Suppose that you are network technician who happens to have a problem with a user experiencing network connectivity problems. Use TCP/IP to diagnose the problem.
Comparing between traditional methods and the object-oriented method. Do support your illustration and explanation by providing justification on chosen methodology compare with other available methods.
36. Computer devices which are automatically detected by windows are called a. plug & play devices b. automatic devices c. serial devices d. installed devices
when state switch to the running state it means ? ???????? it is ready for execution it is terminate it needs I/O all of previous
– Determine the number of 256 KB memories can be placed (without overlapping) in the memory space of a processor that has 30 address lines
For the basic ADT Stack operations, list all cases when a StackException will be thrown. Each listed item should be no more than 10 words
Provide an overview of the internet of things. What makes the industrial internet of things unique? How does it stack up against the established network?
Write a program in c to take two number of input as integer type and perform. Addition and subtraction from these number and print result
Transcribed Image Text: WHICH OF THE FOLLOWING REGISTERS REPRESENTS THE ENDING LOCATION OF THE PROCESS?
Select one:
a.LOGICAL REGISTER
b.BASE REGISTER
c.BOUND REGISTER
d.ABSOLUTE REGISTER
When it comes to cloud computing, what’s the difference between public clouds and private clouds? Which do you believe is the superior option, and why?
Please solve Quickly ?++ Transcribed Image Text: Size of integer variable is
byte, Size of double variable is
byte, Size of char variable is
byte.
What are the four distinct categories of feasibility? Which kind is more concerned with overall cost of ownership? Which form is mainly affected by users?
Comparison of different multithreading methods for uniprocessor and multiprocessor systems in various operating systems (Linux/Windows/Mac/Android, etc.) Describe CPU Scheduling Algorithm in a comparable manner (article).
define each concept and explain how it contributes to the development of security mechanisms that may be used to achieve desired security policies in companies.
What is the name of the computer system that acts as a filter for access to and from other networks by a company’s networked computers?
Why is it not necessary to set up two hardware profiles in Windows 7 for a notebook to use or not use a docking station?
53. Final step in producing a program is to a. implementation and documentation b. storing the data c. getting the output d. searching the input
Transcribed Image Text: on:7
Perform booth multiplication of (-21) 10 and (-12) 10 using 2’s complement representation. Show the
calculation for each cycle in detail.
Write a function example that takes two parameters and return one single parameter of same data type as output. Test that function in main function.
What are a few of the threats to data security? After that, we’ll discuss how to keep ourselves safe from similar dangers in future conversations.
choose any latest research topic in cloud computing and find 4 to 5 research papers related to it and write a paper in IEEE format.
Transcribed Image Text: Use while loop and for loop to calculate the following series.
63 /y* + 85 /y*+ 107 /y
*nn-3/y*
A-
BI
=|?
The assembler creates the ELF symbol table. What information is inherent in each symbol table structure that indicates whether a symbol is strong or weak?
Why is STRUCTURE is not secure and cannot be able to hide its implementation details from its end-user compared to CLASS which is more secure?
Find out which kind of data is more prevalent in a typical business environment by comparing and contrasting unstructured and structured data using relevant examples.
Discuss whether a small business environment should use a workgroup network or a domain network setup. What are the advantages and disadvantages of either option?
What is the output of the following code?
a=10
b=5
c=3
if a>b:
b= b+ 10
else:
a= a + 5
print( c )
(Python3)
98. If the baud rate is 400 for a QPSK signal, the bit rate is ________ bps. a. 100 b. 400 c. 800 d. 1600
Create the TRUTH TABLE for the following: 1. [P ? (P ? Q)] ? R 2. (?P ? R) ? [P ? (?R ? Q)]
Find out which kind of data is more prevalent in a typical business environment by comparing and contrasting unstructured and structured data using relevant examples.
I need code in bash with algorithm Transcribed Image Text: main.bash
1
Task 2 (c)
Check whether the given input is palindrome or
not
innut
Given two string taken input from user. Write a program in C++ that finds the length of common prefix of both string and print it.
Write a value returning function that receives three integers and returns the largest of the three. Assume the integers are not equal to one another.
Consider a multiprogramming or time sharing multi user system. Which issues related to the protection of processes need to be dealt with in this system?
Transcribed Image Text: ?Which of the following instruction is not valid
MOV AX, BX O
MOV DS, 1123H O
MOV AX, 4532H O
PUSH AX
What is the step count of the pseudocode below: k=0 for i=0 to 10 do for j = 1 to i do k++ endfor endfor
Transcribed Image Text: Dim number As Integer = 1
Dim i As Integer
For i = 10 To 1 Step -2
Number*=i\2
Next
Number=
i=
Please solve Quickly (Visual Basic 2010) Transcribed Image Text: Q2] Write a program to print odd numbers from 0 to N using Do Loop Until.
39. Each node in clustered system of the computer system monitors a. itself b. One other node c. neighboring node d. One or more nodes
Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot)?
“Every data collection method has its own in-built biases and therefore resorting to multi-methods of data collection will only compound the biases”. Discuss this statement.
Write a program in php to check whether a number is palindrome number or not. You have to take the user input for the number.
Every subtree rooted at any node of a 2-3 tree is a 2-3 tree in and of itself.
Choose one:
Is it true or false?
In virtual box, you may build several Nat Networks. Completely describe the aim and benefits of establishing a NAT network, including all of the specifics.
In image segmentation and segmentation, examine the usage of the edge detection technique to identify edges. What is the importance of digital image edge detection?
Transcribed Image Text: INCLUDES THE DATA REQUIRED BY THE OPERATING SYSTEM FOR CONTROLLING PROCESS.
Select one:
a.USER DATA
b.PROCESS CONTROL BLOCK
c.SYSTEM STACK
d.USER PROGRAM
Can you hurry please In UNIX systems, which command handles a character stream by duplicating its input? a) tree b) tee c) tty d) ls
Transcribed Image Text: Identify and describe the concept illustrated in the diagram below.
Polygon
•drawo: void
Circle
Triangle
Rectangle
-drawo: void
•drawo: void
-drawo: void
Java Write a program to take a string from user and print how many character it had. For ex = ABC 3 character it have
convert the following eNFA to DFA (compute epsilon closures and use the subset contruction method) Transcribed Image Text: q2
b
q3
90
a
a
ql
29) The challenge for public administration is to provide e-government services that are suitable for all citizens and organizations.
Select one:
a. False
b. True
Using twos complement how do you detect if a number is signed or unsigned? Please use java and include source code long UnSigned(); int signed();
Python program Write a program for a string is given and you have to write this in a file named news.txt and screenshot are must
Q/Find the volume and surface area of ??the cuboid using input and inputdlg to enter data and use disp and msgbox to print the kernels
ASAP.Convert the grammar given below to an equivalent PDA, using the procedure given in Theorem2.20.Start variable is R R ?aB Cb B ?CBR|? C ?a|b
What happens if the file named done already exists when you run the following commands? $ cp to do completed $ mv to do completed
Peter wants to use the electrical outlet to power his computer. Describe the steps that his computer will go through to bring up the desktop.
Create a trigger named trg_line_prod that will automatically update the product quantity on hand for each product sold after a new LINE row is added.
114. In a ______ handoff, a mobile station only communicates with one base station. a. hard b. soft c. medium d. none of the above
What are the possible consequences of cloud computing for our society? What is a synopsis of could computing and his background? Furthermore, it is safe.
Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot)?
Recording the numbers 20,25,30,40 respectively in the memory and adding their total to 0200h Write the assembly code that saves it. (Loop should be used.)
A _______ is the central part of an operating system. It manages the operations of the computer and the hardware-most notable memory and CPU time.
Correct answer will be upvote else downvote What is sandwich integration testing? Name the factors used for handling practical approach to adopt sandwich testing. Ans:
During the live online lecture sessions, discuss the networking factors that positively influence your Google Meet connection and what can be done to improve it.
Write a program in c language to copy a string into. Another string without using strcpy method You must have to take string from user
Write a Java code and initialize the following variables: title, last name, first name, student number, age and address. After that, display all the values.
Transcribed Image Text: Q 02: Why the need of Software Engineering arises? Portability, Interoperability, Reusability are the
different characteristics of a good Software Engineer. Explain?
Is it wise to outsource all technical needs to software service providers? Why do you think so? What managerial, organizational, and technical factors are considered?
You had an byte array is given to you and your task is to convert this aray to hexadecimal string and print that. In kotlin
1) Why AOP and OOP Mix Strategy you will adopt? Describe Benefits 2) Primary Concern details with reason (your Answer should be in 12 points)
Which of the following can be requested by Account Aggregator to the customer O a. Passwords b. PINS O c. Private keys Od. Contact numbers
118. An internet like network within a company. The best fit will be a. intranets b. extranets c. applications of intranets d. intranet technology resources
Which file systems might you use if you have a 20 GByte disc volume and want an 8 KByte cluster size (to prevent wasting space)?
Transcribed Image Text: 6. Which property is used to define if a slider is horizontal or vertical?
a. isHorizental
b. isVertical
C. orientation
d. position
Write a program in Python language to append the two strings A,B as BA and print the appended string in output. A= “First” B= “Second”
When the time to establish link is large and the size of data is small, the preferred mode of data transfer is Packet switching explain?
What is the layered approach to operating system design? What are the benefits and drawbacks of this strategy? Give a brief explanation using an example.
None Transcribed Image Text: 11) Find the particular solution of the following ODE:
dy
+ 3y = 4 + 5 cos
dt
y(0) = 0
Transcribed Image Text: When using a printf() statement, what syntax do you use to print the value of an
“int”?
O %d
%c
%s
%f
Peter wants to use the electrical outlet to power his computer. Describe the steps that his computer will go through to bring up the desktop.
Using their technological abilities to abuse other people’s machines is not something that software developers should do.” The word “misuse” relates to the following: why?
Write a program that will accept the following details: a. Name b. Course c. Year d. Grades at least 3 subjects e. General Weighted Average
Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot)?
Demonstrate how to use pop_back function in vector C++. Given vector
b. What is Forward Engineering. What are the steps used for forwarding engineering in the use case diagram. Plagiarized answer will be reported & downvoted
The basic unit of a worksheet into which you enter data in Excel is called Select one: a. Column b. Cell c. Box d. Table
given an array with repeating elements each element repeats thrice except one.find that one in O(1) space and O(n) time complexity in machine independent language.
Write a complete assembly language program to displays all 256 ASCII characters on the screen. Use at least one conditional jump instruction in your program.
Transcribed Image Text: WHICH STATE OF A PROCESS IS INSUFFICIENT THEREFORE HAS TO BE DIVIDED TO MORE STATES?
Select one:
a.RUNNING
b.NOT RUNNING
c.EXIT
d.ENTER
Transcribed Image Text: Use Prim’s algorithm to find a minimum spanning tree in the following weighted
graph. Use alphabetical order to break ties.
