b. loops CASE statements C. d. all of the above

What is the best way to

Transcribed Image Text: Which programming constructs can use a CONTINUE statement?
Answers:
IF/THEN statements
a.
b. loops
CASE statements
C.
d. all of the above

What is the best way to randomize a program? What is the best way to resize or move the values generated by the rand function?

Because of the way Chrome OS is designed, computers running Chrome OS have a lower internal storage capacity than computers running other desktop operating systems.

When it comes to AI, what do you want to achieve in the end? Include two examples for each of the numerous sub-areas of it.

Which of the following professions has not been affected by personal computers? A. medical B. clerical C. accounting D. law E. None of the above

In C++ Take a string input from user and print the Character with lowest ASCII value in output. Note : String contains UpperCase alphabets only.

Is it true or false? If the compiler encounters a statement that attempts to alter the value of a constant field, an error will result.

Transcribed Image Text: Identify the type of association shown in the below diagram:
Building
Apartment
a. Abstraction
O b. Inheritance
c. Composition
O d. Aggregation

which of the following commands is used to run a following command as a privileged user ? a) runas b) su c) sudo d) xinetd

Write a program to solve the selection problem. Let k=N/2. Draw a table showing the running tie of your program for various values of N.

None Transcribed Image Text: Oak language program
Write a program to print hello world
using loop and the end point must be
taken from user

Transcribed Image Text: Write a C program using a function to calculate min, max and mean of two numbers. Take the
numbers from the user.

In order to prevent a fast sender from swamping a slow receiver with data, feedback is often used. This process is known as-flow control why?

16 Transcribed Image Text: 13
10
A.
15
Apply the sorted edges algorithm to the graph above. Find the total cost of the resulting circuit.

Why does the recursive function have to call itself to solve a smaller version of the original problem when using recursion to solve a problem?

A ——— is a low-cost, centrally managed computer with no internal or external attached drives for data storage. a. tablet thin client c.nettop computer workstation

How can you read the file “attack_parsed_dataset.csv” ?

Select one:

a. df.to_csv(‘attack_parsed_dataset.csv ‘, index=False, header=False)

b.  all other options

c.   df1=pd.read_csv(“attack_parsed_dataset.csv”)

d.  df.to_csv(‘attack_parsed_dataset.csv ‘, na_rep=’NULL’)

Are there any tools that someone like Peter could use safely, other than a PKI-based system that implements key recovery, to avoid losing his passphrase?

Which of the following is not a function of memory management unit of an operating system? Memory Allocation Memory Protection Memory Free space management De-Fragmentation

Create a flowchart that displays a username’s age five years from now. The algorithm should have a variable that is initialized t your current age.

Construct a DFA that recognizes the following language: Transcribed Image Text: CO2
(b) Construct a DFA that recognizes the following language:
E={0,1},
L= (11+00)(0+1)*
[03]

What is the output of the statements below?
s = 0
for j in range(2,10,2):
s+=j
print(s)

a.
40

b.
10

c.
20

d.
30

Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.

Rust Create a array of any length  and fill the array with random entery then print this array and also print the length of array

. javascript Transcribed Image Text: . The keyword or the property that
you use to refer to an object
through which they were invoked is

None Transcribed Image Text: Assignment No. 3
Using while statement. write a C++ program to
print the even numbers in the range [0 – 100]

10 Components of IS includes. Select one: a. Peripherals only b. All the other options c. Hardware & Software only d. People & process only

Write a java program: Using a single print() method [i.e., System.out.print()], create output shown below: Line 1 Line 2 Line 3 Line 4 Line 5

56. _______ is suitable for businesses that require comparable upstream and downstream data rates. a. VDSL b. ADSL c. SDSL d. both (a) and (b)

define each concept and explain how it contributes to the development of security mechanisms that may be used to achieve desired security policies in companies.

write an access control list which should only allow 192.168.10.0 & 192.167.10.0 & 192.166.10.0 to access network devices (routers and switches) through SSH and Telnet?

) i) If CS = 020AH, SS = 0801H, SI = 0100H and IP = 1BCDH, What would be the address of the next instruction?

Transcribed Image Text: Depending on the table: EMP, Write down SQL statement that counts how many employees that their names have “li’ at any place.

CREATE A C++ PROGRAM THAT THE USER WILL INPUT A POSITIVE NUMBER AND THE OUTPUT IS TO REPRESENT THE SCIENTIFIC NOTATION OF THE INPUT NUMBER

102. Like a virus, it is a self-replicating program. It also propagates through computer network. a) Spyware b) Worm Cracker c) Cracker d) phishing scam

Take input an integer n from user and check whether the integer n is within 20 of 100 or 400. Write program in Java language.

define each concept and explain how it contributes to the development of security mechanisms that may be used to achieve desired security policies in companies.

Examine and contrast the most significant links that exist between mobile devices and cloud computing. What are the advantages of cloud computing for mobile devices?

During the live online lecture sessions, discuss the networking factors that positively influence your Google Meet connection and what can be done to improve it.

# For example, if you want to add a colon (:) after every character in the string “Python” you can use the following code. print(“:”.join(“Python”))

which new functions are being managed by multifunctional operators? describe the impact of this new role on activity relationships nad on flow and space requirements

A problem is appropriate for expert system solution when the need for the solution disbutes the cost and effort of building an expert True False

224. Who was the first individual to distribute computer worms through internet? a) Vladimir Levin b) Bill Landreth c) Richard Stallman d) Robert T. Morris

_________ is a supplementary protocol that allows non-ASCII data to be sent through email. a. JPEG b. MPEG c. MIME d. none of the above

Fortran programming: Print the string given below n times in output where n is taken as input from the user. “Read and write in F95.”

126. System is which two or more nodes are joint together is called? a. dual core b. blade server c. clustered system d. single core

21) The main drivers for e-government evolution during the past three decades have been the development of new laws.
Select one:
a. False
b. True

What is the range of the floating point numbers? a) -3.4E+38 to +3.4E+38 b) -3.4E+38 to +3.4E+34 c) -3.4E+38 to +3.4E+36 d) -3.4E+38 to +3.4E+32

Simplify the Boolean function F = a’(b+c’)(a+b’+c) a’b’c’ in the SOP Form SOP : F= X’Y’Z+X’YZ’+XY’Z’+XYZ ‘  = X'(Y’Z+YZ’) + XZ'(Y+Y’) = X’Y’Z + X’YZ’+XZ’

T/F: One disadvantage of array based storage is the possibility of having more elements than we need, wasting memory we could use for other things.

Write a program in which you have to print the difference in between 2 number and those numbers are given. Please do fast in php

The register which holds the address of the location to or from which data are to be transferred is known as memory address register why?

You had given two numbers and you have to print the addition and subtraction of these number in Erlang language. You have to code this

1-a. With the aid of a diagram, thoroughly discuss five (5) roles of algorithms in computer science and discuss how they aid in problem solving.

A storage area used to store data to compensate for the difference in speed at which the different units can handle data is Buffer clarify?

The terminal device often used in checking charge cards that offers both a limited keyboard input and visual output is the: Video display terminal explain?

Search any two real life applications of hashing, study it thoroughly and explain it in your own words. Provide reference to your research as well.

What is the size of the ‘total length’ field in IPv4 datagram ? a. 4 bits b. 8 bits c. 16 bits d. 32 bits

swift WAP for an array of integer is given print all entries, then add one more entry at middle of array  .now print new array

No need copy paste content if any thing wrong will downvotes What is requirement of transaction status and intention list entries in a recovery file?

S-boxes is one of the process in the Data Encryption Standard (DES) protocol. i) Describe the function of S-boxes that makes DES a secure system.

In python show me how to take input an integer, because when I use input () function it takes input as string and not integer.

What are the Wi-Fi vulnerabilities? How to exploit Wi-Fi vulnerabilities? How can WiFi vulnerabilities be closed? Please do not use handwriting while explaining the question.

Transcribed Image Text: Perform the following binary multiplications using Booth’s algorithm, assuming signed two’s
complement integers:
4.
?.
01110
b.
10110010
X
00111
x 11000001

In order to prevent a fast sender from swamping a slow receiver with data, feedback is often used. This process is known as-flow control why?

None Transcribed Image Text: Question 2
By using 4 to 1 MUX, Design a logic circuit that use to detect the month exceed thirty day.

Explain to a client the difference between personal ethics, professional ethics and computer ethics stating why they these principles must be followed during an investigation.

a. Give 3 types of semiconductor memory and explain their respective
attributes.

b. Give 3 examples of RAID and explain their respective advantages and
disadvantages

Create a simple calculator which can perform basic arithmetic operations like addition, subtraction, multiplication, or division depending upon the user input in Bash shell scripting.

A(n)________is a storage device that contains one or more inflexible, circular platters that use magnetic particles to the data,instructions and information.a.Hard disk b.SSDc.USBflash drive.d.optical disc.

I need the answer as soon as possible Transcribed Image Text: Show that L =
{a |p is a prime} is not a context-free language.

How does a router help the communication and interchange of information between a pc from a network with a web server from a different network?

Could you maybe give a more complete overview of the metrics that are involved in the Software development process? Everything must be explained in full.

evaluate n C x p x q n-x for the values of n, x, and p given in Problem A) n= 4, x= 2, p=1/2

Given the radius, in inches, and price of a pizza, design an algorithm to find and display the price of the pizza per square inch

Transcribed Image Text: 2
How many 2-to-4 line decoders are
required to design one 4-to-16 line
decoder?
O 1
O 3
O 7
O 5

4c. Draw table for IP address classes with the requirements given below Class Leading bits Total no of addres in class Starting address Ending address.

None Transcribed Image Text: 9. Consider relation schemas and instances given below.
In each question below, write a SQL query that computes the required
answer.

Compile a list of the components that make up a typical operating system, and describe the purpose of each component in a phrase or two.

Explain how the spiral model of the software development process can support both the Waterfall model and the Prototyping model of the software development process.

Which characteristic of a sociotechnical system is determined by the technical system components, the system operators, and the operational environment in which the system operates?

You have to perform addition of two given number. So make a program in elixir programming language to addition of two number using fat-arrow function.

a) How would you convert a listMyFiles.asm assembly file to an object file? listMyFiles.o b) How would you connect and run the above-mentioned object file?

501. Virtual memory is often described as hierarchy of a. Two storage systems b. Three storage systems c. Four storage systems d. Five storage systems

Which tags are most commonly used in creating a table? Group of answer choices th table header tr td column footer this is for HTML

Tell us how a business can defend itself against hackers locking in to steal account data by identifying the various types of hacks and viruses.

True or False: The Applet class’s play method loads and plays an audio file once and then releases the memory it occupies for garbage collection.

Do not copy from other websites. Code with comments and output screenshot. Thank you! Q. Write a class that overrides any method of java.lang.Object class.

How IT affects in our Daily lives? What is the importance of Computer Literacy. What are the benefits of Technology in Education, Economy and Society.

Identify the type of string method that returns a copy of the string with all leading and trailing whitespace characters removed. Strip clean remove_whitespace rstrip

Transcribed Image Text: 1. In a software process, the software architectural model is a *
O Deliverable
O Role
O Functional requirement
Non functional requirement

A car is a piece of transportation equipment. Analyze the idea and determine which data members and methods should be added in the Car class.

In a full binary tree, find the expected value of the number of edges from a randomly chosen vertex to the nearest leaf. **Discrete Math

Describe the 3 important approaches to Content Organization on the display, with example of each. Describe any 3 important advantages of using Orbitouch keyless keyboard.

A requirements document typically goes through numerous changes during a project. Mention two (2) reasons why the requirements are subject to changes and briefly explain.

104. Multiprocessing provided by the computer system has a type of a. symmetric multiprocessor b. asymmetric multiprocessing c. symmetric multiprocessing d. both b and c

a) How would you convert a listMyFiles.asm assembly file to an object file? listMyFiles.o b) How would you connect and run the above-mentioned object file?

Write a program that inputs a list of integers from the user, and removes the duplicate list elements, plus outputs their min and max values.

Suppose array a is int[] a = {1, 2, 3, 5, 7}, what is a[0] – a[2]? A. -2 B. 1 C. 2 D. -1

Note: Don’t copy from google give a conceptional answer What is the ideal length of meta description? and Describe link building strategies and backlink types

Write a program that initiates the variables cost1, cost2 and costs 3 and assigns them the values 15.7, 22.4, 65.1 respectively in one line .

If you were to keep track of transactions in a banking system. How would you curate a data structure for that? Please answer in C#.

In regards to cloud computing environments, describe what are the risks involved. Once you have identified these hazards, write down your methods for addressing them.

Transcribed Image Text: The minimum number of flip-flops that can
be used to construct a modulus-5 counter is
A
B 8
C
D
10
LO

Grid computing and cloud computing vary in the infrastructure upon which they are based. I’m trying to understand how cloud computing and grid computing differ.

Write a Program in Rust language to find the value of expression. 2a 2 + b*c + a*c Given, a= 10, b= 5, c= -2.

Provide an overview of the internet of things. What makes the industrial internet of things unique? How does it stack up against the established network?

given an array with repeating elements each element repeats thrice except one.find that one in O(1) space and O(n) time complexity in machine independent language.

