ls when there is a lengthy listing of items?

Is it true or false? Even

What is the best way to tell which objects are directories in the output of ls when there is a lengthy listing of items?

Is it true or false? Even if its Boolean value is false at the start, the while loop always executes at least one iteration.

Transcribed Image Text: RAM is a storage represents:
O a. Long-term
O b. Short-term
O c. Medium-term
Od. Short-term and long term
Ouestion 9

Simplify the following boolean algebra, ((A+C).(D.B)) + ((C.A).(B+D)) to a circuit that only uses NAND, NOR, or NOT gates and simplify them if possible.

Python Write a program to take a number from user and calculate its 1/4  root  and print the output The number is floating type

Which of the following keywords and relational operators is used by SQL when performing wildcard matches? 1. EQUAL 2. LIKE 3. MATCH 4. =

Transcribed Image Text: In Priority queuing; scheduler will always choose a process of lower priority over one of higher priority
Select one:
a.FALSE
b.TRUE

write PHP script to create a mysql database and create a new table. The Student table consists   of three fields : StudId, StudName, Marks.

A Multimedia Project is identified as Linear when the user has no control over the content that is being shown to them true False

write a STRUCTURAL verilog code to find 1’s complement & 2’s complement for a variable ( compile verilog online is prefered to use !)

Problem 12. What is the size of a boolean variable in C++? a) 1 bit b) 1 byte c) 4 bytes d) 2 bytes

A string object’s functions may be used to find out the location of a substring when it is a substring of another string object.

Create a C++ program using classes and objects that determines if the number is prime or not. please include the pseudocodes with detailed explanation.

write n 3 function code. show the algorithm run n 3 times, please give the full and right code, also run this code. screenshot.

What protocol is used to retrieve email messages? What does SNMP define to be sent from a manager to an agent and vice versa?

Q.3) write Java program that will draw horizontal line using the symbol * which consist of 12 stars just like the figure below: ************

need detailed and unique content dont answer without 100% knowledge Transcribed Image Text: How the sentence in CNF is written in logical agents ?

SUBJECT:DIGITAL IMAGE PROCESSING Transcribed Image Text: Given image below, Write down the 8-Chain Code and Find Shape number of
it?
Given Image
8-Chain Code

A string object’s functions may be used to find out the location of a substring when it is a substring of another string object.

For the given keys, draw a BST. Assume the keys are inserted in the following order: HLOSBKTADMR Draw the tree and upload the image.

380. Sequential access files are often used with media devices such as a. Hard disk b. WORM disk c. Magnetic tape d. Zip tape

Transcribed Image Text: Assume that XTAL = 11.0592 MHz, write a program to generate a
square wave of 2 kHz frequency on pin P1.5.

Transcribed Image Text: b) Write the time complexity for each of the following algorithms:
{ Counting Sort
Merge Sort
Selection Sort
Binary Search }

Write a C++ program to arrange fruits names in ascending order. Input will be given by user. Use array to perform the given task.

B2. Convert the following JavaFX code segment of Lambda expression into an inner class. Button btn = new Button(“OK”); btn.setOnAction(e->{ System.out.println(“Hello World!”); } );

Explain what the term “firewall” means in the context of network security, as well as how it is used in network architectures and designs.

Transcribed Image Text: Which of the following variables is a python reserved keywords?
a.
name
O b.
import
O C. num
O d.
custom_calc

Will you provide accurate and comprehensive responses? otherwise, it was a negative vote Discuss the most important characteristics of HTTP in a concise manner.

python program Write a program for we have a time from 1970 1 jan find the date and time from that time is 12255121212

Need correct Answers else downvote surely Construct a DFA accepting the language: {W € {a, b)*: W has both ab and ba as substrings}.

2. To access the services of operating system, the interface is provided by the a. system calls b. API c. library d. assembly instructions

12. The step-by-step instructions that solve a problem are called _____. a. A list b. A plan c. An algorithm d. A sequential structure

185. ………………… allows LAN users to share computer programs and data. a. Communication server b. Print server c. File server d. None of these

Write an essay about a computer related topic and explain its importance, its background and statements about the topic. Should be 300 words minimum.

Consider the schedule S given below S: r?(X); r?(Y); r?(X); r?(Y); r?(Z); w?(Y); w?(Z); r?(Z); w?(x); w?(Z) Find schedule is conflict serializable or not.

1. What is a series system? Explain the logic behind its architecture. 2. What is a parallel system? Explain the logic behind its architecture,

Given the parallels between network sniffing and wiretapping, which is the most appropriate term? What is it about them that makes them passive threats?

a ) Draw the SR latch using NAND gates and write the truth table .

b)Convert the decimal NUMBER 1846.8125 to binary number .

315. Several programs run at same time and storage is shared especially in a. microcomputers b. mainframe computers c. inquiry computers d. dump computers

Write a pricing algorithm for item A and the amount you bought. The algorithm shows the cost, including a sales tax of 6 percent.

Correct and detailed answer , no plagarism please…I will Upvote. Thank you! Transcribed Image Text: Explain the concept of decision tree learning with
example

Differentiate the following two functions in bullet points (when and how to use, definition and declaration)? Static function Friend function NOTE:subject:object oriented programming(oop) Deptt:CS/IT

Transcribed Image Text: Write a java program that accepts two
double variables and test if both strictly
between 0 and 1 and false otherwise

Is it true that if a programming language has a while statement, it does not need an if statement? Explain your answer in detail.

Which of the following would return the last character of the String x? Group of answer choices x.charAt(0); x.charAt(last); x.charAt(length(x)); x.charAt(x.length( )-1); x.charAt(x.length( ));

Write a program in c++ that takes a number from user and prints the number in reverse order: [nt: 532245 in reverse order 542235]

use assembly language 8086 to Write a program loads the block of memory locations from 0A1000H through 0A10FFH with number DDH using STRING INSTRUCTIONS

Write a  Description for any 5 design patterns every pattern’s description should inlcude UML diagram advantages and disadvantages Where to use? atleast 1 example

Intro to Software Engineering When describing a system, explain why you may have to design the system architecture before the requirements specification is complete…

Want Correct and detailed  answer else downvoted…. Formal language & Automata Construct PDA For The Languages Transcribed Image Text: {wcwR: we {a, b}* }

A prototype (in AI) lets program builders explore the problem and its important relationships by actually constructing a program to solve it. True False

11. The storage structure which do not survive system crashes are ______ a. Volatile storage b. Non-volatile storage c. Stable storage d. Dynamic storage

Transcribed Image Text: The minimised form of the Boolean expression A’B’C+AB’C’+AB’C+ABC’+ABC is
O A. A+BC
? ?. ?+??
O C. A+BC’
O D. A+B’C

Transcribed Image Text: Question 39
In
an image is represented as a rectangular grid of colored pixels?
Raster graphics
Vector graphics
Scaling
O Translation

Design a 8085 based system to generate an alarm if smoke is detected at either of the sensors deployed at a G+3 storey building.

Given the parallels between network sniffing and wiretapping, which is the most appropriate term? What is it about them that makes them passive threats?

Why is it important to reinstall the OS on a notebook from the recovery media rather than use a retail version of the OS?

15. A small graphic which represents a computer program, drive, folder or document is known as a. button b. icon c. picture d. logo

By using your knowledge of the Internet checksum, can you find a transmission error that will not be detected by the Internet checksum ?

Distinguish between the danger of poor assumptions, what may happen if the assumptions are wrong, and how agile techniques can assist prevent these problems.

Write a C++ program that takes an integer from user and check whether the number is multiple of 4 or not using bitwise operators.

Write algorithms and flowchart images to Read the employee’s name (NAME), Clock overtime, no-go hours (ABSENT) and Specify the payment of the bonus (PAYMENT)

Describe the process through which floats with a single precision are saved. In what Assembly data type are single precision floating point integers stored?

202. Which of the following should describe the technical terms used in the document? a. glossary b. index c. user requirements d. system architecture

Servers handle requests for other domains a. directly b. by contacting remote DNS server c. it is not possible d. none of the mentioned

Correct and detailed Answer Will be UP VOTED else DOWN VOTED Explain the criteria used to evaluate the performance of algorithms for mutual exclusion.?

21

Tax declarations which can only be done at the counter is an example of lateral-channel service penetration
Select one:
a. True
b. False

Write a python program to take input two strings from user and form a new string by concatenation of reverse of both the strings.

What are some of the dangers that data security is exposed to? Then we’ll talk about what we can do to avoid such risks.

Which of the following can be used to deploy UWP apps? a. Group Policy b. Microsoft Store c. MSI files d. The setup.exe file

None Transcribed Image Text: 5. Write a program to read three numbers and prints the bicgest one.
????? ????? ????? ?? ????? ????? ?????

List the services on the internet that make communication more convenient for you. Write out a short description of the features of your smartphone.

How does computer organization differ from computer architecture? Explain the many building blocks of the computer, including the CPU, the hard drive, and RAM.

A knowledge-based reasoner whose analysis is founded directly on the specification and functionality of a virtual system is called a model-based system. True False

Transcribed Image Text: Find a context free grammar with no useless symbols equivalent
S> ABICA, ? > ????, ? — ?, ? > ??b

Evaluate cloud-specific security problems and possibilities. Provide concrete instances of risks, hazards, and vulnerabilities that might exist if the company transitions to the cloud.

Transcribed Image Text: Example: show the control signals needed to perform Add R1, R2, RO using:
a. Three bus organization
b. One bus organization

1-What should be considered in terms of network failure and abundance? 2-What responsibilities and features are required to safeguard network resources and private data?

Transcribed Image Text: QUESTION 12
Find the error, if any, in the following IPV4 addresses.
200.40.11011011.31
199.40.11.1.1
201.40.50.050
TTT Ariat
3 (12pt)
vT E

program takes an upper range and lower range and finds those numbers within the range which are divisible by 3 and multiple of 2.

What does it mean to be secure? What are some of today’s most urgent physical security concerns? Organizational attacks may come in many forms.

Question 20 ASK with more than two input levels allow a data transmission faster than an ASK with only two input levels. True False

66. Two common scrambling techniques are ________. a. NRZ and RZ b. AMI and NRZ c. B8ZS and HDB3 d. Manchester and differential Manchester

Transcribed Image Text: 3. Write a script that shows how a


type newElm element can be created and
inserted before the currentElm element.

I’m not familiar with the concept of multimedia systems, so please explain. Why is a multimedia system useful and what difficulties does it face?

Is this true or false? When a column in a database table does not contain any data, it is referred to as being null.

Q :  How Iterative waterfall Model is better than the Classical Waterfall                    Model. Explain your answer? List any five advantages of Iterative                       Waterfall Model?

When developing a complete Information Security strategy for your MIS, what cyber security risks will you be anticipating and preparing for are the following:

371. The user can load and execute a program but cannot copy it. This process is? a. Execution b. Appending c. Reading d. Updating

We can insert any batch of N keys into an empty binary search tree using at most 2N compares. Select one: True or False

6) Add and multiply the following numbers without converting them to decimal: (a) Binary numbers 1011 and 101. (b) Hexadecimal numbers 2E and 34.

1. Define Data Abstraction.
2. Who is called End-users?
3. Explain the advantage of using database approach.
4. Define Access path?
5. Define Schema?

4. Write a program in C++ to find the sum of digits of a number using recursion. Note: You have to use Function Mustttttt

Write an if /e l se statement that assigns Oto x when y is equal to 10. Otherwise it should assign 1 to x.

2_b Write the time complexity for each of the following algorithms: { Counting Sort – Merge Sort – Selection Sort – Binary Search }

Design 8051 based system for following specifications i)32 KB ROM ii)32 KB RAM Show detail memory mapping and draw an interfacing diagram in detail.

Transcribed Image Text: When using a printf() statement, what syntax do you use to print the value of a
“float”?
%d
%s
%c
%f

None Transcribed Image Text: Write HTML code to insert an image on internet page and make it a hyperlink
opened in the another page

Examine the potential advantages and disadvantages of implementing wireless solutions. Provide at least two different options for wireless communication in the network to consider.

How many ways you can arrange the letters of the word EXECUTION such that vowels occur together but they occur between two consonants ?

Transcribed Image Text: Which of the following is an explicite output control?
O a. TextView
O b. CheckBox
O c. RadioGroup
O d. Toast

When installing a second hard drive, you discover that the hard drive is not connected to the motherboard. How do you choose a cable?