16
2.
Provide at least five rules for the knowledge base and a fact for working memory in a subject where an expert system may aid you.
Using their technological abilities to abuse other people’s machines is not something that software developers should do.” The word “misuse” relates to the following: why?
19. Which of these does not account for software failure ? a. Increasing Demand b. Low expectation c. Increasing Supply d. Less reliable and expensive
Addressing mode refers to the various ways by which the microprocessor can access a. instructions b. both instructions and data c. control signals d. data
Transcribed Image Text: Question 3
Standards that have been approved by a particular organization is known as
De Facto
De rule
De jure
De Law
Transcribed Image Text: 2. In a software process, the software
architectural model is a
O Deliverable
O Role
O Functional requirement
O Non functional requirement
(a) Write the logic expression for the output ‘Y’ of the circuit given below. (b) Write the Truth table and pin diagram for EXOR gate.
11. Which of the following operator is used with this pointer to access members of a class? a) . b) ! c) -> d) ~
Static or dynamic routing? Which would you pick for a basic network? Which option would you pick if you had to choose between two options?
8. An example of a layer that is absent in broadcast networks is: a. Physical layer b. Presentation layer c. Network layer d. Application layer
Transcribed Image Text: Describe an algorithm in pseudocode for finding the locations of the largest and
smallest integers in a finite list of distinct integers
9- Which of the following is NOT an attribute of ? a. name b. src c. width and height d. target Clear my choice
Transcribed Image Text: QUESTION 2
When an object is created, it will find the matching constructors used in the declaration statement.
O True
O False
a) How would you convert a listMyFiles.asm assembly file to an object file? listMyFiles.o b) How would you connect and run the above-mentioned object file?
in HTML and CSS create a nav bar with buttons like in image. Transcribed Image Text: Home
Coffee Filters
Coffee Makers
Gourment Beans|
Customer Service
Compare battery life on your device before and after configuring power management settings. Have you noticed an improvement in battery life? If so, how much?
What does it mean when data is leaked? what’s the story behind that? Who is responsible for this? how sensitive info is protected and detected?
Explain how an assembler works, including how it generates the symbol table, what it does with source and object code, and how it handles labels.
25. please explain Transcribed Image Text: The time complexity to add an element on a Binary Search Tree is always O(n)
O True
O False
Which of the following is invalid in writing condition in if statement?
a.
True
b.
complex
c.
Any string
d.
Any number
Clear my choice
help Transcribed Image Text: true/false: The algorithm is not part of the blueprint or plan for the computer program?
Select one:
O True
O False
When it comes to AI, what do you want to achieve in the end? Include two examples for each of the numerous sub-areas of it.
Write a C++ program to check whether a positive integer n is a perfect square or not. Integer n should be taken input from user.
In Assembly Write a single instruction using 16-bit operands that clears the high 8 bits of AX and does not change the low 8 bits.
Artificial Intelligence Transcribed Image Text: is h admissible *
10
A
B
h-9
h-4
h=2
S
h-0
h-7
D
E
h-5
h-3
O yes
no
what is the relationship between superclasses and subclasses in inheritance? Provide an example code segment in Java that illustrates inheritance and describe the superclass/subclass relationship.
Choose a potential problem with database locks on tables, views or resources and one popular way database administrators and or database users address that problem.
Transcribed Image Text: Flash memory can be erased and .9
rewritten faster than ordinary
Electrically erasable programmable
* (read-only memory (EEPROM
True O
False O
None Transcribed Image Text: Simplify the following in sum of
products:
F(A,B,C,D) = N(4,5,6,7,12,13,14,15)
d(A,B,C,D) = (0,1,2,3)
%3D
AB’
B’
??
No correct answer
?
Which one of the following method requires less number of calculations per iteration. O Euler’s Method O Decoupled Method O Gauss-Seidal Method O Newton-Raphson Method
Make the Guided exploration tutorial of following situation: “As a student, How to join the zoom cloud app and introduce the features available to you.”??
USING MATLAB; Find and display all integers between 1 and 10000 which divide by 37. Propose at least two different ways to solve this problem.
Design a Circuit to perform the following Operation. A+B-C Where A, B and C are three binary numbers and each of them is three bits.
Convert the numbers below into binary numbers and Octa numbers (base 8). Show all steps to get full credit A. 256 B. 512 C. 1024
Why is the foreign key important for the integrity of a database? Can you come up with a scenario to show why it is necessary?
Write a program in C++ to asked user to input positive integers to process count, maximum, minimum, and average or terminate the process with -1.
179. Both station can transmit and receive data simultaneously in a. simplex mode b. Half duplex mode c. Full duplex mode d. None of Above
True or False : In the Code window, Visual Studio examines each statement as you type it, and reports any syntax errors that are found.
If the cache of a dynamic programming algorithm is 1-dimensional then we can always conclude that the dynamic programming algorithm is 1-dimensional. True or False
Transcribed Image Text: Use Prim’s algorithm to find a minimum spanning tree in the following weighted
graph. Use alphabetical order to break ties.
16
2.
Create a structure called BarcelonaPlayer with the following members. struct BarcelonaPlayer { char name[20]; int age; char country[20]; char Position[20]; double Salary; double Rating; };
Only if the number of discs parameter is 7 or less can the recursive method for solving the Towers of Hanoi be used.True or False.
Grid computing and cloud computing vary in the infrastructure upon which they are based. I’m trying to understand how cloud computing and grid computing differ.
Please dont post answer from another site else down vote directly Provide solution in you own language not in bookish language What is synchronization tool?
Trace the route for the following companies: Apple, Facebook and Microsoft Which company had the shortest number of hops to get to its IP address?
Transcribed Image Text: What keyword is used to check multiple conditions with an IF statement?
Answers:
a. ELSE IF
ELSEIF
b.
ELSIF
C.
ELSIFS
d.
Transcribed Image Text: 8.
Convert the following eight-bit one’s complement number to decimal: 010000101’s
9.
Convert the following eight-bit two’s complement number to decimal: 101111002’s
I need the answer as soon as possible Transcribed Image Text: Show that L =
{a |p is a prime} is not a context-free language.
DEAR EXPERTS it’s not Maths subject If u know answer thn do don’t wrong answer i will downvoted Construct PDA Transcribed Image Text: K ,0
c. Given a standard memory size of 2 15 block, briefly explain how many addressable locations can be accessed by an SIC machine and why
A = {a^i * b^j * c^k | i = j or j = k where i, j , k >= 0} Grammar ambiguous why?
In your capacity as a software engineer, how do you determine a reasonable estimate for the cost of the program that you want to develop?
Transcribed Image Text: Briefly explain how virtualization could be useful
in the test environment (as defined in the lecture)
for a large software development company.
Distinguish between Coding scheme and recording. Bar chart and histogram. DK response and missing data. Listwise deletion and pairwise deletion. Thematic units and referential units.
26. The program is known as _________ which interacts with the inner part of called kernel. a. Compiler b. Device Driver c. Protocol d. Shell
I need the answer as soon as possible Transcribed Image Text: 8. How many address lines are
required to address 2 megabytes (2048K) of memory?
Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.
compute the sum of the two given integer values. If the two values are the same, then return triple their sum . In C programming
Choose any three traditional methods for determining requirements and illustrate how you can use each to collect and gather requirements in the system development process.
Transcribed Image Text: Which of the following variable names are invalid?
Select one:
O a. $month_1
O b. $monthl
O c. $month-1
O d. $month
Transcribed Image Text: 1. Use Karnaugh Maps to simplify the followino Boolean Expressions
c)
F=ABC+ABT+ABC+ABC+ABT+ABC
d)
F=ABCD+A BCD+ ABC D+ ABC D+ABTD+ABCD+ABCD+ABCD
-ocgionsusing Boolean identities
Is the junior marketing person’s response in question 5 a violation of a perfect duty? Of an imperfect duty? Of any duty? Explain your response.
Give an example of how each of the six kinds of assaults manifests itself on a network for each of the six types of attacks.
101. If the bit rate for a 16-QAM signal is 4000 bps, what is the baud rate? a. 300 b. 400 c. 1000 d. 1200
Identify the type of string method that returns a copy of the string with all leading and trailing whitespace characters removed. Strip clean remove_whitespace rstrip
Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.
Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.
What will be the output of given code. #include
Transcribed Image Text: Convert
a. 476810 to hexadecimal.
b. 43078 to decimal
c. BC1216 to decimal
d. 937.2510 decimal to BCD
e. 17710 to octal
Perl langauge I am not able tto solve .please help me write a program to print Perl is best programming language using loop 10 times
The RPC semantics may suffer from different kinds of failures. Name two kinds of those failures and explain the solutions to deal with the failure.
What is a business impact analysis (BIA)? What are some functions that would be identified in the BIA for your job or your home network?
54. The type of memories used in MP3 players and cameras are called a. memory databases b. flash memories c. mass storage d. main memory
The advantage of zero-address instruction computers is that they have short programs; the disadvantage is that the instructions require many bits, making them very long.
Is it true or false? If the compiler encounters a statement that attempts to alter the value of a constant field, an error will result.
1.Write a PHP function that accepts a string as an argument and then sums up all the numbers within that string and returns the total.
Description: Explain the flow control functions provided by the Transmission Control Protocol (TCP) and the methods that it employs to overcome the limitations of IP.
452. A multi-user, time sharing operating system developed by Microsoft was named as a. Windows 2.0 b. MS Windows NT c. MS-DOS d. Windows XP
Every class in Visual Basic is derived from a built-in class having which of the following names? 1. Object 2. SuperClass 3. Parent 4. System
A(n) is a function or method that is called when a specific event occurs. 1. callback function 2. auto function 3. startup function 4. exception
The advantage of zero-address instruction computers is that they have short programs; the disadvantage is that the instructions require many bits, making them very long.
The following JavaFx code is called as event ________ Model Button btOK = new Button(“OK”); OKHandlerClass handler = new OKHandlerClass(); btOK.setOnAction(handler); Window Display Delegation Dialog
Take input an integer n from user and check whether the integer n is within 20 of 100 or 400. Write program in Java language.
None Transcribed Image Text: So, what is Kruskal’s Greedy Algorithm?? What is the Aim of this algorithm?? How it
helps us in the real world??
Transcribed Image Text: Find the time complexity of the following
summation. Assume that k is a constant, k> 0
n n
1
??
i=1 j=i+1
Write in c++ Transcribed Image Text: Q2: b- Write a program that uses a function to find and return the maximum number between N numbers.
125. The devices that store a lot of optical disks are called as a. Optical reservoirs b. Jukeboxes c. Karaoke machines d. Sequential access machines
Using diagrams, mathematic notations or representations explain the lexical analysis stage in the program compilation process and its effect or relationship on/with the token table.
