Explain what a network database system is, which is a database management system that is founded on the idea of ownership.
Could you perhaps provide a more comprehensive picture of the metrics involved in the Software development process? Explain everything in detail.
Prove that for any integer n, n 6k -1 is divisible by 7 if gcd(n,7)=1 and k is a positive integer.
“Even for tiny applications with only one user, it is always advisable to utilise a DBMS.” Is it true or false?
Please help with the following: What do the following commands do in the Linux cmd line: mount (-t) umount rmdir (-v)
What is the wi-fi evildirect attack method and how is it applied? (Wi-Fi Direct jacking Attack) please do not use handwritten
147. Interference of signals during the program execution Is called? a. interfere b. interrupt c. interfacing d. both a and b
Explain the differences between Contiguous allocation and Non-Contiguous allocation in relation to memory management. Give appropriate examples to illustrate your answers
A ByteBuffer receives data from the channel and the read method returns the number of String read. Select one: True False
Discuss six ways that threats from destructive programs can be substantially reduced through a combination of technology controls and administrative procedures.
The role of batch-normalization For batch normalization, what parameters should we adjust? What is the best way to go about it?
In this program you have to take both string from user and then concate them in c++ and print the result
Could you perhaps provide a more comprehensive picture of the metrics involved in the Software development process? Explain everything in detail.
MP3 encoding Explain in your own words what masking effects in acoustics are and what function they play in MP3 compression.
_______ is the name used to describe a user providing a user name and password to log in to a system?
Would you recommend a synchronous bus or an asynchronous bus for use between the CPU and the memory? Explain your answer.
Suppose intValues is an array of 100 integers. Write a For…Next loop that totals all the values stored in the array.
Computer Science: As you type, the Visual Studio code editor analyses each statement and reports any syntax mistakes identified.True or False.
None Transcribed Image Text: 7. List and explain the different types of access control.
Please do it correctly.
Subject: Information Security.
Write the SQL sentence that provides an 8% increase in the salaries of all employees working in the ‘Internet Banking’ project.
Demonstrate how IPC works when someone uses the spell-checking function in Microsoft PowerPoint to fix spelling errors by giving an example.
Transcribed Image Text: In which network topology the “Priority is important”
O hybrid
bus
start
no option is correct
mesh
ring
Write a java program to multiply corresponding elements of two arrays of integers and store in another arrays of Repesective location.
Transcribed Image Text: How many strongly connected components does the following graph have?
1
3
4.
6.
8.
9.
(10
Answer
What are the vulnerabilities of “Wi-Fi Direct” technology? Perform a penetration test against “Wi-Fi Direct” technology Please do not use handwriting.
______________ slack is the area from the end of the data portion of the file to the end of the sector.
15. Symmetric multiprocessing architecture of the computer system uses shared a. bus b. memory c. processors d. both a and b
Using 8-bits, the decimal number -65 is equivalent to __________________ in excess-127 notation. a. 11000001 b. 11000000 c. 00111110 d. 10111110
31. The _______ layer changes bits into electromagnetic signals. a. Physical b. Data link c. Transport d. None of the above
Explain the balanced tree technique in the database please. Demonstrate insertion,deletion, update and rollback with an example of a balanced tree.
Transcribed Image Text: When you write a hex data consisting of first digit from A to F, you should suffice a
Design 1-to-8 De Multiplexer considering 8 different nodes as 3 Laser printers, 2 Monitors, 2 Data storage, and 1 inkjet printer.
Tell us about a few Recursion drawbacks and solutions to some of these issues. Give an illustration of what you mean.
Write down a c program that will take a year as input and will print number of days in that year?
What is the difference between the implementation of 1:M unary relationship and M: N unary relationship in a relational data model.
Please discuss what information should be listed in an incident response plan for a malware attack. Be as detailed as possible.
Transcribed Image Text: A
represents a resource node in a resource allocation graph.
Select one:
a.arrow
b.Circle shape
c.Square shape
d.dot
What is Database System Utilities ? (2-3 sentences) How does that work and what is the importance of it? (2-3 sentences)
What is it about Layer 2 and Layer 3 WAN services provided by carriers that makes them so appealing to businesses?
An online retail website needs to maintain a record of each customer’s purchases. How can you do this with cookies, Explain.
The role of batch-normalization For batch normalization, what parameters should we adjust? What is the best way to go about it?
Find out how to troubleshoot some of the most frequent issues that occur with Linux hardware, applications, file systems, and networks.
Is it possible for cloud computing to meet all of an organization’s requirements? concerns about the computer infrastructure of the business
Transcribed Image Text: 1. What is the Two rules help reduce the number of digits needed to
represent an IPV6 address?
What information system problems should you be aware of, and what are the best ways to resolve them in your company?
What is the best tool to use to find out the purpose of a program that is running on your system?
What are the benefits and drawbacks of utilizing IPSec over other network security methods, such as those at the application layer?
‘Will a USB 3.0 machine operate if the printer’s Devices actually is plugged into a Standard usb slot on the motherboard?
What steps do you need to do in order to change the Size property of a form in the Properties window?
160. The _____ layer is the layer closest to the transmission medium. a. network b. physical c. transport d. data link
Describe how a company may protect itself from hackers locking in to steal account information and define hacks and viruses, please?
4 the heap is best used for ? ???????? writing a program designing a flowchart calculating the running time priority queue
Could you perhaps provide a more comprehensive picture of the metrics involved in the Software development process? Explain everything in detail.
Write down a c program that will take a year as input and will print number of days in that year?
Could you perhaps provide a more comprehensive picture of the metrics involved in the Software development process? Explain everything in detail.
Java Write a program for an array is given of double data type you have to find maximum without using sorting
34. Operating Systems, editors and debuggers comes under: a) System Software b) Application Software c) Utilities d) None of The Above
Write a program to print the following pattern. Transcribed Image Text: ***
**
** **
* *** *
****
* *
make a map in dart language and then add another key value ar run time and the print the whole map
Simplify the following function using Karnaugh Map Transcribed Image Text: Simplify the following function using
?Karnaugh Map
F = E(1,3,5, 7)
1. Describe the idea of a memory leak and its cause. Describe trash collection and how it relates to existing heaps.
60. Another name for the cable TV office is the _______. a. splitter b. fiber node c. combiner d. head end
I am working on R studio. How can i find the optimal value of k for the k nearest neighbors model.
Transcribed Image Text: Load, resize, scroll and unload are examples of
Events.
a. form
O b. document/window
O. keyboard
d. mouse
Please help me generating a random number in range 1 to 6 in JavaScript. Write a program and attach output screenshot.
make a code raleted to debugging in python save it as 201916791 Juraboev and take a picture send it to me
1. Describe the idea of a memory leak and its cause. Describe trash collection and how it relates to existing heaps.
I need the answer as soon as possible Transcribed Image Text: Question 1: Create a table-driven agent program for speech
decoder?
Could you perhaps provide a more comprehensive picture of the metrics involved in the Software development process? Explain everything in detail.
Write a function(in pyhton) that RECURSIVELY merges the characters in two given strings in alphabetical order. For example, mergeTwoString((“aghp”,”bdct”) results “abcdghpt”.
Transcribed Image Text: A. Write a FORTRAN 90 program to calculate f(x) for x-1 to 15 from the
function
f(x) =
This SQL statement is used to change the value of an existing row. a. DROP b. UPDATE c. PURGE d. INSERT
If a mistake occurs in the database system, is it more serious than an error that occurs in a non-database system?
Write the execute cycle of LOAD 1020 that load the value from memory address 1020 in Register Transfer Notation; show micro-operation
When it comes to events and entities, what exactly is the difference? What is a good example of your own creativity?
Need correct Answer else downvote mind it Explain what the precondition and postconditions of a given statement mean in axiomatic semantics.
Which of the following is NOT a characteristic about the ‘Content’ of information? a. Accuracy b. Relevant c. Frequency d. Scope
Critically examine the attacks from inside the system in higher education sector. Suggest ways in which those attacks may be mitigated.
In the context of software engineering, what is the difference between a test criteria and a test requirement to be considered?
Design a Windows application named Wallpaper App to calculate the number of single rolls of wallpaper required to cover a room.
Transcribed Image Text: 6. Create a web server and a working client
machine (this is in addition to your CUPS
server).
435. Capability of a system to concurrently execute more than one processes, defines a. Multitasking b. Multischeduling c. Multiprogramming d. Multiprocessing
Write a c++ progarm to read input a string and print the ASCII value of all its characters in seperate lines.
29. 4GL is an example of ______________ processing. a. White Box b. Black Box c. Functional d. Both b & c
Describe the workings of an authentication challenge–response system. It’s not immediately clear how it’s more secure than a traditional password-based system.
Transcribed Image Text: QUESTION 9
View is a subset of the database that contains some information of user interest
True
False
1- Difference between CSMA/CD and CSMA/CA. 2- Differentiate CDMA, TDMA and FDMA? 3 – In what ways IPv6 better than IPv4?
attached question Transcribed Image Text: 7. Convert the following tree to a Min heap.
70
50
25
10
20
20
5
Justify, “A poorly designed front-end of the software can cause a user to make catastrophic errors” plz solve in 30 minutes
Transcribed Image Text: Show that the following grammar is LL(1),
S? aAB I bA le
A? aAb le
B? bB Ie.
Transcribed Image Text: All the following are commonly used plug-ins EXCEPT.
Apple QuickTime
Windows Media Player
Adobe Flash Player
Microsoft Excel
There are many factors when determining the performance of your model. What are some ways to evaluate regression versus classification models?
Compare and Contrast data base management system and file based system and describe each of them with the help of examples
Transcribed Image Text: 2) Write a ALP to implement an NAND gate and store the result in the memory location 6000H.
68. The request and release of resources are ___________ a. command line statements b. interrupts c. system calls d. special programs
If in an integer array the base address is 100, what will be memory address of array value at index 4.
Explain the many design models that we employ in the software development process to aid in the analysis of the code.
With regard to cloud backup, what are solutions? Can you tell me where I can get free space on the internet?
Q1. Briefly Explain the following terms: –Classes and objects –Constructor and its 3 types –Static Data Members and Static Member Functions
Ruby I/O Write a Ruby program to take input a string from the user and print it back to the output.
Write Pseudocode to find the result of equation Transcribed Image Text: S-x, x < 0 :X = ?, ? > 0
Explain the difference between loosely coupled and tightly coupled cloud computing and provide some instances of each of these two concepts.
Q: Configure the following VLans having a single switch. VLan 22, Dept. HR (Ports: fa0/1) VLan 55, Dept. Account (Ports: fa0/22,fa0/23)
Question 1 From the following list of numbers, the biggest number is———and the smallest is———- 56 -23 85 -32 -35 -56
246. Linux runs on a very large range of a. Network Architecture b. Hardware Architecture c. Software Architecture d. Processor Architecture
Write a program in Python to take input three integers x,y,z and print the value of (x*y) + (y/z) in output.
Design a deterministic finite automaton for the given regular expression R. R = (0 + 1 (1 + 01) *00) *
Describe the reasons why an application developer may choose to run an application via TCP rather than UDP in their application.
What e-mail protocol enables a client to download e-mails to the local machine? a. IMAP4, b. SMTP C. TCP d. POP3
Consider the following grammar: X -> (Y) | b Y -> Y, X | X List LR(0) items for this grammar
Create the corresponding matrix and display its shape, type, and its dimension. Transcribed Image Text: 0 — 5? + 3?— z
The average-case performance for Shellsort is a. O(n) b. O(n 1.5 ) c. O(n 2 ) d. None of the above.
In your own words, describe the Linux operating system, including some of its characteristics. Such characteristics need a lot of explanation.
Fill the gap. ___________servers hold software for specialized applications such as audio and video conferencing, voicemail, speech recognition, and UC systems.
A(n) ________is a reusuable software component that can take the shape of a date, time, music, or video, among other things.
49. Abbreviate the term ILFs. a. Interface logical files b. Internal logical files c. Input logical files d. Internal logical function
Take input value of n from user and print some of first n odd natural numbers in O(1) time in JAVA.
The output of Risk identification is: Select one: a. Risk description b. Risk assessment c. Root cause analysis d. Dependibility requirements
120. Flowcharts helps us in debugging process through a a. Stratified way b. Random way c. Clustered way d. Systematic way
What is the benefit of being able to define an initial value when you can assign a value to a variable?
Solidity Prof. Tim Berners-latest Lee’s project Solid is exciting. Give us some background on Tim-Berners Lee and explain his new idea.
Transcribed Image Text: 1. Critically evaluate the role of middleware for distributed cloud computing and support your
answer with a diagram.
There are several ways for data persistence in React Native world. Discuss any THREE (3) data persistence methods for React Native.
What exactly is the Aggregate operator? The Location attribute of a control indicates where the control’s_________ corner is on the form.
1. Briefly discuss the impact of ICT to any 5 of the following and give examples: Communication Banking Sector Multimedia Entertainment
353. Logical Address space can be larger than physical address space. a. True b. False c. May be d. Can’t say
39. _______ cable is used for voice and data communications. a. Coaxial b. Fiber-optic c. Twisted-pair d. none of the above
Using C++ !! Transcribed Image Text: 2. Write C++ program, to replace each element in the main diameter (diagonal) with one.