44. What does the reciever use to extract frames from the bit stream? a. reverse lookup b.character stuffing c. MAC padding d. Big endian

SQL databases adhere to ACID characteristics, which assure the reliability of database transactions and the integrity of database data. Is this true or false?

Implicit and explicit-attached Transcribed Image Text: Discuss the differences between implicit and explicit linking and
explain how each can be achieved in system programming.

137. All modern computer systems that are available provides support of a. symmetric multiprocessor b. single processor c. master slave relationship d. symmetric multiprocessing

Define the following function Transcribed Image Text: 3. void insert10BeforeNeg(int array[], int size);
inserts 10 before the first negative number in the array list

Write SQL query to Delete the details of all Employees working in Mining Department in the table Employees ( EID, EName, Address, Contact, Department).

Both DOS and Linux have multiple commands for managing the file system, what command is used in DOS to create a new (sub) directory:

Transcribed Image Text: Question 4: Write a program Using C# to perform addition, subtraction, multiplication and division
of given two numbers using switch statement.

The individual application modules included in an ERP system are designed to support_________, the most efficient and effective ways to complete a business process.

Explanation of why the system architecture may have to be designed before the requirements specification is complete should be included when discussing a system

65. ________ provides synchronization without increasing the number of bits. a. Scrambling encoding b. Line coding c. Block coding d. None of the above

Which of the following is used to find the absolute value of the argument in C++? a abs() b fabs() c mod() d ab()

C++ Transcribed Image Text: Question 6
What loops will always execute at least once?
for
B
do
while
100%
P Type here to search

?

we first have to differentiate between the information-transaction-service (ITS) front desk, and the administration-system-people (ASP) back desk,
Select one:
a. False
b. True

Which feature of python explains that you can run the program directly from the source codes?

a.
portable

b.
extensible

c.
interpreted

d.
object-oriented

Kenneth H. Olsen is considered the ‘father’ of the minicomputer and one of the founder fathers of the modern computer industry world-wide? Explain ?

None Transcribed Image Text: Write a Fortran program to read a
number and to find out if the number
is positive, negative or zero

According to Howard Gardner’s multiple intelligence theory, there are various types of intelligence, Explain in your own words the six (6) types of intelligence

What is the general term of Blind searching? Select one: a. Uninformed Search b. Heuristic Search c. Informed Search d. Informed & Unformed Search

Transcribed Image Text: To represent hierarchical relationship between elements, which data structure is suitable?
a. Deque
b. Priority
C. tree
d. All of above

Question 2 Describe the signal pattern produced on the medium by the Manchester-encoded preamble of the IEEE 802.3 MAC frame. Explain the term handoff

What are the differences between starting a data modelling project with a packaged data model and starting one with a blank piece of paper?

Hello sir can you Help me answer this question? Transcribed Image Text: Explain how computers receive information from outside world, manipulate and store it.

Subject: Software engineering
Question: As a software engineer, describe a scenario for School Counseling system and also suggest an appropriate software methodology for it.

Help need answer in python Write program prints the sum of negative numbers, positive even numbers and positive odd numbers in a given list.

program takes an upper range and lower range and finds those numbers within the range which are divisible by 3 and multiple of 2.

What is specified in the data manipulation language (DML) for the database management system (DBMS); what are the methods used to process data explain?

Asap Transcribed Image Text: Write a java program to print java is best
language to learn without using of ; over the
whole code

Give four reasons why data modelling is important, if not the most important, element of the systems development process, according to many system designers.

Use One Time Pad cipher with a key “ peace be on the chosenP ” to encrypt   “ Corona Virus on the Air “

Transcribed Image Text: Which of the following miss is definite to occur in cache memory?
Compulsory miss
Capacity miss
Conflict miss
All of these

State whether the following are true or false. If false, explain why. a) Two pointers that point to different arrays cannot be compared meaningfully.

How logical instructions should be routed via a suitable and systematic method in order to produce higher-quality software at the conclusion of the process.

Transcribed Image Text: 4. Write the code to create the following ragged array, given the following table.
9.
8.
6.
7.
27
34
56

Kerberos is an authentication service developed for project Athena. (a) Why Kerberos is needed? Explain your answer in terms of problems, threats and solutions.

Transcribed Image Text: Run Dijkstra’s algorithm on the weighted
graph below, starting at vertex A. Show
every step in the algorithm.
10
13
4

In the slow-start algorithm size of the congestion window increases _______ until it reaches a threshold. 1. exponentially 2. additively 3. multiplicatively 4. suddenly

Transcribed Image Text: “IS MARRIED_TO” Relationship is known as Recursive relationship?
IS MARRIED_TO
1
1
wife
husband
PERSON
Select one:
O True
O False

Define the Cloud Computing Service Models. Discuss how the abstraction and control levels of these  service models differ with the help of a diagram.

Asap Transcribed Image Text: Write a python program to find the os on
which the python compiler is running.Is it 32
or 64 bit?

507. General-purpose computers run most of their programs from rewritable memory, called a. Main memory b. Secondary memory c. Peripheral memory d. Primary memory

Transcribed Image Text: QUESTION 7
A SELECT clause permits
All of these
Calculated fields
O None of these
O Formatted fields
Raw data fields

67. The most creative and challenging phase of system life cycle is a. Design b. Maintenance c. Feasibility study d. None of the above

(10) Omantel company wants to contact the organization that is developing the internet standards. What are the different organizations for developing the internet standards?

Thoroughly discuss the functions of the following software-based security threats: I ransomware Ii backdoor iii adware iv rootkits V keyloggers vi spyware vi worms

Transcribed Image Text: What is the output of C Program.?
int main()
{
int k;
for(k-1; k <= 5; k++); printf("%d",k); return 0; Answer: 28 The electronic transmission of income tax returns is an example of a citizen to administration interaction pattern. Select one: a. False b. True 27. SCSI system is the abbreviation of the a. small common-system interface b. small common-system interaction c. small computer-system interface d. small computer-system interaction python program Write a program for we have a time from 1970 1 jan find the date and time from that time is 12255121212 Transcribed Image Text: Given the following 5 trees: B Which of them have the properties of a Complete binary tree? Complete binary tree: . How much memory is needed to store an Array than a linked list. a. Equal b. Less c. More d. None of the above I need the answer as soon as possible Transcribed Image Text: 2. What do you see as the future of AI? Justify your answer? Object-oriented design methods should be set up in such a way as to emphasize modeling, but less on procedure. Tell me one good reason. java program Transcribed Image Text: “Wrapping code and data together into a single unit” Comment on this and give an example for the same. 180. The information about data in a database is called _______ a. Metadata b. Hyper data c. Tera data d. None of the mentioned Given the parallels between network sniffing and wiretapping, which is the most appropriate term? What is it about them that makes them passive threats? None Transcribed Image Text: Q2. Describe various application areas of expert system in detail. Please do it correctly. Subject: Artificial Intelligence. Unit: Expert systems Q 2. Differentiate between the following terms properly: PUSH and POP instructions. Stack Pointer (SP) and Instruction Pointer (IP). Data Shift and Rotate operation. Explain the concept of the internet of things. What makes the industrial internet of things unique? How does it compare to the traditional network? Transcribed Image Text: is a standard that 29184 describes recommended approaches for the specification of software .requirements ??????? ???????? a. True b. False O Java Transcribed Image Text: Java Write a program to find number of trailing zero in a factorial number in time complexity less than o(n) Transcribed Image Text: A B The colored area in this Venn diagram represents Select one: O a. AUB-C b. ANBNC OC. ANBNCC Od. (ANBNC) Your Python script will write to a file that already exists. What options [file modes when using the open() function] do you have available? In what way can a single individual organize a distributed denial of service assault, and what is the definition of distributed denial of service? 146. Product that software professionals built and then support over long term is a. automobile b. computer software c. computer hardware d. play station Which of the following enclose the input parameters or arguments of a function? a. brackets b. quotation marks c. curly braces d. parentheses (Python3) why we are learning this course i.e., Discrete Structures, and how it will help us in our field of studies. give a brief answer. Is it true or false? Even if its Boolean value is false at the start, the while loop always executes at least one iteration. Transcribed Image Text: 17 Type of memory can be written on it many times Note: This is a multiple-answer question. RAM ROM HDD SSD Which organization promotes the open development and evolution of the internet? a. IETF b. ISOC c. IRTF d. IAB Just answer without explanation please 31. Kernel mode of the operating system is also called a. user mode b. system mode c. supervisor mode d. both a and b create a base class and derive classes all having functions with the same name, excess the function using pointer and virtual functions using c++ Write a c program that generates all the numbers 1-10000 with the following conditions it’s 4 digits, and the number 5 is used twice During an assault on a school’s Research Record, what are the system’s or database’s vulnerability? What kind of OWASP vulnerability are you referring to? A knowledge-based reasoner whose analysis is founded directly on the specification and functionality of a virtual system is called a model-based system. True False Leverage the features of Cleanroom Software Engineering to increase your bottom line. Use Statistical Usage Testing to demonstrate the importance of Cleanroom Software Development. How the central scheduler is different from distributed scheduler? In what situations the distributed scheduler is preferred over the central scheduler? Explain with example. For what reason do we need to do exploratory data analysis? Why shouldn’t we just go right into the modeling phase?, you may wonder. What is the value of x after the following code executes? int x=10; if(x++ >10) { x =13; } a. 10                           b.9                              c.13                             d.11

27 Which of the following refers to the fastest, biggest and most expensive computers ? a) Personal Computers b) Supercomputers c) Laptops d) Notebooks

You had a set of string and your task is to convert it to array and print the array without using loop in kotlin

If it is known that the language  is not Decidable, comment on the decidability of , the complement of , and justify your answer.

Transcribed Image Text: • Define DATA COMMS.
• Significance and uses.
· Compare and contrast: ANALOG vs DIGITAL COMMS.
o Block diagram.
o Features.

379. Random access files are often used with media devices such as a. Magnetic tape b. Paper tape c. Hard disk d. Optical disk

I need the answer as soon as possible Transcribed Image Text: Q4 Write an
algorithm to read
two numbers then
display the largest.
Answer:

What has caused power supply and heat dissipation restrictions to become major design constraints for microprocessors and their associated systems is still a mystery.

HCI Pick out the attribute / characteristics of a user which can affect the systems design. a. Rationality b. Nationality c. Personality d. Perspicacity

Transcribed Image Text: Design 4 line
encoder
decoder.
nt: For
encoder
decoder 4
lines I/O can
be converted
to 2^4 or 16
1/0 lines.

Write a query to find the third-highest bonus from the Employee table. Write a query to retrive the last 3 records from Employee table.

Write a Matlab function to multiply two n-by-n matrices A and B. Run the script with your codes and screenshot your output and codes

Identify some of the difficulties involved in developing an information system infrastructure to support the new service; might cloud computing be a suitable solution?

Transcribed Image Text: Write the table of 5bit Analog to digital
converter .Specify about the input signal
and output signal clearly in the table.

Transcribed Image Text: A matrix in which there is only one row and
any number of columns is said to
* .be
matrix
??????

Transcribed Image Text: 1.
Describe the difference between predefined function and programmer-defined
function?
[Jelaskan perbezaan di antara fungsi takrifan piawai dan fungsi takrifan
?engguna?]

Please solve Quickly C++ programming language Transcribed Image Text: The value of b in below code is
;int a=3,b
:2=( a==1? a:b)
;cout < à à + | à a | b | C

What is the name of the port used by an Ethernet cable? What is the name of the port used by a dial-up modem?

173. The highest level in the hierarchy of data organization is called a. Data bank b. Data base c. Data file d. Data record

Evaluate cloud-specific security problems and possibilities. Provide concrete instances of risks, hazards, and vulnerabilities that might exist if the company transitions to the cloud.

Given: If A AND B, then C. Given: The if-then statement’s reverse isalso correct. If A is True, B is True, what is C?

Can a data leak have a significant effect on cloud security? Are there any steps that can be taken in order to counteract this?

t = 15 t = t * 2 t = t + 1 t = t – 4 put t what does this output?

Computer science What setting should a dual-voltage selector switch on a power supply be set to while operating a computer in the United States?