Describe how the concept of consistency may be applied to interface navigation, display organization, and data input, as well as other aspects of computer programming.
Transcribed Image Text: 12. In automated software testing, the checking of program output with the expected result is called:
Assertion
Setup
O Joint
) Call
Explain how the spiral model of the software development process can support both the Waterfall model and the Prototyping model of the software development process.
Transcribed Image Text: Convert the following to the other conical form
(a) F (X, Y, Z) =E(1,3,7)
(b) F (W,X, Y, Z) = [I (0,1,2,3,4,6,12)
This control has a rectangular area that functions like a text box. 1. List box 2. Drop-down list box 3. Combo box 4. Input label
degital design Transcribed Image Text: What is the BCD representation of the decimal number (9)?
Select one:
O 1001
O 1000
O 1011
O 1101
I need the answer as soon as possible Transcribed Image Text: is the final value of x:
What
x=0
while (x<100):
x+=2
your answer
Python
In assembly: .data arrayOfWords 1020h, 3040h, 5060h, 7080h, 9090h Using the array, access the 3 rd element in the array (the one with subscript 2)
Write program to find the factorial of number less tham 15. Write complete code in main function, do not create other functions. In C language.
Write a program in JavaScript to spilt the array in 2 size Subarrays and print all those sub arrays. The main array is integer type
Assume that your Internet router will be down for 2 hours in a month. What is the availability of your Internet router? Show your calculation.
1. RAD Software process model stands for _____ . a. Rapid Application Development. b. Relative Application Development. c. Rapid Application Design. d. Recent Application Development.
Write a program that converts a time from 24-hours notation to 12-hours notation. The following is a sample interaction between the user and the program
17) What are the features of Python as a programming language?
a.
Versatile language
b.
Functional language
c.
All the these
d.
Object oriented language
can you do traditional long division for this binary problem Transcribed Image Text: 1 1 0 1 0 0
0 0 1 0
1 0
Write a C language program to print the given string n times where n is taken input from user. “C is an structured programming language.”
Transcribed Image Text: Flash memory can be erased and .9
rewritten faster than ordinary
Electrically erasable programmable
* (read-only memory (EEPROM
True O
False O
write a code segment in MARIE assembly language to do the following assumen we have 2 number X, Y. if X
Python Calender library- Write a program that takes input year number from user and print the calender of whole year with day of each date.
is a term that refers to a technique of system development that is designed to shorten the time needed to design and deploy information systems.
Every subtree rooted at any node of a 2-3 tree is a 2-3 tree in and of itself.
Choose one:
Is it true or false?
What type of tree do you receive when you instantiate a tree for ordered data in the Java Standard Library, and how do you know?
define each concept and explain how it contributes to the development of security mechanisms that may be used to achieve desired security policies in companies.
What are some of the technological advantages that a company would gain from offering their goods on Amazon rather than their own e commerce website?
Every subtree rooted at any node of a 2-3 tree is a 2-3 tree in and of itself.
Choose one:
Is it true or false?
The assembler creates the ELF symbol table. What information is inherent in each symbol table structure that indicates whether a symbol is strong or weak?
Is the following code used correctly to read an integer from the input keyboard? int cars ; printf(“How many cars do you have?\n”); scanf(“%d”, cars);
If you are having a problem with a driver, which of the following is the least invasive solution: update the driver or use System Restore?
View the clip below. What is the title of the game and who was the designer and manufacturer? What characteristics make the game unique? https://nv.instructuremedia.com/fetch/QkFoYkIxc0hhUVNDeFpnQk1Hd3JCMWZJRFdFPS0tYzcwZjI3NDJiOWFjMzBlMjJiZTNiMmIzZGY3OWFlMmI5MzUzYzY5Mw.mp4
Prove by induction on the complexity of formula that ?[?:=?]A[x:=x] is always defined and equal to ?A, for any first-order formula ?A and variable ?x.
In image segmentation and segmentation, examine the usage of the edge detection technique to identify edges. What is the importance of digital image edge detection?
In regards to cloud computing environments, describe what are the risks involved. Once you have identified these hazards, write down your methods for addressing them.
Write a program in java to calculate the number of vowels and constant from the string and you have to take string from the user
Transcribed Image Text: Write a program in R programming language
to find the version of the compiler that is
used to run the current script
Transcribed Image Text: is used to select
2 points
items from a list or menu
displayed on the screen.
O Light pens
mouse
Digitizer Pad
40. A bit that selects the mode of the operating system is called a. kernel bit b. user bit c. mode bit d. system bit
Information assurance has a number of countermeasures and security services accessible. Recognize those people who would benefit most from this countermeasure or service, and why.
The Subject is Data Structure Code using NetBeans. Q. Write a Java code to insert {23, 12, 18, 19, 20, 31, 6} in a AVL.
Give an example of how a firm’s understanding of existing cybersecurity defenses may help it prioritize risk mitigation measures as part of its defense-in-depth strategy.
What happens if the file named done already exists when you run the following commands? $ cp to do completed $ mv to do completed
Database Designs What is the purpose of aggregate functions in SQL and how might you use them for reporting purposes in a real world scenario?
Write a program that prompts the user to enter the number of students and each student’s score, and displays the highest and second highest scores.
input: fhgfdgfvbnm,nbvc output: cvbn,mnbvfgdfghf We have to write the code for taking user input as string and reverse this using recursion. Remember use c++ only
Take input an integer n from user and check whether the integer n is within 20 of 100 or 400. Write program in Java language.
Whenever we want to use a software package rather than custom development or outsourcing, should the analytical process be eliminated or at least significantly streamlined?
JAVA write a program to create a array of 10 enteries and user input from each entry then find sum of these entries int array
(Please Don’t copy) write the output of C program and INCLUDE ROUGH WORK as well. #include
It’s due to the fact that computers are so powerful. Please explain how computers have grown so prominent in the educational system in recent decades.
C++ Write a program in C++ to read the content from a text file OUT.TXT, count and display the number of alphabets present in it.
Clear handwriting please Transcribed Image Text: Draw the logic diagram for the Boolean function.
F= A’C O (AOB)’ ABC
A BI
? ?
ill
II
In C++ Write a program to take input 2 string and print the resultant string formed after after concatenation of first string with second string.
If the optimal solution of a linear programming problem with two constraints is x=5, y=0, s1=3 and s2=0 , then the basic variables are ____.
In your capacity as a software engineer, how do you determine a reasonable estimate for the cost of the program that you want to develop?
Transcribed Image Text: How many bit strings of length ten
?both begin and end with a 1
128 O
255 O
127 O
256 O
A) Find the sum of length of all 10 strings entered by user without storing them in any data structure. Please do fast in CPP.
Is it true or false? If the compiler encounters a statement that attempts to alter the value of a constant field, an error will result.
Need correct and detailed Answers else downvote Construct the CLR parse table for the following augmented grammar, A’ ? A A ? (A) I a.
Load marker is the name of the visible silver rectangle which separates the take-up portion of the magnetic tape from the data recording portion? why?
The while loop checks the loop-continuation-condition ______. Select one: a. First b. Last c. Continuously as the loop executes. d. Only when the loop-continuation-condition changes.
452. A multi-user, time sharing operating system developed by Microsoft was named as a. Windows 2.0 b. MS Windows NT c. MS-DOS d. Windows XP
58. Third step in producing a program is to a. test the program b. debug a program c. calculate costs d. both a and b
Transcribed Image Text: WHICH OF THE MEMORY MANAGEMENT REQUIREMENTS IS CONCERNED ABOUT THE INTEGROTY OF THE DATA?
Select one:
a.RELOCATION
b.PHYSICAL ORGANIZATION
c.PROTECTION
d.LOGICAL ORGANIZATION
Write program in java language to take input till user entered alphabets and if user character other than alphabets break it and print the string.
207. With the help of incremental growth a user can enhance the performance of a a. I/O Modules b. System c. Programmed I/O d. Process
In JavaScript: Write a JavaScript program to find the area of a triangle where lengths of the three of its sides are 5, 6, 7.
72. A key that turns a function on or off is called a ______key: a) Power b) Toggle c) Control d) None of The Above
Is there a standard measure for the amount of work a surge suppressor can do before it stops protecting a circuit from an electrical surge?
Transcribed Image Text: Q 03: Briefly Explain.
(a) Software Process Framew ork?
(b) Various steps in Waterfall Process Model with the help of a diagram?
How to write a Bash script on a Linux VM to backup a set of test files to a Windows 7/8 VM system every hour.
Transcribed Image Text: 1. The Fourth Industrial Revolution is characterized by a fusion of
technologies which involves *
Internet
3D printer
Steam engine
Genetic engineering
What is the range of the floating point numbers? a) -3.4E+38 to +3.4E+38 b) -3.4E+38 to +3.4E+34 c) -3.4E+38 to +3.4E+36 d) -3.4E+38 to +3.4E+32
What bandwidth is needed to support a maximum theoretical data rate of 15 kb/s with a Signal-to-Noise Ratio of 3000 and using a four-level code?
Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.
Whenever we want to use a software package rather than custom development or outsourcing, should the analytical process be eliminated or at least significantly streamlined?
** Discrete Math – Computer Science Prove that Mergesort has a runtime of O(n*lg(n)), where n is the length of the list to be sorted.
None Transcribed Image Text: Write a C++ program that inputs an integer array of 10 elements and
prints only the prime numbers in the array.
What does it mean when data is leaked? what’s the story behind that? Who is responsible for this? how sensitive info is protected and detected?
how each of the basic principles of the cybersecurity discipline is used to achieve overall system security is described in detail in the next section.
In regards to cloud computing environments, describe what are the risks involved. Once you have identified these hazards, write down your methods for addressing them.
A(n)______________is a collection of data fields that are all related to the same object, activity, or individual. a. attribute b. byte c. record d. column
list all of the companion programs of Microsoft visual studio 2019 that are available with the compiler together with a brief description of their functions.
Determine how many different floating point numbers there are for 64 bits where the mantissa is 53 bits. This is excluding 0 and non-normal floats.
Give an example of how a firm’s understanding of existing cybersecurity defenses may help it prioritize risk mitigation measures as part of its defense-in-depth strategy.
Transcribed Image Text: The output of the requirements .2
specification
Systems requirements O
User Requirements O
Non functional requirements O
All of the above O
After you have removed the AC adapter and all peripherals, what is the next component you should always remove before servicing any internal notebook components?
53. Which are the two modes of IP security? a. Transport and certificate b. Transport and tunnel c. Certificate and tunnel d. Preshared and transport
158. Devices on one network can communicate with devices on another network via a a. gateway b. file server c. utility server d. printer server
want to implement a network service involving sockets where servers and clients authenticate themselves and encrypt the transmitted data using SSL correct else i downvote
Write a program in C++ to print first 10 terms of Fibonacci series. Series starts from 0,1. You have to print the next 8 terms.