Discuss at least four (4) internet security best practices stating how its usage would help reduce user vulnerability on the internet.
55. Small picture that represents a specific program on a desktop is called a. folder b. document c. file d. icon
Which clause of an SQL query displays the results in a specific sequence? What is the default behavior of this sequence?
Write a Java program that uses the nested-while loops to produce the following output: 1 22 333 4444 55555 666666 7777777
Q. Virtual circuit (VC) is an approach to provide reliable data delivery at network layer. How is VC implemented? give steps.?
Transcribed Image Text: P15.1 Write a program that counts how often each word occurs in a text file. Use an unordered_multiset
1. What is the positive impact of ICT on Education?
2. Why the learning process of ICT has changed your worldview?
Sorting Algorithms 1.) Trace the insertion sort as it sorts the array 25 30 20 80 40 60 into descending order.
Explain Quick sort algorithms with the following set of integers {50 , 70, 60, 90, 40, 80, 10, 20 , 30}
Which one is a correct way to reverse the list called lst? lst = lst.reverse() reverse(lst) reverse() lst = reverse(lst) reverse(lst)
what is the diffrence between if-elseif-else and nested if stament in aso.net?which one is more appropriate in c£ applicatins and why
Write a c++ program to print the pattern given below in output using while loop. C++ ++C C++ ++C C++ ++C
?????? Which of these keywords is used to prevent content of a variable from being modified? ???????? static constatnt final last
203. The services of WorldCom, Sprint and Verizon are provided by a. inter-LATA b. intra-LATA c. LATA d. local exchange carrier
What are the main components of data governance program and ways in which data stewardship is related to data governance ?
Convert the following IEEE floating-point number to base 10. Show your work. 0 0111 1101 011 0000 0000 0000 0000 0000
Which sorting algorithm is O(n2) even in the best case? a. quicksort b. merge sort c. selection sort d. insertion sort
Which RAID level replicates data from one hard disk to another so that the same data is written to both drives?
It is possible for a class to have more than one constructor. A) This is correct. B) The answer is False.
Transcribed Image Text: The main thing that affects the Big-O of a hash map is the load factor.
O True
False
introduce Schema matching methods and provide an example for me, pls the following is an excerpt from a data mining class.
_____________ refers to a system development methodology which is used to reduce the time required to design and implement information systems.
Transcribed Image Text: Angular sends and receives session data to and from the server without requiring any modifications.
True
O False
The total number of messages handled by a computerized telephone system on a daily basis is an example of Volume explain?
If an organization has to share the public key safely, what technique will it employ and how will it protect it?
Analyze the worst case, the best case and average cese scenarios while executing the following algorithm using appropriate examples:
Brute force
Describe the reasons why an application developer may choose to run an application via TCP rather than UDP in their application.
What is the difference between the implementation of 1:M unary relationship and M: N unary relationship in a relational data model.
Transcribed Image Text: . Write a function:
int calculate(int x);
In c++, the function returns value of 3*x^3 + 3*x^2 2.
Write a program in js to check whether a string has vowels and if had they how many times. Using regex
Write a C language program to draw a ruler whose length as well as orientation (horizontal/vertical) is given by the user.
The term “multi-factor authentication” means something different to different people. What role does it play in preventing passwords from being stolen?
The type of line that projects from an object for the express purpose of locating a dimensions Dimension dden Visible Extension
Discuss the classification of traceability relations elicit brief an example that defines the classification context and draw a diagram if necessary.
Demonstrate as many algorithmic paradigms as possible to write a program that raises the number X to the power n (Xn).
A file from which data is read is referred to as a file. a. data b. write c. read d. input
A disk storage medium in the form of an assembly containing a single rigid magnetic disk permenently is disk cartridge explain?
Transcribed Image Text: What function do you use to copy a string to another string variable name?
strcat()
atof()
atoi()
strcpy()
C++ Which function is used to check whether a character is an alphabet? a) isalpha() b) isalnum() c) isdigit() d) isblank()
Q8.Conflicting requirements are common in Requirement Engineering, with each client proposing his or her version is the right one. True False
Transcribed Image Text: ? . Functions returns
many output O
one output O
one or more than an output
none O
Write a C++ program to take input a string and reverse it using stl reverse function and print the reversed string.
In order to best preserve computer components from electrostatic discharge,which two tools should be supported by a PC while disassemblying computers?
Give the process a name that enables you to copy files from specifically configured Internet servers using file transfer utility software.
85. What is the max data capacity of STP? a. 10 mbps b. 100 mbps c. 1000 mbps d. 10000 mbps
Describe the steps you will take to manage and monitor the network in your home. Support your answer with appropriate diagrams
Transcribed Image Text: only Q7 in python
7. Write a program to print swapping of two numbers without using third variable.
Is this true or false? The HTTP response message’s Date: header specifies when the item in the response was last updated.
Solid modeling technique enables the designer to mold and shape, rather than construct on object using a series of lines explain?
174. The most efficient and commonly used digital to analog conversion mechanism is a. ASK b. FSK c. PSK d. QAM
33. Maximum partitioning that can be created on a computer basic disk is a. 2 b. 4 c. 6 d. 8
Describe what impact on product support of the number of known defects left in a program at the time of delivery.
What will be the output of the following Java code snippet? enum Levels { private TOP, public MEDIUM, protected BOTTOM; }
3.4.a) We have seen so many causes of the congestion in the network list out any one of them in short.
220. Configuration manager responsible for implementing and managing the a. System Control b. System Damage c. System registry d. System Access
What are the two design factors that must be taken into account while designing an open hash table that performs efficiently?
How do you ensure there is always at least one primary key if you believe a relation has no duplicate data?
Determine the applications of the following logic programming languages. Systems for Managing Relational Databases Systems of Experts Processing of Natural Language
Is it possible for a database to have two similar data without compromising its integrity? Why do you think it is?
Solve it fast plz Transcribed Image Text: In CRC cards, classes on which a particular class depends are called as:
Answer:
One SAN switch has 24 ports. All 24 supports 8 Gbps Fiber Channel technology.what is the aggeregate bandwidth of SAN switch
Give two reasons why you believe it is critical for the computer. programmer to research the organization and architecture of computers.
What are the website vulnerabilities and why they occur, how to exploit these vulnerabilities. What measures can be taken against them?
How is a function declared in Python?
a.
declare function_name():
b.
declare function function_name():
c.
def function function_name():
d.
def function_name():
Starting Reservation: 195.165.85.128/25 Create 4 subnets. Enter each network ID with its new subnet mask (CIDR format). Net0: Net1: Net2: Net3:
253. A programming technique in which the focus is on doing things. a. object oriented b. procedural c. logical d. structural
When it comes to making a series of interconnected choices, is dynamic programming a particularly helpful technique? What exactly is required?
Why should assembly language be avoided in the creation of general-purpose applications? In what situations is assembly language preferable or necessary?
Indicate the hexadecimal value of AL after each rotation: mov al,6Bh ror al,1 ; AL = rol al,3 ; AL =
Understanding of loops : Write a C++ program to print names of all months in a year. Use vector and loops.
Give two reasons why you believe it is critical for the computer. programmer to research the organization and architecture of computers.
What is the index of the first element in the queue after the next element has been removed from the queue?
In the context of software design and development, what is the connection between cohesion and coupling and how do they interact?
A while loop is a form of Select one: a. transitive loop b. definite loop c. indefinite loop d. finite loop
236. The theoretical upstream data rate in QPSK is a. 12 Mbps b. 14 Mbps c. 18 Mbps d. 20 Mbps
In many integer programming problems, exhaustive enumeration of all possible solutions is impractical. Is it true or false? What’s more, why?
Give two reasons why you believe it is critical for the computer. programmer to research the organization and architecture of computers.
Write down a c program that will take a year as input and will print number of days in that year?
Using Recursion Perform the following Tasks Calculate power of a given number in java Reverse a String using recursion in Java
What are the vulnerabilities of “Wi-Fi Direct” technology? Perform a penetration test against “Wi-Fi Direct” technology Please do not use handwriting.
It is a to the next node in the linked list, which is the property after it in the Node class.
7. Where performance and reliability are both important, RAID level ____ is used. a. 0 b. 1 c. 2 d. 0+1
Design and draw two and three-bits subtraction respectively using only Half Subtractor. Differentiate between analysis and design framework of combinational circuits.
Help me in recursion. Your task is to print I am coder using recursion for 7 times In elixir programming language
Aim – To add the two 8 bit numbers using 8085 microprocessor and store the result. ? Platform Required – sim8085
When it comes to events and entities, what exactly is the difference? What is a good example of your own creativity?
The following 6-bit signed binary numbers were found in a computer. What decimal numbers do they represent? A) 010111 B) 111011
Explain how a checklist can be used to identify the category of a project. Illustrate using a list of scoping activities.
Transcribed Image Text: Find the address space range of 150KB of Flash memory of an ARM chip starting at address
Ox20002000.
What is the definition of a scripting language on Windows? (Choose all that are applicable.) Powershell VBscrip Scripts for batch processing
Transcribed Image Text: It is efficient to write program code before having an overall design structure.
Select one:
a. TRUE
b.FALSE
What are the features of both time-sharing and distributed operating systems, and how does each of them compare to the other?
Transcribed Image Text: What is the depth of a binary heap with 42 nodes? (assume the root is on depth 0)
Explain True/False. Statement – The data transfer between memory and I/O devices using programmed I/O is faster than interrupt driven I/O.
Write a C++ program to take Input a character from user and print the character with next ASCII value in output.
MIS is used to provide the sight information to the right person at the right time for proper decision making? why?
IoT depends on pervasive computing, therefore it is important for it. Illustrate this by using an example that illustrates the point.
Transcribed Image Text: ?Which of the following accesses the sixth element stored in the array
array[6];
array[5];
None of them
array(6);
A variable’s _______ is the time period during which the variable exists in memory while the program is executing.Fill the gap.
75. This is one of the architecture paradigm a. Peer to peer b. Client-server c. HTTP d. Both a and b
3 Transcribed Image Text: Q.2. Give your explanation by making two
propositions for each condition.
a. Contraries
b. Contradictories
c. Subcontraries
Describe briefly:
What are different FPGAs available in the market. Discuss 2 of them.
What are different digital HDLs? Briefly explain
246. The gh-bit-rate Digital Subscriber Line (HDSL) was designed as an alternative to a. ADSL b. T-1line c. DSL d. DMT
Write PLSQ program that reads 2 numbers from the keyboard , subtracts the first from the second and outputs the result.
Write a program in grovvy to print the map elements using loop. Please do fast I didn’t have much time left.
C++ Transcribed Image Text: How do you dynamically (a) allocate and (b) free/de-allocate a string array name[6]?
Write your code below:
Consider the following hypothetical search space and trace using the depth-first-search algorithm on it where the goal is node 13 .
Cacheis a portion of memory that serves as a temporary repository for data as it waits for a given action explain?
Python. Write a short recursive Python function that finds the minimum and maximum values in a sequence without using any loops.
Multiple users may connect to the global Internet using a single IP address by using what kind of network address translation?
Write a C++ program to look for and print the first perfect square (x*x) when its last two digits are odd.
81. Single instruction single data stream (SISD) category is the a. Uniprocessor category b. Dualprocessor category c. Quadcore category d. Multipleprocessor
Write down a c program that will take a year as input and will print number of days in that year?
Why should assembly language be avoided in the creation of general-purpose applications? In what situations is assembly language preferable or necessary?
Transcribed Image Text: Project management is a support discipline, and therefore is not critical to system development.
Select one:
a.FALSE
b.TRUE
Describe the order of magnitude of each of the following functions using Big-O notation: 1 + N + N2+ N3+ N4
32. The _______ layer is the layer closest to the transmission medium. a. Physical b. Data link c. Network d. Transport
Solve and Show complete solution & box final answer Transcribed Image Text: 1011011. 1012 x 145.32 gT- 3BE-2A 16 > N10
In Safety Specifications, Risk decomposition = Select one: a. Hazard analysis b. Hazard identification c. Hazard assessment d. Safety requirements specification
Take input value of n from user and print some of first n odd natural numbers in O(1) time in JAVA.
Sort the following using the specified algorithm: 3. LSD Radix, MSD Radix 3289, 239, 345, 2345, 1789, 2400, 78, 45, 235
________ is a type of transmission impairment in which the signal loses strength due to the resistance of the transmission medium.
Q- a. Give any example which describes the software crises due to design. b. Exemplify the developer myths with suitable scenario.
Explain how has technology had an impact on analyzing waiting line systems ? How has technology improved waiting line performance ?
2. Multi-processor system gives a a. small system b. tightly coupled system c. loosely coupled system d. both a and b
In order to protect yourself from specific risks of data loss and theft, describe the security measures you are considering adopting.
What if condition will return in below javascript code. let x = 10; let y = “10”; if (x == y)
Which routing path (static or dynamic) would you recommend for a simple network? Why would you prefer one over the other?
MOV AX, BX is an example of _____. a. Direct addressing b. Register Indirect addressing c. Register addressing d. Implied addressing
Transcribed Image Text: Explain memory hierarchy with the help of a diagram.