Write a JavaScript function that would accept a string and return the reverse of that string. example: reverse(“john doe”); – this returns “eod nhoj”

A string object’s functions may be used to find out the location of a substring when it is a substring of another string object.

Write program in f# only Please solve it Asap Please write the program to returns the larger value of two given parameters. F# only

50. Defining data requirements such as input and output is classified as a. process definition b. function definition c. print definition d. writing purpose

What advantages are there to split up a single logical message into a number of fixed packets and deliver them separately across the network?

142. Which of the following types of channels moves data relatively slowly? a. wideband channel b. voiceband channel c. broadband channel d. narrowband channel

Using HTML5 and JavaScript. Create an Html page that allows a user to drag and drop an image. The container should have rounded corners.

____ is the simplification of an algorithm’s runtime to its greatest term, giving us a function that describes the functions worst case relative growth.

Transcribed Image Text: Explain and provide picture
The equal error rate (EER)
The zero false match rate (ZeroFMR)
The zero false non-match rate (ZeroFNMR)

321. Software which controls general operations of computer system is classified as a. dump programs b. function system c. operating system d. inquiry system

Transcribed Image Text: “In testing with parameters, a contract model should be followed, what does assertions indicate.”
O Pre-condition
O Action
O Post-condition
Act

I need the answer as soon as possible Transcribed Image Text: Java
Write a program to check whether a
string is palindrome or not

241. A testing strategy that tests the application in the context of an entire system. a. System b. Validation c. Unit d. Gray box

Transcribed Image Text: Question 8
Fixed-requirement constraints in a linear programming model are functional constraints that use an equal sign.
O True
O False

From the ACM code of ethics and professional conduct, what princliples would be violated if facial recognition without consent was used in shopping malls.

Transcribed Image Text: B) Write a program to print the following pattern
A
?
D E
F
G
H
K
L M
N O

can you show how you do it step by step please Transcribed Image Text: 0 1
1 1 0
0 1
1
1
1

In your system description, explain why it is possible that you may need to design the system architecture before the requirements definition is complete…

Explain what the term “firewall” means in the context of network security, as well as how it is used in network architectures and designs.

Investigate the activities of Mafiaboy on the internet. When and how did he infiltrate these sites? What method did they use to apprehend him?

Which one of the following protocol that locates a web page on another computer? Select one: a. TCP b. IP c. TCP/IP d. URL

66. Two common scrambling techniques are ________. a. NRZ and RZ b. AMI and NRZ c. B8ZS and HDB3 d. Manchester and differential Manchester

5. The physical layer concerns with a. bit-by-bit delivery b. process to process delivery c. application to application delivery d. none of the above

What role do procedures like permutation and substitution have in encryption? Give a detailed explanation in no more than five (5) lines of text.

Does the fact that computers use binary to store information make it more challenging to understand how computers work? If so, in what way(s)?

Describe in detail three things that you may attempt if you have completed the debugging procedure but are still unable to resolve the issue.

Write a program in python to decode a string. The string is I had checked this and this is correct \x52\x9C\x85 using utf-8 decoding

The design issue of Datalink Layer in OSI Reference Model is a. Framing b. Representation of bits c. Synchronization of bits d. Connection control

mobile programing,android studio,java Transcribed Image Text: Which annotate in the interface to declare insert method from the following:
O @Dao
@Utility
O @Database
@Query

Please write a code using C++ and open CV that detects hand motion to play a game or use an app using a webcam

What is Computer Security? How it is involving in Information Security?What are attacks in Information Sec. How these attacks causes to damage data/ information

As a result of computers’ increasing power, this is possible. Describe the rise of computers in the educational system during the past several decades.

188. Privileged mode of the operating system mode is a a. user code b. kernel mode c. system mode d. both b and c

Investigate the activities of Mafiaboy on the internet. When and how did he infiltrate these sites? What method did they use to apprehend him?

Which of the following operator is used with this pointer to access members of a class? a) . b) ! c) -> d) ~

Find output. //filename: Test.java class Test{ int x = 10; public static void main(String[] args) { Test t = new Test(); System.out.println(t.x); } }

268. The bit rate for 1000 baud, FSK, baud rate would be a. 1000 bps b. 1500 bps c. 2000 bps d. 100 bps

Is it difficult to build a personal computer? Compare a personal computer with a limited budget to a personal computer with an unlimited budget.

Transcribed Image Text: Design a ladder diagram to implement the control function based on the
following truth table:
c)
Switch Light
A
1
1

Describe and provide an example of one SQL statement (other than statements already discussed) using Microsoft SQL Server. cannot be create, insert. or merge.

186. The parameter that refers to uneven delay of data packets in the delivery is a. Jitter b. Timelessness c. Accuracy d. Transmission medium

human computer interaction Read and write a review of how DECIDE framework was implemented to evaluate the system. The lms moodle: A usability evaluation

What are some of the dangers that data security is exposed to? Then we’ll talk about what we can do to avoid such risks.

Transcribed Image Text: Question#3
Write down Pseudocode that will take marks of physics, chemistry and math as input,
calculates the average and displays output.

In other words, what do you want to accomplish with the authentication? Compare and contrast the benefits and drawbacks of different forms of verification.

Transcribed Image Text: Which of the following is the plain text of the following cipher text?
DPUKVDZZLCLU
windows seven
communication
base station
windows ten

Transcribed Image Text: java
to check whether two square shape matrix
are equal or not take these entries and size from user
input
I

What does a router do when it gets a packet with a destination network address that is unknown to the router is described below.

Explain the concept of the internet of things. What makes the industrial internet of things unique? How does it compare to the traditional network?

Transcribed Image Text: Q3: Write a program to find the area and volume of the cube. And draw
the flow chart for this program.

C++ Transcribed Image Text: Question 1
Which is used to keep the call by reference value as intact?
A virtual
B
const
static
absolute

Identify the conditions that must be met in order to accurately characterise the quality of service provided by a network that handles video traffic.

Transcribed Image Text: A hacker exploits an open Bluetooth connection
to infect a user’s smartphone with a virus. What
type of data breach occurred?

DO NOT COPY FROM OTHER WEBSITES Write your own website Q. What is an Intrusion Detection System? How Does an IDS Enhance Security Management?

Multimedia systems are what they sound like. Provide an overview of the challenges that multimedia systems face and the desirable qualities they should have.

Which of the following Assembly instructions copy the content of a memory location to the accumulator? a. OUT b. STA c. LDA d. LXI

Give an example of how each of the six kinds of assaults happens on a network for each of the six types of attacks.

Distinguish between the danger of poor assumptions, what may happen if the assumptions are wrong, and how agile techniques can assist prevent these problems.

122. In flowcharting standard, first step is to chart the a. Details of program b. Main line of logic c. Terminals d. Input/output variables

Topic: Digital Systems and Binary Numbers Convert the following numbers to decimal: 1. (10111.001)2 2. (7532.42)8 Note: Show your solutions by any means possible.

Write a program in C to find the sum of the series 1!/1+2!/2+3!/3+4!/4+5!/5 using the function. Note: Limit value will enter by the user

t/f? Transcribed Image Text: In the following code, functions is a valid variable definition.
def what_to_do(x=4):
return (lambda x:x%2)(x) if x%2 else (lambda x:x**2)(x)

223. We cannot send the digital signal directly to the channel, when the channel is a. bandpass b. Bypass c. baseband d. Low pass

Critical Thinking #1. Bar Codes versus RFID Bar Codes versus RFID Carpal Tunnel Syndrome Case Study Family-Owned Coffee Shop Printer Comparison No handwritten, please

Transcribed Image Text: models use narative memos, reports, or lists to describe some aspect of a system.
Select one:
a.Graphical
O b.Descriptive
c.Mathematical
d.Structured

Infer the type of following function using ndley Milner type inference algorithm (using type rules)

fun f(a,b,c,d) = d[a(b, c)] + c[b] + 3

257. Which of the following is not consider laws for E-Type software evolution? a. Continuing quality b. Continuing change c. Increasing complexity d. Self-regulation

Solve for D using Euclid Algorithm. Transcribed Image Text: Solve for d (Show your work):
p = 17 q = 23 e = 3

Transcribed Image Text: Write a php code to check if the bits of the
given two positions of a number are same or
not

It’s because computers are so powerful. Please elaborate on how computers have become so dominant in the educational system over the last several decades.

60. In asynchronous transmission, the gap time between bytes is _______. a. fixed b. variable c. a function of the data rate d. zero

XCOPY/D : date command of MS-DOS is used to copy only files that have been modified on or after the date you specify why?

If R0 = 0x20008000, after executing STMDB r0!, {r3, r9, r7, r1, r2}, register r7 will be stored in memory starting from which bases.

Write matlab code to plot the function : y = cos 3 x + 3sinx – 1. x= 0:0.01:2*pi. Provide plot screenshot as well.

A bitmap is _______ An index of bits None of the mentioned An array of bits A function mapping all the bits of data

During an assault on a school’s Research Record, what are the system’s or database’s vulnerability? What kind of OWASP vulnerability are you referring to?

Write a program in php programming language to find the factorial of a number  and you must take take the nu. Ber from user.

Transcribed Image Text: 3. Testing individual program parts or object
classes is called
O Unit testing
Component testing
O Integration testing
O System testing

Write program in julia language Program is to perform addition of three number after making lamda function and print the results from main function

196. An internet is a a. Collection of WANS b. Network of networks c. collection of LANS d. Collection of identical LANS and WANS

Program to check whether a number is odd or even in kotlin. The number is given you don’t have to take care about input.

Punched-card equipment was first introduced in Britain in 1904 by a small company. What was the name of that company?  The Tabulator Ltd. why?

Transcribed Image Text: 8)identify the six components of the
information system which are most directly
affected by the study of the computer
security
a)software

1a. Explain what information security governance is and provide five principles for achieving effective information security governance. Discuss three aspects of computer forensics ethics.

Discuss the function of the flags register, as well as identify and describe any THREE (3) flag registers that you may be familiar with.

Give three examples of WiFi networks’ security flaws. Determine the kind of attack that might be used against each vulnerability and the associated countermeasure.

Transcribed Image Text: A derived class
methods of another class.
Select one:
O a. inherits
O b. overrides
O c. declares
O d. extends

2. Write a program in Rust programming language to print the string given below 5 times in separate lines. “Printing string in Rust. “

Describe the security measures that you are contemplating implementing to protect against the particular risks of data loss and theft that you have identified.

Perform the following operation for the binary equivalent of the decimal numbers (-14) 10 + (-15) 10 The solution in 8 bit representation ?

Transcribed Image Text: Write a java program to test that a given array of
integers of length 2 contains a 4 or a 7

Find the class of the following two IP addresses (both are classful addresses), as well as their netid and hostid: a. 104.37.3.6 b. 208.34.54.12

Transcribed Image Text: Write a php code to check if the bits of the
given two positions of a number are same or
not

1a. Explain what information security governance is and provide five principles for achieving effective information security governance. Discuss three aspects of computer forensics ethics.

for the input binary sequence (b k ) = {1,1, 1,-1} .find the transmitted phase sequence and sketch the transmitted waveform for QPSK system.

List the services on the internet that make communication more convenient for you. Write out a short description of the features of your smartphone.

program takes an upper range and lower range and finds those numbers within the range which are divisible by 3 and multiple of 2.

Which of the following commands starts up a netstat listener: Watch “netstat -an | grep 9812” Iptables -L SYNACK=sr1(ip/SYN) nc -vvv -l -p 9812

None Transcribed Image Text: 3- When we need to create circles in the vector locations of x, y, and z, we can
use code

q13) Which data structure is used in the Breadth First Traversal (BFS) of the graph? a. Queue b. Tree c. Linked list d. Stack

The CIA trend will be defined and discussed in detail, as will the three CSMA protocols and how they are implemented in traditional Ethernet.

A(n)__________ is a specialized version of a linked list in which nodes can be inserted and deleted only from the start of the list.

265. How many communication channels are needed for serial transmission? a. 1 channel b. n channels c. n+1 channels d. None of the above

Identify which type of intellectual property KFC requires to protect their recipe and outline at least two reasons this type of IP is suitable?

Transcribed Image Text: How many octets of the IP address 192.168.1.1/24
is part of host portion?
?. 1
b. 3
?.
4
d. 2

Trying to move to a cloud-based platform may be challenging for businesses. What are the drawbacks and benefits of taking part in this project?