Transcribed Image Text: QUESTION 5
HBRCOA22: Analytics competitors use
to improve business functions.
O incentives
none of these
all of these
quantitative methods
O instinct
text
_________ are accepted languages that involve a number of bar code standards :
Select one:
a. AIDC
b. Machine language
c. Symbologies
d. WMS
358. A process selects a replacement frame from the set of all frames. a. Local replacement b. Global replacement c. Block replacement d. Module replacement
Write a program in Python language to append the two strings A,B as BA and print the appended string in output. A= “First” B= “Second”
55. Data from a computer are _______; the local loop handles _______ signals. a. analog; analog b. analog; digital c. digital; digital d. digital; analog
Transcribed Image Text: QUESTION 2
When an object is created, it will find the matching constructors used in the declaration statement.
O True
O False
Compile a list of the components that make up a typical operating system, and describe the purpose of each component in a phrase or two.
Which one of the following is NOT a resource record tuple structure of a DNS Name server? a. Value b. TYPE c. TLD d. TTL
A ______ is a relation from a set of inputs to a set of possible outputs where each input is related to exactly one output.
Please solve Quickly ?++ Transcribed Image Text: Size of integer variable is
byte, Size of double variable is
byte, Size of char variable is
byte.
35. Which of the following activities of a Generic Process framework provides a feedback report? a. Communication b. Planning c. Modeling & Construction d. Deployment
4. The design issue of Datalink Layer in OSI Reference Model is a. Framing b. Representation of bits c. Synchronization of bits d. Connection control
Separate the functional needs of an information system of your choosing from the non-functional requirements of the system, and provide examples to support your conclusion.
PLEASE FAST Q) Propose a simple algorithm that solves the knapsack problem in the case when all items have the same size but different values.
69. A UML diagram includes which of the following? a. Class name b. List of attributes c. List of operations d. All of the above.
In C++ Take a string input from user and print the Character with lowest ASCII value in output. Given : String contains UpperCase alphabets only.
Transcribed Image Text: QUESTION 2
At the next level of detail, a SQL Server table contains
Attributes
Schemas
None of these
All of these
Tables
24)
What is the designation who is skilled in the art of programming?
a.
programmer
b.
analysist
c.
logic deginer
d.
computer operator
Python 3
Discuss how the darknet and the deep web have made it more difficult to investigate and prosecute cybercrime. Give an example of what you mean.
What two keys do you need to configure the AWS CLI? Choose two. a) Public Key b) Private Key c) Access Key d) Secret Key
Transcribed Image Text: MESSAGE PASSING TECHNIQUE IS AN APPROACH BASED ON EXCHANGING INFORMATION WHERE PROCESSES OPERATE IN ISOLATION FROM EACH OTHER.
Select one:
a.TRUE
b.FALSE
Given a string taken input from user. Find the number of alphanumeric characters in the string. For ex; Allzaamen@12#, output should be 11 In C++
define each concept and explain how it contributes to the creation of security mechanisms that may be used to achieve desired security policies in companies.
20. Which of the following to be considered as a broadband communication? a. Fiber optics b. Multiplexing c. Microwave circuit d. Both a and c
Laser card is the name of the memory card which is conceptually related to the smart card but is similar to the video disk? explain?
“Unlike in the manual system, there is lack of visible transaction trail in the computerized system. “ Is this True or False? Support your answer.
Transcribed Image Text: Draw the logic diagram using only two input NAND gates to implement
we following expression F = (AB + AB)(CD + CD).
If the processor of a computer does not have a direct and unassisted access to data items, these items are said to be offline why?
Which file systems might you use if you have a 20 GByte disc volume and want an 8 KByte cluster size (to prevent wasting space)?
What is the best way to randomize a program? What is the best way to resize or move the values generated by the rand function?
5( Transcribed Image Text: Find the Excess 3 code
equivalent of decimal
number 2?
a. 0011
O b. 0010
O C. 0101
O d. 1001
n the evolution of database technology, second-generation products are considered to be the first true DBMSs because They could manage multiple entities and relationships. explain?
Transcribed Image Text: A use case is a fundamental part of determining the work that will be done in plan-driven processes.
O True
O False
168. Continuing operation with failure of one component of the computer system is called a. graceful upgradation b. fault tolerant c. upgradation d. graceful degradation
don’t use others answer, show your work step by step Transcribed Image Text: 1. Perform the following subtraction using 10’s complement on 532 – 794.
Que. Provide steps to install SDK tools in android studio. Ans. Transcribed Image Text: Que. Provide steps to install SDK tools in android studio.
Ans.
For a cache memory of size 32 KB, how many cache lines (blocks) does the cache hold for block sizes of 32 or 64 bytes?
Danny installed an optical drive on the same cable as his primary harddrive, and now
the system will not boot. What could be causing this?
Rust programming Create a string and then concate the string with each other and print in meaningful statement You can take string as your choice
What might happen to the Windows system if too many services are running, as indicated by multiple icons in the notification area of the taskbar?
205. The graphical models showing the relationships between the system and its environment. a. System models b. Software models c. Class models d. User models
No plagiarism please Transcribed Image Text: What is the value stored at x, given the statements?
int x;
x = 6/ static_cast
Solve it fast fast fast plz Transcribed Image Text: Unauthorized modification of computer folders/data refers to intellectual property right.
Select one:
O True
O False
Can you answer question 6? Transcribed Image Text: 6) Explain what happens when the expiration interval in an Expires header field in an INVITE
expires.
Matlab Transcribed Image Text: Write a program to plot sin(xcosx/
x^2+3x+1) in x 1 to 3 with increments of
0.01 with green color
Matlab please
Transcribed Image Text: Write a program in scala programming
language to check whether the ‘a’ character
present in a string between 2 to 4 times.
Binary addition Transcribed Image Text: 0 1
0 1 1
0 1
0 0
1 0
1
1
1
1
1
1
1
+
1
Keeping in mind the Database Administrator’s and Data Administrator’s primary duties. Discuss who plays a critical role in the latter stages of development and why.
33. Which of the following is an Problem-Oriented Programming Languages? None of the Choices COBOL JAVA MATLAB Give an explanation for the answer. Thank you
The advantage of zero-address instruction computers is that they have short programs; the disadvantage is that the instructions require many bits, making them very long.
Transcribed Image Text: The instruction, MOV AX, [2500H] is an example of
immediate addressing mode
direct addressing mode
indirect addressing mode O
register addressing mode
Explain the vulnerability of AirDrop technology that compromises email addresses and phone numbers. Illustrate this vulnerability with an attack example. Please do not use handwriting.
30. Which of following is not a condition of Dead Lock ? a. Mutual Exclusion b. No Preemption c. Hold and Wait d. Data Transfer
In the IoT system, what is the basis for considering the use of edge computing and cloud computing. Where should the database system be located?
lang : JAVA Transcribed Image Text: The following statement means that the deep cloning is implemented.
Student copy = (Student)super.clone():
Select one:
O True
False
Stuck on this problem. Please help. Thank you. Transcribed Image Text: 8. Implement f(X.Y.Z) = Em(0,3,4,5,7) a. in NAND, b. in NOR (with gate diagrams)
The essential characteristic of a batch processing system is that there is some______________ between an event occurring and the eventual processing of the related transaction.
24. Which of these does not affect different types of software as a whole? a. Heterogeneity b. Flexibility c. Business and social change d. Security
What are a few of the threats to data security? After that, we’ll discuss how to keep ourselves safe from similar dangers in future conversations.
Kernel-Attached Transcribed Image Text: Discuss with 3 examples how kernel objects are represented in
Windows and how the system programmer can manipulate these
handle objects.
Write a program to take input a string and form another string with character at odd indexes in the given string.Print the newly formed string.
Write a java program Implement Map Using BST V get(K key) void put(K key, V value) int size() * @param
Transcribed Image Text: Q(1) Choose correct answer
1. The whos function in MATLAB is used to
show the class of the variable. *
True
False
Write a program in JavaScript to make a copy of object and then change the name of the key which is present to something else
Compile a list of the components that make up a typical operating system, and describe the purpose of each component in a phrase or two.
72. The two most common digital services are ________ service and ______. a. switched/56; switched/64 b. switched/56; DDS c. DDS; swiched 64 d. leased; out-of-band
1. List and briefly define important factors that can be used in evaluating or comparing the various digital-to-digital encoding twchniques. 2. What is differential encoding?
Study the connections between mobile devices and cloud computing and evaluate and compare them. Cloud computing offers a wide range of benefits for mobile devices.
Would it constitute an editing operation or a formatting activity to rearrange the paragraphs in a manuscript using a word processing program? Explain your answer.
fibonacci_dynamic used O(n) time and O(n) space. Design a version that uses O(n) time but only O(1) space. (nt: Create A with exactly 3 elements.)
Numbers with the same beginning and end spelling are called palindrome numbers. Draw a flowchart of the program listing the palindromes from 100 to 9999.
When you are ready to buy a printer, you must consider how you plan to use it.
Explain the four important specifications/features when evaluating printers.
What kind of data does a company keep track of? In the era of big data, should individuals be worried about their personal privacy online?
10. Which is not one of the types of prototype of Prototyping Model? a. Horizontal Prototype b. Vertical Prototype c. Diagonal Prototype d. Domain Prototype
48. _______ are used for cellular phone, satellite, and wireless LAN communications. a. Radio waves b. Microwaves c. Infrared waves d. none of the above
Transcribed Image Text: Compute and write the final value of C.
int A=15, B=10, C;
C-A %-5 || 10<=B && A != 10;
C =
Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot)?
What are the possible ramifications of cloud computing on our society? Could computers and its history be summarized? Also, the fact that it is secure.
Write a program in java in which you have take standard from a student and print if he had to give board exams or not.
Why does the recursive function have to call itself to solve a smaller version of the original problem when using recursion to solve a problem?
Compare battery life on your device before and after configuring power management settings. Have you noticed an improvement in battery life? If so, how much?
Write a program to solve the selection problem. Let k=N/2. Draw a table showing the running tie of your program for various values of N.(Pyhton)
Out-line processor is software that accepts user ideas, manipulates and reorganises them in user-specified ways and then produces a refined model of those thoughts. explain?
Indicate if each of the following assignment statements is valid or invalid. A) total = 9; B) 72 = amount ; C) yourAge = myAge;
determine if the following is a valid deduction rule: P -> Q -| Q __________ ? -|P make a truth table for the relevant statements.
write a program to evaluate the arithmetic expression: X = (AB-C) ÷ (DE+F) 1)Assume a register-to-register architecture with three-address instructions. plz solve in 40 minutes
Code a program in python to take input two numbers from user and print the greater number of both. Please add comments for my understanding.
Technology is rapidly developing, and further change is inevitable. Discuss any five (5) recent computer or communication breakthroughs that reflect the current state of computing.