A-
B I
?
Maximum file size: 250MB, max
Describe the fate of a bathtub curve for a microprocessor operating on an artic region, a space shuttle and satellite observatory.
1. Briefly discuss the four factors that influence data quality. 2. Briefly explain what is meant by the term “inferential statistics
FORTRAN is the first compiler-level language developed by a team of IBM programmers led by John Backus and unveiled in 1957?
Is this true or false? The HTTP response message’s Date: header specifies when the item in the response was last updated.
Transcribed Image Text: In which network topology the “Priority is important”
O hybrid
bus
start
no option is correct
mesh
ring
The brief explanation of Nested Classes in Object-Oriented Programming is as follows: They provide an assortment of benefits and drawbacks (OOP).
______ is a special operator used to check whether an attribute value matches a given string pattern. Between Null Like In
Explain the GRANT declaration and how it applies to defense. What kinds of rights are available? How can they get revoked?
Transcribed Image Text: write the
code in java to make a queue using dynamic array T
having enqueue and dequeue operation
TRUE OR FALSE // C PROGRAMMING LANGUAGE When a file opened for writing already exist its contents would be over written
Explain please Transcribed Image Text: For any two regular languages L and L2, h(L,U L2)=h(L,)Uh(L,).
Select one:
O True
O False
Write a program in C++ to take input a number n and find the nth term of sequence given below. 1,4,9,16,25,………
27 ?????? to create new group called student we use the command ???????? groupmod student useradd student groupadd student groupdel student
ASSEMBLY The binary value of AL after the following instructions have executed is 11101101. mov al, 01101011b rol al,4 True False
Write down a c program that will take a year as input and will print number of days in that year?
Transcribed Image Text: Networking:
Configure Spanning Tree protocols
using four switches. Configure
Spanning Tree protocols using four
switches.
jo 2:56 /
It is termed a any characteristic or set of attributes that may be utilized to uniquely identify one row from another
The output of Risk analysis is: Select one: a. Risk assessment b. Dependibility requirements c. Root cause analysis d. Risk description
Based on your experience on simplifying Boolean Expression using Boolean Algebra, what difficulty do you find with the procedure? (option based)
Write a program in js to check whether a string has vowels and if had they how many times. Using regex
A backbone LAN is usually a ______. a. bus b. star c. either (a) or (b) d. neither (a) nor (b)
For UTP Cabling Properties of UTP Cabling : We have 8 wires , but we use only 4 wires , why?
Write a program in c to copy the one string to other without using strcpy.the one string should taken from use
_____________ refers to a system development methodology which is used to reduce the time required to design and implement information systems.
List the main technological components of a typical Hadoop system, as well as their functions, and explain how they work together.
Java Transcribed Image Text: Write the code in java language to print the
characters in reverse direction and string is
given
Describe a privacy problem that is so severe that it would lead a Facebook user to discontinue usage of the service.
Explain the distinctions between public-key and private-key encryption. Include examples of when and why each could be utilized in your response.
Explain the role of IETF in the development process of the Internet protocols. Mention some latest RFCs and their practical implementation.
Write a Java program that asks a user to enter a number and prints out if it is odd or even.
Validation means: Select one: a. The software should do what the user really requires b. Are we building the product right
With regard to cloud backup, what are solutions? Can you tell me where I can get free space on the internet?
Find the class for the given IP address 185.75.255.10 1. Class B 2. Class A 3. Class C 4. Class D
Using the covid_19 frontline workers as a case study, discuss an item system which could useful in their line of work
This is a valid SQL statement: Values stored in a table, but not in an Oracle instance, are stored in pseudocolumns.
None Transcribed Image Text: /Suppose current date: sunday March 10 2020 22:41:52 GMT-
0800*/
document.write(current.getDate() + current.getDay() +
current.getMonth() );
Answer:
35 Components of a computer that are tangible are. Select one: a. hardware b. peripheral device c. storage device d. output
Computer architecture Transcribed Image Text: 6. Specify the number of registers in a memory chip of size (i) 2K (ii) 64K
37. One that is not a peripheral device of the computer system is a. keyboard b. mouse c. printer d. register
Which Windows 7 tool can be used to see a history of problems a computer has had since Windows was installed?
Describe the ERD to Relations algorithm using pseudo-code. We are interested in the steps. You should have loops in your answer.
Python Transcribed Image Text: This runs in O(n)
def constant(item):
if n ==1:
return “Hello World”
else:
return “Goodnight”
True
False
How would you deny group and other the ability to execute or source a script if you were to do so?
Language:java Transcribed Image Text: 11
Does the folowng represts a corect statement in lava?
char chd
System cut printinch
Cornect
Inonect
Take input three integer x,y,z from user and print the value of xy/z + xz/y + yz/x in output. Language: Python
27. Which of the following is not a guided medium? a. twisted-pair cable b. coaxial cable c. fiber-optic cable d. atmosphere
1. State some current controvercies associated with the BPO ? 2. How can BPO prove to be beneficial for startups ?
A base class reference variable may be used to refer to an object of a derived class by using the operator.
What is the index of the first element in the queue after the next element has been removed from the queue?
None Transcribed Image Text: I had a bicycle when I . young
have O
am
was
none of the above O
5. The ending address of a memory of size 1KB is 33FFH, then what is the starting address of the memory.
What are the benefits of computer literacy? What are the advantages of technology in the fields of education, economics, and society?
Write a program in php to take the string from user and you have to print the reverse of that string.
How will you evaluate the information that you retrieve from the library, in computer study , using the evaluation criteria criteria
DO NOT COPY FROM OTHER WEBSITES Write your own answer Q. What are the benefits of reducing the cost of hardware?
A file from which data is read is referred to as a file. a. data b. write c. read d. input
156. Component-based development model contains many characteristics of a. Prototyping model b. Spiral model c. Concurrent development model d. Waterfall model
Recognize the differences between vulnerability, danger, and control. Describe the significance of key information systems. [Authentication and access control] protection tools?
In C++ which of the following correctly declares an array? a) int array[10]; b) int array; c) array{10}; d) array array[10];
What feature on a printer must be enabled so that a printer can automatically print on both sides of the paper?
None Transcribed Image Text: Q2: Write C++ program to read two
integer numbers, and read theoperation
to perform on these numbers
20. What are attributes of good software ? a. Software maintainability b. Software functionality c. Software development d. a and b
Please help me generating a random number in range 1 to 6 in JavaScript. Write a program and attach output screenshot.
Can you explain to your system administrator why this recurring deadlock cannot be solved
by the system itself when it happens?
Transcribed Image Text: 1. Write a Java program to take three integer values through command line and print the largest
value.
Given the input n, write a matlab code return s turn if n is odd or false if n is even
The output of Risk reduction is: Select one: a. Risk description b. Dependibility requirements c. Root cause analysis d. Risk assessment
141. Data structures that enable programs to adequately manipulate information are termed as a. hardware b. software c. bus d. memory
Transcribed Image Text: python program
take a list of 10 letters and
sort by key value.
I am begineer in python
Transcribed Image Text: python program
give an example where you catch multiple error in one line
I am begineer in python
78. Which of the following applies to a class rather than an object? a. Query b. Update c. Scope d. Constructor
Subject: MATLAB Transcribed Image Text: Q1: Write GUI program and properties for adding two numbers when
num. 1>num.2 and others num.1*num.29
Python Write a program that takes years from user and print the calendar of whole year with day of each date
Python code (language) Paste the code please Transcribed Image Text: 1. Write a program with Turtle to display this shape (House).
What feature on a printer must be enabled so that a printer can automatically print on both sides of the paper?
Data structures and algorithms Transcribed Image Text: Q. Represent the graph below using Adjacency Matrix and Adjacency List.
I
3
4
Fortran Make a introductory welcome message which has title ,firstname ,lastname and greetings for ex.: Here is Mr. rdj good morning
How does a quantum computer differ from a classical computer? What are the obstacles that must be overcome in quantum computing?
With a(n)____________program, the source code for the program is made available to the public and so can be modified by others.
Draw the flowchart of while loop. Use some online tool that would be better for me. Attach the screenshot of flowchart.
1. Describe the idea of a memory leak and its cause. Describe trash collection and how it relates to existing heaps.
Which represents the language that is most difficult for a human to read?
-assembly
-highlevel
– machine
-no answer text provided
Which of the following is a possible advantage of decision trees? Low variance Linear model Explores entire decision space Easy interpretation
Question1 part2 . b. Explain how a man-in-the-middle attack on a Wi-Fi network (as described in part 1) can be defeated.
Which type of I/O has the disadvantage that all I/O data transfers must take place through the AL or AX register?
In PHP, the __________ protocol is used to attach files to an email.
a. SMTP
b. MIME
c. HTTP
d. FTP
Transcribed Image Text: Write a function:
int calculate(int x);
In C language, the function returns value of 4x^2
3x + 1.
Procedural programming has its limitations, since it doesn’t encourage creativity. Object-oriented programming (OOP) teaches the concept of “Everything is an object.”
Create a Python Program (not yet created here in bartebly) that utilizes an Engineering Formula (use any formula from any discipline)
The ————– statement is used to execute one action when a condition is true and another when that condition is false.
A C-string variable is an array, so we can use index operator [ ] to access individual character. True or false?
Python Write a program that takes years from user and print the calendar of whole year with day of each date
As part of the data collection process, you must create meta data. State how you will go about this, giving examples.
What is the extent of cybercrime and what are its boundaries? What distinguishes hacktivism from other types of cybercrime and terrorism?
i need the solution of this qoustion Transcribed Image Text: (c) (x² + y²) dx –
2.xy dy = 0
%3D
C++ Transcribed Image Text: Q1/ Create 2 arrays (a[10], b[10]), read n elements for each on, and print the
* .arrays
Give the output for the java code fragment int i = 7; do{ i = i/2; System.out.println(i); } while (i >0);
For the implemented diagram a) Find the list of mini terms f(W,X,Y,Z) b) Write the minimum function in maxi terms f(W,X,Y,Z)
Examine the advantages and disadvantages of the waterfall approach to determine whether adopting a waterfall strategy is suitable for the project.
Transcribed Image Text: Question 38
When drawing
True
an arc, we need to specify the bounding rectangle for an oval.
False
An international standard, multilevel set of protocols to promote compatibility among telecommunications networks. Select the best fit for answer: OSI why?
The physical layer, in reference to the OSI model, defines the interface between the X.25 network and packet mode device explain?
From which ribbon you can access Picture, Test Box, Chart etc. Select one: a. Edit b. File c. Insert d. View
66. User views are included as part of which schema? a. Internal b. Conceptual c. External d. None of the above.
degital design Transcribed Image Text: The Decimal representation of (123)16 is:
Select one:
O 291
O 219
O 191
O 119
In many integer programming problems, exhaustive enumeration of all possible solutions is impractical. Is it true or false? What’s more, why?
Please provide correct solution only the wrong answer will be downvoted directly understood. Transcribed Image Text: Conest
e NEA
to NFA
1. Describe the idea of a memory leak and its cause. Describe trash collection and how it relates to existing heaps.
________ is a long-standing connection or bond with others. A) attaching B) security C) The term “reguard” D) The term “attachment”
Two instances of data saved in a school’s data warehouse and two examples of data stored in a school’s data lake.
What computer technique is used to identify an object’s present state or location? What do you name these? Describe its use.
Consider a situation where the CPU must send a byte to a printer. Explanation of the CPU’s functioning in 3-4 stages
In order to protect yourself from specific risks of data loss and theft, describe the security measures you are considering adopting.
Is this true or false? The HTTP response message’s Date: header specifies when the item in the response was last updated.
MAC address is also known as __________. a. Hardware address b. Physical address c. IP address d. both and b above
6. Video is represented as a series of images formally known as : a. pics b. shots c. frames d. snaps
Illustrate an XML Documents for a new Blog that contains the root element as URL
and children elements as header,footer,main,links etc.
Application layer is also said to be a _______layer a. Service layer b. Transport layer c. Session layer d. Abstraction layer
A modem is connected in between a telephone line and a a. network b. computer c. serial port d. communication adapter
I am beginner in dart language. Please help me. How to primt I am new in Dart language in dart language
160. The _____ layer is the layer closest to the transmission medium. a. network b. physical c. transport d. data link
Transcribed Image Text: Take 10 numbers input from user and print the mean of those numbers.
Write program in C++ language.
In your healthcare organisation, can you identify 3 important instances where Microsoft Excel is extensively used to capture and tabulate data?
Write a program in python to take a complex number from. User and calculate the true square root of that number
Transcribed Image Text: 15
Computer as a complex system – Data storage function is also known as Input/output (I/O)
TRUE
FALSE
Q3. (a) Give any example which describes the software crises due to design. (b) Exemplify the developer myths with suitable scenario.
Differentiate between an operating system that runs on a stand-alone computer and one that is incorporated inside a computer (see figure).
Recognize the differences between vulnerability, danger, and control. Describe the significance of key information systems. [Authentication and access control] protection tools?
Write a program in C++ to show of a numeric value of a variable using hex, oct, and dec manipulator functions.