True or False : The Title property holds the name of the file the user selected with an Open or Save As dialog box.

Company has no annual cyber security awareness training, which is causing high phishing and social engineering attack, what security policy should the company implement?

Take input two integers x and y from user and in output print the value of: a) x+y b) x-y Write a C program.

write an expression that can be used to access the structure members in each of the following parts: a) Member lastName of structure customerRecord.

47. Octa-core processor are the processors of the computer system that contains a. 2 processors b. 4 processors c. 6 processors d. 8 processors

Transcribed Image Text: Q2/Execute the following instruction
and determine the status of
conditional flag register? 1. MOV
AX,34F5 H 2. ADD AX,95EB H *

153. Which protocol assigns IP address to the client connected in the internet? a. DHCP b. IP c. RPC d. none of the above

Transcribed Image Text: 1. Simplify the following Boolean expression using K-map and draw the circuit for simplified expression using basic gates.
F(A,B,C)= {m(1,2,3)+ [d(5,7)

Transcribed Image Text: Q) Using function write a C++ program to read
a[10][10] elements of two dimensional array and find
factorial for positive numbers

Hub devices takes data sent from one network device and forwards it to all devices on the network regardless of the intended recipient? Explain?

391. Address generating function of direct file organization is known as a. Pascal algorithm b. Hashing algorithm c. Greedy algorithm d. Short path algorithm

Transcribed Image Text: The term
describes a planned undertaking that produces a new information system.
Select one:
a.system development project
b.prototype
c.repository
d.unified process

63. _______ provides redundancy to ensure synchronization and inherent error detection. a. Block coding b. Line coding c. Scrambling d. None of the above

An RPC application requires a. specific protocol for client server communication b. a client program c. a server program d. all of the above

95. In ………………. transmission, the channel capacity is shared by both communicating devices at all times. a. simplex b. half-duplex c. full-duplex d. automatic

In the __________ numbering system, all numeric values are written as sequences of 0s and 1s. a. hexadecimal b. binary c. octal d. decimal

Correct answer will be Upvoted else downvoted. Thank you! pi in terms of base 26 is i) C.DRS ii) D.SQR iii) D.DRS iv) D.DSS

Transcribed Image Text: Question text
4 frame witn destination address CC:DD:EE-FF:FF:FF is,
meant for
host(s) in the network.
one
not even one
d.
all

Write a program in java to get the number from user and then check whether all digits in that number are same  or not.

Concerning virtual machines How can I establish a new unique network under VMware Fusion if I am running four distinct operating systems on VMware?

What are the three types of backup that may be utilized in database recovery management? What does each backup level accomplish in a nutshell?

Write program in f# only Please solve it Asap Please write the program to returns the larger value of two given parameters. F# only

I need the answer as soon as possible Transcribed Image Text: Java
Write a program to check whether a
string is palindrome or not

Transcribed Image Text: Write a java program that accepts two
double variables and test if both strictly
between 0 and 1 and false otherwise

None Transcribed Image Text: Using for. next loop, write a program to print the odd numbers between 21 and 71 on one
line.
QBasic

Transcribed Image Text: 1. To compute Sin(x) using Taylor series approximation given by
Sin(x) = x – (x/3!) + (x³/5!) – (x’/7!) +… (x*/n!)

71. The magnetic tapes are examples of a. random access storage devices b. sequential access devices c. inter-block access devices d. archive storage device

An input device that uses switch contacts placed under a plastic pad which may be inscribed with symbols is known as Touch pad why?

Multiply (-10 Multiplicand) and (-6 Multiplier) with the help of Booth’s Algorithm. Multiply (-23 Multiplicand) and (+7 Multiplier) with the help of Booth’s Algorithm.

describes a connection in which each instance of data in one entity is represented by just one instance of data in the other entity?

Q5 Give a compelling (technical) argument why the tit-for-tat policy as used in BitTorrent is far from optimal for file sharing in the Internet.

Transcribed Image Text: Let U={1,2,3,4,5,6,7,8,9), A={2,4,6,8}), then
(A)=—-
Note that ( is the complement)
?. ?
Ob. U
Oc. No answer is correct
Od.A

What datasets are utilised while learning neural networks? Choose one: training and validation sets testing and validation sets learning and validation sets validation set

Explain what the term “firewall” means in the context of network security, as well as how it is used in network architectures and designs.

Write a C program to print whether the given list of array elements is sorted in ascending order or descending order or not sorted.

For what reason do we need to do exploratory data analysis? Why shouldn’t we just go right into the modeling phase?, you may wonder.

A(n)____________ is one or more collaborative documents, such as an encyclopedia. posted on the Web that can be viewed and changed by the public.

190. The subsystem responsible for the allocation of buffer space is called the ___________ a. Buffer b. Buffer manager c. Storage d. Secondary storage

Asap Transcribed Image Text: JavaScript program to remove all the blank
space from a text and print the results after
all blank spaces removed

Describe the shorthand representation of the structure of a relational database. Illustrate this technique by representing the database for Colonial Adventure Tours as shown

Transcribed Image Text: Principle of equivalence means we can use
hardware instead of software in
programming and vice versa.
Select one:
O True
False

Which of the following is an application layer service? a. Remote login b. Mail service c. File transfer and access d. All the above

An string should taken from user and check if it contains uppercase charcters or not if yes print those else print no such element

Transcribed Image Text: Write a java program that accepts two
double variables and test if both strictly
between 0 and 1 and false otherwise

Transcribed Image Text: B// Compare between : 1. Animation&Transition 2. Syntax & Symantics 3.
Copy& move 4. DEL & RD 5. Bit & Byte

Neural Networks are complex ______________ with many parameters Select one or more: a. Discrete Functions b. Nonlinear Functions c. Exponential Functions d. Linear Functions

Analyse how an Intelligent Storage System provides large capacity as well as high performance supports for effective and efficient functioning of a Data Center.

15. SDLC stands for a. Software Development Life Cycle b. System Development Life cycle c. Software Design Life Cycle d. System Design Life Cycle

Explain the concept of the internet of things. What makes the industrial internet of things unique? How does it compare to the traditional network?

What is a good security awareness program base on no annual cyber security awareness training, which is causing high phishing and social engineering attacks?

Transcribed Image Text: QUESTION 3:
Apply heap sort on the following array: show all work.
18 13 11 7 14 10 4 12 5

What would the strAddress.IndexOf(“Main”) function yield if the strAddress variable includes the text “41 Main Street”? True a. –1 b. 3 c. 4 d.

Create an e commerce website (likitobuy.com) using HTML and CSS. Host this website on a free web hosting website Paste the written codes here.

Transcribed Image Text: Create a C# WinForms program in a Visual C#
Create a solution project of the management system of Movie Theater.
IF

95. It is a prepared application that takes advantage of a known weakness. a) security exploit b) vulnerability scanner c) packet sniffer d) rootkit

How does computer organization differ from computer architecture? Explain the many building blocks of the computer, including the CPU, the hard drive, and RAM.

66. Operating systems that can be modified and distributed are called a. close source b. open source c. free d. both a and b

Star topology is an arrangement of the network in which every node is connected to the central hub, switch, or central computer.True or False

In detail, what is the Internet Explorer Box Model Bug and how does it affect your browsing experience with the browser are explained below.

In virtually all systems that include DMA modules, DMA access to main memory is given higher priority than processor access to main memory. Why?

C++ Language. Transcribed Image Text: 3. Write a function with vector as it’s parameter. The function will display all elements of the vector specified.

Explain what occurs when you type x followed by p when working in vim with the cursor on the initial letter of a word.

How to write an IF statement in JavaScript? if i == 5 then fi = 5 if (i ==5) if i = 5 then

Transcribed Image Text: combines attributes and methods into one unit and hides its internal structure of objects.
Select one:
a.Information hiding
b.Inheritance
c.Polymorphism
d.Encapsulation

In a(n) ______ configuration, the initializing is done manually, with migrations done automatically. a. manual b. automatic c. semiautomatic d. none of the above

Write a bash script for a menu driven file management utility that can do following operations Create file Delete file Copy file Move file

Java Transcribed Image Text: Identify the correct code of the following method.
System.out.println(Math.ceil(-4.3));
a. -3.0
O b. -1.0
? ?. -2.0
O d. -4.0

Take input two integers x and y from user and in output print the value of: a) x+y b) x-y Write a C program.

An example of a layer that is absent in broadcast networks is: a. Physical layer b. Presentation layer c. Network layer d. Application layer

describes a connection in which each instance of data in one entity is represented by just one instance of data in the other entity?

Hand drawn is also fine Transcribed Image Text: Q5) Design a 4-bit odd parity generator circuit using:
A. basic logic gates.
B. encoder IC.

I need the answer as soon as possible Transcribed Image Text: A- Write a program to input 5
numbers and then find its half

Using C++ Programming language: Given the following array definition: int arr[10]; Write a statement using pointer notation that stores the value 1 in arr[7].

Was there any difficulty in implementing a company-wide network? Give an overview of the problems and some proposed solutions to some of the problems.

A string object’s functions may be used to find out the location of a substring when it is a substring of another string object.

Develop a business case for Bus Rapid Transport system and justify why developing a software based ticketing system is better than Man based system.

Nodes may only be added and deleted from the beginning of the list, which makes it a specialized kind of a linked list. A(n)__________

Using VHDL language, design the following logic equation: F = A.B’ + C.(D + E)’ a) As a whole equation b) Using intermediate signals

What is the nickname of the program memory that is positioned nearest to the CPU die but is not physically a part of it?

Wiite a program in C++ with function template to find the minimum and maximum values of an array. inputs should be enter by user.

2. Compilers, Editors software come under which type of software? a. System software b. Application software c. Scientific software d. None of the above

Discuss the function of the flags register, as well as identify and describe any THREE (3) flag registers that you may be familiar with.

Given two string taken input from user.Write a program in C++ that finds the length of common prefix of both string and print it.

Write octave code to plot the function: Y= x 3 + 3*x 2 + 10. Also add the output screenshot else I will downvote.

Write 8085 instructions to transfer a 8-bit number stored at loc 2050H to location 2055H. Attach assembler output and memory view. In sim8058 software.

172. Who invented the modem? a. AT & T Information Systems, USA b. Digital Equipment Corpn. c. Wang Laboratories Ltd. d. Apple Computers Inc.

Wrie a program in js to find the factorial of a number and the number may be positive, negative or zero. Handle all this

Give an example of two samples of non-H schemeas producing after one point crossover, an H instance. What is the H? Please please help.

Which platform offers loan facilitation services between lenders registered on platform & prospective borrowers a. POS b. P2P c. Digital Lendees d. PrePaid Instruments

Q 01: Can you kindly have a broader view of the metrics involved during the development of the Software? Explain it in the detail.

Answer the following Importance of use case diagrams Use case diagram objects Use case diagram guidelines When to use “Include” When to use “Extend”

1. Complete the following codes to find the summation of the array elements using assembly

Array DB 20h, 0AH, 32, 9
Sum DB ?

Describe the design problems for the type of pointers. Pointers in the majority of programming languages can only point to a single type variable.

Media sharing websites let you post photos and videos to share with other people. What are the benefits and drawbacks of using these websites?

This type of loop has no way of ending and repeats until the program is interrupted. 1. indeterminate 2. interminable 3. infinite 4. timeless

What is the ultimate aim of Artificial Intelligence (AI)? Give an overview of the many domains of it, including two examples for each area.

Write a program in rust language to print first 100 natural numbers using for loop. Print 10 numbers in one line separated by space.

Transcribed Image Text: QUESTION 8
The first clause in a query is
O WHERE
ORDER BY
FROM
All of these
SELECT
None of these

Take input a string from user and then print the frequency of every character in the string. Given: String contains alphabets only. In C++.

19. A multidimensional database model is used most often in which of the following models? a. Data warehouse b. Relational c. erarchical d. Network

Transcribed Image Text: Write a context-free grammar for the language {dmcma”b”bªdª | m, n, q 2
3 }. Use as few variables as possible.

Incorporate findings from yearly polls and surveys funded by businesses that offer agile solutions to create an overview of the usage of agile methods.