Write a program code in the Node js to split the string into the readable format.Use the built in modules to easily split the query.

It has evolved over the years into a fairly simple set of tools that are relatively easy to master.is not true of a DBMS? why?

Every subtree rooted at any node of a 2-3 tree is a 2-3 tree in and of itself.

Choose one:

Is it true or false?

Transcribed Image Text: Assume int[][] matrix = {{3,
2}, {7, 9, 5}, {4, 8, 2, 6}}; ,
How many elements are in array?
12
3

What is the significance and use of design patterns in software engineering? Give a brief description of any three design patterns, using an appropriate example.

Write a C program to take input a positive  integer and check whether the number is a multiple of 3 or a multiple of 7.

Transcribed Image Text: Design a 5-to-1 multiplexer circuit, minimizing the number of gates in the circuit as much as possible.
S2
So
U
V
M

Write an algorithim DELETE(A,N,POS) to delete an element at POS. You can use the following array to implement your algorithim {3,8,12,5,6} This can be pseudocode

Transcribed Image Text: The breach of confidentiality always results in a breach of:
Integrity
O Possession
O Utility
O Authenticity
nt link submission
Jump to..

33. How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key? a. 16 b. 17 c. 18 d. 19

Transcribed Image Text: Question 1: Write a C++ program to read a number from the user and print whether it is zero,
positive or negative.

Use the bubble sort to sort d , f , k , m , a , b , showing the lists obtained at each step.

A word processor designed for programmers is called A. a formatter B. a compiler C. an editor D. a debugger E. None of the above

Peter wants to use the electrical outlet to power his computer. Describe the steps that his computer will go through to bring up the desktop.

14 Stakeholders of the public sector are persons or organizations that can affect or are affected by its actions. Select one: a. False b. True

130. The linked list formed by the deleted records is called as ______ a. Delete list b. Free list c. Null list d. Non-existent list

Are the protective measures adequate to ensure the security of the information system? Alternatively, is there a way to guarantee anything or is everything unpredictable?

clear and neat please don’t copy What is the size of the variable when a stack is created? The word “system testing” should be defined.

Explain how different requirements engineering CASE systems work, and how effectively they allow automated consistency analysis for validating and verifying requirements (if they do so).

450. To overcome limitations of MS-DOS, Microsoft came up with idea of a. Windows 3.0 b. Windows XP c. Microsoft Windows d. MS Windows NT

What happens if the file named done already exists when you run the following commands? $ cp to do completed $ mv to do completed

73. Every easily made mistakes and flaws in the computer design and architecture, are referred to as a. Fallacies b. Pitfalls c. Error d. Debugging

define each concept and explain how it contributes to the creation of security mechanisms that may be used to achieve desired security policies in companies.

Transcribed Image Text: What is the difference between bit address 7CH and byte address7CH? What is the specific location of bit
address 7CH in memory?

8. The ASCII encoding of binary data is called i) base 64 encoding ii) base 32 encoding iii) base 16 encoding iv) base 8 encoding

Draw a UML representational diagram and draw the diagram for the process of any digital/automated system. Explain why it is best suited for this process

No plagarism please! Write in your own , if found copied will be downvoted directly Q. Difference among sequential access, direct access and random access?

Transcribed Image Text: A set of interlinked of multimedia
documents which is storing in the
web is
Software O
Internet
World Wide Web
Media file

Is it true or false? If the compiler encounters a statement that attempts to alter the value of a constant field, an error will result.

how each of the basic principles of the cybersecurity discipline is used to achieve overall system security is described in detail in the next section.

Would it constitute an editing operation or a formatting activity to rearrange the paragraphs in a manuscript using a word processing program? Explain your answer.

With the use of relevant research examine the potential benefits connected-car technologies offer auto makers such as BMW in terms of enhancing long-term customer relationships?

Write a C++ application to accept 20 peoples from the user. a. find the arithmetic mean b. find the standard deviation c. find the variance

Systems with several processors require synchronization between the processors in order to share memory. Clusters and grids don’t have the same mechanisms as regular computers.

What are infographics and in what ways can you verify what you see? What dangers should you look out for? (list at least 4 methods)

Which of the following are valid case statements in a switch? a. case 1:            b. case x < 4:            c. case 'ab':                  d. case 1.5: 53. Windows 3.X series provided a GUI on the a. bottom of DOS b. top of DOS c. left of DOS d. right of DOS If a function has a local variable with the same name as a global variable, only the ____ variable can be seen by the function. Give scenarios that could serve as an example for each type of four dimensions along which poor data might impact a business in database ? Name any three protocols which are weak or susceptible for attack, assuming that the organization’s users extensively rely on the network for their day-to-day operations. What types of indexes recommended for a given database used by a mobile service provider of its users and advertiser customer based given information retrieval. (Intro to Python) Q3. Create a list of 10 integers (starting with 0) whose value and index are the same, for example L[5] = 5. 148. ISP exchanges internet traffic between their networks by a. internet exchange point b. subscriber end point c. ISP end point d. internet end point 27. To get the physical address from the logical address generated by CPU we use ____ . a. MAR b. MMU c. Overlays d. TLB None Transcribed Image Text: Q2. Write program in c++, using function to finds the sum of the following series:- Sum= 3/7+ 5/11+7/15+ 9/19+ 11/23+….+n/ (2n+1) Take a string input from user and print the Character with highest ASCII value in output. Given : String contains lowercase alphabets only. In C++ What is the most important distinction between connectionless communication and connectionoriented communication, and how can you identify the difference between the two types of communication? Transcribed Image Text: QUESTION 1 A CASE expression No server instances per computer Returns a value based on conditional logic Multiple server instances per computer Given the following data: 11   18   24   33   47   59   61   72 Find each of the following: Q 1 Q 3 D 5 P 80 Transcribed Image Text: |Show forwarding processes to reduce the stall cycle LDUR X1, [X2] ADD X2, X2, #2 OR X4, X1, X6 STUR X4, X4] Transcribed Image Text: Compare and contrast the Windows API and the POSIX API and briefly explain how these APIS can be applied in systems programming. What type of tree do you receive when you instantiate a tree for ordered data in the Java Standard Library, and how do you know? Count the total number of different one-to-one functions from the set {0, 1} into the set {1, 2, 3,…,n}, where n is a positive integer. (Intro to Python) Q3. Create a list of 10 integers (starting with 0) whose value and index are the same, for example L[5] = 5. The main limitation of legacy system over ERP is O a. Less effectiveness O b. gh cost O. C. No integration O d. More modules. Choose any three traditional methods for determining requirements and illustrate how you can use each to collect and gather requirements in the system development process. Given a clipping window A (10;0);B(20;0);C(20;20) and D(10;20), use Cohen Sutherland line clipping algorithm to clip the line segment having two end points(5;1) and (25;30). Explain briefly the following How to use 1) Write back, 2) Write through, 3) Write allocate, and 4) No-write allocate during cache hits or misses Please solve Quickly Transcribed Image Text: what is the MATLAB command in a script file when the command window shows * (Enter person’s weight) ?????? In fixed channel assignment strategy, each cell is allocated a predetermined set of _______ a) Voice channels b) Control channels c) Frequency d) base stations Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot)? Transcribed Image Text: 4. Apply topological sorting underpants shirt socks watch pants shoes tie belt (jacket 5. Apply SCC on the following d h f 179. Which of the following divides the input domain into classes containing data? a. Equivalent partitioning b. Environment partitioning c. Procedure division d. Compilation division Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers. Transcribed Image Text: Q3: Write a complete program to read a string from the user at the runtime and check if it is palindrome (syetrical). Multi-programming systems________: Are easier to develop than single programming systems Execute each job faster Execute more jobs in the same time None of The Above Technology is rapidly developing, and further change is inevitable. Discuss any five (5) recent computer or communication breakthroughs that reflect the current state of computing. How to write a Bash script on a Linux VM to backup a set of test files to a Windows 7/8 VM system every hour. What would be the depth of penetration for copper at 2 MHz frequency with o=5.8 x 10? 46.72 µm 56.90 µm 76.34 um 66.08 µm Prove the following using RULES of INFERENCE/REPLACEMENT: 1. ?S ? C 2. W ? S 3. ?W ? T 4. T ? H Therefore: H A(n) ___________is a database that stores business information from many sources throughout the firm and covers all elements of the company’s procedures, products, and customers. Transcribed Image Text: Write a c++ program that display the following alphabet pattern. Use nested loops of your choice. Output should be: TTTTTTTTTTT T T Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot)? Use a tree to test whether the following argument is valid or invalid. If it is invalid, read off a counter example. 1.A?B 2.B?C ?A?C Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers. Transcribed Image Text: Software Reverse Engineering cannot be performed straight forward if. * Low Level Code exists gh level code exists no code is available JAVA PLEASE Explain why you would want to implement the Cloneable interface instead of just using the simple assignment statement object y = object x. Which file systems might you use if you have a 20 GByte disc volume and want an 8 KByte cluster size (to prevent wasting space)? ijg Describe in detail three things that you may attempt if you have completed the debugging procedure but are still unable to resolve the issue. convert the  following nfa into  equivalent dfa Transcribed Image Text: 1. Convert the following nfa into an equivalent dfa. (1) b ? 91 92 ? l1 = [1121, 12787, 1314545, 1144, 15000] l2 = [14542, 13587, 11451, 121545, 18784] check both are list are equal or not whithout using loops In order to prevent a fast sender from swamping a slow receiver with data, feedback is often used. This process is known as-flow control why? a) How would you convert a listMyFiles.asm assembly file to an object file? listMyFiles.o b) How would you connect and run the above-mentioned object file? want to implement a network service involving sockets where servers and clients authenticate themselves and encrypt the transmitted data using SSL correct else i downvote Asap Transcribed Image Text: Let T, be the recurrence relation is defined as follows: 0, n = 0 %3D Tn-1+n, Find the value of T,? Python program Write a program for a string is given and you have to write this in a file named news.txt and screenshot are must In Python, which keyword is used in chained conditional that will allow additional condition in the program? a. ifelse b. elif c. elseif d. else Create a query to display all names where the first name starts with letters in the J-R range. Use the BETWEEN clause. Need an example Choose the correct verbs to complete the sentences There is a certain amount of hands-on work which involves carrying out/ensuring/contributing training courses for U.K.-based personnel. How are software systems versioned? Take an example Software version document online and explain the versioning details used and conventions that are followed. Give proper references. Create a Python Program that utilizes an Engineering Formula (use any formula from any discipline) and all of the following structures: String Methods Text File Manipulation What are the two sorts of services provided by the Internet to its applications? What are some of the distinguishing features of each of these services? don’t use others answer, show your work step by step Transcribed Image Text: 3. Convert the decimal real number -29.3125 to a binary floating point value. Answer only if you are 100% sure . Correct and detailed answer will be Upvoted else downvoted. Thank you! Discuss about timestamp ordering rule and starvation. When multiple paths are all based on checking the same variable/value, it is recommended to use if and else if statements. Is this true or false? Given that the organization’s users depend heavily on its network for their day-to-day activities, please identify any three protocols that are insecure or vulnerable to attack. Tell us about TCP connections and what they do. The Internet is a connectionless packet-switched network, therefore does the concept of a TCP connection contradict that? If possible, could you give a more complete description of the metrics that are involved in the Software development process? Everything should be explained in full. Prompt the user to enter two angles of a triangle and compute the third angle of the triangle and print it in the output. Language: PHP Examine the use of the edge detection method in picture segmentation and segmentation. When it comes to digital picture edge detection, why is it so important? PROBABILITY AND STATISTICS Two dice are rolled, find the probability that the sum is a) equal to 1 b) equal to 4 c) less than 13 What are the most significant distinctions between a local-area network and a wide-area network, and how do these differences influence the architecture of a distributed database? shortly,step by step and without notes please Transcribed Image Text: 2. Encrypt the following message using RSA cryptosystem. Message : THIS , with n=2633 and e=29. 158. Bug in one program of the operating system effects others in a. single program environment b. multitasking environment c. sharing environment d. multi program environment Transcribed Image Text: Removing a duplicate code in the program.14 * is an example for Reverse engineering O Bad smell O Fixing faults O Refactoring O Does the idea of using your smartphone without an operating system make you nervous or excited? It’s important to know which operating system is needed for What is the range of numbers returned by Math.random() method? i) -1.0 to 1.0 ii) -1 to 1 iii) 0 to 100 iv) 0.0 to 1.0 Transcribed Image Text: 33. In a parallel projection, will a line parallel to the Z axis project as a point, a line, or not at all. Give correct answer get upvote else downvote sure…. Transcribed Image Text: foliowing” CFG s-> 0ABB|a nn
A-> aBBIa
B-> b BB/A
Construct pD A for the

Transcribed Image Text: Create an Inline Salesforce object query language (SOQL) to find the contact id and name of
the contact object in the descending order.

16) Which of the following is a basic characteristic of the IP protocol?

a.
connectionless

b.
media dependent

c.
reliable end-to-end delivery

d.
user data segmentation

How important is it to keep up with the upgrades? What might be some consequences of either turning this feature off or of ignoring update announcements?