Identify four feasibility types. Briefly explain each type and formulate two questions that can be asked for each type of feasibility.
163. System feasibility in spiral model is determined in a. first loop b. second loop c. third loop d. all loops
With your knowledge in file systems write a java programs the can be used to: Rename a file in a directory
Write a program in pascal language to take radius from user and print the area of circle formed using that radius.
Is information security policy considered static or dynamic? Why do you think this scenario will turn out the way it does?
Transcribed Image Text: -For INT 1Ch, Show the IP and CS of the ISR that could be existed.
What should h
Write down a c program that will take a year as input and will print number of days in that year?
What is software engineering? Explain the differences between the following terms Software engineering vs. computer science Software engineering vs. system engineering.
Transcribed Image Text: AB
AB + A’B’
10
How many 2-to-4 line decoders are required to design one 4-to-16 line decoder?
Two read heads and two write heads are built into small wheel in a technique known to be Helical scan why?
Fiber to the home uses 1. Frequency division multiplexing 2. wavelength division multiplexing 3. time division multiplexing 4 statistical time-division multiplexing
get the manchester code spectrum Transcribed Image Text: 1. Raalt
Sanlw)=F”
Rab
2. Sox (u)= Soaluw) I r wP
alw)V(?
%3D
An array index should normally be of type float. State whether the statement is true or false. If false, explain why.
How many pins does a floppy drive connector have? What is the storage capacity of a 3.5% high density floppy disk?
What would be the resulting output of the Boolean expression, 1 + 0 * A. no answer B. 1 C. 0
Find out how to troubleshoot some of the most frequent issues that occur with Linux hardware, applications, file systems, and networks.
Which type of statement causes a procedure to execute? 1. Procedure declaration 2. Access specifier 3. Procedure call 4. Step Into
Which of the following is a possible advantage of decision trees? Low variance Linear model Explores entire decision space Easy interpretation
Write a program in c to take user input for integer type numbers and perform addition and subtraction and display result.
Explain the differences between multicore, manycore, and clusters, as well as which of these (specified processors) is best for high performance.
86. Using ODL, you can define which of the following? a. Attribute b. Structure c. Operation d. All of the above.
In the context of software design and development, what is the connection between cohesion and coupling and how do they interact?
In UNIX systems, which command handles a character stream by duplicating its input? a) tree b) tee c) tty d) ls
A problem’s _____ will answer the question, “What does the user want to see either printed or displayed on the screen?”
What are the data security methods that fall within the purview of the software-based security method? Talk about it in depth.
283. In command interpreter environment of the operating system, commands are executed by a. windows b. itself c. Linux d. UNIX
Transcribed Image Text: @3\write
a program to calculate
ten terms of the following series.
use fortran.
15
2
?
12
16
112. _________ conversion is the representation of analog information by an analog signal. a. Digital-to-analog b. Analog-to-analog c. Analog-to-digital d. Digital-to-digital
What is the lvalue assigned to given the following? int(‘9.9’) = integer A. 9.9 B. 10 C. None of the preceding
Transcribed Image Text: 1. What will get printed as output?
a = [ 10, 20, 30, 40, 50 ]
a.remove(30)
print(a)
A computer performs operations by comparing data items and then, depending on the results, follows predetermined course of action. Logical explain?
Define hacks and viruses and describe how a business may defend itself against hackers locking in to steal account info, please?
Describe any three suitable types of problems that can be implemented using reinforcement learning in a Telecommunications organization such as Airtel.
What exactly is the Aggregate operator? The Location attribute of a control indicates where the control’s_________ corner is on the form.
Distinguish between the two methods by which computers may run many processes at the same time and explain how they vary.
Your computer crashed! Your data was not corrupted due to which feature of your NTFS system drive? compression encryption journaling permissions
True or False: It’s always possible to recover deleted file items such as e-mails, texts, and photos from a mobile device.
Transcribed Image Text: Write an
example instruction that will subtract the value contained in data location X to register R
Answer:
Explain the difference between loosely coupled and tightly coupled cloud computing and provide some instances of each of these two concepts.
Transcribed Image Text: By using a S-R flip – flop design a binary counter with the following sequence
0, 1, 2,3,5,4,7,0
Transcribed Image Text: Use a Karnaugh map to minimize the following standard POS expression:
F = (A+B+C)(A+ B+ C)(A+B+C)(A+B+C)(A + B+C)
Block coding can help in _______ at the receiver. a. Synchronization b. Error detection c. Attenuation d. both (a) and (b)
A device for converting handwritten impressions into coded characters & positional coordinates for input to a computer is Writing tablet explain?
Construct a truth table for R(x,y,z) = x’ y + x’ z + y’ z’ and draw the corresponding logic circuits
Write a pro- gram that computes and outputs the nth Fibonacci number, where n is a value entered by the user.
How would you deny group and other the ability to execute or source a script if you were to do so?
What were some of the information security and privacy issues making Veterans Affairs (VA) and its assets more susceptible to attacks?
Asap Transcribed Image Text: Complete the C++ function given below:
int evenDigits(int n){
//returns the number of even digits in n
Would you recommend a synchronous bus or an asynchronous bus for use between the CPU and the memory? Explain your answer.
Construct a 16 to 1 multiplexer with 4 to 1 and 2 to 1 multiplexers. Draw block diagrams and truth table.
None Transcribed Image Text: write c++ program that read tow positive
number and perform addition and
subtraction operations using switch
statement
Linked list is more suitable data structure than array for a program that requires a lot of insert/erase operations.True or False.
Write a bashscript to print the string given below 10 times in separate lines along with the line number. “Hello! Programmer”
use matlab how to get find the local maxima and minima of this graph maked by using t=0 -> 10PI x=2sin(t)+0.5t;
2. Which address identifies a process on a host? a. physical address b. logical address c. port address d. specific address
What are the two design factors that must be taken into account while designing an open hash table that performs efficiently?
Give examples of how various reasons influenced the decision to require system developers to adopt an object-oriented approach for system development.
Write the configuration steps to support at least two VLANs at each branch, one for employees and another for IT managers.
221. Time sharing technique handles a. Single Interactive Job b. Multiple Interactive Job c. Recent Interactive Job d. Old Interactive Job
6)Which of these interfaces is used to manage a layer 2 switch remotely?
a.
VTY
b.
AUX
c.
RS232
d.
Console
5. The ending address of a memory of size 1KB is 33FFH, then what is the starting address of the memory.
In serial, asynchronous transmissions, the stop bit is used to signal the end of the character within the data frame. explain?
111. What problem is solved by Dijkstra’s banker’s algorithm? a. mutual exclusion b. deadlock recovery c. deadlock avoidance d. cache coherence
Transcribed Image Text: Question
no 02:
E= {A, aaB, c, aaBaaB, aaBc, caaB, cc}. From given alphabet prove Kleene Star Closure.
Define and what does it do in own word The System Configuration window has five tabs: General- Boot- Services- Startup- Tools-
What are the security concerns for each OSI layer with various network topologies, and why did your department choose that topology?
Interface an 80286 microprocessor with total memory size 128KB using RAM chip size of 16KB. Show the detail of your drawing.
Represent the following conditional statement by two register transfer statements with control functions. If(P=1) then (R5? R3) Elseif(Q=1) then (R5? R4)
Transcribed Image Text: sniffer is not an example of
Select one:
a. bot
b. scareware
C. Trojan horse
d. malicious code
2 The basic goal of computer process is to convert data into __________. a) information b) tables c) files d) graphs
What exactly is the Aggregate operator? The Location attribute of a control indicates where the control’s_________ corner is on the form.
Transcribed Image Text: one of these is from circular waiting properties :
continuous
independent process
hold and wait
None of above
186. The components in the domain name space are separated by ……………….. a. Comma b. Dot c. Colon d. Semi colon
Take a look at how Oracle Cloud compares to the cloud services offered by companies such as Amazon, Google, and Microsoft.
Return type_________________ indicates that a function will perform a task but will not return any information when it completes its task.
In an output statement, the newline character may be a part of the string. (Mark the statements as true or false.)
Transcribed Image Text: Lec -1
1- Write a C++ program to read A[20] elements randomly and
print it In ascending order
An online retail website needs to maintain a record of each customer’s purchases. How can you do this with cookies, Explain.
Python Write a program to append two strings x,y given string print the result as x+y and y+x X= “jane” Y=”jebwhwh”
CAM is an addressable memory that can determine whether or not a particular data is present in one of its addresses.
The sum of the numbers (E0000E) 16 and (BAAC) 16 is ( ) 16 and their product is ( ) 16
42. A k-bit field can specify any one of a. 3^k registers b. 2^k registers c. K^2 registers d. K^3 registers
How can we make sure that our projects succeed? What is configuration of a software product? Discuss the configuration management activities?
Write a Java program to print the pattern given below without using loops. * *. .* *. .* *. .* *
2. Compare Serif with Sans Serif.
3. Briefly explain any two character sets.
4. Define Link and Node from hypermedia structure.
Write a program that will read a 4- to 6-digit number and print it with a comma. not use array c++
A memory that is capable of determining whether a given datum is contained in one of its addresses is CAM why?
Give two reasons why you believe it is critical for the computer. programmer to research the organization and architecture of computers.
44. Model preferred to create client/server applications is a. WINWIN Spiral Model b. Spiral Model c. Concurrent Model d. Incremental Model
Disk formatting is prepared by a computer system at a. One level b. Two levels c. Three levels d. Four levels
If you wanted a rule to match on a URI string that has been URI decoded, which modifier would you use?
Please define the main advantages of using an AS/RS system. Which business sectors are more advantageous in using such technologies? Why?
Write 8086 ALP to convert: i. Four digit hexadecimal number to decimal number ii. Four digit octal number to decimal number
If someone don’t open the computer casing, how will they find out how many memory slots are populated on the motherboard?
The cloud computing revolution has implications for business in a variety of ways. Does Collaboration be with you at this moment?
A variable’s _______ is the time period during which the variable exists in memory while the program is executing.Fill the gap.
………….transform message into format (cyber text) that cannot be read by hackers. a. Decryption b. Encryption c. Transformation d. None of these
Transcribed Image Text: 5.
For the below expression, construct the circuit diagram and also give the truth table
(A.B.C) + A. (B+C)
Java Program Write a Program to check if an alphanumeric string contains numeric value or not.if it is then find which ones
If a motherboard has one blue IDE connector and one black IDE connector, which do you use to install a single drive?
5 Transcribed Image Text: what is the output of the following code snippet
var ar=new Array(2,4,5,6);
arr(ar,ar[2]);
document.write(ar[0]+ar[1]+ar[2]);
function arr(x,y)
{x[0]=ar[2]++;x[1]=5;y++}
Answer:
Coding Theory!
Q:Factorize X^ 21 – 1 over IF2
I want you to solve this question completely(with all calculations you need )
What key aspect of both the binary search and the merge sort accounts for the logarithmic portion of their respective Big Os?
I want to play music in the background. Write code to play and stop the music in background (Provide only Java Code)
b) Write a program in Java to take input three integers x,y,z and print the value of (x*y) + (y/z) in output.
Write a program in java to check whether a string is a rotation of another. Take both string from user. In O(1)
Each of the following is a characteristic of cybercriminals except a. better funded b. less risk-averse c. low motivation d. more tenacious
Write pseudocode for a program that outputs every number from 1 through 15 along with its value times 10 and times 100.
What is the most significant distinction between connectionless communication and connectionoriented communication, and how can you determine the difference between the two?
WRite a pr‘ograt? ‘tg“pn’d in C language. | ol Transcribed Image Text: WRite a program to print “Hello Coder”
in C language.
Should some websites be blocked from children’s access? Who should be held accountable for the activities of children when on the internet?
Write a calculator program that applies addition, subtraction, multiplication, and division, using C program. Explain in details every part of the program.
For an if statement to condit ionally execute a group of statements, the statements must be enclosed in a set of —–
Transcribed Image Text: p?q is logically equivalent to
O a) -pV ¬q
O b) pv¬q
O c) -p vq
O d) -pAq
Which two tools might a software developer or system administrator use to register a component of an application in the Windows registry?
What do you call software that is intended to offer a particular feature for usage by a large number of distinct customers?
matlab draw the surface color-filled function cos(x+y) = 2 where x = 0 to 107 and y =x matlab code with output
Apache is a popular example of networking software of what type? a. Web server b. Browser c. Email server d. Email client.
Was the phrase “important consideration” intended to convey anything specific or general? This is particularly true in the area of software engineering.
Do not copy from other websites Write your own answer Q. What is the function of the Internet Control Message Protocol ICMP?
In-depth explanation of how the Domain Name System (DNS) works, covering iterated and non-iterated requests, authoritative and root servers, and DNS entries.