25. The fundamental notions of software engineering does not account for ? a. Software processes b. Software Security c. Software reuse d. Software Validation

Transcribed Image Text: Evaluate the following Scheme form:
(let ((a 3) (b 4)) (+ (* a a) (* 2 a b) (* b b)))

102. What is the full form of USB? a. Universal Serial Binary b. Universal Storage Base c. Universal Serial Bus d. Uninterrupted Service Bus

A virtual LAN (VLAN) allows devices to be grouped_________. a. based on subnets b. logically c. directly to hubs d. only around core switches

What would the strAddress.IndexOf(“Main”) function yield if the strAddress variable includes the text “41 Main Street”? True a. –1 b. 3 c. 4 d.

A string object’s functions may be used to find out the location of a substring when it is a substring of another string object.

Transcribed Image Text: 7
If S.value for some semaphore S is -4, then the number of processes waiting on that
semaphore is:
-2
2

The 15th and 16th Fibonacci numbers are 610 and 987, respectively. Divide the larger of these numbers by the smaller. What do you observe?

Transcribed Image Text: Perform the following Binary Subtraction by using 2’s complement.
11101
01011
O a. 00010
??. 110010
c. 100010
O d. 10010

How does computer organization differ from computer architecture? Explain the many building blocks of the computer, including the CPU, the hard drive, and RAM.

Binary Divion:can you please you  work  because I am confused Transcribed Image Text: 1 1 0 1 0 0 0 1 0 1 0

To what extent do you believe Microsoft PowerPoint is important to today’s students? Are there advantages to using it as a tool in school?

An object that has more than one form is referred to as: a. Interface b. Abstract class c. Polymorphism d. Inheritance Clear my choice

Transcribed Image Text: A primitive variable is passed from one method to another method by
in Java.
pass by value
O pass by reference

answer step by step . Simplify the following Boolean expression using K-map and draw the circuit for simplified expression using basic gates. F(X,Y,Z)=?m(0,2,5)+ ?d(1,3,6,7)

Show all name and phone numbers of students and the type of donation they received including any unmatched student. table name; Student Donation Volunteer

What is another way to refer to a file allocation unit, which is used to store portions of a file on the hard drive?

What is the name of the computer system that functions as a filter for a company’s networked computers’ access to and from other networks?

What are the many kinds of services offered at the network layer? With the aid of a diagram, explain the network layer’s transportation method.

Generate a random integer in the range 1000 to 9999 and without printing it verify that it is a 4 digit number. In C++

In a TCP/IP model if end-to-end connectivity is the main provision then which of its model layers is in charge of Ethernet related transmission?

1. Write Octave code to solve the quadratic equation 3x 2 -5x + 1 = 0 Find roots of the equation and print them.

Transcribed Image Text: char ch=a’;
switch(ch+1 )
{ case ‘a’ :cout<<'a'; break; case 'b' :cout< int main (void) { printf(‘We are to learn correct’); printf(‘c language here’); return 0; }

In what way can a single individual organize a distributed denial of service assault, and what is the definition of distributed denial of service?

The act of following someone through an access control point without having the proper credentials is commonly known as: phishing piggybacking pear phishing pretexting

33 In Ms-Word, which of the following is not a type of page margin? Select one: a. Center b. Left c. Right d. Top

USING C: Write a program to show that an integer n is divisible by 9 if the sum of digits is divisible by 9

Write a C program to calculate sum of all even or odd numbers in given range obtained from the user. Use a recursive function.

List the services on the internet that make communication more convenient for you. Write out a short description of the features of your smartphone.

43. Which of the following is/are considered stakeholder in the software process? a. Customers b. End-users c. Project managers d. All of the above

Q1:- What is ethics? Elaborate the value of Information Technology (IT) and IT new ethical issue as well as determining the right & wrong?

In which of the following the tester is not concerned with the implementation of the software. Structural Testing Stress Testing Path Testing Functional testing

Discuss the function of the flags register, as well as identify and describe any THREE (3) flag registers that you may be familiar with.

For what reason do we need to do exploratory data analysis? Why shouldn’t we just go right into the modeling phase?, you may wonder.

I need the answer as soon as possible Transcribed Image Text: For code below, r=
int x=28;
int r;
r= x%5;
printf (“%d”, r):

245. Abstraction combines the data and functions into a single unit called a class. a. True b. False c. May be d. Can’t say

Write a Swift function that accepts two integer values and return true if one of them is 20 or if their sum is 20.

A prototype (in AI) lets program builders explore the problem and its important relationships by actually constructing a program to solve it. True False

DO NOT COPY FROM OTHER WEBSITES Write your own website Q. What is an Intrusion Detection System? How Does an IDS Enhance Security Management?

Studying why computers are so powerful. Please elaborate on how computers have become so potent in the educational system over the last several decades.

Transcribed Image Text: Q.2 Calculate the shortest path using Dijkstra’s algorithm. Consider A as a source.
8
B
6
5
5
D
E
9

U kw 100% thn Answer else downvoted Write regular expression for the language over (0, 1): the set of all strings that contain 100.

Write a program in python to decode a string. The string is I had checked this and this is correct \x52\x9C\x85 using utf-8 decoding

205. V.90 modems with a bit rate of 56,000 bps are called a. 56K modem b. 56000 modem c. 56 modem d. 5600 Modem

System boundaries are established to define Select one: a. Interactions b. Classes c. Objects d. What is inside and what is outside the system

Using Python, Create a program that takes a number and prints the number of digits comprising that number. This should work for any decimal.

q2 ) In an array A[10], the last element is defined with index ________. a. Undefined b. 9 and 10 c. 10 d. 9

In your experience as someone who has researched various types of cyberattacks, what would you do if you discovered someone was stealing your data?

How can we use an ARQ algorithm to broadcast a message? So how can we transmit the same message to 100 separate WAN nodes?

Identify some of the difficulties involved in developing an information system infrastructure to support the new service; might cloud computing be a suitable solution?

434. Multi-user systems includes a. Microcomputers and personal computers b. Mainframes and Macrocomputers c. Personal computers and notebooks d. Mainframe and Server class systems

Transcribed Image Text: Find The greatest common divisor 120 and
* .500 using prime factorization
??????
Define: Simple Path, Rooted tree,
Augmented matrix
??????

Please provide an explanation. Multiprocessor systems are categorised according to the method by which the central processing unit and the memory unit are connected.

How Do You Manage The Complete Site In Center Of The Browser, Which Is Completely Using Divs Using The Help Of Css2 Or Css3?

Transcribed Image Text: Explain the difference between Computer Organisation and Computer Architecture?
Maximum number of characters (including HTML tags added by text editor): 32,000

Biggest problem with spiral? a.)iterations were too long b.)iterations were too small c.)it didint use iterations d.)nothing companies should go back to using spiral

201. Two computers connected by an Ethernet hub are of a. LAN topology b. MAN topology c. WAN topology d. None of the above

The URL Connection class can be used to read and write data to the specified resource referred by the ReadableByteChannel Select one: True False

What is the range of unsigned and signed decimal numbers as well as binary numbers that can be represented in a 10 bit system?

139. Phase that works to understand business problem and information characteristics that software must accommodate is a. communication b. modeling c. construction d. deployment

Please fill in the blank with an explanation. _____ $t0, $s3. Ss4 SLL St0, $t0, $s6 Lw $t1, 0($t0) # A[i-j] is in $t1

What are the advantages of knowing how to use a computer? What benefits does technology provide in the areas of education, economy, and society?

Computer science: Provide an overview of the.components of a backup plan. What are the distinctions between backup plans for mobile devices and personal computers?

Examine TCO in the context of cloud-based software migration. Identify some of the advantages and disadvantages of a conventional information system’s cloud computing environment.

None Transcribed Image Text: 3. What are two common techniques used to protect a password file? Explain.
Please do it correctly.
Subject: Information Security.

For what reason do we need to do exploratory data analysis? Why shouldn’t we just go right into the modeling phase?, you may wonder.

For what reason do we need to do exploratory data analysis? Why shouldn’t we just go right into the modeling phase?, you may wonder.

On Sim8085 Transcribed Image Text: Statement :
in memory location 2002H.
Add the contents of memory locations 2000H and 2001H and place the result

14.10 What are the advantages of using CDMA for a cellular network? 14.11 What are the disadvantages of using CDMA for a cellular network?

Demonstrate what happens when you attempt each of the following integer divisions: 1. 0 / 1 2. 1 / 0 3. 0 / 0

How can we use an ARQ algorithm to broadcast a message? So how can we transmit the same message to 100 separate WAN nodes?

Before data can be transmitted, they must be transformed to ________. a. periodic signals b. electromagnetic signals c. aperiodic signals d. low-frequency sine waves

Evaluate cloud-specific security problems and possibilities. Provide concrete instances of risks, hazards, and vulnerabilities that might exist if the company transitions to the cloud.

Multimedia systems are what they sound like. Provide an overview of the challenges that multimedia systems face and the desirable qualities they should have.

70. Condition which stops computer to produce expected results is classified as a. less disk space b. error c. print statements d. alphabetical statements

Transcribed Image Text: can turn static documents into applications such as games or calculators.
O HTML
O XHTML
O JavaScript
O Cascading Style Sheets

program takes an upper range and lower range and finds those numbers within the range which are divisible by 3 and multiple of 2.

Is the graph an equavalence relation or not Transcribed Image Text: 9. The relation with the directed graph shown below is an equivalence relation.

A relationship between entity supertype and entity subtype is known as  _______. Partial participation relationship IS-A relationship M : N relationship Total participation relationship

Q. The _________ clause specifies which record or records that should be updated. If you omit the __________ clause, all records will be updated!