Write a program in dart language to take a list and add element from 1 to 50 and print all this list in reverse order.
Computer science question Transcribed Image Text: The removeMin operation for both the linked and array implementation of a Minheap is:
O(logn)
O(1)
O(n)
O(n?)
O(nlogn)
Question . Discuss Diffie-Hellman key exchange protocols to enable two users to securely exchange a key that can be used for subsequent encryption of messages.
Write a program in which you have to print the difference in between 2 number and those numbers are given. Please do fast in php
404. Mechanisms for synchronization and communication among various processes can be provided by a. Sequence management b. Communication management c. Request management d. Process management
Every subtree rooted at any node of a 2-3 tree is a 2-3 tree in and of itself.
Choose one:
Is it true or false?
When pc1 wishes to connect with pc2 and pc3, how does Switch determine the Mac Address? With the use of a diagram, describe the procedure.
Q: Write down three real life applications of Trees (Data Strcuture). NOTE: WRITE IN YOUR OWN WORDS PLEASE DON’T COPY FROM GOOGLE & EXPLAIN BRIEFLY.
On the device that you are currently using list the processor and clock-speed of the device. How is this information relevant today? No handwritten plaese.
182. Relational schemas and other metadata about relations are stored in a structure called the ____________ a. Metadata b. Catalog c. Log d. Data Dictionary
how each of the basic principles of the cybersecurity discipline is used to achieve overall system security is described in detail in the next section.
What is RAID 5 and how does it work? What circumstances would necessitate the deployment of RAID 5 rather than one of the other options?
Explain how Homomorphic Filtering is used for picture improvement and why it is useful. Explanation of how this method improves the contrast of an image
Transcribed Image Text: Multiples
How many numbers between (and including) 440 and 970 are not multiples of ten?
Give your answer as a single integer.
Transcribed Image Text: b) Consider the code given below and predict the
output.
for (int i=1; i<=9;i=i+2)
{
if (i==5) continue3;
cout<0); 3. d=(5==(3*2)); 4. d =(5==5);
Correct and detailed answer will be Upvoted else downvoted. Thank you! List and explain the various issues that arises while preforming testing on OO Software.
Select which of Conditional Formatting rules that will display rectangular bars? Select one: a Data Bars b. ghlight Cell Rules c.Color Scales d.Top Bottom Rules
Implement a “Library” class with attributes such as list of books, librarians, timings etc. • Implement functions to search, issue & report over due books
Write a program in kotlin to remove all the blank spaces from the string using regular expression and print the string in both the conditions
Write a program in which you have to print the difference in between 2 number and those numbers are given. Please do fast in php
To binary search for a key in a sorted array, the maximum number of comparisons is log2 n. Choose one: Is it true or false?
What are the differences between the perimeter network and the interior network in terms of information security and risk management, and how do they interact?
In Hadoop, to set an environment variable in a streaming command use ____________ a) -cmden EXAMPLE_DIR=/home/example/dictionaries/ b) -cmdev EXAMPLE_DIR=/home/example/dictionaries/ c) -cmdenv EXAMPLE_DIR=/home/example/dictionaries/ d) -cmenv EXAMPLE_DIR=/home/example/dictionaries/
What is the most significant distinction between connectionless communication and connectionoriented communication, and how can you recognize the difference between the two types of communication?
List five benefits of using a database to manage data instead of a file system. List all of the advantages that a database-based strategy has.
I need answer quickly Program takes the masses of two objects and the distance between them to determine the gravitational force acting between the objects.
Comparison of different multithreading methods for uniprocessor and multiprocessor systems in various operating systems (Linux/Windows/Mac/Android, etc.) Describe CPU Scheduling Algorithm in a comparable manner (article).
Transcribed Image Text: The basic storage element in a digital system is
Select one:
O a. multiplexer
O b. counter
c. flipflop
O d. encoder
define each concept and explain how it contributes to the creation of security mechanisms that may be used to achieve desired security policies in companies.
q3″ Theta (?) is an asymptotic representation used to represent ___________ of an algorithm. a. Worst case b. Average case c. None d. Best case
What role will Artificial Intelligence play in the future? What artificial intelligence software applications are presently in use? Is Artificial Intelligence a cause for concern?
java Transcribed Image Text: If you declare an array: int [] numbers = new int[5]; , then how many elements are in the array?
undefined
Transcribed Image Text: Q1
in
in c++
Q1/ write a program to draw a truth table of the following logic circuit:
BD
1 Add file
A type of malware that holds a computer system or data captive until the payment is made. a. Scareware b. Spyware c. Ransomware d. Adware
Which command allow you to request an IP address as a DHCP client? (Choose all that apply.) a) dh b) dhclient c) pump d) dhcpd
Please solve Quickly ?++ Transcribed Image Text: Size of integer variable is
byte, Size of double variable is
byte, Size of char variable is
byte.
there are many advantages to studying communication. Explain how these benefits apply to you. What do you think the outcomes will be if implemented directly?
Transcribed Image Text: Ch 19
When designing Web pages,
combine grid patterns as needed.
use slim margins.
avoid headings.
vary line spacing.
A and D.
In C++ Take a string input from user and print the Character with lowest ASCII value in output. Given : String contains UpperCase alphabets only.
Write the assembly code that finds the sum of numbers up to 1-N and saves it to address 0250h. Run the code and show output
Transcribed Image Text: Write a java program to multiply
corresponding elements of two arrays of
integers and store in another arrays at the
Respective location.
Transcribed Image Text: Describe what is meant by #AABBCC when declared as a colour value in CSS.
(Note: Marks are not awarded for any conversion.)
Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.
Explain how the spiral model of the software development process can support both the Waterfall model and the Prototyping model of the software development process.
Identify ruber-ducky learning strategy and why you would like to change it. Explain why do you think they may be inefficient. (Explain in paragraph form)
________ is the process of converting digital data to a digital signal. a. Block coding b. Line coding c. Scrambling d. None of the above
Rewrite the following while loops as for loops: (c++) int i = 1; while(i<=10) { if (i<5 && i !=2) cout << 'X'; i++; }
Transcribed Image Text: Suppose today is December 14, 2014. Which of
the following functions will NOT return
12/14/2014 as a date?
12/14/2014
=12/14/2014
=TODAY()
=DATE(2014,12,14)
Transcribed Image Text: WHICH DYNAMIC PARTITION PLACEMENT ALGORITHM CHOOSES THE BLOCK WHICH IS CLOSEST IN SIZE OF THE REQUEST?
Select one:
a.BEST-FIT
b.FIRST-FIT
c.NEXT-FIT
d.SECOND-FIT
In image segmentation and segmentation, examine the usage of the edge detection technique to identify edges. What is the importance of digital image edge detection?
Transcribed Image Text: b. Use Dijkstra’s algorithm on the following network to find shortest paths.
5
7
8
RM
W
3
7
2.
4.
3.
Which of the following problem solving methods discussed in class may not produce the optimal solution? Greedy Brute force Exhaustive search None of the above
convert the binary numbers below to decimal value, hexadecimal and BCD numbers. Show all steps to get full credit
A. 11101001 B. 10101010 C. 11001100
Mac OS X is an embedded operating system Transcribed Image Text: Mac OS X is an embedded operating system
Select one:
O True
O False
A web page document is considered to be which of the following in the Document Object Model? a. object b. property c. method d. attribute
72. In computing, main causes of errors are a. errors in program b. errors in data c. fault in system design d. all of above
None Transcribed Image Text: Q) Using function write a C++ program to read
a[10][10] elements of two dimensional array and find
factorial for positive numbers
With the usage of a simultaneous multithreading architecture, what are the problems that an operating system must deal with and how does it do so?
Q- Which design principle invites polymorphism and inheritance to be implemented in object oriented paradigm? Discuss with help of example Subject: Software Design and Architecture
Write an assembly program to move (N) memory contents located at starting address with offset (AF0h) to the new location address starting at offset (500h).
C++ Transcribed Image Text: Test Content
Question 1
int x=22, y=17;
if((x>30 || y<2))
cout<<"BAHRAIN";
else
cout<<"MANAMA";
MANAMA
BAHRAINMANAMA
BAHRAIN
BAHRAINORMANAMA
Type here to search
C PROGRAMMING QUESTION If an array is declared as int arr[5][5], how many elements can it store? (a) 5 (b) 25 (c) 10 (d) 0
Discuss the following as they relate to IP networks: i. Network Address Translation. ii. Datagram Networks. iii. IP Fragmentation and Reassembly. iv. ICMP. v. ICANN.
In today’s world, every company has adopted big data in their IT systems. What are the advantages and disadvantages of using it in a company?
What do we name a computer’s ability to execute multiple apps at the same time? ? interactive processing ? load balancing ? multitasking ? time-sharing
Transcribed Image Text: Exercise
• Writhe the pseudocode and draw the flowchart to determine if the
number entered by the user is odd or even
Transcribed Image Text: Which of the strings 0001, 01001, 0000110 are accepted by the dfa in Figure 2.1? Transcribed Image Text: 91
92
1
1
Given 5 processes with burst time 10,8,12,2,1 and all process are available at t=0. Find which process will be scheduled last according to SJF algorithm.
Transcribed Image Text: using HTML code write a program to
display the table in the following
picture
No
Name
address
1
Ahmed
Baghdad
Ali
Tikrit
Write a Java program to get whole and fractional parts from a double value. Given value: 11.98 Expected output: Integral Part: 11.0 Fractional Part: 0.9800000000000004
In your own words, describe the significance of operating systems and if it is feasible to communicate with a computer without using an operating system.
What does it mean when data is leaked? what’s the story behind that? Who is responsible for this? how sensitive info is protected and detected?
Describe five scalability strategies for the hospital information system. In Windows Server 2016, how would you format a partition or drive using a file system?
What is PCI DSS? What are the 12 requirements outlined in PCI DSS? What are a couple of best practice ways for implementing PCI DSS?
What are the benefits and drawbacks of using each application? What are the app prices? What kind of security measures are used in these apps?
73. Which of the following is not an option when shutting down your computer? a. switch user b. stand by c. log off d. restart
Provide an overview of the internet of things. What makes the industrial internet of things unique? How does it stack up against the established network?
What is the output of the following?
aList = [5, 10, 15, 25]
print(aList[1::2])
a.
[10, 5]
b.
[10, 25]
c.
[15, 10, 5]
(Python3)
how much bandwidth would required to transmit a DS-1 signal (1.544 Mb/s) using a four-level code with a signal to noise ratio of 15 dB
1) Why AOP and OOP Mix Strategy you will adopt? Describe Benefits 2) Primary Concern details with reason (your Answer should be in 12 points)
282. Communication between devices of computer system is provided by a. shared memory b. message passing c. graphical user interfacing d. both a and b
Transcribed Image Text: State role of concurrent engineering in product development process and how it ca
be beneficial in reducing product cost and manufacturing defects?