Illustrate the execution of the selection-sort algorithm on the following input sequence: (12, 5, 36, 44, 10, 2, 7, 13, 22, 23)
Java Write a program that calculates the weight of number that should be taken from number. For ex : 123 = 6
Convert the following Infix Expression to a Postfix Expression using stack. A + B / C – (P * Q) + R
_________________ is a bit-oriented protocol for communication over point-to-point and multi-point links . a. Stop-and-wait b. HDLC c. Sliding window d. Go-back-N
Transcribed Image Text: What is the 8085 Assembly Language Instruction That do the follwing
Rotate Accumulator right. Bit 0 -> C. B7
The link layer is responsible for providing. connection between applications communication from host to host connection between nodes Communication between carrier pigeons
I need the answer as soon as possible Transcribed Image Text: Write a C++ program to insert a row into
array B[3][3]
Transcribed Image Text: Write a c++ program that reads non-negative
integer number and determines whether it is
odd or even or prime
Transcribed Image Text: 3. Requirements engineering is
An iterative process
A sequential process
O A dynamic process
() All of the above
ghlights the parts of the policy and/or procedure that applies to you as an employee that uses email in your work environment
Transcribed Image Text: 3. Draw the logic gate circuitry for the following Boolean expressions using
NAND gates only
F=AB+AC
c)
d) F=A+B(C+D)T
Identify the main key attribute, composite attribute, simple attribute, multivalued attribute, and derived attributes for each object. Assign appropriate labels to characteristics.
Is a two-phase locking performed if the ATM pin is entered incorrectly numerous times? If so, how does it achieve this? Explain.
Evaluate the following Scheme form: (let ((a 3) (b 4) (+ (* a a) (* 2 a b) (* b b)) n
Which of the following is not an output format option for AWS CLI commands? a) JSON b) List c) Table d) Text
How do you write a single line comment? How do you write a multi-line comment? How do you write a documentation comment?
php Module I/O Prompt the user to enter radius of circle r(in cm) and in output print the area of the circle.
swift language wap to print numbers even using GUARD statement. start and end points are given no need to take from user
Sema wants to iterate over the given integer array using for in loop. Your task is to help her in grovvy language
48. Secondary memory of the computer system is able to store a. program b. data c. instructions d. both a and b
Transcribed Image Text: The pillar that allows you to build a specialized version of a general class, but violates encapsulation principles is
11. In computer, GUI stands for a. graphical user interface b. general user interrupt c. graphs, utilities, icons d. grayed user interface
When the OS addresses the sectors on a hard drive as one long list of sequential sectors, what is this technology called?
220. Incorporating changes in an existing system to enhance, update, or upgrade its features. a. Maintenance b. Evaluation c. Deployment d. Validation
List at least 4 HW or SW resources needed by a process. Are they HW or SW? Use single words where feasible.
2) Show that by using one of De Morgan’s Laws and the property that (???)?~(~??~?)~(~?)=? (nt: No need to create truth tables)
Transcribed Image Text: In order to execute a program, a corresponding process must first be created. True or False.
True
O False
Draw a precedence graph which execution schedule is conflict-serializable. Graph must contain 5 transactions (i.e. 5 vertices) and at least 7 edges.
Transcribed Image Text: TRUE or FALSE – Constructor of base class is derived from the derived classes.
Select one:
a. TRUE
b.FALSE
A string object is ______ which means its contents cannot be changed. Select one: a. Absolute b. Immutable c. Undisputable d. Irreversible
Look at the following class definition. What is the name of the superclass? What is the name of the subclass? class Tiger(Felis):
Subject code – rcs506 Write the three address instructions for the following statement. X = (A + B) x (C + D)
4. Show that (p ? q) ? (p ? r) and p ? (q ? r) are logically equivalent using equivalence law.
Determine if the following are TRUE or FALSE: Suppose that ?, ~? and ? are true, determine the truth value of (???)?~?.
Transcribed Image Text: Find the first arithmetic complement of the following numbers, showing the solution
the number
Answer
2(111001)
8(323761)
(F1905A2)16
Answer:
39. The _________ product defines the number of bits that can fill the link. a. bandwidth-period b. frequency-amplitude c. bandwidth-delay d. delay-amplitude
Transcribed Image Text: What is the computational complexity (Big O order of magnitude) of the following function?
n4 + 4000n2logn +120000
[X]
? Transcribed Image Text: Question#4
Which of the following variable names are valid, and which are invalid?
1. Number
2. Num 2
In the evolution of database technology, third-generation products supplanted second-generation systems because Nonprocedural database access was an improvement over navigational access. why?
Identify the main key attribute, composite attribute, simple attribute, multivalued attribute, and derived attributes for each object. Assign appropriate labels to characteristics.
Q.What are the activities carried out during the requirement analysis? What is the final outcome of requirement analysis? (cse 320 software engineering)
What is the difference between two-tiered and three-tiered computer application architectures, and where are the four basic computer application functions located? Explain.
A central computer that holds collections programs for many PCs, workstations computers is a(n) a) supercomputer b) minicomputer c) laptop d) server
Let A be a 3×3 matrix where A 2 =I 3 , then det(A) is 1 or -1. Select one: 1-True 2-False
Transcribed Image Text: java program to find all roots of a quadratic equation The quadratic equation is given
Characters 93 (with spaces)
B. Web Documents are identified by addresses called Uniform Resource Locators (URL). Identify a URL of your choosing and explain its parts?
Write a Program in Java to Illustrate the Client can Run in Infinite Loop handling Multiple Server responses, one at a time?
Which data structure conveniently used to implement DFS? Select one: a. Priority Queues b. All of the mentioned c. Queues d. Stacks
Aperiodic or non-periodic signal is the one that does not change constantly without exhibiting a pattern or cycle that repeats over time?
Which two tools might a software developer or system administrator use to register a component of an application in the Windows registry?
What do you call software that is intended to offer a particular feature for usage by a large number of distinct customers?
This is a crucial component in recovering data from a relational database after a power outage in the midst of a transaction.
Transcribed Image Text: What is the address range of a Class B network address in binary?
01xxxxxx
OxxxxxxX
10xxxXXx
O 110xxxxx
110?????
Show me how to use h1 heading tag in HTML.Use the heading as: “HTML Headings” Write HTML code and show output screenshot.
93. Loading of the operating system at the start is also called a. versatile machine b. clouding c. versatile memory d. booting
Transcribed Image Text: 4. Write a program in C++ using constructor to print two numbers. The numbers should be given as
input.
Use the Button class discussed in this chapter to build a GUI for one (or more) of your projects from previous chapters.
Transcribed Image Text: Derive the Boolean functions for a typical stage of a decrement micro operation :
P14 : A from A-1
10)Which layer of the TCP/IP model is responsible for routing messages through the internetwork?
a.
application
b.
physical
c.
internet
d.
session
A storage device which is used to store data & information external to the main storage is known as Backing storage explain?
Provide a breakdown of the IT project resources and technology required to help management. What capabilities can we expect from prospective tools?
The intensity of a grayscale pixel is expressed within a given range between a minimum and a maximum 0 and 1 why?
Transcribed Image Text: Q1) Answer the following :
1. (5>4)or(3<>2)
2. (3<5) and (3!=3)
3. (3>1) or(3>5)
4. Not(4<5)=F
5. Not ((5>4)or(3<>2))=F
Transcribed Image Text: 2 The foillowing in an internet website address. Label the various parts as:
Protocot, Server name; Directory; Document
http://www.igniteassist.co.za/modules/policies-and-procedures.php
List the 5 informational text structures Transcribed Image Text: Informational Te
List the 5 informational text structures
1)
2)_
3)
4)
5)
In your own words, describe the significance of operating systems and whether or not communicating with a computer without one is feasible.
Sorting Algorithms 1.) Trace the bubble sort as it sorts the following array into ascending order: 25 30 20 80 40 60
Write any system that you are familiar with and write the purpose of the system and how they can optimize that system?
In what ways may transport protocols be used to serve the needs of users? Mention TCP, UDP or both for each service.
Make a program in c++ that determines and print the largest element of an array SALARY [5] and which index it corresponds
Exercise 1: (Algorithms and Flowcharts) 1. To find Area of Rectangle. (Provided: A= L * B, A: Area, L: Length, B: Breadth)
Which of these methods is used to check for infinitely large and small values? a) isInfinite() b) isNaN() c) Isinfinite() d) IsNaN()
23. Delimiting and synchronization of data exchange is provided by a. Application layer b. Session layer c. Transport layer d. Link layer
Explain why there could be reasons to believe that Information System and people are the driving force behind developments in Information Technologies.
If a battery in a laptop is rated for 80 WHr, and the laptop draws 20 watts, how long will it run?
In Python: Read a string as input from user and print the number of Uppercase alphabets present in the string in output.
Write a C# program to find: 1. All permutation of words from “Babatunde”. 2. How many times does “a” appear in abracadabra.
Transcribed Image Text: Which of the following is a Machine Learning Tool?
a. SQL
O b. Spark
c. Excel
O d. Tableau
8. Interface used by windows is called a. menu driven interface b. command driven interface c. graphical user interface d. prompt interface
Caesar cipher is represented as …………….. a. C = (p+3)mod3 b. C = (p+26)mod3 c. C = (p-3)mod26 d. C = (p+3)mod26
Because Chrome OS uses less internal storage space than competing desktop operating systems, PCs using Chrome OS need less internal storage space.
Document reader is a machine for reading documents that are encoded in a way that is readable by person and machine. explain?
Plot this on matlab using fill Transcribed Image Text: 2 sin 5t, 0
Input into a text box triggers the event for each key that the user presses when inputting data into the text box.
Perform the following arithmetic operations using One’s complement representation ( Please show the calculation process ). 23.15 10 + (-9 10 )
Write a C++ program that reads 10 numbers from user, store them in an array and print the smallest value of them.
57. Writing a program into a suitable language is called a. program coding b. program instructions c. program debugging d. program testing
Answer the following questions in a file called bigo.java: ? Write an O(n) algorithm that sequentially inserts an element into a list
discussion, think about when binary, hexadecimal and octal numbers would best be used? Why, do we have to have different number systems?
This kind of data transmission allows data to be transmitted in both directions on a signal carrier at the same time.full-duplex explain?
Write a c++ code to get string as input then you have to copy this to other string and print both strings
The type of post test loop available in C++ is the ____ loop, where the body of the loop is always executed.
Transcribed Image Text: 3. Simplify the following logic equation to get a sum of
products expression.
F= (a + b’+ c)(b’+c)(b+ c’)
52. Windows uses graphics to make program easier to use,such graphics are known as a. GUI b. IR c. DOS d. IBM
Answer the following questions on System operations and support. Identify two areas of system development expertise that are critical for system support.
a java question. draw a binary search tree whre it results from adding the following numbers in the order listed below: 55,63,23,28,11,32,60,66,25,62
Explain why it would be preferable to use a DATE data type to store date data instead of a character data type.
49. Control processing unit loads instructions that are executed from a. hardware b. shared resources c. memory d. both a and b
Create a dataframe of ten rows, four columns with random values. Write a Pandas program to display the dataframe in Heatmap style
What is the effect of a data leak on the security of the cloud? What can you do as a preventative measure?
What are single row functions? List down the categories of single row functions and explain how they are different from group functions.
Explain a scenario where you can apply one of the four access control measures. Why would you select one over the others?
Explain the cost of context switch between processes and threads in Distributed Computing ? Note : Please write in text Not pics
MCQ: ________________ property checks whether all situations are addressed by a security requirement document. a. Verifiability b. Completeness c. Realism d. Consistency
Simple factory is not considered a design pattern because it does not decouple the client from concrete classes Select one: True False
Transcribed Image Text: Which of the following is a weighted code:
A
?CD ?ode
B
Excess-3 Code
C Gray Code
D
None
45. Data input command is just the opposite of a a. Test command b. Control command c. Data output d. Data channel
PCs using Chrome OS need less internal storage space because Chrome OS consumes less internal storage space than rival desktop operating systems.
Transcribed Image Text: C program to
2 find the factorial of a non-negative integer T
B entered by the user using recursion.
How can you add a program icon to the Windows 7 taskbar so the program can quickly be launched at any time?
Some devices and many apps report the ___________ of the device. That can make it much easier to track the owner’s movements.
Transcribed Image Text: .A“Stack” is also known as what?
O a. Linked list
O b. LIFO
O c. FIFO
O d. Queue
CRYPTOGRAPHY NEED CORRECT AND DETAILED ANSWERS ELSE DOWNVOTE What is the role of Ticket Granting Server in inter realm operations of kerberos?
Given the boolean function A.B.C.D+A`.B.C.D+A.B.C`.D+A`.B.C`.D+A`.B`.C`.D+A`.B.C`.D`+A`.B`.C`.D` use a Karnaugh map to derive a simpler equivalent expression as sum of products product of sums
51. One that is not a operating system mode is a. user mode b. kernel mode c. supervisor mode d. system mode
Event delegation models and components are preferred in GUI development because… Describe with concrete instances The word “system testing” should be defined.
Write C++ program to generate 10 random numbers in range 1 to 100 and print them in single line separated by ,
90. Identify the class name for the following code: ABC123 course(); a. ABC123 b. course c. course() d. All of the above.
131. What is the use of Bridge in Network? a. to connect LANs b. to separate LANs c. to control Network Speed
In Excel, the range of cells receiving copied content is called the ____ area Group of answer choices fill range paste location
343. An HTML file is a text file containing small markup tags. a. True b. False c. May be d. Can’t say
104. A ______ switch is a faster and more sophisticated router. a. two-layer b. three-layer c. four-layer d. none of the above
Cyper secutity questions Transcribed Image Text: If you are digging through a trash
called?
can for information, what is this hacking technique
How many bit strings of length seven either begin with two 0s or end with three 1s i want it in discrete
Write an Assembly language instruction(s) to add the content of the Accumulator and the content of the memory location with address 210.