Transcribed Image Text: Consider the value of i=39 & j=39 and give the
output for the below python program
while i<=j: j=i i=i+1 print(i) Explain the concept of the internet of things. What makes the industrial internet of things unique? How does it compare to the traditional network? Q_1 Three distinct numbers between 10 and 25 (inclusive) are chosen at random. What is the probability that the numbers are all composite numbers? Anyone can write a summary report in points about Tuple Type in C# programing language Write points please, not copy paste from other sources. program takes an upper range and lower range and finds those numbers within the range which are divisible by 3 and multiple of 2. A Ring, refers to a record chain, the last of which refers to the first record, in the chain, is called a pointer wxplain? Java Transcribed Image Text: Java Write a program to find number of trailing zero in a factorial number in time complexity less than o(n) Java Take a number from user and check this number lie between range of 0 to 100 or not and both edges are included Entity and referential integrity are critical in a database for many reasons. Please provide an example of each kind of integrity you’re talking about. Transcribed Image Text: In general, one of the following is not a workable theory act utilitarianism rule utilitarianism O B. Kantianism Subjective Relativism OD. Transcribed Image Text: Q2/Execute the following instruction and determine the status of conditional flag register? 1. MOV AX,34F5 H 2. ADD AX,95EB H * 1. Which of the following is not a level of data abstraction? a. Physical Level b. Critical Level c. Logical Level d. View Level Transcribed Image Text: * which signals is used to indicate data segment registers in 8086 ALE A17/S4 and A16/S3 O A19/S6,A18/S5 A18/S5 and A17/S4 The storage device known as a buffer is used to compensate for the variation in data flow rates from one device to another. explain? Given two string taken input from user.Write a program in C++ that finds the common prefix of both string and print the common prefix. If a file system defines a cluster as six sectors, how many bits of information can be stored on each cluster? Explain your answer 6. Write an assignment statement that might be used to implement the equation below: (use the pow(a,b) function) y = 4x?+ 2x² + 1 22/ In sum – of – products expressions, the complemented and uncomplemented variables are assigned by ‘0’ and ‘1’ respectively. Select one: True False Transcribed Image Text: In Object-Oriented Analysis, Lare organized as objects. O a. Classes O b. Requirements O c. Operations O d. Objects and Classes With the aid of a diagram, thoroughly discuss five (5) roles of algorithms in computer science and discuss how they aid in problem solving. How to make a redirect? so that if someone visits with HTTP, the visitor automatically redirects to HTTPS from C panel or PHP code? Why even if all the links in the Internet provides reliable service (sends datagram without errors); the TCP reliable delivery service is not redundant.Explain. Write a program In JavaScript to replace all the instances of i to I in a given string. nt :- use regular expression.In JavaScript Transcribed Image Text: is a programming language that deals with a computer’s hardware components and constraints — – programming language HLL Low- Level Language Transcribed Image Text: Convert the non-deterministic finite automaton (NFA) M below into a deterministic finite automaton (DFA) M’. 90 (91 a a, b 92 5. The physical layer concerns with a. bit-by-bit delivery b. process to process delivery c. application to application delivery d. none of the above Design and explain the following with the help of diagrams and examples. (a) Four bit Synchronous Up counter. (b) Four bit Synchronous down counter Transcribed Image Text: A class can be instantiated if it has abstract methods but not inherit from abc.ABC Select one O True O False Is it true or false? Even if its Boolean value is false at the start, the while loop always executes at least one iteration. A topology in which each node coonects to exactly three other nodes is: A) bus B) none of the lised C) ring D) star Simplify the following function using * ?Karnaugh Map F=2%(1,3,57) Transcribed Image Text: Simplify the following function using * ?Karnaugh Map F = E(1,3,5, 7) Explain the techniques and alternatives that may be used for database design distribution. To do this, describe the benefits and disadvantages of database distribution. In MS Access the data is stored as. Select one: a. Tables b. A hirerachcial structure c. None of the above d. Network structure Transcribed Image Text: Given the following 5 trees: B Which of them have the properties of a Complete binary tree? Complete binary tree: . What are the three types of backup that may be utilized in database recovery management? What does each backup level accomplish in a nutshell? Give four reasons why data modelling is important, if not the most important, element of the systems development process, according to many system designers. is it a modem or a point-to-point connection? What is the architecture of the network: bus network (multi-drop wire), ring, switched, or hubbed star? 2c) What are instance variables, and what role does the name ‘self’ play in the context of a class definition? Briefly explain without examples 1 Transcribed Image Text: A graph of amplitude versus frequency of a signal is called time domain plot. Select one: O True O False Autonomic computing is just a fancy term for “software that automatically carries out a task.” This allows cloud computing environments to function more efficiently. To automatically play a sound clip continously in the background when a page is locked, which attribute should you add to the audio element? Hyper threading technology is used in the processor of a computer to simulates a single processor into two virtual processors to the operating system? For the given keys, draw a BST. Assume the keys are inserted in the following order: HLOSBKTADMR Draw the tree and upload the image. Python Write a program to take a number from user and calculate its square root  and print the output The number is floating type Do you believe a discrete or continuous computational model of elementary particles being produced and destroyed in a high-speed accelerator would be more accurate? Explain why it is difficult for a person to comprehend the semantic meaning of a scene from a three-dimensional viewpoint in your own words. Transcribed Image Text: When using a printf() statement, what syntax do you use to print the value of a “char”? %s O%f %c %d 50.Which transmission mode is used to send a video or radio signal in a TV transmission over your LAN? a.Broadcast b.Multicast c.Anycast d.point-to-point transport for an online application, various kinds of testing must be done Testing for load Testing for capacity Usability Testing the dependability of the product Transcribed Image Text: 5) Write an SQL Query to display the accountno, name, Recurrent_acno, amount whose fixed deposit Less than 80000. (Use inner join) 28- Designing, implementing, and maintaining an e-government system that adds public value to society is a challenging task. Select one: a. True b. False None Transcribed Image Text: Q5. Differentiate between backward chaining and forward chaining with example. Please do it correctly. Subject: Artificial Intelligence. Unit: Expert systems In Fortran F95, WAP to prompt the user to enter the radius of a sphere and print the surface area of sphere in output. What role may artificial intelligence play in improving the creation of databases? What are the advantages and disadvantages of employing artificial intelligence in databases? 23. In the architecture of a database system external level is the a. physical level b. logical level c. conceptual level d. view level We can insert any batch of N keys into an empty binary search tree using at most 2N compares. Select one: True or False Take input a string and check if it contains any lowercase letter or not. Print “Yes” if it contains else print “No”. In C++ You can clear the contents of a TextBox control in the same way that you clear the contents of a Label control.True or False. What is specified in the data manipulation language (DML) for the database management system (DBMS); what are the methods used to process data explain? in matlab y = -2pi to 2 pi (a) = tan(y-0.5) (b) = sin(y^2) (c) = cos(y^3) plot these in matlab in one frame Cleanroom Software Engineering has the following benefits: Use statistical use testing to demonstrate the importance of this kind of software development in a cleanroom. Compare the First fit and Best fit partition allocation with reference to Memory Man- agement. What should be the optimal size of a page/frame? Describe in detail three things that you may attempt if you have completed the debugging procedure but are still unable to resolve the issue. Only E please in python Transcribed Image Text: D. Verify the priorities and rules of precedence for operators. E. Calculate simple interest on shell. Compare and contrast unstructured and structured data using appropriate examples to determine which kind of data is more common in a normal corporate setting. 26. _______ signals can have only a limited number of values. a. Analog b. Digital c. (a) or (b) d. None of the above Transcribed Image Text: What is the name of the system call that creates a child process that is a copy of the parent process? In ____________, the address of the operand is specified in the instruction. a. Stack Addressing b. Register Addressing c. Immediate Addressing d. Direct Addressing Write a  Description for any 5 code smell detection techniques ,every technique’s description should inlcude pros and cons Where to use? atleast 1 example What is the nickname of the program memory that is positioned nearest to the CPU die but is not physically a part of it? Question Create any program, use the following: 3 methods 2 objects 2 constructors 1 input 2 classes 1 file 1 array (In JAVA PROGRAMMING) I need help with writing an SQL statement that display the output only if it was typed in from a console prompt line. Transcribed Image Text: Consider a value as a=3 and b value as b=9 Write the output of below given program a=a+5 a+=5 b*=(a+b) print(b) Stuck on this question. Please help. Thank you. Transcribed Image Text: 7. Find the mintem and maxterm of the: NAND, NOR. Implication function, AND Which of the following Assembly instructions copy the content of a memory location to the accumulator? a. OUT b. STA c. LDA d. LXI Can a data leak have a significant effect on cloud security? Are there any steps that can be taken in order to counteract this? Transcribed Image Text: 1. [2 points] What does it mean for Python to be strongly and dynamically typed? Give an example of each concept. a. Distinguish between a program and a software product. b. Explain why the Spiral life cycle Model is considered to be the Meta model. The switching method uses in the forwarding of the frame that receives the entire frame and applies the CRC check before forwarding the frame? On what basis should edge computing and cloud computing be considered in an IoT system. What is the best location for the database system? ‘Which OSI layer is in charge of data transmission across LANs? a. Transport layer b. Network layer c. Data Link layer d. Physical layer Give an example of the word “worm” and how it is used in the context of information security. Consider any of the following scenarios. If the bit rate for a 16-QAM signal is 4000 bps, what is the baud rate? a. 300 b. 400 c. 1000 d. 1200 16. The ability to move around within a media stream is known as : a. buffering b. random access c. access d. sequential access In CSS3 which of the following method moves an element from its current position using tranform? a. rotate() b. scale() c. translate() d. matrix() 66. Two common scrambling techniques are ________. a. NRZ and RZ b. AMI and NRZ c. B8ZS and HDB3 d. Manchester and differential Manchester In linux please help Your system is suddenly to slow Which command can you use to check its load for memory and processing power How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key? a. 16 b. 17 c. 18 d. 19 A module is made up of 3 basic components: header, body, return statement variables, constants, code sequence, selection, and loop structures input, processing, output What is the difference between a program written in a high-level language, a program in machine language, and a program expressed in Java bytecode? Transcribed Image Text: Computer monitor with 24-bit color has the following colors: a. 16700000 colors b. 16000000 colors O c. 16800000 d. 16777216 colors What is the output of the following java code? String A = “Teaching”; String B = “English Language”; System.out.println (A.charAt(B.indexOf(‘g’,9))); a.g b.3 c.Error d.n What are the most important aspects of (Android) mobile application development to keep in mind? If it helps, you may utilize a visual model. 22. Three or more devices share a link in ________ connection a. Unipoint b. Multipoint c. Point to point d. None of the mentioned Is it true or false? The database management system (DBMS) interacts directly with the data and returns the results of operations to the application. Transcribed Image Text: New nodes are added to the .. of the queue. a. Front b. Back c. Middle d. Both A and B 63. _______ provides redundancy to ensure synchronization and inherent error detection. a. Block coding b. Line coding c. Scrambling d. None of the above – Transcribed Image Text: java program take an arraylist of string from user and iterate over this using iterator and print each value I Write a  program in scala programming language to print hello, good morning and in the next line print your are in of compiler

Write a java program to get the larger value between the first and last element of an array of an length 3 of integers

Instruction set orthogonality refers to the characteristic in an instruction set architecture where each instruction has a “backup” instruction that performs the same operation.

Transcribed Image Text: Identify the type of signal given below
‘alue
Time
Unipolar Signal
Digital Signal
Perodic signal
Unipolar, Digital Signal and Periodic signal

An example of a neural network with several layers would be helpful. In the next paragraphs, describe overfitting and how it may be avoided.

Transcribed Image Text: Write a java program to sum all the numbers divisible by 3 or 5 between
10 and 100.
Format
BIU

Explain in your own words, how a Knowledge Base System is different form an Expert System, whilst at that discriminate their functions if any

Internal memory have the program and data to be located before the ALU and control unit of a computer can operate on it? Explain?

Give four reasons why data modelling is important, if not the most important, element of the systems development process, according to many system designers.

Correct and detailed answer please. Thank you Transcribed Image Text: . Discuss the satisfiability and validity of the CTL
formula EF(p ^ q)
EFp.

Use Boolean algebra to simplify the function to a minimum number of literals.

X = AB’C + A’B’C + A’BC + AB’C + ABC

1) All dynamic routing protocols make routing decisions that are decided by an a)  Central processing unit (CPU) b)  Router c) Algorithm d) Processor

You can divide the code for an application into logical parts by moving some of the code from the main() method to other ____________________.

p ? q is logically equivalent to ________ a) ¬p ? ¬q b) p ? ¬q c) ¬p ? q d) ¬p ? q

Where did we come from during the Industrial Revolution and the Computer Revolution? And how does the Computer Revolution differ from the Industrial Revolution?

What does a router do when it gets a packet with a destination network address that is unknown to the router is described below.

Documenting modifications to information systems and analysing their possible influence on system security are critical and significant components of digital forensics. False or True

I need the answer as soon as possible Transcribed Image Text: Python program to capitalize the first letter
of string that taken from user

A device that continuously finds the MPP of a solar panel or array is called ……………….. a. MPPC b. MPPA c. MPPT d. MPPP

Incorporate findings from yearly polls and surveys funded by businesses that offer agile solutions to create an overview of the usage of agile methods.

One of the biggest criteria for team performance is integration. What does organizational integration mean and why is it important for successful team performance?

Show that there are infinitely many primes that are not one of the primes in a pair of twin primes. (nt: Apply Dirichlet’s theorem.)

Describe in detail three things that you may attempt if you have completed the debugging procedure but are still unable to resolve the issue.

i need a simple code in java Transcribed Image Text: Write the Java code to implement onPostExecute to read Json objects from JSON array

What does an Eclipse IDE allows? i. Editing the program ii. Compiling the program iii. Both editing and compiling iv. Editing, building, Debugging, Compiler

36. Which SDLC activity does the user initiates the request for a desired software product? a. Requirement gathering b. Implementation c. Disposition d. Communication

What are some of the dangers that data security is exposed to? Then we’ll talk about what we can do to avoid such risks.

247. Switched/56 service is the digital version of an a. analog leased service b. Digital data service c. analog switched service d. 900 service

Transcribed Image Text: In HTML Forms, using the “get” method is recommended in order to send user ID and password.
Select one:
True
False

write a one function to find the max number, and use this function to find maximum number for the following arrays: a[4], c[7], d[4]

Write a query to fetch all the records from the Employee table ordered by Lname in descending order and Department in the ascending order.

‘Which OSI layer is in charge of data transmission across LANs? a. Transport layer b. Network layer c. Data Link layer d. Physical layer

Model each of the following constructs inanE-R diagram: composite attribute, multivalued attribute, derived attribute, associative entity, identifying relationship, and minimum and maximum cardinality constraints.

Write a program in C++ language to sum the elements of array A, array A with 10 integer elements, entering its value from keyboard.