In Internet protocol stack, when data is sent from device A to device B, the 5th layer to receive data at B is  Application layer explain?

In Internet protocol stack, when data is sent from device A to device B, the 5th layer to receive data at B is  Application layer explain?

6. What is cloud computing services changing? The way people access information. The way people deliver information. The way people use information. All of the above.

The Intra-Site Automatic Tunnel Addressing Protocol is used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network. Is it true or false?

Using your knowledge in binary tree traversals, implement the following tree traversing algorithms in either Java or C++, i. inorder, ii. preorder iii. and postorder traversal

Explain the two kinds of signal in the multilayer perceptron with the help of diagram of architectural graph of a multilayer perceptron with two hidden layers?

One of the benefits of a Hadoop installation is the high degree of computational redundancy it offers. What makes this so crucial in a hospital setting?

Python Module 2.1 Write a program to take input three integers x,y,z from user and print the value of x*y – y*z – z*x in output.

Based on your observation in today’s society, how would you compare the presentation of issues in the different kinds of media (print, broadcast and new media)?

Transcribed Image Text: Question 2
A resource constraint refers to any functional constraint with a 2 sign in a linear programming model.
O True
O False

Describe what a challenge–response system for authentication is and how it works. What makes it more secure than a conventional password-based approach is not immediately obvious.

The use of unification to identify appropriate substitutions for variables eliminates the instantiation step in first-order proofs, making the process more efficient in many cases. (True/False)

6. The RAID level which mirroring is done along with stripping is a. RAID 1+0 b. RAID 0 c. RAID 2 d. Both a and b

Take a look at the ADT for the cave system. This ADT may be implemented using a graph. Implement the algorithm using the class you created.

What is the results of the source codes below?

a = [3,5,8]
a[1] = a[2] + 3
print(a[:])

a.
[2,11,8]

b.
[3,11,8]

c.
[3,8,11]

d.
[3,5,8]

The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet. a. 1-persistent b. p-persistent c. non-persistent d. none of the above

None 157. Under software requirement engineering QFD stands for a. quality function design b. quality function development c. quality function deployment d. none of the mentioned

Give some examples of benefits and drawbacks, such as the following: The service that does not need a connection The service that is based on connections

44. System resources of computer system can be utilized better in a. single program environment b. dual program environment c. core environment d. multi program environment

Question:- can any one tell me if we implement linked list implementation in queue then the important condition for a queue to be empty is ?

145. The cheapest modems can transmit a. 100 bits per second b. 300 bits per second c. 600 bits per second d. 900 bits per second

What worries do you believe the database’s designers have? when it came to making this important resource accessible on the internet to the public at large?

How would you convince diverse stakeholders of the overall need for a healthy security culture? How do you make it real and relevant for nontechnical audiences?

Prioritize identifying and communicating at least three suggested practices to companies, particularly those that use the cloud, in order to protect their data and other resources.

Transcribed Image Text: Which of the following is a condition(s) that causes deadlock?
a. Mutual exclusion
b. Hold and wait
Oc. Circular Wait
d. Coffman’s Conditions

Identify 5 attributes per entity making sure that you identify the primary key attribute, composite attribute, simple attribute, multivalued attribute and derived attributes. Label attributes accordingly.

Transcribed Image Text: Arrays
Consider the following two lines of c:
char *a = “abede”;
printf(“Xs\n”, a);
What text do these lines print to the console?

Write 8085 instruction to store the 1 byte data 52H into memory location 2000H using direct addressing mode. Show memory view and assembler output. Sim8085 software.

Transcribed Image Text: 2. For a smartphone as a system, do the following:
a. Decompose the system into sub-components
b. Modularize the sub-components of the system

Explain the distinctions between personal ethics, professional ethics, and computer ethics to a client, as well as why these principles must be observed during an inquiry.

What technological barriers do companies face when trying to link networks that are located in different locations and how do companies like SkyVision help these companies?

What are the most significant distinctions between a local-area network and a wide-area network, and how do these differences influence the architecture of a distributed database?

None Transcribed Image Text: Draw the curve of the implicit function:
f(x,y) = x2 sin(x + y2) + 5cos(x2 + y) = 0
Only on matlab

Consider the case of an e-commerce website that wishes to maintain a record of each customer’s purchases. Describe how cookies may be used to do this.

Discuss the Life cycle activities of Prototyping model in detail with diagram. Explain why the Spiral life cycle Model is considered to be the Meta model.

How are software systems versioned? Take an example Software version document online and explain the versioning details used and conventions that are followed. Give proper references.

By definition, a(n)________ is a person or thing that has the power to carry out a threat. a. vulnerability b. exploit c. threat agent d. risk

When choosing a card randomly from a standard deck of playing cards how uncertain is the suit (Hearts, Diamonds, Spades, Clubs)? Answer in bits of entropy.

Instruction set orthogonality refers to the characteristic in an instruction set architecture where each instruction has a “backup” instruction that performs the same operation.True or False.

The terms ethics and morality are often used interchangeably in casual conversation. However, there is a distinction between them. Explain the differences between ethics and morality.

Describe the process through which intra-AS routing is achieved. Give an example of a routing protocol and explain if it is LS or DV in nature.

What does the layered approach to operating system architecture entail? What are the benefits and drawbacks of this strategy? Justify your position succinctly with an example.

MCQ: Which of the following is an example for user to host authentication? a. Encryption keys b. Digital certificate c. Username & Password d. Hash algorithm

Multiprocessor systems allow several processors to communicate with one another in order to access shared memory. Mechanisms that are not typically applicable to clusters and grids?

A single bus structure is primarily found in A. Main frames B. Super computers C. gh performance machines D. Mini-and micro-computers E. None of the above

Choose When (4536) BCD + (4346) BCD addition is performed how many correction are required?
A. 1 correction
B. 2 correction
C. 3 corrections
D.4 corrections

Transcribed Image Text: Which of the following is an example of a UML diagram?
Select one:
a.use case description
b.use case diagram
c.event table
d.screen layout

Which of the following is not associated with the session layer ? a. Dialog control b. Token management c. Semantics of the information transmitted d. Synchronization

Multiplexing methods that are utilized by the physical layer include TDM, FDM, and CDM. Begin by explaining the advantages and disadvantages of each of these methods.

Transcribed Image Text: #include
using namespace std3;
int main() {
int x-6; int y=103;
int z=0; int q=1;
Z+= X– -ys
q*=++z+y;
cout<
int main ()
{
int arr[1]
{10};
printf(“%d”, 0[arr]);
return 0;
}

316. Special set of characters that computer associates with specific user identification is classified as a. password b. identity code c. inquiry code d. dump code

300-500 words per discussion Discuss the following and provide scenarios each. Consider engineering-based domains when using examples. Dynamic Programming Asymptotic Analysis Greedy Algorithms Divide and Conquer

which of the following devices is used to connect different network segments and manage the traffic between them? a. Bridge b. Hub c. Gateway d. Repeater

Transcribed Image Text: 1. a) Create a table Staff
Column Name Datatype
Constraint
Sid
Number(3) Primary Key
Varchar2(30)
Varchar2(30)
Sname
City
redate
Date
Salary
Number (7)

23) As paired strategies for achieving competitive advantage operational effectiveness and cost leadership work better together than operatioinal effectiveness and innovation. True or False? True False

Explain the six stages that make up a typical preliminary enquiry. Why is it important for an analyst to be cautious while using the term “problem”?

To prevent two devices from attempting to utilize the bus at the same time, do microprocessors require pins of the bus arbitration type to govern traffic?

Due to the improvement in navigational database access made by third-generation products, second-generation systems were replaced by third-generation products in the development of database technology. why?

How do you create an access list that prevents a certain machine from being accessed? Could you perhaps clarify in more detail and offer an example?

37. For a ______ channel, we need to use the Shannon capacity to find the maximum bit rate. a. noisy b. noiseless c. bandpass d. low-pass

Transcribed Image Text: 4G+
8:15 AM | 4.3KB/s @
Vo
52
Title
.Write a function that take a angle in
degree and return tan(x) in java

Take input 7 integers from user and print them in reverse order of there input, i,e. number entered last should be printed first. Code in C++

The number of exchanges needed to sort an array of N integers using Selection Sort is N.

Choose one of the following options: True or False.

What are the two sorts of services provided by the Internet to its applications? What are some of the distinguishing features of each of these services?

100. What is (are) reason(s) to change an information system? a. New technology b. New requirements c. Problems in the existing system d. All of these

Discuss the theory of computation such as the automata theory, computability theory, computational complexity theory and quantum computing theory; and describe their relevance in modern computers.

Arrange the following activities to form a general software engineering process model: I. Manufacture. II. Maintain. III. Test .IV. Install . V. Design . VI. Specification

When it comes to version control software, what’s the difference between distributed and centralized? What are the two most significant benefits of utilizing version control software?

Standard building components are essential in multimedia. Explain the components of multimedia and how they may be used to create an interactive website for your organisation.

Outline the steps for segmenting networks. Be sure to describe the benefits of the segmenting strategies. Create guidelines for the implementation of methods for detecting attacks.

I need the answer quickly Transcribed Image Text: Q2) determine A>B, A Value

51. Method used in writing and designing of a program is termed as a. bottom-up method b. top-down method c. split method d. binary states method

Createtables based on this relational schema using SQL using Microsoft access Screenshot the SQL and OUTPUT for each . base (basecode, city,state,poscode,ManagerID) Type (TypeCode,Description) Truck (SerialNum,BaseCode,Typecode,Miles)

Make class Student, you need to add the normal constructor with parameters not default with 5 attributes age, gender, ID full name, date of registration JAVA

None Transcribed Image Text: Name
Scholar No.
Class
Father’s Name
Mobile No.
Joining Date
(YYYY MM-DD)
Total Fees
List the swing controls in the given frame.

Transcribed Image Text: What commands can be used to end loop execution? (Choose all that apply.)
Answers:
CONTINUE
a.
b. EXIT
C.
EXIT WHEN
d. STOP

Examine the use of the edge detection method in picture segmentation and segmentation. When it comes to digital picture edge detection, why is it so important?

5400 TTL series IC’s can operate over a temperature range of ( -55 to 125 ° C ) . Select one : O True O False

Transcribed Image Text: In a CRC card, anything that a class does is called
O a. Collaborators
O b. Subclasses
O c. Attributes
O d. Responsibility

a) Take input a string from user and check if the string contains two consecutive digits in it or not. Please do this fast in C++

Write a program that take Input two strings from user and find which string is larger in length. Print the larger string in output. In C++

.Which function is used to perform some action when the object is to be destroyed? a) finalize() b) delete() c) main() d) none of the mentioned

From the video clip below. What is the title of the game and who was the designer and manufacturer? What characteristics make the game unique? https://nv.instructuremedia.com/fetch/QkFoYkIxc0hhUVJsV09NQk1Hd3JCM0ppLzJBPS0tYWU1OWM0Y2ZlNzdhZTIxNGE3Y2UwYjhjYzA2YzJmZjNlNWExZTIyMA.mp4

Transcribed Image Text: Give an O(n)-time algorithm for Collapse problem (“in ONE loop”, & InPlace )
INPUT
C
E
F
OUTPUT
A
?
C
DE
F

Java Programming Create your own class that illustrates the use of encapsulation. Make sure to include at least one setter and one getter for the class

Average Number of Letters Modify the program you wrote for Problem 1 (Word Counter) so it also displays the average number of letters in each word.

YOUR QUESTION IS: 1. What value will be assigned to the numeric variable x when the following statement is executed x 4 \ 2 * 4

What specific role does an operating system (OS) play? What is the relationship between an operating system, applications, and other software with regard to computer hardware?