Read the tree from simple.dnd file and after coloring each branch with a different color write these two trees in tree.phy file.
Write a Java program that checks if a series of 10 numbers entered by the user in the ascending order are consecutive
OS Transcribed Image Text: In Unix, Which system call creates the new process? *
fork
create
None of the above
O new
When an operating system requires a lot of input/output from a user, what type/kind of scheduler should be used? Justify your response.
Dear experts it’s not civil subject Sub:- Cse c/n What are the two qualities that must be possessed by traffic throttling mechanism
Advanced topics in data base I want to come quickly please Scaling out is better than scaling up, what do you think?
In Python Which of the following statements creates a tuple? values = (1, ) values = [1,2,3,4] values = (1) values ={1,2,3,4}
None 151. Which one of the following is not a step of requirement engineering? a. elicitation b. design c. analysis d. documentation
Create the following table in mySQL Table name: Register Primary key: sid,cid Foreign key: sid references Students(sid) Foreign key: cid references Courses(cid)
In the following line of code, the class access specification for the base class is c l ass Pet : Fi sh
Write a python program to swap the first element to the last element of the list and print the newly formed list
Machine codes are in binary, mnemonic codes are in shorthand English is the difference between a mnemonic code and machine code why?
The IEEE Standard 754 representation of a floating point number is given as: 01011011001100110101000000000000. Determine the binary value represented by this number
1.As an Internet user, how would you stay alert and be knowledgeable with regards to proper 2ecurity practices? Explain TWO (2) countermeasures.
12 To start the PowerPoint presentation from the beginning (first slide), press Select one: a. F5 b. F4 c. F2 d. F8
Transcribed Image Text: 1) Consider the following directed acyclic graph
A
B
D
E
F
G
H
Find 5 possible topological sorts.
Write a c program to check whether a number is Palindrome or not. And you have to take that number from user.
What do you call software that is intended to offer a particular feature for usage by a large number of distinct customers?
Create a dataframe of ten rows, four columns with random values. Write a Pandas program to display the dataframe in Heatmap style
17 The starting point of the e-government target plan is the formulation of the e-government vision. Select one: a. True b. False
Please answer the question in the screenshot. Transcribed Image Text: 1. (Direct Proof) Suppose a is an integer. If 7|4a, then 7|a.
What is -Xms and -Xmx while starting jvm? a) Initial; Maximum memory b) Maximum; Initial memory c) Maximum memory d) Initial memory
Perform Quick Sort on the following array with using last element as a pivot .Show the steps 37 8 36 64 150
Subject: Discrete Structures Topic: Pigeongole Principle Using Pigeonhole Principle, Show that if y is an Odd integer, the y^2?+3y+5 is odd.
Why is a hash structure not the ideal option for a search key that is likely to be used for range queries?
Consider the following Python code fragment. What output is produced, if any? for i in range(7, 10) : print( i, i**2, i**3)
Do processes(Operating system) need to be terminated? If so, when and how? If not, why not? How long do processes exist then?
The pieces of equipment which are attached to the CPU of a computer and which it can access are called peripheralsexplain why?
Transcribed Image Text: Two operations of semaphore are T (meaning “to test”) and I (meaning “to increment”)
Select one:
O a.TRUE
b.FALSE
A Boolean function simplified by using k-map has in general more terms than the product of maxterms standard form ?
True
False
write a java program to create method make sum two number then use Overriding to modify this method to multiply two number
List the types of information most susceptible to data exfiltration and provide at least two (2) examples for each type of data
422. Commercial data processing applications usually falls in category of a. Program bound b. Processor bound c. Memory bound d. Device bound
Apply Hoare’s partitioning to sort the following values in ascending order using the Quicksort algorithm 4 90 22 45 100 57 10
Data tablet uses much less computer time than the light pen and gives resolutions equal to that of the CRT display explain?
3. Write a program in C to concatenate two String S3 and String S4, to concatenate these strings call a function StrConcate()
q12 Which of the following ADC’s is having more resolution? 2 bits ADC 4 bits ADC 8 bits ADC 16 bits ADC
Write a C program to take input 6 char values from user and in output print the sum of their ASCII values.
136. MAC address is also known as __________. a. Hardware address b. Physical address c. IP address d. both and b above
A password manager stores encrypted passwords in what format? Is it a local, a web site, a clod, or a USB drive?
What are the benefits of database integrity and referential integrity? Which of the following integrity principles would you use as an example?
Compare and contrast the Windows API and the POSIX API and briefly explain how these APIs can be applied in systems programming.
What are the major functions of the transport layer and the internet layer in TCP/IP protocol? Mention 2 functions of each layer.
ii) Write a explicit custom comparator that sorts the array in descending order. Test the custom comparator taking a random array. C++
Write a java program to take user input of number of base 10 and you have to convert it into base 2
Transcribed Image Text: ADC AL,BL affects
a. PF only
O b. all conditional flags
O. CF only
O d. CF and PF
30. Physical memory is divided into sets of finite size called as ______ . a. Frames b. Pages c. Blocks d. Vectors
To compute Sin(x) using Taylor series approximation given by using programming forSin(x) = x – (x3/3!) + (x5/5!) – (x7/7!) +……..- (xn/n!)
Take input an integer i from user.Print numbers from 1 to i using loop in C language. Take loop of your choice.
Answer the following questions on System operations and support. Identify two areas of system development expertise that are critical for system support.
What is the size of a boolean variable in C++? a) 1 bit b) 1 byte c) 4 bytes d) 2 bytes
Determine the effect of FIVE information systems/information technology on print/online media, as well as the impact on the person and the company.
What exactly do you think you know about word processing? Give at least three characteristics of word processing and explain its function.
Give two examples of computer applications that would benefit from a connection oriented service.Give two instances where a connectionless service is optimal.(…)
Correct and detailed answer will be Upvoted else downvoted Write a C program to print table of numbers from 1 to 20
Write a Swift program to compute the sum of the two integers. If the values are equal return the triple their sum.
Is it true or false? The get accessor can be compared to a method that returns the value of a class property.
Please Help ASAP!!! Transcribed Image Text: Convert the following EBNF grammar to a BNF grammar:
->
27- In the strategy model, the e-government leader determines the short-term targets of the e-government system. Select one: a. True b. False
203. In Linux a user can load or upload a. I/O Modules b. I/O Devices c. Kernel Modules d. File Base I/O
What is the effect of a data leak on the security of the cloud? What can you do as a preventative measure?
Determine the effect of FIVE information systems/information technology on print/online media, as well as the impact on the person and the company.
The process of converting text, numbers, sound, photos, or video into data that can be processed by a computer is called ___________.
Transcribed Image Text: In AVL trees, how many rotations do we need to balance a Right-Left & Left-
Right trees?
O 2
B : Give reasons for resource scheduling C : What does extinction mean? Why is it calculated Please answer both.. In Short
Transcribed Image Text: 5. Which of the following relationships models the following statement: “The book contains 300
pages”
Dependency
Aggregation
Generalization
Realization
Take Input age from user and check whether the user is senior citizen or not. Given age of senior citizen>=60. In C++
Provide a brief description of each component of a typical operating system kernel, followed by a list of all of the components.
i need the solution of this qoustion Transcribed Image Text: (b) (1 + 2x) cos y dx + dy/cos y = 0
swift WAP foran array of integer is given print all entries, then add one more entry in it .now print new array
Transcribed Image Text: write C++ program, using function, to find (search) X value in array, and
return the index of it’s location?
49. Which of the following is not the approach to dealing with deadlock ? a. Prevention b. Avoidance c. Detection d. Deletion
50. The computer’s capability of distinguishing spoken words is called a) voice analysis b) speech acknowledgment c) voice recognition d) speech interpretation
228. The customer requirements are broken down into logical modules for ease of _______________ a. inheritance b. design c. editing d. implementation
Transcribed Image Text: A class can be thought of as a/an
for creating objects.
Alternative
Blueprint
Compressed format
Both A and B
In Python language- Take input two strings from user and form a new string by concatenation of reverse of both the strings.
The words that make up a high-level programming language are called . 1. binary instructions 2. mnemonics 3. commands 4. key words
B3 Write a program that reads a file and find out the total uppercase, lowercase, whitespaces and digits occurred in the file.
Transcribed Image Text: In Linux, the command used to
delete a File is
a.
mv
b. delete
c. del
O d.
rm
Write a C program to read 3 integers and arrange them in descending order without use of any data structure or sorting.
When we plan to employ a software package rather than bespoke development or outsourcing, should the analysis process be abolished or reduced?
The data formatting and translation layer is an OSI layer that is responsible for data formatting and translation. Presentation Transport Session Application
To construct an object of the type Book and initialise its properties, how would you go about using an object initializer? In
All of these are categories of security threats except a) Environmental threats b) Unwanted threats c) Natural threats d) Malicious human threats
Transcribed Image Text: The Banker’s algorithm is used
to detect deadlock O
to slove deadlock
to rectify deadlock
to prevent deadlock O
Transcribed Image Text: (b) Determine the order in which an inorder traversal visits the vertices of the ordered
rooted tree below.
h
Transcribed Image Text: Q2: b- Write a program that uses a function to find and return the maximum number between N numbers.
248. The ability for programmers to use the same written and debugged existing class. a. Reusability b. Design c. Debugging d. Implementation
In database recovery management, what are the three layers of backup that may be used? Explain briefly what each backup level does.
What do you call software that is intended to offer a particular feature for usage by a large number of distinct customers?
Write a Javascript program to prompt the user to enter 3 integers and in output print the largest of all three numbers.
Transcribed Image Text: DXAVD 0.EK/s
A simple WIFI modem forms a
–
* .wireless network
LAN
MAN O
WAN O
None O
USE KMAP to Simplify the following: F(A,B,C ,D) =B’CD’ + ABC’D + AB + A’BCD F(W,X,Y,Z ) =W’X’YZ’ + W’X + Y’Z’
Transcribed Image Text: 1. Which of these factors may affect perfective maintenance. [Multiple Answers]
Team stability
Ethical responsibility
Hardware Specifications
Program structure
In database recovery management, what are the three layers of backup that may be used? Explain briefly what each backup level does.
In constructing a pie graph, what value is the best to use to identify each slice? Frequency Relative Frequency Mean Sample size
ASAP Transcribed Image Text: Write a js program to check whether two
given integers, whether one is positive and
another is negative.
29. During transfer of data between the processor and memory we use ______ . a. Cache b. TLB c. Buffers d. Registers
Calculate the sum of natural number using loop and without using loop in c language and the number taken from the user
The primary drawback of a one-time pad is that the key length is equal to the plaintext length choose one: true false
Show how to add (0.12) 10 and (-0.12) 10 using floating point binary representation. Store the final result in single precision format.
When an operating system requires a lot of input/output from a user, what type/kind of scheduler should be used? Justify your response.
Which tuples with null values for the title property are included in the query select * from student natural full outer join?
Transcribed Image Text: QUESTION 2
Array is a static data structure because it cannot change its size at run time.
True
False
Name any three protocols that are vulnerable to attack, assuming that the organization’s users depend heavily on the network for day-to-day operations.
Need Correct Answer else downvote Write in brief about the phenomena obtained from current state of web after several cycles of ABC.
Write a program in python with a loop to compute and print the powers of 2, for powers 0 to 20 inclusive.
Write a java program to multiply corresponding elements of two arrays of integers and store in another arrays at the respective location.
Display And Visibility Properties Are Used To de And Show Elements In Any Page. Then How They Are Different From Each Other?
write C++ code for the fibonacci sequence of numbers where user enters the number to be arranged and the number of terms
Correct and detailed Answers will be given Upvoted else down voted What is meant by interprocess communication? Discuss about synchronous interprocess communication.
Give an in-depth explanation of what data security is, as well as the three types of data ownership and their corresponding obligations.
In this section, we’ll talk about specialist apps including graphics programs and video game creation tools as well as web authoring tools.
31. In a classful addressing, first four bits in Class A IP address is a. 1010 b. 1100 c. 1011 d. 1110
Take input a string in C++ and print all of its character in seperate line along with their index. Please do fast.
What is the Nyquist sampling rate for the band-pass signal with bandwidth of 850 KHz if the lowest frequency is 350 KHz?
Computer Science: What is the reason that sometimes much more space is reserved for a numeric field than any initial values stored.
A frame with destination address CC:DD:EE:FF:FF:FF is meant for _____ host(s) in the network. a.one b.a group of c.all d.not even one
If 2 1.4567 =b, then what is 2 3.4567 ? a. b 2 b. b 4 c. 2b d. 4b e. b+4
Write a summary on the use of agile methodologies based on annual surveys and surveys sponsored by companies that sell agile products
True or False: As items from the file are read, the read position advances towards the conclusion of the file. the document
Guillaume has a Windows 10 personal laptop. He wants to ensure that the Microsoft Store apps on his computer are kept updated.