Create the truth table of this expression: S = ((A AND B) OR (C AND D)) AND NOT((C AND NOT(A)) OR (B AND D))

q1) In the tree data structure, terminal nodes have _________ number of children. a. Depends on the problem. b. 0 c. 2 d. 1

Transcribed Image Text: Discuss the following and give examples of each:
a) Constructor
b) Friend Functions
c) Virtual functions
d) Polymorphism
e) Multilevel Inheritance

Find the Laplace transform of the given two function below: e -t e -at Write Matlab program to find the transform and print it.

Design an algorithm to check if one of the optimal local alignments of two sequences A and B is also an optimal global alignment.

In order to guard against a rise in theft and security events, what are some tactics and objectives for an information security incident plan?

Consider how strongly the users of the network rely on the network to perform their everyday business and choose three unsecure or attack-vulnerable protocols.

Transcribed Image Text: means that requirements should
not have contradictory definitions
Select one:
O a. Consistency
O b. Compleetness
C. Bid
O d. Readable

I need the answer as soon as possible Transcribed Image Text: Java
Write a program to check whether a
string is palindrome or not

The execution of SUB AL, BL is performed by _____. a. BIU b. both EU and BIU c. neither EU nor BIU d. EU

Discuss the circumstance in which there is insufficient memory for new processes and what actions the operating system should take to solve this problem.

None Transcribed Image Text: Q1/- Write a c++ program to get the sum
the odd numbers between 22 and 389
using visual studio? *

4. ____ is used to define the worst-case running time of an algorithm A. Big-? notation B. Big-? notation C. Big-O notation D. Complexity

171. Trap that is executed during the program is caused by a. error b. division by zero c. interrupt d. both a and b

What are the differences between starting a data modelling project with a packaged data model and starting one with a blank piece of paper?

Transcribed Image Text: 5. Write the 5-tuple representing the following NFA. Also, covert it to its equivalent DFA.
1
0,1
0,1
91
start
92

3) Write a ALP for 8086 to exchange the content of AL and AH registers without using XCHG instruction.

Note: Please do not handwritten.

How many of you are on Facebook? How many of you check in to it at least a few times a week? Daily? Why?

Transcribed Image Text: e Write a program to input a
from
c String (char array)
User and rint it in rever se.
c++ program

What datasets are utilised while learning neural networks? Choose one: training and validation sets testing and validation sets learning and validation sets validation set

What role may artificial intelligence play in improving the creation of databases? What are the advantages and disadvantages of employing artificial intelligence in databases?

An example of a neural network with several layers would be helpful. In the next paragraphs, describe overfitting and how it may be avoided.

Which the following question,Subject_Code is a(n) __________ and Subject is a(n) __________? A)entities,attribute B)tuple,entity C)entity,table D)attribute,relation Transcribed Image Text: Subject
PK Subject_Code
Subject_Name
Credit_Hours

Compare and contrast unstructured and structured data using appropriate examples to determine which kind of data is more common in a normal corporate setting.

26. _______ signals can have only a limited number of values. a. Analog b. Digital c. (a) or (b) d. None of the above

Draw a binary search tree step by step by inserting the following numbers 11, 6, 8, 19, 4, 10, 5, 17, 43, 49, 31

A whole number is first multiplied by 2 and then by 5. The result could be:

(A) 12

(B) 25

(C) 50

(D) 55

Which of the following Assembly instructions copy the content of the accumulator to an I/O port? a. OUT b. STA c. LXI d. LDA

Describe the responsibilities of the project manager, sponsor, business analyst, and program manager for the project you selected as a suitable match for waterfall.

What is the number of slots in a frame for TDM if n signal sources with the same data rate are to be transmitted

None Transcribed Image Text: 13.XOR BX,1800H
a. Clears bits 11 and 12
b. Set bits 11 and 12
c. Invert bits 11 and 12

In Image retouching , explain how colour tones can be corrected in an image using the curve adjustment layer or palette in Adobe Photoshop

Explain what the term “firewall” means in the context of network security, as well as how it is used in network architectures and designs.

60. In asynchronous transmission, the gap time between bytes is _______. a. fixed b. variable c. a function of the data rate d. zero

Name the type of network that is characterised by a group of computers that share data and peripherals within the confines of a building

Write an if /e l se statement that assigns Oto x when y is equal to 10. Otherwise it should assign 1 to x.

Which type encompasses merchants who use imprint, standalone terminals, Point of Sale (POS) systems, and store PCI DSS privacy data in databases and storage?

The Veterans Administration (VA), as well as its assets, have become increasingly susceptible to cyberattacks as a result of data security and privacy issues.

Using python: what will be the final value of sum in this code sum = 5 for x in range(0, 10): sum += x

QUESTION 15 Evaluate the following expressions, assume the following declaration: int x = 4; What is displayed by the following statement:   cout << ++x; What is the importance of logic (propositional logic and/or predicates) in computer science? Can you give me several examples of where it is used? None Transcribed Image Text: 4. register is keep the right sequence of instructions to be executed. a) CX b) CS c) IP d) AX Explain the concept of CRC ( Class Responsibility Collaborator). Why is it important? List at least two specific reasons and provide a thorough rationale. i need the answer quickly Transcribed Image Text: Write a program in pascal to take string as user input and print it in output Transcribed Image Text: MC4: schemes send bits as signals, and schemes share a channel among users. multiplexing, demultiplexing modulation, demodulation modulation, multiplexing demodulation, multiplexing A constant is a reserved memory location that stores data of the same type, but this data cannot be changed. Select one: True False Transcribed Image Text: In a preorder traversal, the -is processed first a. left subtree b. right subtree C. root O d. a or b If there is one thing that can be said about the main objective of software engineering, it would be this: It’s a mystery, really. What are the differences between starting a data modelling project with a packaged data model and starting one with a blank piece of paper? write a program in JavaScript to find a number is odd or even. REMEMBER DONT USE IF ELSE PLEASE DO IT WITH TERNARY OPERTAOR program takes an upper range and lower range and finds those numbers within the range which are divisible by 3 and multiple of 2. Transcribed Image Text: Show a definition for a recursive Java method long powerOf2(int n) that returns the value of 2″ (assume n is non-negative). Determine the output of the following code. char c=’a’; switch (c) { case ’a’: System.out.print(“1”); case ’b’: System.out.print(“2”); case ’c’: System.out.print(“3″); } System.out.println(” Done”); None Transcribed Image Text: Q2. Write program in c++, using function to finds the sum of the following series:- Sum= 3/7+ 5/11+7/15+ 9/19+ 11/23+….+n/ (2n+1) The file formats__________ can add to power point shows. Select one: a. only MPEG b. only WAV c. only JPG d. All of the above Every NFA has an equivalent with only a single final state. Formally, in terms of NFA machine components, how can such an NFA be defined? 19. Environment in which programs of the computer system are executed is: a. operating system b. nodes c. clustered system d. both a and b Transcribed Image Text: Write a program in scala programming language to check whether the ‘a’ character present in a string between 2 to 4 times. None Transcribed Image Text: Q1) What is the state table, state diagram, characteristic table, characteristic equation, excitation table and symbol of T FF 4 marRN What will be the output of the code given below. #include using namespace std; int main() { for(int i=0;i<=10;i++){ cout< section Both the section and the section are correct The section

Transcribed Image Text: Multiples
How many numbers between (and including) 440 and 970 are not multiples of ten?
Give your answer as a single integer.

What is the guiding concept in the design of an operating system’s microkernel? What is the most significant difference between it and the modular approach?

Write a program to write a file with data is do not enter here, the virus has been spread. In haskell the file named abc.txt

Determine the value of x, where y = 7, e = 12 and n = 566 using modular exponentiation method (x ? ye (mod n)).

142. ________ satellites can provide direct universal voice and data communications for handheld terminals. a. GPS b. Iridium c. Teledesic d. none of the above

In FTP, ASCII, EBCDIC, and image define an attribute called _______. a. file type b. data structure c. transmission mode d. none of the above

In the process of fetching a web page from a server the HTTP request/response takes ______ RTTs. a. 2 b. 1 c. 4 d. 3

What are the features of DSDM and what are the DSDM Principles? The Dynamic Systems Development Technique (DSDM) is a method for developing dynamic systems.

Transcribed Image Text: 5. F(A,B,C) = A’B +B’C + A’B’C. Convert F as a product of max terms algebraically using the
property xtyz= (xty)(x+z).
%3D

When making an on-site service call, what should you do before making any changes to software or before taking the case cover off a computer?

Can someone help me plot the direction field and integral curves for this ODE using Python Transcribed Image Text: -2
y’ + (- – 1)y

Java Transcribed Image Text: Which among the following is called as Java Interpreter?
O a. java
O b. javac
O c jre
O d. jar

input: fhgfdgfvbnm,nbvc output: cvbn,mnbvfgdfghf We have to write the code for taking user input as string and reverse this using recursion. Remember use c++ only

What is the layered approach to operating system design? What are the benefits and drawbacks of this strategy? Give a brief explanation using an example.

181. SDLC stands for ________ a. Software development life cycle b. System development life cycle c. Software design life cycle d. System design life cycle

Implement the following task  by using java .Define and implement UML association, composition, aggregation with suitable example, separately. Also write their differences in table form

The internet offers many benefits to business organizations. Outline two major ways by the internet can help any business achieve competitive advantage. NB. No plagiarism.

What is the name of the computer system that acts as a filter for access to and from other networks by a company’s networked computers?

Transcribed Image Text: The program takes the masses of two objects and the distance between
them to determine the gravitational force acting between the objects.

Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.

Decrypt the following ciphertext.

AF BO ORHDL A PNFDTE DR IT N SUTND GNFDRBABAWD, IHD A MRHFE A LNE FRDLAFS DR

WNO. ? JAKDRU IRUST

How can you check a given number is multiplex of 3 Or a multiple of 7 or a multiple of 11 . In js please

Transcribed Image Text: Write a program in C++ to take input a string and print the
ASCII values of all the characters in the string.

The rules for creating control flow statements like as ‘if-then-else’, ‘case-switch’, ‘while-until’, and ‘for’ are referred to as _____, and they are defined as follows:

131. A software program that is outdated or obsolete is termed as a. legacy application b. engineering application c. embedded application d. open source application

– Describe an Information System and explain its components and characteristics -Define the nature of the Internet and discuss the variety of functions it performs

Grid computing and cloud computing vary in the infrastructure upon which they are based. I’m trying to understand how cloud computing and grid computing differ.

Discuss four (4) major components of a computer-based information system and how they contribute to the success of running a business in the modern world?

what command, common across the vast majority of operating systems, can be used to view network connections? a) netstat b) nslookup c) ip d) ifconfig

Let ? ={0,1,E,=} and EXP = {a=bEc | a b and c are binary integers, and a = b^c. Show that EXP is not regular.

Transcribed Image Text: Which of these factors may affect perfective .2
* [maintenance. [Multiple Answers
Team stability O
Ethical responsibility O
Hardware Specifications
Program structure

List the types of controls you can use to protect the file from destruction or contamination or to reconstruct the file if it is damaged?

Transcribed Image Text: What is the bandwidth of a
modulated signal compared to
?message signal
E? x x,
3 I I
x, E E
12pt

Aside from network-related factors like latency, loss, and bandwidth performance, there are many more factors to consider while choosing a CDN server. What are they?

4. ________ is used to place the nodes in a single row in JavaFx Application.

a. Stack Pane
b. Flow Pane
c. Hbox
d. Vbox

Develop a program that read 5 numbers from the keyboard to display how many even numbers and how many odd numbers (using any loop)
(Python)

Hello, Does anyone know how to implement a Q-learning technique into a Robotis OP2 Bipedal robot to learn how to walk, using the Webots program?

Multiple choice question An example of hybrid OS is: a. IOS b. MAC OS X c. Andriod d. All of the above Clear my choice

29. Which of the following is used to access programs installed on computer? a. START button b. windows explorer c. internet explorer d. control panel

Write a program that takes a string and creates a new string made of first two characters and last two characters from the given string

Provide an overview of the internet of things. What makes the industrial internet of things unique? How does it stack up against the established network?

Write a multithreaded JAVA program that accept a sentence from the user then rotate it with each thread until it return to its original form.

399. Various system resources can be scheduled to requested processes by means of a. Request management b. File management c. Process management d. Conflict management

Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.

i need the answer quickly Transcribed Image Text: 3.3 Q4: An 8254 receives the control word (10010000)2, what configuration
Regste
set up for the timer?