None Transcribed Image Text: Q1.
Define an expert system. Describe characteristic features of Expert Systems
Please do it correctly.
Subject: Artificial Intelligence.
Unit: Expert systems
Every subtree rooted at any node of a 2-3 tree is a 2-3 tree in and of itself.
Choose one:
Is it true or false?
An efficient operating system generally achieves ________ average turnaround time and ________ throughput. A. Low, high B. gh, low C. Low, low D. gh, high
In an IoT system, what’s the starting point for thinking about how to use edge and cloud computing? Where should the database system be located?
Transcribed Image Text: The program takes the masses of two objects and the distance between
them to determine the gravitational force acting between the objects.
How would you summarize the evolution of the network protocols that are now in use, including how they were started, evolved, and are still developing?
What is the best way to randomize a program? What is the best way to resize or move the values generated by the rand function?
In this comparison, the software development process is compared to the procedures recommended for writing papers. Is there a striking resemblance; are there major differences?
Transcribed Image Text: Find the errors in the program and rewrite the correct statements
A=30;
B-60
c=*(A+2
P-input(“Enter the float number=’))
printf(XYZ)
B
II
III
Transcribed Image Text: Minimize the given expression using a four variable K-map.
F(A, B, C, D) = E(0, 2, 4, 7, 9, 12, 14)
%3D
solve (Web development) Transcribed Image Text: Select the form control below that does not use the tag.
checkbox
select list
radio button
text box
Transcribed Image Text: QUESTION 6
The signature of “public int getStringLength(String str)” method is:
O public int getStringLength(String str)
public int getStringLength()
int getStringLength(String)
getStringLength(String)
Describe in detail SaaS, PaaS, and IaaS Cloud computing models. Describe three considerations when auditing Cloud technologies.
Need help with this.. please explain in detail!
a) How would you convert a listMyFiles.asm assembly file to an object file? listMyFiles.o b) How would you connect and run the above-mentioned object file?
Transcribed Image Text: WHAT IS BEING RETURNED IN THE CASE OF NOT BEING ABLE TO CREATE A NEW PROCESS?
Select one:
a.0
b.1
C-2
d.-1
Transcribed Image Text: QUESTION 8
Assume x = 4, which of the following is true?
(x== 4)
x != 5
x== 5
x l= 4
149. Which one of the following protocol is not used in internet? a. HTTP b. DHCP c. DNS d. All of the above are used
4.What is DHCP and what are its advantages? 5. What is a MAC address and what is the difference between it and an IP address?
Write a Program in Rust language to find the value of expression. 2a 2 + b*c + a*c Given, a= 10, b= 5, c= -2.
71. ISR is the interrupt program that stands for? a. interrupt software routine b. internally service routine c. internal service routine d. interrupt service routine
MATLAB Transcribed Image Text: WRITE MATLAB CODE TO PLOT THE FUNCTION Y = X2 – 7*X
+ 10.
X = 0:0.01:10. PROVIDE MATLAB PLOT SCREENSHOT.
What test and evaluation using standards example NIST, CIS and utilize this as a tool to for the Security of Exchange Server in your organization.
Why does the recursive function have to call itself to solve a smaller version of the original problem when using recursion to solve a problem?
42.Which of the following is one of the CSMA access modes that supports an aggressive transmission algorithm? a.1 persistent b.2 persistent c.3 persistent d.4 persistent
Write a program in Python language to append the two strings A,B as BA and print the appended string in output. A= “First” B= “Second”
Describe a few of the most frequent password-related hacks that occur nowadays. Which of these assaults has become more effective as computing power has increased?
Write a program that asks the user to enter a signed number and read it. Then display the content of multiplying this number by 24.5
In regards to cloud computing environments, describe what are the risks involved. Once you have identified these hazards, write down your methods for addressing them.
Write a recursive method that for a positive integer returns a string with commas in the appropriate places, for example, putCommas(1234567) returns the string “1,234,567.”
Transcribed Image Text: CvCS Ae a prime p (Large). Let P be the pruimilive elomont of Zp
Let de zp* with 2
The advantage of zero-address instruction computers is that they have short programs; the disadvantage is that the instructions require many bits, making them very long.
54. RTP stands for : a. real time protocol b. real time transmission control protocol c. real time transmission protocol d. real time transport protocol
What is the guiding concept in the design of an operating system’s microkernel? What is the most significant difference between it and the modular approach?
What is the CPI for pipeline with the following conditions? Using Forwarding, Hazard type % Jumps 30 Branches (Taken) 10 RAW (combined load-alu, load-store) 20
Write a program in Python language to append the two strings A,B as BA and print the appended string in output. A= “First” B= “Second”
Transcribed Image Text: Q1/ Write a program to insert 10 numbers in array and then count how
many even and odd numbers in this array.
Transcribed Image Text: Which data model has the highest level of abstraction?
O a. Relational
O b. Object-oriented
O c. Entity relationship
O d. erarchical
Transcribed Image Text: c) Explain the functionality of the circuit in Fig B4 using truth table. Write a Boolean
expression for X.
M
Fig. B4
Transcribed Image Text: A balance must be made between allowing users to do real work and ensuring only real users can do work.
True
False
ASSUMING C LANGUAGE True or False : You can have the data portion of a Linked List be a Struct containing a Linked List itself
What is RAID 5 and how does it work? What circumstances would necessitate the deployment of RAID 5 rather than one of the other options?
Given the radius, in inches, and price of a pizza, design an algorithm to find and display the price of the pizza per square inch
Grid computing and cloud computing vary in the infrastructure upon which they are based. I’m trying to understand how cloud computing and grid computing differ.
Transcribed Image Text: Which of the following statement in Python
language statement is the same as a=a//(b*c).
O (b*c)//=a
O all=(b*c)
O a*=(b*c)
O a=//(b*c)
Write a function that inserts the nodes of a binary tree into an ordered linked list. Also write a program to test your function (C++)
304. Which of the following operating system is better for implementing a Client-Server network? a. MS-DOS b. Windows 95 c. windows 98 d. windows 2000
L . , imize the following SOP expressio Transcribed Image Text: Q1: Use Karnaugh map to minimize the following SOP expression F(A,B,C) = Em(0
,1,4,5,6)
Give an example of how a firm’s understanding of existing cybersecurity defenses may help it prioritize risk mitigation measures as part of its defense-in-depth strategy.
a) The basic components of any communication system are transmitter, channel and receiver. Discuss in detail the role of each component to enhance effective communication.
13 Transcribed Image Text: what is the output of the following code?
1.ST= “today is Monday at 12:33 PM”;
2.preg_match(Aw+\s(\d+):\d+/’. $ST. Smatches):
3echo Smatches[1):
Answer:
I need the answer as soon as possible Transcribed Image Text: Examples of printers that have the ability to print an
unlimited number of symbols?
In C++, if a member of a class is private, we cannot access it outside the class, but what if the member variable is protected?
Are the protective measures adequate to ensure the security of the information system? Alternatively, is there a way to guarantee anything or is everything unpredictable?
Python program. Write a python program to get the number of lines of a code a file had. You should take file name from user
Python please. Take a string from user and a character also take from user and calculate how many times that character appear in that string.
he monitor power LED is ‘on’ but the monitor screen is completely dark. The least likely cause of the problem is: System RAM problem why?
Which selections are valid definitions of a string variable? Check all that apply. string yoyo(“yoyo”); string yoyo = “yoyo”; string zeros(30,’0′); string yoyo = null;
Discuss carefully the difference between the use case diagram that was used in requirement specification and the one that is used here in system modeling.
The_______ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location.
Why does the recursive function have to call itself to solve a smaller version of the original problem when using recursion to solve a problem?
Transcribed Image Text: Write a recursive method using java to
return the sum of all numbers less or
equal n divisible by 2 and 3
Explain the attacks and their counter measures
i. Timing attack (with example)
ii. Denial of Service Attacks
iii. Weak Vs Strong Collision property of hash
Transcribed Image Text: Most of the things that can be measured quantitatively occur naturally in digital form.
Select one:
O True
O False
Jump to..
1. Which transmission media has the highest transmission speed in a network? a. coaxial cable b. twisted pair cable c. optical fiber d. electrical cable
Transcribed Image Text: 1. Convert each of the following values to an 8-bit unsigned bina
ry
value.
?) 3510
b) 10010
c) 22210
d) 14510
L . , imize the following SOP expressio Transcribed Image Text: Q1: Use Karnaugh map to minimize the following SOP expression F(A,B,C) = Em(0
,1,4,5,6)
want to implement a network service involving sockets where servers and clients authenticate themselves and encrypt the transmitted data using SSL correct else i downvote
Some experts think that the Data Flow Diagram is no longer appropriate for modeling web-based information system needs. Determine and explain the disadvantages of DFD.
8- Which of the following allows user to select many choices or options? a. b. c. d.
Laser card is the name of the memory card which is conceptually related to the smart card but is similar to the video disk? explain?
java Transcribed Image Text: Graphics: Write a program that behaves like the video below.
New commands needed: StdDraw.pause( ) and StdDraw.clear( ).
O 1x
0:00
How important is it for an IT person to understand the functions of individual computer components such as the role of the CPU and memory
In OSI model, when data is sent from device A to device B, the 5th layer to recieve data at B is Session layer why?
How Artificial Intelligence will shape the future? What are the artificial intelligence applications currently used as software? Is Artificial Intelligence something to be afraid of?
Write down the Paradigms Of Programming? Why do we need So Many Paradigms? Are they really required? Discuss in detail with your very own sentences.
What is Quality of Service (QoS) and where you would implement it in your network. Will this QoS implementation continue once it hits the internet?
Find the sum of first 200 Natural numbers using loop in F95 language. Print the sum in output. Note: Use loops else I will dislike.
Avoiding risk is one of the risk response strategies. Avoiding risk is used to reduce the likelihood and the impact of the risk. True False
In CSS3 which of the following method increases or decreases the size of an element using tranform? a. rotate() b. scale() c. translate() d. matrix()
Write a program in Fortran language to read and print the array
A(4,4) and then find the sum of the elements of the secondary diagonal.
Transcribed Image Text: Give the code for merge sort that takes an unsorted array (or vector) as input and returns a sorted array (or vector).
Information assurance has a number of countermeasures and security services accessible. Recognize those people who would benefit most from this countermeasure or service, and why.
given an array with repeating elements each element repeats thrice except one.find that one in O(1) space and O(n) time complexity in machine independent language.
What is the best way to randomize a program? What is the best way to resize or move the values generated by the rand function?
Transcribed Image Text: What are the consequences if the available main
memory is not shared properly among the
number of processes by the operating system?
Identify two modes of doing the same thing were one involves a more technologically advanced method. List down as many examples. Snail mail vs email.