Transcribed Image Text: What is a sound with a voltage equal to 2.3 is represented in a 4 bit A/D converter with a 5v maximum value

In Python write a program to read two integers num1 and num2 from user and print the value of num1*num2 + num1 – num2 + num1/num2

Need output #include #include using namespace std; int main(int argc, char const *argv[]) { char arr[12] = “H3ll0\tW0r1d”; for(int i=0;i<12;i++) { cout<<(bool)isprint(arr[i]); } } suppose the RSA cryptosystem is used for sending secret messages with the private key (15,3) and the cipher text “3” is received. what is the plaintext? Q- Provide a Survey of GOF design patterns in given format Name Type Number of mandatory classes Purpose in one line Subject: Software Design and Architecture Discuss the Life cycle activities of Prototyping model in detail with diagram. Explain why the Spiral life cycle Model is considered to be the Meta model. 23 Static websites that only show information content are an example of: Select one: a. Transaction points b. Communication points c. Information points d. Service points In Java, a char variable is capable of storing any Unicode character. Write a statement that assigns the Greek letter ? to a variable named greekLetter. Transcribed Image Text: Let R be the relation R = {(a, b) | a < b} on the set of integers. Find a) R-1. b) R. Please Help ASAP!!! Transcribed Image Text: In the space provided below, briefly describe the reference-counting garbage collection algerithm. Edit Format Tale 12pt v Paragraph BIU Av Open address bar in your browser and type “chrome://help” and explain the features in help and propose how you can protect organization’s computers from similar attacks. Please write 4 pages document on Artificial Intelligence and Language. It should include; research question, dependent variable, independent variables, literature gap, theory, and hypotheses and methods. Decryption and Encryption of data are the responsibility of which of the following layer? a. Session layer b. Network layer c. Transport layer d. Presentation layer Explain the six stages that make up a typical preliminary enquiry. Why is it important for an analyst to be cautious while using the term “problem”? List four criteria that would be used to compare the software development project tracking tools that companies employ to keep track of their software development projects. Transcribed Image Text: Question 2 is a connecting device that operates in the physical and data link layers of the Internet model. Router Bridge Repeater AP If a system hangs after being used for several hours and you suspect overheating, what can you do to easily monitor the CPU and system temperature? What will be the output of the following C code? char str[20]; str= “123546”; res= atof(str); printf(“String value = %s, Float value = %f\n”, str, res); Write a C++ program to read a multi word sentence from the user and replace all the words “pet” with the word “bet” in the sentence. Answer only if you are 100% sure . Correct and detailed answer will be Upvoted else downvoted. Thank you! What is the use of GetNames operation? Transcribed Image Text: Which of the following statements are equivalent? O y += x x = x +y x += x+y x++y | x += y One of the benefits of a Hadoop installation is the high degree of computational redundancy it offers. What makes this so crucial in a hospital setting? With respect to objects, describe the difference between a property and a method. Feel free to use words like thing, action, description, attribute, and so on. #include  using namespace std; int main() { int n,r,sum=0,temp; cout<<"Enter the Number="; cin>>n; temp=n; while(n>0) { //logic } // number is palindrom or not }

Besides the ArrayList class in Java, do you think there are other classes that are implemented with an array. Name those predefined Java classes, if any.

Name 3 application layer protocols using TCP and UDP each. Also explain with the help of diagram how transport layer provides transportation service to application layer.

Do not copy from other websites. Correct and detailed answer will be Upvoted else downvoted. Thank you! Q. Prove that bipartite matching problem is in NP

Iterative Factorial Write an iterative version (using a loop instead of recursion) of the factorial function shown in this chapter. Test it with a driver program.

Take input a character and string, append the character to both left and right extreme of the string and print the resultant string formed. In C++.

Varied models are used in software development, with each model having a different relevance depending on the application. Please classify those models according to your preferences.

In asynchronous serial communication the physical layer provides a. start and stop signalling b. flow control c. both (a) and (b) d. none of the mentioned

What is meant by Regular Expression? Why we used it? What is the difference between a regular expression and a descriptive method? Kindly give some examples

By using NetBeans IDE, write the servlet program with html form to add the two numbers. (use get method).With screenshots of the program and the output.

Transcribed Image Text: Differentiate these given notations and
explain it by solving some examples.
O Notation
Big O Notation
Q Notation
Note: No Copy Paste(Strict Policy)

Q-Write a program using if statement instead of switch statement.

x=2;

switch x

case 1;    disp(‘One’)

case 2;    disp(‘Two’)

case 3;    disp(‘Three’)

otherwise; disp(‘Unknown Number’)

end

16. When two or more processes attempt to access the same resource a _________ occurs. a. Critical section b. Fight c. Communication problem d. Race condition

62. ________ is the process of converting digital data to a digital signal. a. Block coding b. Line coding c. Scrambling d. None of the above

Given a viewport 40cm wide, what is the size of 1vw? a. 400cm b. vw is not measured in units c. 40cm d. 4cm e. 0.4cm

381. File operation used to access attributes of a file is known to be a. get attribute b. set attribute c. define attribute d. declare attribute

DAA  subject GIVE CORRECT ANSWER GET LIKE ELSE DOWNVOTED Solve the following 0/1 knapsack problem  using greedy method P= ( 11,21,31,33) w=(2,11,22,15) C= 40, n =4.

Given the following JavaScript code: elem = document.createElement(‘span’). Which statement can be used to add the new element to the DOM. document.body.childNode(elem) document.body.appendChild(elem) document.body.parentNode(elem) document.body.node[1]= elem

Given the sets: P = {x, y} Q = {x, {x}} Q – P is a subset of {x, {x}} Select one: A. FALSE B. TRUE

I need the answer as soon as possible Transcribed Image Text: Q4
C++
Q4/ Write a program to find a minimum number between fifteen (15) numbers.

128. The levels in which the three schema architecture can be defined includes a. internal schema b. conceptual schema c. external schema d. all of above

c). Information systems affect organizations economically and behaviorally.  Describe the ways in which each of these applies to an understanding of the working of the organization.

In FTP, there are three types of _______: stream, block, and compressed. a. file types b. data structures c. transmission modes d. none of the above

What are the two sorts of services provided by the Internet to its applications? What are some of the distinguishing features of each of these services?

Transcribed Image Text: When used as a condition, any nonzero value implicitly converts to
false; 0 (zero) implicitly converts to true|
Select one:
O True
False

1.Three examples of Information Systems that you may have encountered. 2. Give one example of each part of the IS Equation from the different            information systems.

Give an example of each of the five functions a database management system does. Explain the issues that might emerge if each duty was not fulfilled.

Interconnecting networks that connect part of a company’s internet resources to the intranets of its customers or suppliers. What will be the best match for you?

Reorder the following to melts faster to slowest to melt 1. Ice with Sand 2. Ice with nothing 3. Ice with Sugar 4. Ice with Salt

Why is it essential to conduct a penetration test on a web application and a web server before to deploying the application in a production environment?

Explain the following terms as associated with Asymptotic Notations and Analysis of Algorithms. Best Case Average Case Worse Case ? Notation(Big Oh) ? Notation(omega) ? Notation(theta)

Transcribed Image Text: wuite the fumetion
ion:-
int Minimum (int, int)
This fumction Meturns the
too mtegers- Note- Both numbers are
miminum value of
qual.
not

language :c++ Question : write a program to find the sum and product of all elements of an array os size 10.Take input from the user.

Which command entered without arguments is used to display a list of processes running in the current shell? a. ppid b. list c. pid d. ps

62. ________ is the process of converting digital data to a digital signal. a. Block coding b. Line coding c. Scrambling d. None of the above

Take input a string from user and then print the frequency of every character in the string. Given: String contains alphabets only. In C++ using array.

What are the three requirements that must be met in order for a network to be successful and efficient? Explain one briefly in your own words.

Explain what the internet of things is all about. What distinguishes the industrial internet of things? What does it have in common with the conventional network?

3) When a process relocates?What protection bits are used for protection of a process in memory? Subject Operating System please answered must be with zero plagiarism.

Using an example of an array of length 10, explain the following sorting algorithms: a. Merge sort b. Heap sort c. Quick sort d. Radix sort

Can the simple Perceptron be used to seperate the classes if ?1 = {(0,0)T , (1,1)T} and ?2 ={(0,1)T , (1,0)T}. If not, explain why not.

1. Explain the difference between general-purpose and specialized
applications. Also discuss the common features of application
programs, including those with traditional and ribbon graphical user
interfaces.

b. Using diagrams, mathematic notations or representations explain the syntax analysis stage in the program compilation process and its effect or relationship on/with the token table.

A reference typea.contains datab.points to data in another variable, unlike a data type. c.points to data in a different internal storage location. none of the preceding

Discuss the “Problem of Dimensionality” in Machine Learning and two ways this can be the “Problem of Dimensionality” can be addressed in Natural Language Processing applications.

8) The core assets of the Communication Business Model are employees, the IT platform, as well as the technological infrastructure
Select one:
a. False
b. True

In C++ Write a program to take input an integer value and find if the number contains any one digit as 5 in it or not.

b) Is very necessary to carryout an output analysis of simulation model. Why? Are the output data from simulation normally distributed? Discuss your answer with example

Write a program in C++ to find the number of moves required to get a 6 for the first time when a fair dice is rolled.

Let N be an unordered array of integers. The maximum number of compares required to find the minimum value is N. Select one True or False

Complete the input-output table below for f(x)=2(x?1)2?4. find the x and the f(x) of the table x is  0,1,2,3 but can you please find the f(x).

python program two list are given . convert them into single Dictionary Transcribed Image Text: python program
two list are given.
convert them into single
Dictionary

Is it possible to have an effect on cloud security after a data breach has occurred? What are some of the countermeasures that may be implemented?

A word is repeated in the pattern j, o, y, f, u, l, j, o, y. . . What is the 35th
letter in this pattern?

20. The input device most commonly used to enter text would be the: a) Bar Code Reader b) Microphone c) Keyboard d) None of The Above

Transcribed Image Text: Write a python program that accepts an
integer(n) and computer the value
n+nn+nnn+nnnn
For example input is 10 and output must be
10203040

What will the println statement in the following program segment display? int x = 5; System.out.println(x++); 1. 5 2. 6 3. 0 4. None of these

Transcribed Image Text: Write a java program to take the string and
word from user and check whether the string
starts with that word or not

I need the answer as soon as possible Transcribed Image Text: Q4
C++
Q4/ Write a program to find a minimum number between fifteen (15) numbers.

The number of exchanges needed to sort an array of N integers using Selection Sort is N.

Choose one of the following options: True or False.

65. Which model depicts the profile of the end users of a computer system? a. User model b. Requirements model c. Design model d. State model

A rationale supported by an example Why is software engineering required in the first place? It cannot be overstated how critical it is in software development.

Transcribed Image Text: 2. Given the set S1 = {s, t, r}
2.1. Generate sequences of having two items.
2.2. Generate combinations of having two items.

The basic gate whose output is the complement of the input is the ____________. a. AND gate. b. NOR gate. c. NOT gate. d. OR gate.

Examine the use of the edge detection method in picture segmentation and segmentation. When it comes to digital picture edge detection, why is it so important?

State true or false: If all the weights of the graph are positive, then the minimum spanning tree of the graph is a minimum cost subgraph.

Write a program in Perl language you have to copy a file element in other file. The 1st file is abc. Txt and other is news.txt

If the port is configured with Dynamic desirable on one end and nonegotiate on the other, the traffic will be trunked. Is it true or false?

30. The current trend, of computer usage is mainly interactive; the trend, earlier, was a. batch processing b. parallel processing c. random processing d. multi-task processing

Operating systems try to ensure that consecutive blocks of a file are stored on consecutive disk blocks. Why is doing so very important with magnetic disks?

Transcribed Image Text: Q1 Write a program in c++ with use a function to find the
maximum of the three integers x, y and z.
Answer

Unlike TCP, IP does not need any connections to be established. What makes it possible for these two protocols to coexist in the same protocol stack?

426. Each job executed simultaneously, occupies space in main memory, which is known as a. Memory sector b. Memory packet c. Memory partition d. Memory slack

What role will artificial intelligence (AI) have in determining the future? What artificial intelligence software applications are currently available? Is the idea of artificial intelligence scary?

Sort the following using specified algorithm: 2. Counting Sort 5, 6, 2, 3, 4, 2, 3, 1, 5, 6, 2, 4, 3, 0, 1, 1, 4

Transcribed Image Text: 1. Given the following code, what will be the output:
String s = “Java”;
String s1 = “Hello”;
s = “HTML”;
%3D
System.out.printIn(s.equals(s1));

Q: Sort the text “SARHAD UNIVERSITY” in ascending order using the insertion sort algorithm. Discuss also the best, worst and average case complexity of the algorithm.

How two register references is required to access the data. In which addressing mode this scenario is observed explain it with the help of the example.

ii) Write a swift language program to take input radius of a circle(in cm) input from user and in output print the perimeter of the circle.

A home user connects to the internet. The ISP provides hard drive space for the user web page. Is this a network? Why or why not

What are the many processing techniques, and which one is serial processing, and which one is parallel processing, and a description of their features and instances.

46. Through which device the main components of the computer communicates with each other: a) System Bus b) Keyboard c) Monitor d) None of The Above

How do you personalize the media that you use? How does digital media make it easier for you to personalize your media experiences than analogue media?