Factors Affecting the Tablet Hardness are all the following

EXCEPT?

Amount of binder

Compression of the tablet and compressive force

Method of granulation

Tablet size

Take a string from. User and a character from user and print the count how many times this character appear on that string. In c

If a company chose to make the move to the cloud, it could do so. Where should the company focus its efforts to achieve this?

Determine the value(s) of x so that the matrix below is the augmented matrix of an inconsistent linear system. x 1 5 5 -3 2

Encode the text digital communications using Huffman coding procedure. Explain each step. Transcribed Image Text: Encode the text digital communications using dynamic Huffman coding procedure.

QUESTION 3 How much RAM is supported by the 32-bit version of Windows 10? a. 16 GB b. 64 GB c. 2048 GB d. 4GB

Transcribed Image Text: A STD_LOGIC_VECTOR
assignment is, for
example,
Select one:
a.
<= "UULLLLHH"; b. <= "01XXUU00"; C. All of the above. d. <= "00110001"; The __________ declares that this method overrides a method in the base class. a. override keyword b. class keyword c. virtual keyword d. base keyword Transcribed Image Text: Ch 7 For depicting changes over time, the appropriate figure is typically a O table pie chart photograph block diagram bar graph 40. The hybrid algorithm that combines EDF with SCAN algorithm is known as : a. EDS b. SDF c. SCAN-EDF d. None of the mentioned It clear how important disaster ………is today for every ERP implementation. Select one: O a. problem-solving O b. management O c. planning O d. infrastructure Comparison of different multithreading methods for uniprocessor and multiprocessor systems in various operating systems (Linux/Windows/Mac/Android, etc.) Describe CPU Scheduling Algorithm in a comparable manner (article). Transcribed Image Text: What type of graph is this? 10 Age a. Bar chart O b. Scatter plot O. Box plot d. Heatmap ? 2. 505. Software may trigger an interrupt by executing a special operation called a a. Recovery call b. System call c. Process call d. Package call Is it possible to capture airdrop traffic with a wi-fi card with monitor mode? If possible, how is it done? Please do not use handwriting. DO NOT COPY FROM OTHER WEBSITES Q. How to create dynamic circular list from this txt file data? txt file: Alyce,Female,33 Autumn,Female,26 Brad,Male,45 Jon,Male,60 Zach,Male,22 When it comes to cloud computing, what’s the difference between public clouds and private clouds? Which do you believe is the superior option, and why? What is the output of the following code? int x = 0; if (x < 4) { x = x + 1; } cout<< x; Using C++ Programming language: Define a vector of doubles called values and give it a starting size of 25 and initialize each element with zero. 2. Please answer ASAP Transcribed Image Text: TEST NAME: Which attack type can target confidentiality O Interception O Denial of service (DoS) O Internuption Fabrication In fixed channel assignment strategy, each cell is allocated a predetermined set of _______ a) Voice channels b) Control channels c) Frequency d) base stations To binary search for a key in a sorted array, the maximum number of comparisons is log2 n. Choose one: Is it true or false? Heapsort uses a heap to sort different elements. The use of a heap makes this algorithm the most efficient in the worst case for sorting. Transcribed Image Text: In the network 251.12.10.110/28, the Fourth octal of max IP address of the network which cannot be assigned to a host is 38 Which of the following layout is available in powerpoint? Select one: a. Content without caption b. Picture without caption c. One content d. Comparision Given a string str = “Python”. Write a program in python Language to print the given string in reverse order without modifying the given string. Transcribed Image Text: Convert the following logic gate circuit into a Boolean expression. Write Boolean subexpression next to each gate. t1 y t2 |t4 t3 Use INDIRECT PROOF: 1) A ? ( B ? C ) 2) B ? ( D ? E ) _____________ Therefore ~ A V D Transcribed Image Text: One of the downsides of a pure interpretation implementation is that it is less compact from a space perspective. True O False Transcribed Image Text: – Minimize the given expression using four variable k-map. F(A, B, C, D) = Em(0, 1, 3, 4, 7, 8, 15). %3D Improvement of HeapSort . Demonstrate several ways to improve the performance of the HeapSort algorithm discussed in the lectures. Explain why speed could be better. Interest, challenge, and personal satisfication are considered_______________ Motivators, while pay and benifits are considered _________motivators. intrinsic; environmental extrinsic; environmental environmental; internal intrinsic; extrinsic extrinsic; intrinsic T F is an abbreviation for Transformative Function. The public members of a class may be accessed straight from the “main” function of the class. Provide an overview of the internet of things. What makes the industrial internet of things unique? How does it stack up against the established network? Information assurance has a number of countermeasures and security services accessible. Recognize those people who would benefit most from this countermeasure or service, and why. The_______ scheme uses a page table containing pointers to all pages; the page table itself and all updated pages are copied to a new location. Transcribed Image Text: Explain the following terms interrupt programming a) Volatile b) Wrapping Up c) Interrupt service routine (ISR) d) Rising Mode e) Falling Mode What happens if the file named done already exists when you run the following commands? $ cp to do completed $ mv to do completed Transcribed Image Text: It is possible draw a graph that : is it a tree, * .has 5 vertices, and has 6 edges true False What is the layered approach to operating system design? What are the benefits and drawbacks of this strategy? Give a brief explanation using an example. Create transactions which execution could bring the DB to deadlock. Why it could occur? What could be done prevent or protect your DB from deadlock? Write a program that converts a time from 24-hour notation to 12-hour notation. The following is a sample interaction between the user and the program: One of the following can be found in both SNMPv1 & SNMPv2: A) Manager to manger messaging B) Get-next-request C) Row creation D) Row deletion Design a linear-time algorithm that verifies that the height information in an AVL tree is correctly maintained and that the balance property is in order. When pc1 wishes to connect with pc2 and pc3, how does Switch determine the Mac Address? With the use of a diagram, describe the procedure. show your work step by step Transcribed Image Text: 2. Perform the following binary division. Assume that all values are unsigned numbers. 10011011 / 111 Design a Circuit to perform the following Operation. A+B-C Where A, B and C are three binary numbers and each of them is three bits. Write a program to give the examples of operators. Pleasue use C++ with cin and cout * Arithmetic Operators * Logical Operators * Relational Operators Do symmetric encryption methods have advantages and disadvantages? In choosing on the kind of encryption to employ, what factors need to be taken into account? determine the number of integers among the first 100000 positive integers that contains exactly one 3, one 4 and one 5 in their decimal representative Translate roster method into rule method. a. A = {2, 3, 5, 7, 11, 13, …} b. B = {2, 3, 5, 7, 11, 13} 180. Which of the following is a common testing conducted by the developers? a. Unit testing b. Entry testing c. Phrase testing d. Code testing b) Write a Java program to make a cos() calculator, user enters a value x and the program prints the value of cos(x) in output. None Transcribed Image Text: (b) Write an 8051 assembly language program to program counter 1, in mode 2, C/T bit isl, count value is 05h. Which of the following statements is correct? To raise the value of a variable, use increment; to reduce the value of a variable, use decrement. Transcribed Image Text: 3. What are the attributes of good software? [Possible Multiple Answers] Easy to understand V Easy to use V Dependable V Maintainable 239. The tasks of data transfer and signaling are separated in modern a. data transfer network b. signaling network c. radio networks d. telephone networks Is it true or false? Transcribed Image Text: The statement: double d = (double) 7; results in a widening type conversion. O True O False i need the answer quickly Transcribed Image Text: 1. Implement the following operation using shift and arithmetic instructions. Assume that all parameters are word-sized. 9(AX)-6(BX)-(BX)/4?AX A linker is given object modules for a set of programs that were compiled separately. What information need to be included in an object module? Which file systems might you use if you have a 20 GByte disc volume and want an 8 KByte cluster size (to prevent wasting space)? Transcribed Image Text: 10. Threads advantages are ?. b. Lighter then process c. Shared codes and data d. Context switch is very slow e. a&b Where is the correct place to insert a JavaScript? The section Both the section and the section are correct The section

1.What are the range for IPv4 Address classes (tip: class A, B…)? Note : DO NOT COPY FROM OTHER WEBSITES. CORRECT AND DETAILED ANSWER ONLY!

Using their technological abilities to abuse other people’s machines is not something that software developers should do.” The word “misuse” relates to the following: why?

Many beginners are confused about the difference between the working of touch and of cat, could you please make the difference clear with an example

Which line of code reserves space in memory and which line puts a value into memory? LINE 1: int x; LINE 2: x = 1;

Can you write a Java code that works like this? Transcribed Image Text: Test Case 1
Enter an integer \n
O ENTER
0+ 1
1\n

What does it mean when data is leaked? what’s the story behind that? Who is responsible for this? how sensitive info is protected and detected?

To run the old system and the new system at the same time for a specified period, the system implementation approach used is parallel explain?

define each concept and explain how it contributes to the creation of security mechanisms that may be used to achieve desired security policies in companies.

Where is the correct place to insert a JavaScript? The section Both the section and the section are correct The section

I need the answer as soon as possible Transcribed Image Text: 8. How many address lines are
required to address 2 megabytes (2048K) of memory?

20. Which of the following is widely used inside the telephone system for long-haul data traffic? a. ISDN b. ATM c. Frame Relay d. ISTN

What is RAID 5 and how does it work? What circumstances would necessitate the deployment of RAID 5 rather than one of the other options?

105. In incremental process model, requirement and specification of software are collected in a. communication framework b. modeling framework c. deployment framework d. planning framework

Use logical equivalences (Theorem 2.1.1) to verify the logical equivalence of the statement: (p ? ( ? (? p? q))) ? (p? q) ? p

Every subtree rooted at any node of a 2-3 tree is a 2-3 tree in and of itself.

Choose one:

Is it true or false?

Give any two reasons why you believe it is critical for the computer. A programmer is someone who studies the organization and architecture of computers.

What is the most important distinction between connectionless communication and connectionoriented communication, and how can you identify the difference between the two types of communication?

Give an example of how each of the six kinds of assaults manifests itself on a network for each of the six types of attacks.

An attacker who controls multiple zombies in a botnet is known as a . a. zombie shepherd b. rogue IRC c. bot herder d. cyberrobot

please assist With regards to Java multi-threaded programming provide a definition of a task and thread, and discuss how these two concepts are related

To binary search for a key in a sorted array, the maximum number of comparisons is log2 n. Choose one: Is it true or false?

It is the safest and most reliable method to minimize the quantity of spam you get by using opt-out links Is it true or not?

Provide an overview of the internet of things. What makes the industrial internet of things unique? How does it stack up against the established network?

Python calendar library. Write a program that takes input year number from user and prints the calendar of whole year with day of each date.

89. The files in which the updates are performed rarely are classified as a. complete files b. duplicate files c. dynamic files d. static files

Examine and contrast the most significant links that exist between mobile devices and cloud computing. What are the advantages of cloud computing for mobile devices?

Static or dynamic routing? Which would you pick for a basic network? Which option would you pick if you had to choose between two options?

Transcribed Image Text: Q1. Write Syntax for each of the following in C++
environment:
i. Function Declaration
ii. ii. Function Definition
iii. iii. Function Overloading

CONSIDERING C LANGUAGE TRUE OR FALSE Radix sort is a linear sorting algorithm for integers that uses the concept of sorting names in alphabetical order.

Find the complement of the following bit string: 100011010 (write down the sequence of 0’s and 1’s without any blank space). hints:answer is 9 bit

1. During the encapsulation process, the information added before the data is considered a a) Trailer b) Protocol data unit (PDU) c) Frame d) Header

Transcribed Image Text: QUESTION 7
A (n)
trigger is assumed if a designer uses the FOR EACH ROW keywords.
row- level
instead of
statement-level
before

Description: Explain the flow control functions provided by the Transmission Control Protocol (TCP) and the methods that it employs to overcome the limitations of IP.

What are the four distinct categories of feasibility? Which kind is more concerned with overall cost of ownership? Which form is mainly affected by users?

Write a C program to take input 3 integers and print the result where result is:Sum of first two * absolute difference of last two.

161. Which of the following allows devices on one network to communicate with devices on another network? a. modern b. gateway c. t-switch d. multiplexer

When users, managers, and analysts all work together to collect and review requirements for an information system, this is referred to as a “structured process.”