of struct) 2.process item(dequeue, and put new item into list) 3. Disply item(sort the list

create “Online shopping System” with c++ following this option 1. Add item(using queue with array of struct) 2.process item(dequeue, and put new item into list) 3. Disply item(sort the list by using any sort method)

Transcribed Image Text: Write a c++ program to read a
sequence of numbers and stop
when the sum of odd numbers
equal to the sum of even
numbers and then print their sum
(using while)

A security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific example of what you mean.

Transcribed Image Text: Which of the following is NOT
a feature of the Python
programming language?
O a. Simple
O b. Free and Open
Source
O C. Easy to learn
o d. Low level language

Assuming the ocean’s level is currently rising at about 1.6 millimeters per year, create an application that displays the number of millimeters that the ocean will have risen each year for the next 25 years.

The three methods for doing a blind search should be explained. Which process do you believe is the most effective? Provide justifications and relevant instances. ‘Artificial Intelligence’ is a term that refers to artificial intelligence.

? Transcribed Image Text: QUESTION 17
To connect a workstation serial port to a router console port we use:
O a. Crossover
O b. Straight Through
O c. Rollover
O d. All of the above

Consider the opportunity of applying for a position with a neworganization.  What would you like the employer to know aboutyou?  How does your Strengths Test accent your potentialwithin that organization?   Please clarify your responsethrough examples.

AWS Lambda Function Please provide a lambda function with a lambda trigger and a deletion policy of any kind…(An example in other words). I am trying to do a demo for a CloudFormation stack 🙂

I could use some help with making a working code for a 12 hour clock system in verilog for my DE0lite or any other Fpga Board. I am being unable to get the results correct

Principles of Inforamtion Security Which of the following would provide the way to test operating system patches for a wide variety of computers before deployment? A. OS hardening B. Application control C. Virtualization D. Sandboxing

28)In the e-government audit approach; the key indicators of the portal level’s assessment are all of the following, except:
Select one:
a. Visitor base growth rate
b. Visitor conversion rate
c. Awareness
d. Service range

START ITEM A ACTIVITIES B C D E F G END ITEM H Prepare your own Network Diagram in order to reach the end item. Explain how you reach Item H in a paragraph form.

1. A.Write a program for displaying the string declared in an array, str[] = “hello”,in reverse order of characters using pointers. B.Write a program for initializing from another vector that will output 10 20 30

Registers are small, quick, stand-alone data storage places that are used to temporarily store information. in the central processing unit (CPU). List any three different kinds of registers and explain what they are used for.

I need the answer as soon as possible Transcribed Image Text: True or false
10 INPUT N
20 FOR I=1 TO N
30 INPUT X,Y
40 Z=Z+((X^2-3Y)/(Y+COS(X*3.14/180)))
50 NEXT I
60 PRINT Z
70 END

Compiler Design Transcribed Image Text: When using BNF to specify a programming language, the
of the
.grammar are comprised of the tokens produced by the lexical scanner
a) terminals
b) non-terminal
c) Productions
d) Rules

Suggest at least TWO possible control or counter-measure that could use to prevent one of the following threats: Malware, Denial of Service, Phishing, SQL Injection . Discuss why you think this is a valid countermeasure.

Give a detailed description of the flow of execution of a program using functions. Please reexamine the usage of function prototypes in order Include a description of how a function call works when a program

Transcribed Image Text: find count value *
Class counter
Int Count=D0;
Puplic:
counter():Count(9);
{}
void counter(int x)
{
www
Count=x;
Count-;
}
Void Main()
{counter c(8)
counter c1;
cout<< Count count=9 count37 counts8 ather answer Transcribed Image Text: Q2) 1) Is the following HTML file is valid?

test page




2) What does DOCTYPE mean?

What steps do you believe are necessary to ensure the security of data at rest and in transit? Furthermore, which security method is more successful in terms of data integrity protection and user authentication protection.