When an operating system requires a lot of input/output from a user, what type/kind of scheduler should be used? Justify your response.
Discuss some of the most important information system problems to be aware of, as well as the best methods for addressing them.
Transcribed Image Text: B) Ues false position method to find approximation root for f
(x)=xsinx -1 =0 ,[0,1], e=0.0001
(two iteration only).
Do larger amounts of RAM lead to better overall process execution performance? What are the benefits and drawbacks of having more RAM?
Transcribed Image Text: What function do you use to convert an string of ASCII characters to a double?
strcpy()
atoi()
atof()
strcat()
What is reservation protocol? Write down problems in reservation protocol and how thoese efficiencies have been removed in binary count down protocol.
An array stores 10 integers in 64 bit system, what is the size of total memory in bytes occupied by the array.
Perform the following additions and subtractions. Assume the numbers are stored in signed-magnitude base 2 representation -1010111 + -10011 -100110 – 11010
111. ___________ is a second-generation cellular phone system used in Europe. a. GSM b. D-AMPS c. IS-95 d. none of the above
Programs prepared by an outside supplier & privided to a user in a machine readable form is known as Canned program why?
What would it take for a company to run its own private cloud? What are the normal steps that someone might take?
Java Module 1- Take input three integers 3 integers a,b,c and print the value (a*b)+(b*c) in output. Write a program in Java.
What advantages does a File System Web site have over an HTTP Web site? Also, Discuss the differences between inheritance and encapsulation?
None Transcribed Image Text: For the casen=6; find H(001010; 011100) and H(100011; 011111)
3 and 3
4 and 3
3 and 4
Please help ASAP!!! Transcribed Image Text: Convert the following EBNF grammar to a BNF grammar:
->
Transcribed Image Text: Find the errors in the program and rewrite the
correct statements
A=30;
B=60
c=*(A+2
P=input(“Enter the float number=’)).
printf(XYZ)
2. Write an if statement that assigns 0.3 to commission if sales is greater than or equal to 10000. C++ programming language.
_____ read hand-drawn marks, such as small circles or rectangles. (335) a. MICR readers b. Digitizers c. OMR devices d. OCR devices
Repeater operates in which layer of the OSI model? a. Physical layer b. Data link layer c. Network layer d. Transport layer
Can you give me 350-500 words on why is it effective to have an NLP (Natural Language Processing) in analyzing financial news?
MCQ Which of the following agreement used in Diffie?Hellman keys? Private key Agreement Secret key Agreement Public key Agreement Key pair Agreement
Transcribed Image Text: Find the first arithmetic complement of the following numbers, showing the solution
the number
Answer
2(111001)
8(323761)
(F1905A2)16
Answer:
The first line of HTTP request message is called ____. a. Request line b. Header line c. Status line d. Entery line
Simplify the logic circuit below using boolean algebra laws and rules and draw the simplified logic circuit. Transcribed Image Text: Y
A
Explain why there could be reasons to believe that Information System and people are the driving force behind developments in Information Tecknology
When an operating system requires a lot of input/output from a user, what type/kind of scheduler should be used? Justify your response.
77. Composition is a stronger form of which of the following? a. Aggregation b. Encapsulation c. Inheritance d. All of the above.
Correct and detailed answer will be Upvoted. Thank you! Q. List the core concepts of CT. How do you understand Computational Thinking?
What is the effect of a data leak on the security of the cloud? What can you do as a preventative measure?
The PLA device is programmable array of AND gates feeding a programmable array of OR gates . Select one : True
False
Create a sentinel while loop that prompts the user to enter integer numbers. Loop should stop when the user enters -1 .
Write a JAVA program to take input a string from user and print it’s length in output without using inbuilt length function.
A constructor_______________ parameters. Select the correct answer: a) can receive b)cannot receive c) must receive d) can receive a maximum of 10
2. The _______ is the physical path over which a message travels. a. Protocol b. Medium c. Signal d. All the above
Answer must be Handwritten Define term statement and expression. Explain different types of statement used in C programming Answer must be Handwritten
Write a program that reads 10 numbers, finds the largest number, prints it, finds the smallest number, and prints it.Without using arrays
In database recovery management, what are the three layers of backup that may be used? Explain briefly what each backup level does.
What exactly do you mean when you say “network security”? describe the functioning of the data encryption standard algorithm in further detail
Find the middle of the tools with 5,6,3,2,7,8,5,4,5,7 elements integer to 0400h assembly document recording some 0450h. (JE branch can be installed)
Which of the following is another name for a packet filter? a. proxy server b. reverse proxy server c. DMZ d. firewall
Transcribed Image Text: What is the output of the following C++ code?
int num = 2;
cout << (num + 1)/ 4;
Calculate the sum of natural number using loop and without using loop in c language and the number taken from the user
4- Given the statement: p {background-color:green ;}, which in the statement is the property? a. green b. background-color c. background-color:green; d. p
A(n)___________ phone can be used with more than one communications network, such as when used with both a cellular and Wi-Fi network.
None Transcribed Image Text: The function sprintf() works like printf(), but operates on
O Data file
O stderr
O string
O stdin
Transcribed Image Text: In asymmetric multiprocessing, the process is
taken from the ready queue.
Select one:
O True
O False
Drevie IS
Transcribed Image Text: 3. Draw the logic gate circuitry for the following Boolean expressions using
NAND gates only
F=AB+AC
c)
d) F=A+B(C+D)T
In database recovery management, what are the three layers of backup that may be used? Explain briefly what each backup level does.
Create an algorithm to implement the russe multiplication technique. Also, can you explain how your method works by solving a small problem?
Are Data Structures and Algorithms no longer used today in the age of Machine Learning? and what is the relation between them?
99. For avoiding programs of the operating system to get stuck, system users use a. trap b. timers c. process d. programs
Transcribed Image Text: Write a php program to print the current time with
hours, minutes, second.
The time format must be hours:minutes:seconds
The program takes the masses of two objects and the distance between them to determine the gravitational force acting between the objects.
Write a short note on UNIX Operating system? Identify and explain 6 utilities to create and manage files in the UNIX OS.
Computer Science: What is the reason that sometimes much more space is reserved for a numeric field than any initial values stored.
234. Solaris 10 is the most successful commercial a. Linux Implementation b. UNIX Implementation c. Window Vista Implementation d. Microsoft Windows Implementation
Transcribed Image Text: List all 3-tuples in the relation {(a,b,c)| abc = 6} where a, b and c are all positive
integers.
Transcribed Image Text: The same slicer needs to be on every single page in order for them to by synced?
True
False
Don’t copy Transcribed Image Text: In 555 timer ,if vcc=51, the lower comparator triggers when the trigger input(pin2) voltage reaches
below
volt
5. Choose the correct data type for the value 12.21 from the given options: a) bool b) int c) float d) string
Computer Science: How would you remedy a scenario where an organisation currently lacks the capabilities essential to make a project technically feasible?
Determine the value of text.at(0), text.at(3), and text.at(10), assuming for each one that text is of the following string: The good ship
Write a function that returns of multiples of n in given list. Ex: [12,41,63,21,52,17,18] n=3 Answer:12,63,21,18 WRITE IN PYTHON AND SHOW OUTPUT
How many bytes would it take to store the following text using ASCII? “Holy cow! The brown fowl jumped over the moon”
1 Transcribed Image Text: The animated file format of the image is:
a. GIF
O b. PNG
c. JPG
O d. MP4
Transcribed Image Text: 3
Convert the fractional binary number
0001.0010 to decimal.
O 1.125
O None
O 1.5
O 1.4
O 1.25
The term “distributed denial of service attack” refers to an assault in which a single individual orchestrates the destruction of a service.
If 2 1.4567 =b, then what is 2 3.4567 ? a. b 2 b. b 4 c. 2b d. 4b e. b+4
In Python language- Take input two strings from user and form a new string by concatenation of reverse of both the strings.
Transcribed Image Text: 4. What are the attributes of good software? [Possible Multiple
Answers]
Easy to understand
Easy to use
Dependable
Maintainable
Write a program in JavaScript to convert the 1 st letter to capital of a given string and print the new string.
What are some of the arguments that some database management professionals use to argue against the practice of denormalization in their work?
Transcribed Image Text: Q2) a- Obtain the inverse z-transform of the function
100z
F(z)=
(z+1)(x+2)(2+3)
using partial fraction technique and
ztransform table.
Exeperts if you know ? then Answer else downvote Applets and events handling Give the sources of action events and item event
6 Non – Masking: interrupt with priority lower than current priority is not recognized until pending interrupt is complete.? ???????? True False
Transcribed Image Text: Explain the functions of following instructions of PIC16 with example of each:
SUBWF , INCFSZ, BCF, CALL, MOVLW, RETFIE
What is the effect of a data leak on the security of the cloud? What can you do as a preventative measure?
24. In IPV 4, the IP address 200.200.200.200 belongs to a. Class A b. Class B c. Class C d. Class D
44. A form can be used to a. modify records b. delete records c. format printed output d. All of the above
Draw FA for the language that only accept L = {01, 011 , 100} over ? = { 0 , 1 }
Write a program in assembly language to put the value 55H into 10 RAM locations starting at RAM address 140H. Use POSTINC0.
Design the digital circuit that collects three 4-bit numbers and displays it on the Hexadecimal 7-segment display, using the necessary integrated circuits.
15. When your computer stops working suddenly, it is referred to as a __________. a) crash b) die c) death d) penalty
Create a dataframe of ten rows, four columns with random values. Write a Pandas program to display the dataframe in Heatmap style
In multimedia, standard construction components are critical. Demonstrate how multimedia components may be utilized to build an interactive website for your organization.
1. What are reflex agent, model-based agent, goal-based agent, utility-based agent, and learning agent being used for in the real world application/products?
Look at daisy chaining, polling, and separate requests for communication dependability in the case of hardware failure in three bus arbitration methods
259. Which of the following is the Characteristics of good software? a. Transitional b. Operational c. Maintenance d. All of the above
Determine the time complexity of the following algorithms: Transcribed Image Text: Algorithm
Kruska?’s algorithm
Prim’s algorithm
Best Case
Average Case
Worst Case
Explain why the following hyperlinks (URL) are not very safe, and how will you make them secure: http://www. com/ distributor/distributor.asp?distID=123 http://www. com/changepassword.php?userID=123
If return statement is not used inside the function, the function will return:
a.
None
b.
Null
c.
Arbitary value
d.
0
List desktop windows version with there year of release which are released after windows 98 second edition. Note also add their logos
Write a program to interpolat the string . You can assume that you had two strings and print the results after operation
For the following data set {25, 74, 45, 65, 17, 31, 64, 50}, Perform insertion sort and write output of each iteration.
d) Write a Python program to accept a filename from the user and print the extension of that. Input: Random.py Output: Py
In this section, we’ll talk about specialist apps including graphics programs and video game creation tools as well as web authoring tools.
Transcribed Image Text: B: Write a program to search for a number into List Box. (Use While).
The Nunber is lound
Seach
Make Link list by displaying 0 9 0 7 2 0 0 1 and then perform addition and deletion functions in C++.
113. The __________ cellular phone system will provide universal personal communication. a. first-generation b. second-generation c. third-generation d. none of the above
Was the phrase “important consideration” intended to convey anything specific to you? This is especially true in the area of software engineering.
What is the difference between two-tiered and three-tiered architectures, and where are the four essential functions of a computer application located? Explain.
28. please explain Transcribed Image Text: The time complexity to find an element in a BST is always O(log n)
True
False
Transcribed Image Text: 1. Which of these factors may affect perfective maintenance. [Multiple Answers]
Team stability
Ethical responsibility
Hardware Specifications
Program structure
Transcribed Image Text: Question 3
If A is a Boolean variable then A+0 is equivalent to
O a A
Ob. A’
Od.0
Write a C++ program that prompts the user to positive numbers, then it will display the sum and the average of them.
What is the purpose of formal methods? At least four justifications for the use of specifications in software development should be provided.
Prepare a paper titled “Functionality Requirement Analysis” that educates technical personnel about the necessary capabilities for consuming, manipulating, and producing application data.
4. Choose the correct data type for the value 12.21 from the given options: a) bool b) int c) float d) string
(Compression) Explain why it is better not to use Huffman coding for messages whose characters have an equally distributed probability of occurrence.
What do you call software that is intended to offer a particular feature for usage by a large number of distinct customers?
Find the middle of the tools with 5,6,3,2,7,8,5,4,5,7 elements integer to 0400h assembly document recording some 0450h. (JE branch can be installed)
i need the answer quickly Transcribed Image Text: ng
Hew/wike anagacithen which adlds_the qiven two
muimburs (x4and_reluns the Sum in the
given_variableX
What is the advantage of using data striping in RAID (Redundant Arrays of Independent Disks) systems for all levels? Explain in detail.
Which tuples with null values for the title property are included in the query select * from student natural full outer join?
Implement a program to tokenise a text input from user and place each token in a tree. Print the sorted tree elements.
A A A A A A A A A A A A A A A A WRITE JAVA PROGRAM FOR THIS PATTERN
Write C++ program to print the pattern shown below in output using loops. ***** **** *** ** * ** *** **** *****
What would it take for a company to run its own private cloud? What are the normal steps that someone might take?