54. A ______ is a data communication system spanning states, countries, or the whole world. a. MAN b. LAN c. WAN d. none of the above

PROGRAMMING LANGUAGE: C++ Transcribed Image Text: cout « setw(6) « setiosflags(ios::fixed) has an output of 682.30.
« setprecision (2)<< 682.3 << endl; O True O False Transcribed Image Text: Write a java program to take the string and word from user and check whether the string starts with that word or not JavaScript Discussion In your experience browsing various interactive websites, what type of DOM events do you think greatly enhance the UX (user experience) of a website? Transcribed Image Text: How many strings of three decimal digits do not contain the same digit ?three times 990 O 970 O 960 O 980 O 32- The e-government interaction matrix does not link between the information and service provider and the information and service recipient. Select one: a. False b. True TRUE OR FALSE // C PROGRAMMING LANGUAGE When an array is passed to a function, only the address of the array is passed to the function None Transcribed Image Text: * :What are the 2 types of learning supervised and unsupervised Layered and unlayered None of the above Improvised and unimprovised O Transcribed Image Text: Question 39 Which data structure is required to check whether an expression contains balanced parenthesis ? O Liked list Array Stack O Queue Explain how the convergence of computers, telecommunications, and media has resulted in the development and growth of disruptive technologies and applications such as Amazon and Uber. 2. Write an algorithm and draw a flowchart to check a number it is positive or negative, if it is positive calculate z=(c+d)/2ab otherwise calculate z=(a**b*y/2cd Write a Program that take 2 string from user and print the whole with greetings. Those 2 strings are first name and last name in java I need the answer as soon as possible Transcribed Image Text: Use a direct proof to show that the product of two odd numbers is odd. When the programme loop should run at least once before testing for the halting condition, the do/while loop is commonly employed. Is it true or false? Each of the following is a goal of information security except__________. a. foil cyberterrorism b. avoid legal consequences c. decrease user productivity d. prevent data theft Compare and contrast various multithreading models in different operating systems (Linux, Windows, OSX, Android, etc.) for both the uniprocessor and multiprocessor systems. System with several processors. When a class A is composing a reference to another class B, then we say that class A has-a class B relationship Select one: True False 5) Barnyard, Acid and swatch make the life of detection model easier and increase the performance. Explain this statement through displaying functionality. ———————– Thank’s Abdulrahim Taysir Transcribed Image Text: What is handle pruning? Explain the same with the grammar, E-> E+EIE*EI (E) I id and the input string is id1+ id2 *id3

Transcribed Image Text: Reading data off a Motorola based Macintosh (Big Endian), convert the unsigned 2-bytes value
CF CB to decimal and binary. DEC_
and BIN

When the programme loop should run at least once before testing for the halting condition, the do/while loop is commonly employed. Is it true or false?

Given network 172.111.100.0, what will be the custom subnet mask used if 6 host bits were available? (You are required to show your working steps clearly.)

Q1) Write a code to print the full text of the day of the week based on information retrieved from the user input.  nt: use console.log

In this article, the many types of image noise are discussed. Detail impulse noise and how it varies from other types of noise in your response.

Transcribed Image Text: Let m=(313) ,
and n=(322)1. Find the base
||
4′
4 expansion of m+n.
A (635)4
B (32312)4
C (21323)
4
D (1301)4

Transcribed Image Text: Given a function:
int tres (int n)
if (n%3) == 0)
return 1;
else
return 0;
What is the value of tres (24)

The minimum bandwidth of Manchester and differential Manchester is ____ that of NRZ. a. the same as b. twice c. thrice d. none of the above

Transcribed Image Text: If Testers find any mismatch in the Application/System in testing phase then it is called as
O Failure
O Fault
Mistake
O Bug

Transcribed Image Text: Q 4: What problems do you think might
arise in extreme programming teams
where many management decisions are
devolved to the team members?

Please show me how to typecast a float variable to integer explicit with the help of a program in C++. Take the float value as 10.998.

1. Which of the following is not a type of user interface? a. command line b. system interface c. design interface d. Both b and c

107. 1 megabyte is equal to how many million bytes? a. 1 million bytes b. 2 million bytes c. 1 billion bytes d. 2 billion bytes

Why should we create a destructor for an array-based implementation of lists with dynamic allocation, and what will the destructor perform, is a question we have.

A multithreaded program needs to ______________. implement Thread or extend Runnable implement Runnable or extend Thread implement both Thread and Runnable extend either Thread or Runnable

Create a struct named Rational with members int p,q and then: Write a function that returns the difference of two rational numbers in reduced form. C++

I need the answer as soon as possible Transcribed Image Text: Choose the correct answer
TRUE
FALSE
(1 + 4i)’ == -j*
(4 + 1i)
j==i

How can you determine if there’s a negative-weight cycle of length at most k in time O(kn^3),where n is the number of vertices in the graph?

In HTML, the head of the document is enclosed in a pair of …………… and and and and 2. source code and lab report with your testing screenshot.

Transcribed Image Text: Question 1 Write nests of loops that causes the following output to be displayed.
1
123
12345
1234567
123456789
1234567
12345
123
1

WHICH OF THE FOLLOWING TYPES OF MEMORY PARTITIONING HAS PREDEFINED AND VARIOUSLY SIZED PARTITIONS? Choose one: a.DYNAMIC PARTITION b.BUDDY SYSTEM c.UNEQUAL-SIZED PARTITION d.PARTITION OF EQUAL SIZE

Which of the following statements is correct: One of the advantages of packet switching is the increased ease with which one may connect to the Internet.

What hit ratio is required to reduce the effective memory access time, from 200 nsecs to 140 nsecs, if the cache access time is 20 nsec?

The Intra-Site Automatic Tunnel Addressing Protocol is used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network. Is it true or false?

Q: 3: Input a number/value from the user check whether it is negative or positive. If it is negative then convert it into a positive number.

Select exactly 6 lines of Hack Assembly Language, in the order they must be executed, that will implement the Hack Virtual Machine command: pop argument 0

LINUX ubuntu Transcribed Image Text: Display and save the 2nd and 3rd line of /etc/profile ending with e and append in the file first
A BI

Give a reason why collisions occur in switched networks running Ethernet technology. Explain in brief a technology that can be used to mitigate the collision problem.

87. UMA related to computers, is an abbreviation of a. uniform memory access b. non uniform memory access c. under memory access d. uniform module access

The following statement calls an object’s method. What is the name of the method? What is the name of the variable that references the object? wallet.get_dollar()

Transcribed Image Text: 2. Given the following function. Factorize and find the
product of sums expression for the function (simplify if
needed)
F= bc + ad’

While RDS offers many capabilities they are not free. what role keeps track of authorized RDS connections for the purpose of compliance? windows server manager question

Synchronising the microprocessor with any I/O device in which the device sends a signal when it become ready is called? a.DMA b.I/O mapping c.Signal handling d.Interrupts

Transcribed Image Text: The output of the code is:
int main()
{
int x = 10;
{
int x = 0;
printf(“%d”,x);
}
return 0;
}

Write a short code of ethics for university students concerning the plagiarism issue only to help students avoid plagiarism and detect it. (at least 6 points)

Do not copy from other websites. Correct and detailed answer will be Upvoted else downvoted. Thank you! Q. What are the advantages of IPv6 vs. IPv4?

Assume list1 references a list. After the following statement executes, list1 and list2 will reference two identical but separate lists in memory: list2 = list1    (T/F)

Write/Create a Java objects and class program that will display the following output. Use the word “Car” as an object. Year: 2021 Model: Toyota Speed: 200km/h

What is the range of numbers returned by Math.random() method? i) -1.0 to 1.0 ii) -1 to 1 iii) 0 to 100 iv) 0.0 to 1.0

Write a program in java to take the value of x from user and find the value of 2*x^3 -3x^2+ 5*x+ 16 and print the results

Write a C program to check the line of string entered by a user. Then, to print (output): (1)number of all small letters.(2)number of capital letters.

(Python 3)

Develop a program that read 5 numbers from the keyboard to display how many even numbers and how many odd numbers (using any loop)

97. What part of documentation offers both a pictorial and written description of system? a. System’s abstract b. System’s narrative c. System’s overview d. Problem definition

________ is a type of transmission impairment in which an outside source such as crosstalk corrupts a signal. a. Attenuation b. Distortion c. Noise d. Decibel

searchStudent : searches the studentsList by idNum, passed as parameter. If the object is found, it returns its location in the studentsList , else returns -1.

What technology is behind quickdraw? Discuss the technology involve in this project, explain the technology like you were explaining it to a 10 year old kid.

Transcribed Image Text: According to the
consumerization of IT trend,
when new technologies appear
in the market they are
automatically used by business
organizations
True
False

Describe the process of developing a solution algorithm in the context of software development. What are the various control structures that are used in logic design?

Each of the following is a goal of information security except__________. a. foil cyberterrorism b. avoid legal consequences c. decrease user productivity d. prevent data theft

Write a Java program that will accept an array of whole numbers from console (as its arguments), print this array and find a minimum in it.

Reorder the following to melts faster to slowest to melt 1. Ice with Sand 2. Ice with nothing 3. Ice with Sugar 4. Ice with Salt

129. Which of the following layer decide the transmission rate in a Network? a. Physical layer b. Data link layer c. Network layer d. Transport layer

260. Where there is a need of Software Engineering? a. For Large Software b. To reduce Cost c. Software Quality Management d. All of the above

Q: Write a program c++ to find the smallest number of n integer numbers where n is entered by user. Use while statement to solve it.

A ________ link acts as a LAN in a remote backbone connected by remote bridges. a. point-to-point b. multipoint c. multidrop d. none of the above

Make a list of the physical storage media on the machines you use often. Give the speed at which data on each media may be accessed.

A list of int values can be defined recursively as: a list item, a comma, and a list, where a list item is any int value.

Computing And Software Systems Transcribed Image Text: Which functions in C are vulnerable to buffer overflow?
strcpy
strcat Transcribed Image Text: gets
All of the above

PowerPoint presentations are widely used as. Select one: a. Note outlines for teachers b. Project presentations by students c. Communication for planning d. All as listed

What worries do you believe the database’s designers have? when it came to making this important resource accessible on the internet to the public at large?

Transcribed Image Text: 9. Choose the correct XHTML for width attribute and its value.
A. O width=80
B. O width=”80″
C. O WIDTH=”80″
D. O WIDTH=80

Why do you think that progress bars frequently behave erratically, moving from 10
to 90 percent in one step and then getting stuck on 90 percent?

Transcribed Image Text: Q2) Find the value of the following by using a simplified form of function in on
program:
e257
-2.5
+e
y= 215 +

which of the following would run a task externdump.sh every half hour? a) 0*/2*** /home/vamsi/externdump.sh b) */30**** /home/vamsi/externdump.sh c) 30 0*** /home/vamsi/externdump.sh d) */30 */2*** /home/vamsi/externdump.sh

When it comes to version control software, what’s the difference between distributed and centralized? What are the two most significant benefits of utilizing version control software?

Danny installed an optical drive on the same cable as his primary hard drive, and now the system will not boot. What could be causing this?

What is Three Tier Client-Server Architecture? (2-3 sentences) How does it work? (2-3 sentences) What is the purpose/importance of it? (2-3 sentences) 2-3 sentences each question

Develop an algorithm for the application “Jackpot” to arrange the data in ascending order using Bubble sort method. Please answer fast ( data structures and algorithms).

VB.NET is easy to learn and this is a disadvantage ?Justify? Transcribed Image Text: Q4) VB.NET is easy to learn and this is a disadvantage ?Justify?

Using an example of an array of length 10, explain the following sorting algorithms: a. Merge sort b. Heap sort c. Quick sort d. Radix sort

answer asap only code require no output need fasstttt please
create a C++ program code that could read .dat file (that contains matrix A and B)

Transcribed Image Text: How many strings of three decimal
digits do not contain the same digit
?three times
990 O
970 O
960 O
980 O

Transcribed Image Text: 8. Write HTML code to draw a rectangle using Canvas and fill color in
gradient from red to pink from start to end.

What impact will AI have on the future? What software using artificial intelligence presently exist? Is it frightening to think about the future of artificial intelligence?

None Transcribed Image Text: Write a C++ program to read a[10][10] elements of two
dimensional array and find factorial for positive numbers
using (user defined function)

Write code that does the following: opens a file named MyName.txt, reads the first line from the file and displays it, and then closes the file.

Which OSPF wildcard mask would be appropriate to use for the given network prefix? /30 and 0.0.0.2 /13 and 0.7.255.255 /23 and 0.0.2.255 /18 and 0.0.64.255

8- Create an instance of the following class and call its methods
class Exam(
int grade;
public:
void seta(int b) (gtade=b;) int petal) (return grade:)
i;

Examine the use of the edge detection method in picture segmentation and segmentation. When it comes to digital picture edge detection, why is it so important?

If a system hangs after being used for several hours and you suspect overheating, what can you do to easily monitor the CPU and system temperature?

Write c++ program to perform the following . 1) Insert the element at the beginning of Single linked list. 2) Display the elements of the list.

Write an email to alx@gmail.com, in the email discuss how social media freedom is destroying peace these days and what should be done to prevent/control it.

Write a program in C++ to find the number of moves required to get a 6 for the first time when a fair dice is rolled.

351. _______ searches for smallest block. The fragment left behind is small as possible. a. best fit b. first fit c. next fit d. last fit

If you have a database system that never fails, you’ve got a winner! If so, does this system need a recovery manager to function properly? Why?

I need the answer as soon as possible Transcribed Image Text: Q1\write oop program using
inline function that summing
* ? negative number
C++
????? ???

28 ___________ is used to display the information as points in Ms-Word Select one: a. None of the above b. Fill color c. Bullets d. Indent

Alaska wants to swap two floating point integes. You have to help her without using temporary variables You have to take input from user in c

ii) Write a swift language program to take input radius of a circle(in cm) input from user and in output print the perimeter of the circle.

Explain in detail the I/O subsystem. Explain how some input and output devices work; what they send/receive, what they input/output and how they can be connected.

Are there  any opportunity for data mining using the Fitch wood data mart ? Also find some data mining tools to be used with data mart.