5. The maximum number of nodes at level ? for a binary tree is: A. ? B. 2? C. 2 ? D. ? + 1
123. Software that can control acess and use a computer system is a. fault tolerant b. facility controls c. software piracy d. system security monitor
An electrical inter-connection that permit 8 or more bits of data to be moved in the same instant of time is called Parallel interface explain?
Write a program I’m JavaScript to replace all the instances of i to I in a given string. nt :- use regular expression. In JavaScript
In your own words, explain (1) why merge sort is always O(n log n) and (2) why quick sort is average case O(n log n)
Is it true that a method that takes an array as a parameter has access to the original array or just a replica of it?
Write a program that stores and prints the months of a year: Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, and Dec.
In today’s world, every company has adopted big data in their IT systems. What are the advantages and disadvantages of using it in a company?
Based on the topic “Why computers are so powerful”. How is a computer so powerful nowadays in Education System, please include the 4 attributes. *
Transcribed Image Text: The discipline develops change control procedures and manages models and software components.
Select one:
a.configuration and change management
b.environment
c.project management
d.deployment
48. Which of the following is always there in a computer ? a. Batch system b. Operating system c. Time sharing system d. Controlling system
A Network switch is referred to as an intelligent device. Discuss two different characteristics of a switch that makes it more intelligent than a hub?Explain
Transcribed Image Text: Problem
What is the output of the following C++ code?
double num = 5.%3;
cout << static_cast
Answer
In JavaScript: Write a JavaScript program to find the area of a triangle where lengths of the three of its sides are 5, 6, 7.
Heapsort uses a heap to sort different elements. The use of a heap makes this algorithm the most efficient in the worst case for sorting.
37 In excel,____________ represents the data in diagrammatic way Select one: a. None of these b. Graphs only c. Tables only d. Smart art only
Intelligent agents __________ their environment and then ___________ Select one: a. observe, take action b. trace, suggest modifications c. sense, self-destruct d. ignore, predict behaviors
In a multiprogramming or time sharing multi user system. Which issues related to the protection of processes need to be dealt with in this system?
Transcribed Image Text: Q3/ B) Show the way to select your board
and the serial port. How can you use the
Arduino IDE.
Your answer
Write python code using repetition to create the following patterns 999999999888888887777777666666555554444333221 This pattern should repeated in muiltiply rows. for example: three rows 999999999888888887777777666666555554444333221 999999999888888887777777666666555554444333221 999999999888888887777777666666555554444333221
Which view is used to filter and look at the data in a table, without changing the structure of the file? A.Report B.Data C.Dashboard D.Model
When the time to establish link is large and the size of data is small, the preferred mode of data transfer is Packet switching explain?
d) Print NATURAL numbers from 5 to 25 without using a single digit in the code. Note: Use knowledge of chars in this. Java language
Transcribed Image Text: 4 F
QUESTION 14
What is the output (result) of the following postfix expression? (Response is a numeric value)
abc + d-
Transcribed Image Text: (b) Using MUX, design a circuit that has the following min-term:
F = E(A,B.C.D) (2,3,8,9,10,11,12,13,14,15), use the variable (A) as the selector.
What types of indexes recommended for a given database used by a mobile service provider of its users and advertiser customer based given information retrieval.
a) Implement the following Logic Circuit using C++. A, B, C, and D are the input bits while F is the output bit function.
??
How to find the addition of three given numbers in clojure programming language. I don’t have any idea how to do it. Code and output.
Transcribed Image Text: Most of the maintenance cost is spend on .1
Adapt to environmental changes
Fixing faults O
Refactoring O
Adding new functionalities O
158. Devices on one network can communicate with devices on another network via a a. gateway b. file server c. utility server d. printer server
Write a C++ program to read two integers from user and then print the smaller among them in output. Don’t use if-else, use ternary operator.
Python program You had given two numbers and you have to add them and find how much time required for the addition of these numbers
8. Build & Fix Model is suitable for programming exercises of ___________ LOC (Line of Code). a. 100-200 b. 200-400 c. 400-1000 d. above 1000
Transcribed Image Text: Consider the value of x=44 and value of y=3.
X=Y
Y=X
2*pow(X,Y+2)/10 + 5
print(Z)
What is answer for the statement print(z)
How do you qualify the name of a field in an SQL query? When is it necessary to do so? give few examples in details
(a) Name some risks which Spiral Model can identify and resolve ? (b) Explain the functionality of the quadrant approach in the Spiral Model ?
Why Is Sentiment Analysis important? What are 5 applications of sentiment analysis? What is the framework of doing sentiment analysis? How Does Sentiment Analysis Work?
32. A main purpose of DBMS is to provide ____________ view of data to user. a. Abstract b. Partial c. Complete d. None of these
In JavaScript: Write a JavaScript program to find the area of a triangle where lengths of the three of its sides are 5, 6, 7.
Given the Boolean function F=xw’ + y’z’ + w’y’z’ Simplify the given function ? and Implement the circuit using 2-level implement with NAND gates only.
Discuss how the darknet and the deep web have made it more difficult to investigate and prosecute cybercrime. Give an example of what you mean.
What kind of calculations are expected to be carried out only by artificial intelligence that is directed by humans? By means of unrestrained artificial intelligence?
I need the answer as soon as possible Transcribed Image Text: Write a MATLAB program to print the determinant of the matrix:
123
456
789
Java Write a program to take a string from user and print how many character it had. For ex = ABC 3 character it have
is Transcribed Image Text: The relation R= {(1,1).(1,4),(2,3),(2,4),(3,1).(3,4)} on
the set {1,2,3,4} is :
Select one:
a. Reflexive
b. not reflexive
c. transitive
d. symmetric
Convert each number to its standard form. a. 6.09 × 10 8 a. b. 5.133 × 10 4 b. c. 3.9 × 10 ?8 c.
Take a string from. User and a character from user and print the count how many times this character appear on that string. In c
Transcribed Image Text: 04
A- What the mean of De-multiplexers and design 1 to 4 channel De-
multiplexers.
B- Implementations the 5- stage Johnson Counter.
CREATE A C++ PROGRAM THAT THE USER WILL INPUT A POSITIVE NUMBER AND THE OUTPUT IS TO REPRESENT THE SCIENTIFIC NOTATION OF THE INPUT NUMBER
What is the best way to randomize a program? What is the best way to resize or move the values generated by the rand function?
i need the answer quickly Transcribed Image Text: Q#1
a. Explain the classification of SQL statements.
b. Explain the various data types supported by
Oracle.
If the processor of a computer does not have a direct and unassisted access to data items, these items are said to be offline why?
Transcribed Image Text: When any recursive function is called, what is used to store activation record at the run-time ?
Array
Stack
Queue
Linked List
Numbers with the same beginning and end spelling are called palindrome numbers. Draw a flowchart of the program listing the palindromes from 100 to 9999.
Transcribed Image Text: 02/| write C++ program to find the summation of the following
series using while statement:
Y= sin (1/2) +sin (1/4) ++sin (1/100).
The system 2x + 3y ? 4 (mod 4) 3x + 4y ? 5 (mod 4) has no solution modulo 4. Select one: True False
How to write a Bash script on a Linux VM to backup a set of test files to a Windows 7/8 VM system every hour.
– Discuss the key functions of an operating system, and how these functions make it possible for computer applications to effectively utilize computer system resources.
Tell us about the basic principles of creating effective data input fields. Can you conceive of any situations in which these rules should be flouted?
define each concept and explain how it contributes to the development of security mechanisms that may be used to achieve desired security policies in companies.
I need the answer quickly. Use Java. Write a program to convert the user decimal input into a hexadecimal output by a user defined function.
Compare and contrast the C++ shell sort performance from when The bbard’s Increment and the Knuth’s increment’s are used vs from when they are not.
Write a program to take two integers as input and print there product in Python. Please do fast. I need answer as soon as possible
#21. Create a XML layout in Android Studio IDE for the following requirements. Linear layout TextView (text = CalenderView Demo) CalenderView Button (text = Next)
Transcribed Image Text: Observe the below Graph.
R3
R2
a) Write “Yes Deadlock” or “No Deadlock” as your response.
b) Justify your answer with reason.
Use real-world examples from computer science to illustrate and contrast the concept of abstraction. To describe the importance of abstraction in software engineering in detail
Write assembly code that writes the sum of the numbers up to 100 and the natural numbers divisible by 7 to address 700h. One choice.
Consistency and completeness are desired in a requirements document. Give an example of what it means in a requirements document to be consistent and comprehensive.
What are ways that could be used to secure IIS? What are some of the automated tools that can scan the IIS server for vulnerabilities?
. If several radio buttons are placed on a form, not inside group boxes, how many of them may be selected at any given time?
Transcribed Image Text: The program takes the masses of two objects and the distance between
them to determine the gravitational force acting between the objects.
Explain how different requirements engineering CASE systems work, and how effectively they allow automated consistency analysis for validating and verifying requirements (if they do so).
Study the connections between mobile devices and cloud computing and evaluate and compare them. Cloud computing offers a wide range of benefits for mobile devices.
Because of the way Chrome OS is designed, computers running Chrome OS have a lower internal storage capacity than computers running other desktop operating systems.
DESCRIBE A SCENARIO INVOLVING 2 COMPUTER DEVICES TANSFERRING A VIDEO FILE USING AN UNSECURED FTP CONNECTION WHERE TCP THREE WAY HANDSHAKE IS SUSPECTIBLE TO VULNERABILITY
65. Agile Modeling (AM) provides guidance to practitioner during which of these software tasks? a. Analysis b. Design c. Coding d. both a and b
What type of tree do you receive when you instantiate a tree for ordered data in the Java Standard Library, and how do you know?
Solve it fast fast plz Transcribed Image Text: Spiral model works well with larger projects compare with small projects.
Select one:
O True
O False
133. These hacker breaks security for altruistic or at least non-malicious reasons. a) White hat b) Grey hat c) Blue hat d) None of these
In Hadoop, to set an environment variable in a streaming command use ____________ a) -cmden EXAMPLE_DIR=/home/example/dictionaries/ b) -cmdev EXAMPLE_DIR=/home/example/dictionaries/ c) -cmdenv EXAMPLE_DIR=/home/example/dictionaries/ d) -cmenv EXAMPLE_DIR=/home/example/dictionaries/
What kind of calculations are expected to be carried out only by artificial intelligence that is directed by humans? By means of unrestrained artificial intelligence?
Transcribed Image Text: write APL for read byte from input port at
address BOOOH and then output byte
AAH at address B2H *
Assembly
language
Are the protective measures adequate to ensure the security of the information system? Alternatively, is there a way to guarantee anything or is everything unpredictable?
Does syntax have anything to do with meaning? In order to construct more complicated regular expressions from smaller ones, what are the three fundamental operations?