Asynchronous I/O activity is a problem for certain memory management techniques such as base/bounds and paging. Give a solution to the problem.
Q.2.5 Create the pseudocode that will demonstrate how an application will write your name and surname to a text file called “students.dat”.
502. gh rate of page-fault for a process results in a. Low performance b. gh performance c. gh cost d. Low cost
Transcribed Image Text: Function F is given F= m0 + m3 + m6,
Implement F by using a decoder. Draw logic diagram.
438. Concurrent execution of multiple jobs in a single-user system is known to be a. Multitasking b. Multischeduling c. Multiprogramming d. Multiprocessing
What do you call software that is intended to offer a particular feature for usage by a large number of distinct customers?
What does it mean to have an overlay network? Is there a router included with this? Where do the overlays’ edges lie?
Transcribed Image Text: Which of the following function is used to find the first occurrence of a
given
string in another string?
What character string does the binary ASCII code 1010100 1101000 1101001 1110011 0100000 1101001 1110011 0100000 1000101 1000001 1010011 1011001 0100001 represent?
List of three Conditions to check wheather a relation that is in the first normal form is also in second normal form.
Transcribed Image Text: What is the output of the following C++ code?
int num
63B
cout << (num + 5) / 2;
When we plan to employ a software package rather than bespoke development or outsourcing, should the analysis process be abolished or reduced?
Write a program to take input two integers from user and print the result formed by doing XOR of both these numbers.
B9 Write a program that reads a file and find out the total uppercase, lowercase, whitespaces and digits occurred in the file.
Write a Python program that shows how many of 3 integers are equal to each other. WRITE IN PYTHON AND SHOW OUTPUT
Mention if there any possibility of sequential scanning of data based on several sorted orders with a sequential file organization or not.
Transcribed Image Text: TRUE or FALSE – A pointer can be used to access elements of an array.
Select one:
a.TRUE
b.FALSE
3. Write an if statement that assigns 0.4 to commission if sales is greater than or equal to 10000. In C++ language.
There is no field for service fees in the Solmaris database. Which table would you put the service charge information in? Why?
27) Exception reports are generated when a performance metric falls below a minimum threshold level of performance. True or False? True False
The performance set may be a single cell or range of cells in some kind of excel analysis A) true. B) False
Transcribed Image Text: Use the recursive reasoning to find the big O of T(n) given
2n
+T
3
T(n) = T
3
What does Windows XP mean when it refers to a backup of the critical system files needed to operate the operating system?
One of the advantages of using decorator pattern is that it may result in having too many classes Select one: True False
A computer executes operations by comparing data elements and then taking predefined actions based on the results. Is it logical to explain?
Briefly discuss the benefits and the challenges of the listed enterprise applications: Enterprise systems Supply Chain Management (SCM) Systems Customer relationship management
Solve it fast fast plz Transcribed Image Text: Changing only function parameters and using the same function name is
called
in polymorphism.
90. In _______encoding, we use three levels: positive, zero, and negative. a. unipolar b. bipolar c. polar d. none of the above
34. The information to be communicated in a data communications system is the _______. a. Medium b. Protocol c. Message d. Transmission
lf an 8086 running at 5 MHz performs bus cycles with two wait states, what is the duration of the bus cycle?
Please give handwritten Transcribed Image Text: A function in pure python (without libraries) implementing the multiplication of two 8-bits numbers
in GF(2^8).
A password manager stores encrypted passwords in what format? Is it a local, a web site, a clod, or a USB drive?
Given the boolean function A.B.C.D+A`.B.C.D+A.B.C`.D+A`.B.C`.D+A`.B`.C`.D+A`.B.C`.D`+A`.B`.C`.D` use a Karnaugh map to derive a simpler equivalent expression as sum of products product of sums
Create a list of four reasons why a systems analyst may wish to sample data or choose representative candidates for an interview.
In Python language- Take input two strings from user and form a new string by concatenation of reverse of both the strings.
43. ______ cables carry data signals in the form of light. a. Coaxial b. Fiber-optic c. Twisted-pair d. none of the above
Transcribed Image Text: Write the Babylonian numeral as a ndu-Arabic numeral.
Babylonian
Symbols
ndu-Arabic
1
10
Symbols
The equivalent ndu-Arabic numeral is
Transcribed Image Text: Which of the following is a Machine Learning Tool?
a. SQL
O b. Spark
c. Excel
O d. Tableau
Transcribed Image Text: Statement :
Write a program to generate a delay of 0.4 sec if the crystal frequency is
5 MHz.
How will the internet of things (IoT) impact our everyday lives? Give an example of a smart gadget or application to explain.
Which Datalink sublayer encapsulates data and provide media access control?
a.
MAC sublayer
b.
LLC sublayer
c.
TCP sublayer
d.
IP sublayer
Transcribed Image Text: Apply the depth-first search algorithm to the following graph starting at node F.
A
C
D
G
E
F
What is the 8085 Assembly Language Instruction That do the follwing Loads 16-bit data in the register pair designated in the operand.
Discuss some of the most important information system problems to be aware of, as well as the best methods for addressing them.
….. combine increment and decrement operations with assignment. Mixed-mode assignments Abbreviated assignments Assignments with function calls RHS of the assignments Thank you.
I need the answer as soon as possible Transcribed Image Text: Write a Java program that
converts numbers from decimal
to binary
What is the difference between two-tiered and three-tiered architectures, and where are the four essential functions of a computer application located? Explain.
Transcribed Image Text: Which type of network supports
?transmitting voice, video and data
LAN O
MAN O
WAN
All the above O
if it is true or false: a) The very first step in every programming job is to begin coding in some kind.
k. You assign an access key by including an __________ option in the control’s caption or identifying label. @ # $ &
Two massively powerful computers are transmitting and receiving data. Can we still have congestion? (Answer “how?” with yes or no and explanation).
What are some of the potential signs that the operating system on a laptop has been hacked and how can you tell?
ASAP Transcribed Image Text: Write a js program to check whether two
given integers, whether one is positive and
another is negative.
Transcribed Image Text: Write a function to find the largest integer among three integers entered by
the user in the nain function?
What is a Cache, and what does it do? Use of parallelism and/or locality, or a combination of both, to enhance performance
Based on yearly polls and surveys funded by businesses that offer agile solutions, write an overview of the usage of agile methods.
91. A _______ is a device that operates only in the physical layer. a. passive hub b. repeater c. bridge d. router
Recognize common issues that students can encounter with their smartphones and how mobile device management software may assist them in resolving them.
Transcribed Image Text: Data inconsistencies occur when different
versions of the same data appear in the same
place.
Select one:
True
False
Which tuples with null values for the title property are included in the query select * from student natural full outer join?
Give two examples of computer applications that would benefit from a connection oriented service.Give two instances where a connectionless service is optimal.(…)
180. In representation of text symbols, each set of the bit pattern is called a. Code b. Unicode c. Coding d. sequence
False part shoul display “Invalid mark”. If some other number is entered apart from 0 to 100. What is the spreadsheet formula?
Write a Javascript program to prompt the user to enter 3 integers and in output print the largest of all three numbers.
Select four replacement algorithms, and provide their names and descriptions. In order to arrive at a deeper understanding, do a side-by-side comparison.
Simplify the Boolean equation M = W’XY’ + WXY’ + XY’Z using Boolean identities and theorems to show that M = XY’
In multimedia, standard construction components are critical. Demonstrate how multimedia components may be utilized to build an interactive website for your organization.
Given the instruction A000h MOV M, A, complete the timing diagram below by drawing the signal for ALE, RD, WR and IO/M:
These days school children use the electronic gadgets. Create a guideline for them so that they can avoid in social engineering attack?
A storage device which is used to store data & information external to the main storage is known as Backing storage explain?
Which of the following variable names follows the C language rules for identifier names? a. char b. 2day c. Printf d. _my_website.com
The Internet offers many benefits to business organizations. Outline two major ways by the internet can help any business achieve competitive advantage.
C program to compute the sum of two integer values if the two values are the same then return triple their Sum
Java Transcribed Image Text: Which of the following is Java archiver?
O a. javadoc
O b. jre
c. javac
O d. jar
2) A hardware implementation is required for executing the following equations, draw proper diagrams to complete your results.
1- x+y+z+a.b : R3
Write an algorithm, Pseudo code, and draw a flowchart that will read the two sides of a rectangle and calculate its area.
430. Concurrent execution of multiple jobs in a multi-user system is known to be a. Multischeduling b. Multiprogramming c. Multiprocessing d. Multitasking
Program Requirements: Given a string below, declare print it in the output in the languages mentioned. str = “Programming” 1. C language.
ASAP Transcribed Image Text: Write a program in java to get the number of
elements which presents in both the given
array
What are the new research topics for UAVs (Unmanned Air Vehicles) that requires computer science, as in image processing, video analytics, etc?
It is possible to transmit an array of attribute values to the console screen buffer’s consecutive cells by using which Win32 method?
One of the most often used scheduling algorithms is Round Robin. i)Use a real-world example to explain the Round Robin scheduling method.
Prepare a paper titled “Functionality Requirement Analysis” that educates technical personnel about the necessary capabilities for consuming, manipulating, and producing application data.
503. Limiting powers of conventional memory management schemes suffers by a. Two limitations b. Three limitations c. Four limitations d. Five limitations
Which of the following search methods has the lowest space complexity (worst-case)? Select one: a. breadth-first b. A* c. bi-directional d. depth-first
How can data written on a device that only allows sequential access be converted to a device that only enables direct access?
What are some of the potential signs that the operating system on a laptop has been hacked and how can you tell?
Transcribed Image Text: It is desired to clear the accumulator contents of a SAP-III computer.
Explain the possible instructions for this purpose.
Write a MATLAB program to print the determinant of transpose of the matrix: 1 2 8 4 5 0 1 8 7
A typical modern computer uses A. LSI chips B. Vacuum tubes C. Valves D. All the above E. None of the above
In what ways are WFH (Work From Home) and remote learning being hindered by recent cyber-attacks and how can they be avoided?
39. The _________ product defines the number of bits that can fill the link. a. bandwidth-period b. frequency-amplitude c. bandwidth-delay d. delay-amplitude
Identify the two main Sub Methodologies in Six Sigma that you would recommend to a friend in a service company to use
The bridge between the logical and physical views of the data is provided by: a. DBMS c. SQL b. records d. tables
a) What is System Call? How it is handled by Operating System? b) Differentiate Between Distributes operating system and embedded operating system.
What is the difference between two-tiered and three-tiered computer application architectures, and where are the four basic computer application functions located? Explain.
write a series of instructions that will output FFH to an output port located at address B000H of the I/O address space.
9 Transcribed Image Text: In ASK demodulation, the circuit which gives a square data signal at the output is called a
circuit.
write a report for Symmetric and Asymmetric Keys and should also include programming cods and demonstration related to Symmetric and Asymmetric Keys.
Write a function that receives an integer. The function must return a string containing the hexadecimal representation of the integer. Preferred: C++
You have to read a file and print it in console using input stream in java and write a program for that
167. In BPSK, we use a polar Non Return to Zero (NRZ) signal for a. Decoding b. Encoding c. Modulation d. Demodulation
The sum of the numbers (112) 3 and (220) 3 is ( ) 3 and their product is ( ) 3 .
(Reg D+ Reg E ) X (Reg B + Reg D)Reg B = @3000H. Write the assembly language and run to simulator
Systems development involves many cross-lifecycle tasks critical to any project’s success. Identify each, explain its value, and describe its stages of usage.
Transcribed Image Text: What function do you use to convert an string of ASCII characters to an integer?
strcat()
strcpy()
atoi()
atof()
Give an implementation of the size() method for a DoublyLinkedLIst class, assuming that we did not maintain size as an instance variable
Transcribed Image Text: Please tell the below difference as per the salesforce.
How many triggers can be made on the same object?
Q4. Write three functions to find “ Father, Left child and right child” of Binary tree using an array implementation. SUBJECT:data structure
How do I write a CGI script that uses Python to print out an HTML table with 10 Rows and 10 Columns.
An explanation with a graphic illustration Why is software engineering even necessary? It is difficult to overstate its importance in software development.
Is this statement true or false? The fields, attributes, and methods of the derived class are passed down to the base class.
Transcribed Image Text: The
function prints to the console and then returns to the next line.
O System()
out()
print()
O println()
Apache is a popular example of networking software of what type? a. Web server b. Browser c. Email server d. Email client.
Transcribed Image Text: Find the largest among three different numbers entered by user.
1- Draw the flowchart.
2-Write the corresponding pseudo code.
Repeater operates in which layer of the OSI model? a. Physical layer b. Data link layer c. Network layer d. Transport layer
Transcribed Image Text: Which Python function will accept the user input as a string?
O CopyParameter()
O SetParameter()
O GetParameter()
O GetParameterAsText()
Transcribed Image Text: 21
If logical address is 215 and relocation register is 1215 then physical address will be:
1000
1430
430
Hello help me writing a program that takes the text file name from the user and reads the contents of that file.
Artificial Inteligence Transcribed Image Text: The path using DFS from A to H *
B
D
A
F
ABSGH
O ASCGH
Other: