improve performance: Indexes, Explain Plan, Rewriting SQL Server Statements, Materialized Views, Map-Reduce and Replication.

write a program and input three decimal in main and pass them to the defualt constructor of the class. show the result of the multiplication of three numbers. in c++.

Transcribed Image Text: Write a code that determines if a string is a palindrome (can be read forward and
backward with the same meaning); e.g. “civic”, “elle”, “madam”
66
22

The purpose of testing is to demonstrate that a software works as it is supposed to. What’s to keep test subjects from knowing what a software is supposed to do?

Given a string s= “Programming”. Write a C++ program to find the number of vowels and consonants in the given string. Note: Do not hard code else I will dislike.

Microcomputer hardware consists of three basic categories of physical equipment __________. keyboard, monitor, hard drive system unit, input/output, memory system unit, input/output, secondary storage system unit, primary storage, secondary storage

Explain what is Basic 2-tier Client-Server Architecture (2-3 sentences)

How Basic 2-Tier Client Server Architecture Works? (2-3 sentences)

What is the importance of Basic 2-Tier Client Server Architecture (2-3 sentences)

What is the results of the source codes below?

values=[‘sct’,’hct’]
for x in range(len(values)):
print(values[x] * 2,end=” “)

a.
scthct scthct

b.
hct sct

c.
hctsct scthct

d.
sctsct hcthct

Pig Latin scripting language is not only a higher-level data flow language but also has operators similar to ____________ a) SQL b) JSON c) XML d) All of the mentioned

Please solve Quickly Matlab programming language Transcribed Image Text: if A [103]; b-1407); and the output is c [40 21] what is the correct
command?
c-b.*a
C=a./b;
c-a/b;
C=a*b;
C=a.*b3;

Write a program to call a function to find the negative numbers of an array (a) = (3, 4, 0, -1, 5, -6, 10, -4) , then print the results.

Assume an organization’s authentication protocol is Kerberos. What impact does it have on security and service availability if either the AS (authentication server) or the TGS (ticket granting server) fails?

Given two 8-bit numbers FE and FF at locations 1000H and 1005H respectively. Write 8085 instructions to swap the contents at the given locations. Attach assembler output and memory view.

Transcribed Image Text: What will be the output for the program given below?
A=20
put of
B=5
uestion
C=A/B
print(A,”/”,B,”=”,C)
O 20/5=4
Error
O 4
O A/B=C
ENG 4))
A

Mathematical Analysis for Computer Sciences- Transcribed Image Text: d) What is a Queue line? What do you mean by Queuing Theory?
e) What are the conditions of Markov chain .

Transcribed Image Text: Which of the following do you use to check the number of rows affected by an
|UPDATE
statement?
Answers:
a, SQL%FOUND
b. SQL%NOTFOUND
SQL%COUNT
C.
d. SQL%ROWCOUNT

Design 2-bit synchronous counter that counts 0, 1, 2, 3 in succession. Draw the given counter’s counting table (state diagram) in binary and decimal form below . Indicate the transitions.

Five channels of l00 kHz bandwidth each are to be multiplexed. What is the minimum connection bandwidth if a 10kHz guard band is required between the channels to avoid interference?

Discuss with examples the main difference between system programming and application programming and explain in your own words how each of these can be carried out in the computer system.

Question 5 a) how would you compile an assembly file listMyFiles.asm into an object file listMyFiles.o b) how would you link and execute the object file created in (a) above

383. A set of programs used for creating, deleting and updating files, forms a a. File processing system b. File monitoring system c. File development system d. File management system

The preferred method today of bot herders for command and control of zombies is to use. a. Internet Relay Chat (IRC) b. e-mail c. Hypertext Transport Protocol (HTTP) d. spam

i need the answer quickly Transcribed Image Text: What is the return type of Constructors?
Select one:
O a. float
O b. None of them
O C. void
Od. int

Consider yourself the iTunes store’s database administrator. How could you utilize predictive analysis to figure out which musicians and films will be the most popular in the next year? Polymorphism?

Transcribed Image Text: Q1/Write a C++ program to find the nearest integer to a real positive number. The
should interrupt you to input the value of the real number.
program

Which tag is used to define the list items in two of the different types of lists? (Only provide the opening tag as the closing tag is optional in HTML5)

Where (if anywhere) should laws prohibit anonymity on the Internet? Where (if anywhere) is anonymity appropriate on the Internet? What are some kinds of Web sites that should prohibit anonymity?

Suppose that instead of using 16 bits for the network part of a class B address originally 20 bits had been used.How many class B networks would there have been?

Information Technology acts as an enabler during Business Process Analysis and Design. Give five examples (in five different areas in an organisation) of how IT is useful during this process.

recommender system that recomends games,  we have more than 1000 games in the catalogue and for each user there are 200 relevant games. which metric evaluation is best and why?

Is it possible to use non-ECC SDRAM memory instead of ECC SDRAM? can someone use unbuffered SDRAM modules in place of buffered SDRAM modules if your motherboard supports unbuffered SDRAM.

Is the division statement in the following code an example of integer division or floating-point division? What value will be stored in portion? double portion; portion = 70 / 3;

Given a 4-element array with distinct values: {x 1 ,x 2 ,x 3 ,x 4 } , what is the minimum number of comparisons you need to sort this array?

the biodiversity, concepts, the advantage and dis advantages, also list down possible ways and strategies on how we acquire those benefits and needs without compromising the growth process of biodiversity.

Do it quick I don’t have my system right now so i need your help Program to find the sum of series: 1 + x^2/2 + x^3/3 + … x^n/n

The idea of RZ and the idea of NRZ-I are combined into the ________ scheme. a. Manchester b. differential Manchester c. both (a) and (b) d. neither (a) nor (b)

Write a progprogram in python language that take a string from user and print that and then take a integer and from that position remove the element from the string

39. What is the first step in performing an operating system upgrade ? a. Partition the drive b. Format the drive c. Backup critical data d. Backup old operating system

Java Program Write a Program to take an alphanumeric string contains numeric value or not.if it is then find which ones is maximum and which one is lowest in numeric

Citing practical examples from the field of computer science, compare and contrast the concept of abstraction. To emphasize the concept of abstraction, discuss the importance of abstraction in software engineering

What would be the mission statement of a internet service provider company? What would be the values of a ISP company? What would be the vision of a ISP company?

Create a JavaScript function to remove a character at the specified position of a given string and return the new string. Test the function on string “JavaScript” and position 0,3,5.

Do fast Transcribed Image Text: JavaScript program to to pass arguments
to a function.
Create a function take a argument and check
whether a number is floating type or integer

Discuss five reasons the project manager uses a Gantt chart as a tool, stating one particular software tool as an example. State the necessary steps to construct a Gantt chart.

Java Program Write a Program to take an alphanumeric string contains numeric value or not.if it is then find which ones is maximum and which one is lowest in numeric

Transcribed Image Text: In each case below, find a recursive definition for the language Land prove that it is correct.
1. L= {a’b’ lj > 2i}
2. L= {a’ b’lj<2i} 175. A client server computer program in which client runs in a web browser is termed as a. web application b. application software c. product line software d. embedded software i need the answer quickly Transcribed Image Text: The comparisons can be done with help of operator. Select one: O a. Assignment Ob. Mathenmatical O c. Arithmetic O d. Relational Accuracy, consistency, and integrity (ACID) are the properties of SQL databases, which ensure the dependability of database transactions and the integrity of database data. Is this statement true or false? Transcribed Image Text: 38. Given the follwing Frame control field (802.11 version,control,CTS,1,0,1,1,0,1,1,0) From the above, The frame here is a retry one ? * True False 83°F Clear O O Which of the following Assembly language instruction calls the SUB subroutine if the zero flag status is 1? a. CNZ SUB b. CALL SUB c. COZ SUB d. CZ SUB Define simple and composite attributes, as well as single valued and multi valued attributes. b) Describe five drawbacks of utilizing database systems. c) Identify three possible reasons of transaction failure. Object recognition in its full generality is a very hard problem. We discussed brightnessbased and feature-based approaches. We also presented a simple algorithm for pose estimation. Other possibilities exist. (True/False) Define simple and composite attributes, as well as single valued and multi valued attributes. b) Describe five drawbacks of utilizing database systems. c) Identify three possible reasons of transaction failure. FOR JAVA Write a method that takes a String array and an integer as parameters and prints the Strings in the array whose length is greater than the second parameter. What role will artificial intelligence (AI) have in determining the future? What Artificial Intelligence (AI) software programs are currently in use? Is the idea of artificial intelligence a scary one? Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? a. FIN b. RST c. SYN d. PSH Given a list of strings, write a program to print the first and last string in the list in the output. In Python language. Given List: color_list = [“Red”,”Green”,”White” ,”Black”] Write a program that having as an input a positive integer n , lists all the bit sequences of length n that do not have a pair of consecutive 0s. Discuss how computer technology may help sectors including education, restaurants, shopping malls, and online shopping, among others. How will you utilize these technologies if you wish to establish these businesses? To put it another way, how does the architecture get turned into computer code? Using examples and a diagram, describe the steps it takes to go from A to B. Question 1. 243 5 is equal to 73 10 Question 2. The signed binary of -6 is 1111 1010 2 Question 3. 0100 0111 bcd = 0111 1010 3-excess code A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose? Error detecting protocols explain? In Python Write a program that reads a string from the user containing a date in the form mm/dd/yyy. it should print the date in the format March 12, 2018. 1. Define a business model. 2. Define Management Information System. 3. Identify a business. Analyse its business model and how the information system can be utilized to support the business. a) Write a program (in java language) to read and write data in file? b). Write a program (in java language) to create a child with sleep command using getpid()? Which operation of Binary Search Tree (BST) uses the successor of a node to complete its functionality successfully? Group of answer choices a)Insertion b)Deletion c)Rotation d)Update the key value e)Search Java Program Write a Program to take an alphanumeric string contains numeric value or not.if it is then find which ones is maximum and which one is lowest in numeric When the word coast is put before the variable definition, what does that mean? How to concatenate two strings in C++ language? How to make a function return multiple values? In the circular linked list below, find the value of the “Head->Next->Data”.

clist1

a.
56

b.
2

c.
11

d.
12 Transcribed Image Text: ??MP
Head
12
56
2
11

Transcribed Image Text: Theorem 14.8. If P is a polynomial over a
field K, then we can find a field
L2 K in which P factorises completely into
linear factors

class Output { public static void main(String args[]) { int x = 3.14; int y = (int) Math.abs(x); System.out.print(y); } } The output of the above Java code is ?

Write a C++ program for linked list containing following methods. Add (Add at last) Add at first Add after value Search Remove given value Remove first Remove from last Display

Let s1 be a variable containing the string “utica”. Which of the followings changes the value of s1 to “Utica”. Select one: a. s1=’U’+s1 b. s1=’U’+s1[1:] c. ‘U’+s1[1:] d. s1[0]=’U’

A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose? Error detecting protocols explain?

Which of the following SQL commands lists the contents of a table named EMPLOYEE? LIST * FROM EMPLOYEE DISPLAY * FROM EMPLOYEE SELECT ALL FROM EMPLOYEE SELECT * FROM EMPLOYEE

Q1: Can there be more than one agent program  that implements a given agent function? Q2: Given a fixed machine architecture, does  each agent program implement exactly one  agent function?

Hello sir can you Help me answer this question? Transcribed Image Text: Differentiate between each of the following types of computers, Mainframes and
Supercomputers, Workstations and PCs, and Portable Computers.

Write a C++ program to read a 1D array of n integer elements. Then, find the output for each of the following:

Find the second smallest number in the array.

Using python- Create an array with a list of names on it (first name, last name) . The array shoud show show the list of last names as the output.

Python Automation Script: write a python automation script that scrape a website: “https://www.goodreturns.in/gold-rates/delhi.html” get the latest gold rate and change from previous day, and print the result on the screen.

Transcribed Image Text: Which of the following class members are accessible by friend functions?
Select one:
a.private, protected and public members
b.only protected members
c.only public members
d.only private members

What does traffic congestion mean? Discuss the TCP congestion management algorithm. You must be aware of the difference between congestion control and flow control. Flow control is accomplished via how.

Discuss the benefits and drawbacks of using dynamic memory in embedded applications. Is it something that should be outlawed at all costs? Is there a reason for this or not?

Transcribed Image Text: QUESTION 1
What is the 8085 Assembly Language Instruction That do the follwing
Copies the contents of the source into the destination register or memory.
TT
Daranran

What is the process ID of the first process in a RedHat Enterprise Linux system that starts? What does this procedure go by? Also, could you please underline the answer?

SDN (Software-Defined Network)! How do they work? What distinguishes them? What are their benefits and drawbacks? What would be your reason(s) for recommending an SDN for your school or business?

In C++ language Write a program to print first 25 natural numbers with only 5 numbers in one line. Output should contain 5 lines with 5 numbers in each line.

Rust Write a program for given that a number is given and then typecast to string and also verify that the it becomes the string.and print the string and results

Write a progprogram in python language that take a string from user and print that and then take a integer and from that position remove the element from the string

113. The data model that is produced from reverse engineering is: a. a conceptual model. b. an internal model. c. a logical model. d. None of the above is correct.