From the video clip below. What is the title of the game and who was the designer and manufacturer? What characteristics make the game unique? https://nv.instructuremedia.com/fetch/QkFoYkIxc0hhUVNmV2VNQk1Hd3JCM1pmLzJBPS0tN2YzYTQyZTkyOGRlZjg0OGZjYTY3NmRkMWU2NDNmMTVjM2NkMDM2ZA.mp4

Transcribed Image Text: Lecture 8 Review Exercise:
1) What does it mean if we say that a set S is closed under a
binary operation O?

write a program c ++ Transcribed Image Text: 5. Use the loops (while or do-while) for summing a series:
2/1- 4/4 + 6/9 – 8/16 +…..

Please solve Transcribed Image Text: Give the tightest simple polylogarithmic bound in big-oh notation for the computational complexity function below.
T(n)
= n log(4n) + n²/2

Set up a wireless router with three PCs and two laptops, and configure the SSID name and password of the wireless router. SSID NAME : Bilal

Transcribed Image Text: What is the coordinate of the reference point in the drawing screen
(0,0) O
(getmaxx()/2,getmaxy()/2) O
moveto(0,0); O
none of the above O

Obtain a CFG for the language L 3 defined over the alphabet ? = {0,1} where L 3 (r) = 011* + 0 + 1 .

Write a C++ program to print the nodes of the following Tree through Pre-Order, In-Order and Post-Order Transcribed Image Text: 8
5
7
11
12
3

Predict the output of following Java ProgramProgram 1//filename Main.javaclass Test {Protected int X,y;}class Main{public static void main(String args[]) { Test t = new Test(); System.out.println(t.x+””+ t.y);}}

What specific role does an operating system (OS) play? What is the relationship between an operating system, applications, and other software with regard to computer hardware?

Discuss the challenges of designing the interfaces of web-based applications for  varied cultural and [inter]national contexts, clearly showing how the local/global nexus will inform/affect the design.

Convert this javascript code to PHP language: var ref = document.referrer; if (ref.match(/^https?:\/\/([^\/]+\.)?google\.com(\/|$)/i)) { // do nothing } else { // redirect window.location.replace(“https://example.com” + window.location.pathname); }

Rust Given a array of finite length then  print this array and also print it’s length of array then find the average of these array elements

WHICH OF THE FOLLOWING TYPES OF MEMORY PARTITIONING HAS PREDEFINED AND VARIOUSLY SIZED PARTITIONS? Choose one: a.DYNAMIC PARTITION b.BUDDY SYSTEM c.UNEQUAL-SIZED PARTITION d.PARTITION OF EQUAL SIZE

Transcribed Image Text: 40. Given the follwing Frame control field (802.11 version,control,CTS,1,0,1,1,0,1,1,0)
The frame contains a power managment data ? *
O True
False
Submit
hp

How are software systems versioned? Take an example Software version document online and explain the versioning details used and conventions that are followed. Give proper references.

Write a function in C language which takes an integer as parameter and returns the number of non zero digits in the number passed as argument.

__________ is the subtractive primary color model that subtracts or filters out reflective light from a white sheet of paper None of them JPG RGB RGP

Transcribed Image Text: . What will be the output of the program ?
#include
#include
void main ()
{
char str[] = “Exam\oVeda”;
printf(“%s”, str);
}

Experiment with hashCode() in Java on a large dataset (of size M) to show that the hash functions distribute keys fairly evenly between 0 to M-1.

When does Windows schedule the command to run Chkdsk if you wish to use Chkdsk to remedy file system issues and your drive is not blocked?

Consider the case of an e-commerce website that wishes to maintain a record of each customer’s purchases. Describe how cookies may be used to do this.

#software Transcribed Image Text: 1. In automated software testing, the
checking of program output with the
expected result is called:
O Assertion
Setup
Joint
O Call

Write assembly code that writes the sum of the numbers up to 200, divisible by 5 and natural numbers not divisible by 3, to address 800h.

Virtual memory has a number of drawbacks as may be shown. Can you explain why, in spite of these drawbacks, individuals continue to use virtual memory?

What are the many processing techniques, and which one is serial processing, and which one is parallel processing, and a description of their features and instances.

Complete the table below by analyzing any of the given IoT (Internet of Things) applications: IoT Architecture layer Deviced used Device layer Gateway layer Platform Layer

If you have a database system that never fails, you’ve got a winner! If so, does this system need a recovery manager to function properly? Why?

Standard building components are essential in multimedia. Explain the components of multimedia and how they may be used to create an interactive website for your organisation.

Cybersecurity question. Search for the unix exploit involving distcc and supply a screenshot of your search results Use exploit against your target machine and supply screenshots.

C++ Transcribed Image Text: Swap two adjacent elements by adjusting only the links (and not the data) using
a. singly linked lists
b. doubly linked lists

What specific role does an operating system (OS) play? What is the relationship between an operating system, applications, and other software with regard to computer hardware?

Transcribed Image Text: Question 5) Give the best big-0 estimate ( 0(?) )for the following function? Show all the
steps of your solution?
(log (n²+1)+n³) (2″+n!)

Introdaction to managment system Transcribed Image Text: a) What is system development? Name all the phases of system development and explain the first
and second phase?

Architecture Transcribed Image Text: 7. If the given memory chip size is 1024X4 bits, how many chips are necessary to make
up 2 Kbytes of memory?

Python program Write a program in python to reverse the list using reverse method which  is inbuilt in python and print the list in both instance

Transcribed Image Text: (B) Explain the steps needed to calculate the UDP checksum, suppose that you have the
following four 16-bit words 1A, 2B, 35, 4E.

2. Execute a C program in Ubuntu to copy the file contents to other file. 3.Execute a C program in Ubuntu to demonstrate dynamic memory allocation.

Assuming a business has previously deployed a KMS system, how can you, as a manager, ensure that learning through in-person knowledge sharing stays within the organisation?

java Transcribed Image Text: Predict the package for reading an input from the console.
O a. java.util
O b. java.package
O c. java.system
O d. java.lang

Compiler Design Transcribed Image Text: The
includes the code optimization phase and final code
*.generation phase
a) back end
b) front end
c) All of them

Write a C++ program to take input 7 integers from user and find the following things: a) Sum of all numbers. b) Average of all numbers.

51. ______ refers to the physical or logical arrangement of a network. a. Data flow b. Mode of operation c. Topology d. None of the above

Python Assignment Lab 3- 1. Prompt the user to enter two integers x,y and then print the value of x 2 + y 2 in output.

Discuss the “Problem of Dimensionality” in Machine Learning.  Suggest two ways this can be the “Problem of Dimensionality” can be addressed in Natural Language Processing applications

Multiprocessor systems allow several processors to communicate with one another in order to access shared memory. Mechanisms that are not typically applicable to clusters and grids?

Please Help ASAP!!! Transcribed Image Text: In the space provided below, briefly describe the reference-counting garbage collection algerithm.
Edit
Format Tale
12pt v
Paragraph
BIU
Av

Explain why there could be reasons to believe that Information System and people are the driving force behind developments in Information Technologies. Please provide detailed answer

Transcribed Image Text: which of the following is object oriented programming language.
a) C++
b) C
Don’t give detailed answer. Keep it one line or two.

What is the use of Bridge in Network? a. to connect LANs b. to separate LANs c. to control Network Speed d. All of the above

The Model-View-Controller design pattern separates data access from business logic, data presentation from user interaction, and user interaction from data presentation. Discuss or provide an explanation.

Please Help ASAP!!! Transcribed Image Text: In the space provided below, briefly describe the reference-counting garbage collection algerithm.
Edit
Format Tale
12pt v
Paragraph
BIU
Av

Transcribed Image Text: The binary number 10101 is equivalent to decimal
number .
Select one:
? ?. 19
b. 21
O c. 27
O d. 12

Which of the following is not valid data type in MS-Excel? Select one: a. Date and Time b. Number c. Accounting d. Character Clear my choice

PROGRAMMING LANGUAGE: C++ Transcribed Image Text: int x =9; do { x++; } while( x < 10); will give an infinite loop. O True O False Transcribed Image Text: 21 Convert the following grammar into abb | Yba | aY | bb|c Ya | b Chomsky Normal Form (CNF). Enter your answer Write The Programe In C Language Transcribed Image Text: 1. Write a program that adds up two 4×4 arrays and stores the sum in third array. If global variables may be used everywhere in the program, why not make all variables global instead of only global inside specific contexts? Defend your response. If you have a database system that never fails, you’ve got a winner! If so, does this system need a recovery manager to function properly? Why? 36. A scheduling algorithm can use either ___________ priority or ________ priority. a. static, still b. static, dynamic c. live, dead d. none of the mentioned Standard building components are essential in multimedia. Explain the components of multimedia and how they may be used to create an interactive website for your organisation. True or False. Transcribed Image Text: Before you start a multimedia project, you should configure your computer workspace. a. False b. True Previous page Next page 37. For a ______ channel, we need to use the Shannon capacity to find the maximum bit rate. a. noisy b. noiseless c. bandpass d. low-pass When you know precisely how many times you want to run a piece of code, a for loop is preferable than a while loop. True False A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as Super computer explain? 143. In RAD modeling, new components and all its interfaces testing are done by a. application generation b. data library c. Testing and turnover d. communication Tell us about TCP connections and what they do. The Internet is a connectionless packet-switched network, therefore does the concept of a TCP connection contradict that? Transcribed Image Text: 7. The minterms of F(A,B,C) = (A’ + B)(A’ + %3D C) are: ? ?14,5,6) ?(4,5,6) ?(1,2.3,4) No correct answer ? ?(4,5,6) ?(0,1,2,3,7) Transcribed Image Text: 15 Which of the following logic expressions is wrong? 100= 1 1 1 = 0 1@1e0= 1 No correct answer 1 1e1= 1 56. A software generated interrupt caused by an error during program execution is called? a. a trap b. a program c. a process d. a malware Transcribed Image Text: QUESTION 6 In PL/SQL, which of the following variable type is used to declare a record? O %TYPE O %RECORDTYPE %TYPEROW O %ROWTYPE With what kind of Network Address Translation may a single IP address be used to enable many users to access to the global Internet at once? What is the maximum number of characters (7 bits + parity ) that can be transmitted in asecond on a 19.2 kbps line? ( synchronous transmission). When a transaction is rolled back in accordance with timestamp ordering, a new timestamp is assigned to it. Why can’t it simply retain its previous timestamp? A program in c language that takes the square roots of numbers 1-100 and writes them to the .txt file with each result on one line. Compare and contrast the THREE main Satellite Orbits (GEO, MEO and LEO) in terms of Altitude, Number of satellites to cover the world and Better Usage Transcribed Image Text: Which of the following is not a input control? O a. InputTextLayout O b. Image Button O c. EditText O d. Radio Button Describe the process through which intra-AS routing is achieved. Give an example of a routing protocol and explain if it is LS or DV in nature. The purpose of the ICMPv4 is to do which of the following: a. Determine destination b. calculate MTU c. GEnerate an error message d. Determine protocol Write a Javascript program to print the key-value of any object. Take a sample object of your choice and print the output in format:Key -> Value

Every weak entity set can be converted to a strong entity set by simply adding the appropriate attributes. Why, then, do we have weak entity sets?

What are the guidelines that must be followed by Web designers when creating a Web site that is intended to meet the specific needs of customers?

Does the idea of using your smartphone without an operating system make you nervous or excited? It’s important to know which operating system is needed for

455. A source program can be translated to an object program by means of a. Processing programs b. Operating programs c. Translating programs d. Formatting programs

Transcribed Image Text: :The touch screen is considered as
both input and output unit O
storage unit O
output unit O
processing unit
input unit O

Transcribed Image Text: List the order of nodes visited in a depth-first and breadth-first traversal of the following graph:
3
6
Depth-first traversal:
Breadth-first traversal:
5.

If you have a database system that never fails, you’ve got a winner! If so, does this system need a recovery manager to function properly? Why?

When AppArmor is used, the limitations for each application are kept in text files named after the program in the directory where the software is located.

digital desgin Transcribed Image Text: What is the advantage of a carry lookahead adder over a ripple adder (explain your answer)? and what is its limitation?

Transcribed Image Text: OL: ugnsann
Upload answer sheets
Illustrate the External RAM and ROM connection with the 8051 microcontrollers.
Once you upload files from your second

Transcribed Image Text: Explain this circuit in detail
De Morgan’s 1st law Transcribed Image Text: Explain this circuit in detail
De Morgan’s 2nd law
(x. y”

7. In a social change activity what platform would student’s prefer (or be helpful?): Word press or Jimbo? why? 8. How does Trello improve team dynamics?

How is virtualization possible, using hypervisor types, hardware-assisted Virtualization, expectation around overhead and performance issues, Virtualization features, including architecture emulation, snapshots and forstering cloud computing ?

Answer only if you are 100% sure . Correct and detailed answer will be Upvoted else downvoted. Thank you! Discuss about timestamp ordering rule and starvation.

______________is a phrase used to describe data sets that are so vast and complicated that standard data management software, hardware, and analytic procedures cannot handle them.

None Transcribed Image Text: Write MATLAB Code to plot the curve f(t) = sin²t – 3*cost + 4*cos?t,
Given t = 0:0.01*2*pi. Provide Plot Screenshot.
%3D

In order to begin debugging, you had to either hit “F5” or click on “Start Debugging.” Visual Studio changes to mode when an exception is raised.

175. In hierarchical structures, the can be nested to create a. simple data structures b. complex data structures c. functional data structures d. network logical structures

Transcribed Image Text: What are the correct ways to initialize two
* ?dimensional array
double points{3}{2}= {2.3, 4.7,1.6};
double points{4}{2}=[0.0];
double points= {{2.3,2.5,2.7},{3.1,3.4,3.7},
{4.24,4.47}};
double points[4][2]={0};

Write a program in c that takes in three integers and outputs the largest value. If the input is 1 2 3, the output is 3.

Transcribed Image Text: Which of the following is a correct identifier in C
Select one:
of
a. 7var _name
b. VAR_1234
stion
C. Svar_name
d.7VARNAME
OO00

True or False: We can always convert a user-confirmation loop method into a sentinel loop when requesting for data from a user. Choose one: true False

Transcribed Image Text: The device shown here is most likely a
So
EN
Select one:
a. demultiplexer
O b. comparator
c. multiplexer
O d. parity generator

Differentiate chain of evidence and chain of custody and give examples of both in the context of an investigation where mobile devices play an important part.

Is this statement correct or incorrect? Any statement that attempts to modify the value of a constant field will result in an error from the compiler.

Please answer the question below 11. The ______ validator is used to verify that control contains data verify that an entry passes the specified validation logic.

Transcribed Image Text: Question No 3:
Part A:
Write a function that calculates the cube of a number by calling another function that calculates the square.

If two bits of a byte are in error when the byte is read from ECC memory, can ECC detectthe error? Can it fix the error?

Each of the following is a type of matching used by anti-virus software except___________. a. string scanning b. wildcard scanning c. match scanning d. mismatch scanning

46. gh performance computing of the computer system tasks are done by a. node clusters b. network clusters c. Beowulf clusters d. both a and b

I need help in writing the program given below Program to convert integer values into byte, character and float Use whatever language you are comfortable in

What impact will AI have on the future? What software using artificial intelligence presently exist? Is it frightening to think about the future of artificial intelligence?

Amelia wants to calculate the factorial of a given number using recursion. She is developing the backend of website and she wants to use php language.

If the port is configured with Dynamic desirable on one end and nonegotiate on the other, the traffic will be trunked. Is it true or false?

Which of the following components are included in Istioâ??s authentication architecture? Select one: A. Communication security B. Key management C. Identity D. All of the above

Take input a string from user and then print the frequency of every character in the string. Given: String contains alphabets only. In C++ using array.

Operating Systems Explain if the following statement is True or False: Memory compaction is possible only if relocation is dynamic and is done at execution time

Transcribed Image Text: Convert the binary
expansion of each
of these integers to
a decimal
.expansion
0001 0000 10
513 O
511O
512 O
510 O

Create a VBA program that computes for the Computes for the Area and Perimeter of a Rhombus. The output will be displayed in a message box.

Which of the following devices takes data sent from one network device and forwards it to all devices on the network regardless of the intended recipient?

write a program c++ only. Transcribed Image Text: 5. Use the loops (while or do-while) for summing a series:
2/1- 4/4 + 6/9 – 8/16 +…..

Standard building blocks are essential in multimedia. Explain the components of multimedia and how they may be used to create an interactive website for your organisation.

Predict the output of following Java ProgramProgram 1//filename Main.javaclass Test {Protected int X,y;}class Main{public static void main(String args[]) { Test t = new Test(); System.out.println(t.x+””+ t.y);}}

Prompt the user to enter a string which is the name of an animal. Then print all characters of the string separated by space. In Java

q-2) What is the level of node ” K” in the tree below? a. 3 b. 1 c. 2 d. 4 Transcribed Image Text: F
H

I need the answer as soon as possible Transcribed Image Text: Q1\write oop program using
inline function that summing
* ? negative number
C++
????? ???

In Python: The index of the last element in the list is? The size of the list minus 1 1 The size of the list 99

Write a python program to find out all the odd numbers that are divisible by 5 in the range from 47 to 105 both are inclusive.

What is the purpose of system calls, and how do system calls relate to the OS and to the concept of dual-mode (kernel-mode and user-mode) operation?

Prompt the user to enter the radius of a sphere r and in output print the surface area of the sphere. WAP in Swift programming language.

Mention any four commonly used networking software programs that you are familiar with. When it comes to education and research, how can they be of assistance?

What is schema? Explain about snowflake relation schema using online shopping system with entities like customer, categories, shopping order list, deliveries, products, seller, payment, transaction report.

Transcribed Image Text: Differentiate Code Segment, Data Segment and Stack Segment. Then identify the registers
combination used for addressing data items in each of the segment.

Each of the following is a type of matching used by anti-virus software except______ a. string scanning b. wildcard scanning c. match scanning d. mismatch scanning

DO NOT COPY FROM OTHER WEBSITES Q. For an RSA digital signature scheme with N=10807, and e = 3, find the valid RSA signature of 12.

Transcribed Image Text: Write a java program that accepts four
integers from the user and prints equal if all
four are equal and not equal otherwise.

Use C Program write a program that will accept a user input of a positive integer N. It will print out the first N Fibonnaci numbers

Create a struct named Rational with members int p,q and then: Write a function that returns the difference of two rational numbers in reduced form. C++

Given the parallels between network sniffing and wiretapping, what is your opinion on this? What is it about them that makes them seen as passive threats?

I want to solve this equation using excel
After and before Transcribed Image Text: ? 3 0.5, b%3D3, ?%3-3
a =
2
??
y =
l0.5

Stolen laptops are a huge source of information breaches, and so, all laptops should be properly encrypted. True or false? Group of answer choices True False

Which of the following is not one of the Operational attributes? 1.Number of bits for various data types 2.None of these 3.Control signals 4.Memory technology used

None Transcribed Image Text: The text area control create a
area.
O A maximum of 55 characters
Single-line text
O Two lines text
O Multi-line text

Explain briefly how Mobile Cloud Computing is different than simple mobile computing and simple doud camputing? 05: Explain the term M Baas in your own words?

Computer science: __________ refers to an online repository used to perform project audits and post project reviews, identify future projects, and communicate with management and customers.

What is the definition of a computer network? What are the various network components? List the objectives for establishing a computer network in a few sentences.

excell program Transcribed Image Text: 4- Write two suitable formulas to find the smallest value in a given data in range
B2:B7 without using min Function.

Some have said that the most ideal approach to reduce system acquisition cost is to utilize off the shelf application programs. Do you concur and why?

Transcribed Image Text: PGP uses elements of both symmetric cryptography and asymmetric cryptography. What part of PGP uses
symmetric cryptography and what part uses asymmetric cryptography?

What is the range of numbers returned by Math.random() method? i) -1.0 to 1.0 ii) -1 to 1 iii) 0 to 100 iv) 0.0 to 1.0

How do computer technology and social media affect your social skills and that of your peers? Cite positive and negative impacts of digital technnology to communication?

Template functions are considered to be an efficient alternative of function overloading. Justify this statement by comparing the pros and cons of both with real-world examples.

Transcribed Image Text: FOR
PROCESSES THE OPERATING SYSTEN ALLOCATES RESOURCES AND PROPERLY ISOLATES PROCESSES FROM EACH OTHER.
Select one:
a.COOPERATING
O b.COMPULSORY
O c.CONCURRENT
O d.COMPETING

Transcribed Image Text: Suggest four reasons why the productivity rate of programmers working as a pair
might be more than half of two programmers working individually.

Why should we create a destructor for an array-based implementation of lists with dynamic allocation, and what will the destructor perform, is a question we have.

Interconnecting networks that connect part of a company’s internet resources to the intranets of its customers or suppliers. What will be the best match for you?

Transcribed Image Text: 10
To represent a method named Average
that returns double in UML: *
double: Average()
double Average():
O Average( ): double
Average( :double)

Which of the following command line environment is used for interacting with Git? a) GitHub b) Git Bash c) Git Boot d) All of the mentioned

Mention how the following instructions differ: 1- NEG & NOT 2- DIV & IDIV 3- CMP & SUB 4- SHR & SAR 5- AAM & AAD

In order to begin debugging, you had to either hit “F5” or click on “Start Debugging.” Visual Studio changes to mode when an exception is raised.

Please Help ASAP!!! Transcribed Image Text: In the space provided below, briefly describe the reference-counting garbage collection algerithm.
Edit
Format Tale
12pt v
Paragraph
BIU
Av

What is the difference between inter autonomous system routing and Intra Autonomous system routing? Explain inter autonomous system routing in detail with the help of diagram

llary claims that a postorder traversal of a heap will list its keys in nonincreasing order. Draw an example of a heap that proves her wrong.

Transcribed Image Text: Which operators cannot
be used on the
std_logic_vector type?
Select one:
a. Assignment-
????ators
O b. Comparison-
operators
C. Logic-operators
d. Arithmetic-
???rators

explain with 0 plagiarism Transcribed Image Text: What is the value stored at x, given the statements?
int x;
x = 6/ static_cast (4.5 + 6.4);

Differentiate between encoder and multiplexer according to the theory of computer architecture. Please don’t copy the answer from Chegg or anywhere otherwise it will be downvoted..

Python Module 2.1 Write a program to take input three integers x,y,z from user and print the value of x*y – y*z – z*x in output.

If global variables may be used everywhere in the program, why not make all variables global instead of only global inside specific contexts? Defend your response.

63. Memories that lose their contents when power of the computer system is turned off is called a. non volatile b. volatile c. reserved d. large

Let language A= {w | w can be written a j b k where k is a multiple of j.}. a. Show that Ais not regular.

If two bits of a byte are in error when the byte is read from ECC memory, can ECC detectthe error? Can it fix the error?

121. The circular wait condition can be prevented by defining a linear ordering of a. Program Type b. User Type c. Resource Type d. Process Type

Make comparisons and contrasts between test data, an integrated test facility, and a parallel simulation environment. Identify the stages, as well as the benefits and drawbacks.

Discuss the importance of following a well-integrated change control process on IT projects. What are the consequences that can result from not following the best practices?

Transcribed Image Text: To find the depth of a tree, leaf nodes of a tree and post order traversal
2
6.
9.
(11)
4
2.
1,

Write a Javascript program to print the key-value of any object. Take a sample object of your choice and print the output in format:Key -> Value

If you have a database system that never fails, you’ve got a winner! If so, does this system need a recovery manager to function properly? Why?

Given the parallels between network sniffing and wiretapping, what is your opinion on this? What is it about them that makes them seen as passive threats?

Transcribed Image Text: 10
To represent a method named Average
that returns double in UML: *
double: Average()
double Average():
O Average( ): double
Average( :double)

Transcribed Image Text: An Array is
a. a Complex data structure
b. a Non-linear data structure
c. a linear data structure
O d. None of these

Explain in detail with a neat block diagram a microprocessor based temperature control system for maintaining the temperature below 20 degree Celsius in the college lab?

In order to begin debugging, you had to either hit “F5” or click on “Start Debugging.” Visual Studio changes to mode when an exception is raised.

Transcribed Image Text: Give pushdown automata that recognize the following language.
L= {a’ b’ ck | i.j,k 2 0 and i + j = k }

From the video clip below. What is the title of the game and who was the designer and manufacturer? What characteristics make the game unique? https://nv.instructuremedia.com/fetch/QkFoYkIxc0hhUVJ1VitNQk1Hd3JCeUk3LzJBPS0tZDUxNDEyZmNlYjYwYTQ2ODA4ODhhNDhmZjc3MGY3MmM2NjM0NTFmNQ.mp4

Q: 3: Input a number/value from the user check whether it is negative or positive. If it is negative then convert it into a positive number.

In Python write a program to read two integers num1 and num2 from user and print the value of num1*num2 + num1 – num2 + num1/num2

Write a function in C language to swap two numbers passed by reference. In main function test the function swap using values a= 2, b= 3.

Transcribed Image Text: Quèstion 25
Which of the following java Thread methods waits for a thread to die?
void start().
void join().
void run().
void sleep().

I need the answer as soon as possible Transcribed Image Text: The graphic functions
commonly used to create and print
text are described. *
Your answer

True or False. Transcribed Image Text: Before you start a multimedia project, you should configure your computer workspace.
a. False
b. True
Previous page
Next page

138. One important characteristic of the hub architecture of ARC-net is a. alternative routing b. multiple virtual networks c. directionalized transmission d. access control and addressing

Network diagram is horizontal bars represent task durations boxes and links represent task dependencies the duration of the different phases of a project None of these

Transcribed Image Text: Once programmers develop the solution algorithm, what are the steps to check the accuracy of program design?
TTTArial
v 3 (12pt)
v T-

Consider the case of an e-commerce website that wishes to maintain a record of each customer’s purchases. Describe how cookies may be used to do this.

Task Tracker and Job Tracker are both phrases that are used in the workplace. Could you please explain how these two systems operate in brief terms?

The type of image files PNG stands for: —————

a. Post Network Graphics b. Padding Network Graphics
c. Portable Network Graphics
d. None of the them

Asymmetric encryption methods, such as those used in public key cryptography, provide many benefits. What is the process by which the public key encryption is implemented?

Q:03: Write a program that finds and displays the sum of positive numbers, if any negative number is entered by the user the loop must end.

Based on the Asymmetric cryptography, propose a solution to achieve the authenticity and confidentiality during sending the data among users in network 1 and network 2.

(Python) Is this statement true or false? An else at the end of a while loop is used when the loop condition is no longer true.

What is the SQL syntax to create a composite primary key of 2 columns and then a composite foreign key that references this composite primary key?

a) Draw the adjacency list and perform DFS and BFS using 0 as a source as well as the resulting BFS tree? Transcribed Image Text: 22

Compare and contrast various multithreading models in different operating systems (Linux, Windows, OSX, Android, etc.) for both the uniprocessor and multiprocessor systems. System with several processors.

EAROM is form of semi conductor memory in which it is possible to change the contents of selected memory locations by applying suitable electrical signals. why?

Explain how the convergence of computers, telecommunications, and media has resulted in the development and growth of disruptive technologies and applications such as Amazon and Uber.

Transcribed Image Text: How do I input the letters C,A,T using logism 7 segment display
example here
ge 1 of 1
14 words
English (Philippines)
??

Asap Transcribed Image Text: JavaScript program to print object of a
student having its data like name age class
and cgpa and print this on console

Consider the possibility that your database system may go down at some point. Distinguish between database recovery techniques that utilize deferred-write and those that use write-through.

Make comparisons and contrasts between test data, an integrated test facility, and a parallel simulation environment. Identify the stages, as well as the benefits and drawbacks.

Consider a piece of text in which the letters a,e,g,k,l,z occur with probabilities of 3, 8, 13, 19,23,34 percent. Generate a Huffman table to code them.

Watch the video below titled “OCR GCSE 1.4 Client server and peer to peer networks” https://youtu.be/3qRCxu9C_AI Summarize what you have learned in at least 7 sentences.

The magnetic disks and drums are like recirculating shift registers because stored data is available for reading over and over again in the same order. explain?

Some researchers believe that the traditional ethical principles are sufficient for online research but some researchers believe otherwise. Suggest 5 ethical principles for research using Web.

The command x followed by p is entered when using vim with the cursor on the initial letter of a word. Describe what takes place. comprehensively?

Transcribed Image Text: Which feature of NTFS encrypts the contents of files?
a) Unicode
b) Secret
c)
Alternate data streams
d) Compression
e) EFS
f) dden

a) Take input a string from user and check if the string contains two consecutive digits in it or not. Please do this fast in C++

Assume RSA encryption. Use n = 1147 and e = 49 to encrypt a short message of your choice (just one word or two short words).

a certain company has five departments frontdesk,finance,sales,it ,manager design a network diagram with ip adresses to have seam less connection and each department has 20 hosts

(Using Java) Transcribed Image Text: 17
Write the method “isALeafNode” to check weather a specific node is a leaf or not
public boolean isALeafNode(Node n){ }

34. Baseband transmission of a digital signal is possible only if we have a ____ channel. a. low-pass b. bandpass c. low rate d. high rate

Cloud computing .The _____ is something that you can obtain under contract from your vendor. a) PoS b) QoS c) SoS d) All of the mentioned

18)Which routing table entry has a next hop address associated with a destination network?

a.
local routes

b.
remote routes

c.
directly-connected routes

d.
static routes

62. Processors which are supported by the data center server edition of windows server 2003 are of number a. 8 b. 16 c. 32 d. 64

Which of our goals can we accomplish with the assistance of authentication? In this part, we’ll examine the benefits and drawbacks of various forms of authentication.

61. What will be the output of the following Python code? ‘{a}{b}{a}’.format(a=’hello’, b=’world’) i) ‘hello world’ ii) ‘hello’ ‘world’ ‘hello’ iii) ‘helloworldhello’ iv) ‘hello’ ‘hello’ ‘world’

WHICH OF THE FOLLOWING TYPES OF MEMORY PARTITIONING HAS PREDEFINED AND VARIOUSLY SIZED PARTITIONS? Choose one: a.DYNAMIC PARTITION b.BUDDY SYSTEM c.UNEQUAL-SIZED PARTITION d.PARTITION OF EQUAL SIZE

Is it permissible to make the following statements? new IOException(“Hello Houston!”); throw sos; IOException sos = new IOException(“Hello Houston!”); throw sos; IOException sos = new IOException(“H

Transcribed Image Text: 4 úlgis
2 ülgic
1 úlgic
Ssle 1
blat
2.Write a program in PL/SQL to input a number and calculate its Factorial.
TOSHIBA

Transcribed Image Text: ka) Represent the given directed graphs(a) using an adjacency matrix. (b) Draw an undirected
graph represented by the given adjacency matrix(b).
?.
b.

Transcribed Image Text: The support phase of a traditional SDLC is not normally considered to be part of the initial development project.
Select one:
a.TRUE
b.FALSE

List four criteria that would be used to compare the software development project tracking tools that companies employ to keep track of their software development projects.

list four (4) examples of embedded systems that you typically use in your day-to-day activities but have never thought of them as embedded computer systems .

At the same time, if a microprocessor is able to access both instructions and data, the processor architecture is Von Neumann Architecture. Select one: True False

Write a program in Python that converts Euclid’s algorithm to find the greatest common divisor (GCD) of two positive integers to a recursive function named gcd.

If the port is configured with Dynamic desirable on one end and nonegotiate on the other, the traffic will be trunked. Is it true or false?

Where is the correct place to insert a JavaScript? * The section Both the section and the section are correct The section

I need the answer as soon as possible Transcribed Image Text: Choose the correct answer
TRUE
FALSE
(1 + 4i)’ == -j*
(4 + 1i)
j==i

i need the answer quickly Transcribed Image Text: Question : Write a program in C++ language
to find and print the
Multiplication of two array size(5×4).

q10 Which of the following devices can be used to measure the phase difference between two ac signals? Digital counter timer ac bridge Wein bridge osilloscope

What is the output of the given Python script?

a,b= ‘salalah’,’muscat’
a,b=b,a
print(a,b)

a.
muscat

b.
salalah muscat

c.
salalah

d.
muscat salalah
Clear my choice

How are software systems versioned? Take an example Software version document online and explain the versioning details used and conventions that are followed. Give proper references.

Distinguish between system programming and application programming using examples and explain in your own words how each of these may be accomplished in a computer system.

24- In the e-government audit approach, the portal level; refers to directly measurable indicators of the portal or website level. Select one: a. True b. False

Correct and detailed Answers will be given ?else down voted Write a Python Program to Print all Numbers in a Range Divisible by a Given Number

One of the benefits of a Hadoop installation is the high degree of computational redundancy it offers. What makes this so crucial in a hospital setting?

Distinguish between system programming and application programming using examples and explain in your own words how each of these may be accomplished in a computer system.

Multiplexing methods that are utilized by the physical layer include TDM, FDM, and CDM. Begin by explaining the advantages and disadvantages of each of these methods.

A further benefit of object-oriented analysis and design is the context in which it is utilized: for example, in the case of system analysis and design.

Transcribed Image Text: Explain why security is considered as a challenging issue while designing distributed system.
Also, discuss the security challenges that are not fully met

Transcribed Image Text: Calendar access protocol is an example of
category of port
numbers.
O a. Well-known
O b. Private
O . Unused
O d. Registered

Transcribed Image Text: The syntax of a geoprocessing tool includes parameters that are both
and
O required, optional
O alpha, numeric
O subjective, topical
temporary, permanent

Why do you think Trevor Noah has to repeat the question regarding the right way of protesting thrice? Does Lahren’s answer satisfy you? Explain your answer.

A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as Super computer explain?

Write a program using if statement instead of switch statement.

x=2;

switch x

case 1;    disp(‘One’)

case 2;    disp(‘Two’)

case 3;    disp(‘Three’)

otherwise; disp(‘Unknown Number’)

end

27, 58, 29, 40, 90, 78, 62, 30, 40, 56, 73, 31, 90, 25, 47 What are the five number summary listing values in numerical order

159. What is the name of the device that connects two computers by means of a telephone line? a. bus b. Tape c. cable d. modem

Purchase module responsible for sharing date and maintaining the integrity of data transferred to and from the clients and servers.
Select one:
a. False
b. True

Please Help ASAP!!! Transcribed Image Text: In the space provided below, briefly describe the reference-counting garbage collection algerithm.
Edit
Format Tale
12pt v
Paragraph
BIU
Av

Correct and detailed answer will be Upvoted else downvoted. Transcribed Image Text: BIG-DATA
What are the areas where HDFS cannot be considered as a good fit?

SQL DATABASE Is there any mechanism in oracle to show that how many rows are there in a single table? If yes, then please give example.

Architecture Transcribed Image Text: 7. If the given memory chip size is 1024X4 bits, how many chips are necessary to make
up 2 Kbytes of memory?

Transcribed Image Text: m. Write a recursive C function that finds the factorial of a given integer. Use this function to
?!
find “C =
r!(n-r)!

Write a program in JavaScript to check whether a key is present in a Object Or not. You can assume the Object as your own choice

Please, use network programming by Java, and I want a picture of the output : Write a code that implements the threaded day/time server, TDayTimeServer ?

Which of the following protocols is/are one of the control protocols used in IP communication infrastructure? A) ARP B) ICMP C) DHCP D) None of them

In _______ transmission, a start bit and a stop bit frame a character byte. a. asynchronous serial b. synchronous serial c. parallel d. (a) and (b)

If you are the owner of a company (e.g: restaurant, online shopping, shopping mall, petrol station), why do you need to have system/apps/website for your company?

List the five functions that a database management system must do. Describe the consequences of not doing each task. Describe how each duty may be fulfilled.

Standard building blocks are essential in multimedia. Explain the components of multimedia and how they may be used to create an interactive website for your organisation.

Python Transcribed Image Text: Which widget allows to create screen inside another screen?
Select one
O a Root
Ob Screen
O c. Window
O d. Frame

1. What is the data type and range of uint32_t? 2. What do you expect this C code to do?   While (1) {   Body( ) }

A multithreaded program needs to ______________. implement Thread or extend Runnable implement Runnable or extend Thread implement both Thread and Runnable extend either Thread or Runnable

Read a string input from user and find if the string contains an upper case letter or not. Print yes or no in output. In C++

Write a program in python that use nested loops to get this as output Transcribed Image Text: 01
012
0123
01234
012345
0123456
01234567
012345678
0123456789

Network Security Assessment Transcribed Image Text: Outline and explain any three (3) examples of network-based attacks.
A- BI
E E
Maximum size for new files: 5GB

Which object oriented methodology is best suited such that it has strong emphasis on modelling but has weaker emphasis on process and why? State one reason.

Write 8085 instruction to store the 1 byte data 52H into memory location 2000H using direct addressing mode. Show memory view and assembler output. Sim8085 software.

Take a look at the ADT for the cave system. This ADT may be implemented using a graph. Implement the algorithm using the class you created.

34. Which of the following algorithms is not a broadcast routing algorithm? a. Flooding b. Multi-destination routing c. Reverse path forwarding d. All of the above

Write a program that take user input two times and find the remainder if both have same remainder this is lol number else not in java

Transcribed Image Text: WHICH OF THE FOLLOWING MEMORY PARTITIONING TYPES HAS PREDEFINED AND VARIOUS SIZED PARTITIONS?
Select one:
a.BUDDY SYSTEM
b.DYNAMIC PARTITION
c.UNEQUAL-SIZED PARTITION
d.EQUAL-SIZED PARTITION

dr java Transcribed Image Text: Which of the following lines are not a Java comment?
* comments */
O // comments
comments
O /** comments */

Que 3:  a. Describe the myths of customer in software development, and what is reality?
b. Elaborate any two reasons of software crisis.

In software development

Transcribed Image Text: 32. “The system shall provide all its services during the weekend”, is an example for”
Functional requirement
Non-functional requirement
Domain requirement
External requirement

When a transaction is rolled back in accordance with timestamp ordering, a new timestamp is assigned to it. Why can’t it simply retain its previous timestamp?

154. Which of the following is an example of bounded medium? a. Wave guide b. Coaxial cable c. Fiber optic cable d. All of the above

As Engineering and Computing students you must be familiar, with the respective professional bodies, as well as, Rules of Practice,Professional Obligations and Codes of Ethics. Comment.

Use of a single data model for conceptual and logical design has many benefits versus utilizing two separate models. E-R and relational database models, for instance….

Which of the following connectivity devices is used to extend a network on a purely mechanical basis? a. Active hub b. Gateway c. Router d. Switch

Write a C program to take input 3 integers and print the result where result is: Sum of first two * absolute difference of last two.

Check the correct in checkbox The preprocessor removes the _______ from the source code. comments header files both comments and header files none of the mentioned

Write a program in haskell programming language to find the product of list elements formed in O(1) time and the start and ending bound is given

Cross-site scripting and cross-site request forgery exploits allow attackers to hijack legitimate sites. What are these two exploits and what ia a common mitigation for each?

Transcribed Image Text: Give two types of data mining processes. List out the various steps within them. Which are the most
time-consuming parts of these processes.