(Don’t copy) Answer and explain question in C language: Use bitwise operation to mask 723746 (octal) by 000017 (octal), write the masked string in octal.
Transcribed Image Text: WHICH OF THE FOLLOWING REGISTERS REPRESENT THE STARTING ADDRESS FOR THE PROCESS?
Select one:
a.BOUND REGISTER
b.ABSOLUTE REGISTER
c.LOGICAL REGISTER
d.BASE REGISTER
11. Which of the following is considered a broadband communication channel? a. coaxial cable b. fiber optics cable c. microwave circuits d. all of above
hoose the correct combination of the symbol and multiplication factor for prefix: Giga M and 106 G and 109 T and 1012 P and 1015
What is the name of the device that connects two computers by means of a telephone line? a. bus b. Tape c. cable d. modem
Transcribed Image Text: 02/| write C++ program to find the summation of the following
series using while statement:
Y= sin (1/2) +sin (1/4) ++sin (1/100).
write a program in c++ to print the following figure
1 3 5 7 9
1 3 5 7
1 3 5
1 3
1
Write a statement that declares a String variable named city. The variable should be initialized so it references an object with the string “San Francisco”.
Transcribed Image Text: The function f(x) = x^3 is bijection from R to R. Is it True or False?
%3D
O a. True
Ob. False
159. ______ is a network that this technology connects sites that are in diverse locations. a. LAN b. MAN c. WAN d. None of these
Calculate the checksum for the following binary numbers. Give the result in binary. Use the 16-bit format. 11010110 10000100 00110111 10101001 01010100 10100010 01101010 11000101
Why does the recursive function have to call itself to solve a smaller version of the original problem when using recursion to solve a problem?
What type of tree do you receive when you instantiate a tree for ordered data in the Java Standard Library, and how do you know?
How important is it for an IT person to understand the functions of individual computer components such as the role of the CPU and memory
Transcribed Image Text: Multimedia elements content is subject to be change with time such as sound,
music, and video a time independent multimedia
False
True
I need the answer as soon as possible Transcribed Image Text: 1. Briefly discuss the 4G and 5G technologies. How 5G Will Make Life Better?
Transcribed Image Text: The scope of a
is the body of its method.
O a. default
O b. parameter
O c. class
O d. static
Cross platform app development is regarded as one of the most popular mobile app development trends. Discuss any FIVE (5) advantages of cross platform development.
Transcribed Image Text: 6. Convert the following negative numbers into binary, using
2’s complement form
a) -23 using 8 bits
b) -11 using 5 bits
Suppose that f (x), g(x), and h(x) are functions such that f (x) is ?(g(x)) and g(x) is ?(h(x)). Show that f (x) is ?(h(x)).
What is database security and how does it differ from other types of security? What are the two most effective ways of guaranteeing data security?
I need the answer as soon as possible Transcribed Image Text: 8. How many address lines are
required to address 2 megabytes (2048K) of memory?
Describe a typical synario involving 2 computer devices transferring a video file using an unsecured ftp connection where TCP three-way handshake is susceptible to vulnerability
given an array with repeating elements each element repeats thrice except one.find that one in O(1) space and O(n) time complexity in machine independent language.
Having fewer sectors per disk cluster has both benefits and drawbacks. Remember to include in retrieval time and archive longevity while planning your archive strategy.)
Tell us about the basic principles of creating effective data input fields. Can you conceive of any situations in which these rules should be flouted?
In your own words, describe how each of these tasks may be carried out on a computer system and provide examples to support your claims.
Solve it quickly please now Transcribed Image Text: To take input for the size of an array which method is used by Scanner class?
Answer:
229. What do you call a technical person who is capable of understanding the basic requirements? a. team leader b. analyst c. engineer d. stakeholder
Write a program that uses Stack to convert a binary number into an equivalent decimal number and test your function with the following numbers 11111111,11000101
Compile a list of the components that make up a typical operating system, and describe the purpose of each component in a phrase or two.
Transcribed Image Text: 19
Convert the following DFA into a regular grammar
Note: use –> to represent arrow.
1
92
1
1
Enter your answer
For each of the conditional statements below, write the converse, inverse, contrapositive, and negation(fully simplified and clear).(a) If it’s Saturday, then we don’t have class.(b)p?(q?r)
Python program You had given two numbers and you have to add them and find how much time required for the addition of these numbers
Transcribed Image Text: In URL .mil belongs to which Domain type?
O a. Organization
O b. None of these
O c. Commercial
O d. Government
Find the sum of first 200 Natural numbers using loop in F95 language. Print the sum in output. Note: Use loops else I will dislike.
This class allows you to use the print and println methods to write data to a file. 1. File 2. FileReader 3. OutputFile 4. PrintWriter
What is the name of the computer system that acts as a filter for access to and from other networks by a company’s networked computers?
File transfer protocol (FTP) is built on _________architecture a. Peer to peer b. Client server c. Both a and b d. None of the above
step by step guide tor method to develop a smart list ( include a detailed plan for the implementation with specific technique/technology/software/ application/ hardware etc.)
It has evolved over the years into a fairly simple set of tools that are relatively easy to master.is not true of a DBMS? why?
Which of the following CLI command can also be used to rename files? a) rm b) mv c) rm -r d) none of the mentioned
Transcribed Image Text: Q3: b- Write a program to exchange he main diagonal elements with the secondary diagonal elements of
a two dimensional square matrix.
What does it mean when data is leaked? what’s the story behind that? Who is responsible for this? how sensitive info is protected and detected?
Convert each number to its standard form. a. 7.3 × 10 7 a. b. 4.45 × 10 ?7 b. c. 8.680 × 10 ?2 c.
What does cat file01 file01 file01 display? i. error ii. blank terminal iii. contents of file01 three times successively iv. contents of file01 single time
A ________ bridge can forward and filter frames and automatically build its forwarding table. a. simple b. dual c. transparent d. none of the above
Which of the following is used to change the direction of text Select one: a. Orientation b. Alignment c. Merge and center d. Wrap text
Write a program in java to calculate the number of vowels and constant from the string and you have to take string from the user
What security strategy would be most effective in mitigating the lack of encryption or hashing to restrict data flow, as well as illegal data alteration?
4c. Draw table for IP address classes with the requirements given below Class Leading bits Total no of addres in class Starting address Ending address.
24) Among the various types of cloud computing, it is the private cloud that tends to be the most secure. True or False? True False
q12) Time complexity of Binary Search Algorithm is ________________. a. O(1) b. O( n 2 ) c. O( log n ) d. O( n )
Discuss the concept of Data Flow. Consider the various types of transmission modes and with the aid of diagrams and practical scenarios explain your answer
Transcribed Image Text: Question 1
Identify the type of signal given below
Time
Unipolar, Digital Signal and Periodic signal
Perodic signal
Unipolar Signal
Digital Signal
Magnetic tape can serve as : A. secondary-storage media B. output media C. input media D. All of the above E. None of the above
how each of the basic principles of the cybersecurity discipline is used to achieve overall system security is described in detail in the next section.
Why does the recursive function have to call itself to solve a smaller version of the original problem when using recursion to solve a problem?
Computer Science Define the term Text Visualization. Give examples of different types of text Visualization. How do we Visualize textual data and analyze text documents?
List main features of Embedded System. Please answer the question in your words and in detailed way by explaining step by step. Thanks in advance.
SQL Database Designs The database administrator is charged with managing the database. What does this mean? What types of tasks would the database administrator do?
When a large number of devices attempt to connect to a single port on an Arista switch, which command triggers an SNMP notice is required?
It’s due to the fact that computers are so powerful. Please explain how computers have grown so prominent in the educational system in recent decades.
Transcribed Image Text: 2
How many 2-to-4 line decoders are
required to design one 4-to-16 line
decoder?
O 1
O 3
O 7
O 5
Explain briefly the following How to use 1) Write back, 2) Write through, 3) Write allocate, and 4) No-write allocate during cache hits or misses
Which one of the following is referred to the accessibility of information all times for authorized viewers? a. Availability b. Accuracy c. Confidentiality d. Integrity
The smallest colorable area in an electronic image (such as a scanned document, digital photograph, or image displayed on a display screen) is called a(n)_____________.
Transcribed Image Text: • H.W.
• Draw the implementation and the
timing diagram of a mod-12 with a
straight binary sequence from 0000
to 1011.
None Transcribed Image Text: . Express the decimal number 25 as an 8-
bit number in sign-magnitude.
No correct answer
10011001
00011001
00100101
O 11011011
Create a new program called Hamlet2. Modify previous Hamlet1 code to count the word “and”. Print the total number “and” in the file. Answer: 939
What is the best way to randomize a program? What is the best way to resize or move the values generated by the rand function?
When a SELECT query includes a GROUP BY clause but no ORDER BY clause, the output results are presented in what order they were grouped.
Transcribed Image Text: Let A, B, and C be sets. Using the Identities sets table, show that (A UB) n (BUC) n
(AUC) = ?nBn?
Transcribed Image Text: Which of the following models uses UML to draw system components?
Select one:
a.Gantt chart
b.Spiral model
c.Use case diagram
d.PERT chart
Provide an overview of the internet of things. What makes the industrial internet of things unique? How does it stack up against the established network?
In this section, you will learn about the categorisation of user manuals, online help, and tutorials. b) Provide examples of online lessons, demonstrations, and recommendations.
Discuss the important KPIs for static and path testing, and show how static and path testing saves project managers money by comparing savings to expenses.
Create a new program called Hamlet2. Modify previous Hamlet1 code to count the word “and”. Print the total number “and” in the file. Answer: 939
Write a python program to take input two integers named alpha and beta from user and print the value of alpha*beta + alpha/beta in output
What is RAID 5 and how does it work? What circumstances would necessitate the deployment of RAID 5 rather than one of the other options?
What factors would have contributed towards the cost of development, cost of delivery, and identify other constraints play in the selection of video delivery system?
4c. Draw table for IP address classes with the requirements given below Class Leading bits Total no of addres in class Starting address Ending address.
Using the AIT network as an example, explain how you would connect from your home through a VPN to a system within the AIT intranet.
Use the Euclidean Algorithm to find the GCD of following pairs of numbers: 375 and 565 432 and 111 51 and 357 11571 and 1767
Transcribed Image Text: We can use
to comment a single line?
O a. #
O b. //
O c. /*
O d. all of them
Based on the effective business presentation, explain what is the most important things that you need to follow for every part of the business presentation.
Write a program in Fortran language to read and print the array
A(4,4) and then find the sum of the elements of the secondary diagonal.
Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.
171. In e-mail system, …………………. allow people to read and send e-mails. a. message transfer agent b. user agent c. browser agent d. server agent
dbxfbfdbndxf Transcribed Image Text: For this assignment you are assigned a task to develop a SOQL query to find name, id from the
opportunity object.