Please let us know whether each of the following is acceptable as a name for a variable. In the event that it isn’t, be sure to elaborate on why. totalCost

Write an ALP to calculate the factorial of a given 8 bit hexadecimal number.

Note: Please do not handwritten. Also, write steps for program in tasm and in assembly language.

CREATE A C++ PROGRAM THAT THE USER WILL INPUT A SET OF POSITIVE INTEGERS (0 TO TERMINATE) AND THE OUTPUT IS TO COUNT THE NUMBER OF PRIME AND COMPOSITE NUMBERS.

Q3: write a C++ program to find by using function. Transcribed Image Text: y = X + .
Q3: write a C++ program to find
n!
by using function.
CCCCCCCO

Transcribed Image Text: (b) Use Spin to prove that the algorithm is still correct: use an assertion to prove mutual
exclusion, and an LTL property to prove freedom from starvation.

In cell ?H15?, enter a VLOOKUP function to determine the 2022 percentage of total attendance for the city listed in cell ?H14?. Use the range ?A5:H11? as the table array.

a) What is the definition of heuristic evaluation? What is the purpose of it? Outline the procedures required in obtaining expert approval. b) Using real-world examples, explain any four Usability Heuristics.

Create a new string from a given string changing the position of first and last characters. The string length must be greater than or equal to 1. Write program in Java.

Transcribed Image Text: Which of the following is correct way to define the function fun() in the below
program?
#include
void main ()
{
int a[3] [4];
fun (a) ;
}

7. Which of the following is NOT a type of variable in Java? None of the Choices Local Variables Class Variables Instance Variables Give an explanation for the answer. Thank you

Transcribed Image Text: Question 31
An optimal solution is only optimal with respect to a particular mathematical model that provides only a representation of the actual problem.
O True
O False

114. A tool that can help designers understand the dependencies of database structures is a: a. dependency graph. b. data model. c. graphical display. d. None of the above is correct.

Evaluate the postfix expression 6,5,2,3, +, 8, *, +, 3, +, * using stack. Transcribed Image Text: Evaluate the postfix expression 6,5,2,3, +, 8, *, +, 3, +, * using stack.

Educate these stakeholders on the advantages of utilizing a spreadsheet solution and how simple it was to process data in order to generate the information provided in the report in Excel

Transcribed Image Text: Computer Basics and flow chart
Arrangement of drivers from bigger to
smaller capacity as
CD, DVD, Hard, Floppy O
Hard, DVD, CD, Floppy
Floppy, CD, Hard, DVD O

Pretend that you have been charged with the task of redesigning the interface for the ATM at any local bank of your choice.develop two personas and two user senarios for it.

Transcribed Image Text: What will be the output of the program ?
#include
#include
void main ()
{
char str1 [20] = “Hello”, str2[20] = ” World”;
printf(“%s”, stropy(str2, strcat(strl, str2)));

15. A ______ file system is software that enables multiple computers to share file storage while maintaining consistent space allocation and file content. a. Storage b. Tertiary c. Secondary d. Cluster

Transcribed Image Text: I A channel has a frequency range between 3 KHz and 14 KHz. The SNR in this channel is
25 dB. Find the channel capacity of this channel.

How to improve System and Explain? 1. Several reasons contribute to the failure of Food panda, like fake restaurants an orders,  miscommunication, technical faults, unstructured business model and lack of  ownership.

Brian was asked to write x72x72 as a product of 2 powers with the same base in 4 different ways, using only positive exponents. Which could be one of Brian’s expression.

Transcribed Image Text: Define the Kernel method for creating a feature space and discuss how and why it is used in combination
with Support Vector Machines to classify data.
Your answer:

Give an example of how process modeling may be helpful for any project, not just IT system development. To what extent is logical process modeling utilized in thorough systems requirements analysis?

80886 microprocessor Transcribed Image Text: Q) 4. Answer the following:
A. If DS=89FOH and the offset is 3421H calculate:
Physical address.
Logical address.
upper and lower ranges of the data segment.

i need the answer quickly Transcribed Image Text: Find the probability distribution of boys and girls
in families with 3 children, assuming equal
(probabilities for boys and girls. also find F(x

None Transcribed Image Text: (c) In 8051, assume that the IE bit for the serial internupt is enabled.
Explain how this internupt gets activated and also explain its working
upon activation

I need the answer as soon as possible Transcribed Image Text: 14. Prove that binary opening and celosing operations are idempotent, that is :
(A E)•E = A•E
(A•E)•E = A•E