91. The _____ scheme uses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-level signal. a. 4B5B b. 2B1Q c. MLT-3 d. none of the above

>ython program to check prime number take user input – | am beginner to programming help Transcribed Image Text: python program
to check prime number
input
I am beginner to programming help me
take user

Is the internet useful for those with disabilities, whether they’re physical or mental? What new technology do you think will be developed to help those who have special needs? • Should assistive technology be open-sourced?

i. How can a mixed network be converted into a directed network? ii. Distinguish between the various types of arcs in network model iii. In one sentence carefully distinguish between feasible solution and optimal solution

Create a JavaScript program to compute the sum of the two given integers. If the two values are same, then returns triple their sum. Take sample values as, (12,10) and (13,13) to test the code.

Your goal is to build a page that has a button and text that wraps around the left edge of the button. Which CSS property and value should be used to create the button’s appearance?

When is breadth-first search is optimal? Select one: a. When there is less number of nodes b. When all step costs are equal c. When all step costs are unequal d. All of the above

Which architectural pattern is best for applications in which one component generates data and another uses it? Explain the pattern with two real-life examples, or write a piece of code to demonstrate how it works.

Solution by Matlab language Transcribed Image Text: Q4:
Use the funetions for plotting x-y data for plotting the following functions:
() f() =t cos(t)
(ii) x =e
y = 100 + e
0SIS2 step 0.06

Write a function in C++ that takes a list as input and prints all the unique values in the array only once, i.e., if a value is repeated it should be printed only once .

3. Write a program in C++ to find the Greatest Common Divisor (GCD) of two numbers iteratively. Sample Output: Input the first number: 12 Input the second number: 8 The Greatest Common Divisor is: 4

The following 6-bit signed binary numbers were found in a computer. What decimal numbers do they represent? A) 010111 B) 111011 give me full details or will dislike and correct answer don’t copy and paste

A _____ is a product or service, such as a technical report, a training session, or hardware, produced or provided as part of a project. a. deliverable b. product c. work package d. tangible goal

188. Terminals are required for …………….. a. real-time, batch processing & time-sharing b. real time, time-sharing & distributed message processing c. real time, distributed processing & manager inquiry d. real-time, time sharing & message switching

c++ Transcribed Image Text: Evaluating Output.
What is the output from the following code segment?
int point = 1;
while ( point ! = 13)
{
cout << point << ", "; point +=3; } • Describe in detail the procedures necessary to do the following activities in Microsoft Office Word: 4) Insert a heading into the document. 5)Insert a hyperlink to another document to which you want to connect. Q3: Design a form with a text box in visual basic . Use select statement so that when user enters g, b, r and respectively. y then form colored to green, blue, red, and yellow Considering software evolution; What are the strategic options for legacy system evolution? When would you normally replace all part of a system rather than continue maintenance of the software?  I appreciate your help, thank you How may auditing and accountability improve an IT infrastructure’s overall architectural design, according to NIST SP 800-53 Rev 4 Appendix F: Security Control Catalog – AU: Audit and Accountability? Give concrete instances if you can. Consider Greg Linden’s illustration of search engines learning by observing which search results users click. What are the advantages of having this information for the search engine company (e.g., Google or Microsoft in Linder’s examples)? When is it appropriate to use Excel to create a table in Word rather than a spreadsheet program such as Excel? What are some of the advantages and disadvantages of creating a table in Word? With the advancement of technology, the majority of appliances are wireless-capable nowadays. Is it true that wireless information appliances and services have an effect on corporate Internet and Web usage in the business sector? Why? m beginner in java Transcribed Image Text: java program take an array ( 11 size) of character from user and make a string from these entries and print this string I am beginner in java Transcribed Image Text: 22 * :Calculate the object code for the instruction at address 1086 53AFD9 Transcribed Image Text: 23 :Calculate the object code for the instruction at address 108E ?B25 24 and End records) What is the difference between database security and system security when it comes to protecting the database? When creating web-based data designs, does it matter? If this is the case, what steps should I take? Transcribed Image Text: 7. Which Which o as a quadratic so 8. Which data structure allows deleting data elements from front and inserting at rear? A. Stacks B.Queues C. Binary search trees D. Hash tables Please solve Quickly Matlab programming language Transcribed Image Text: What is the output of the following code? X-[123 4… 1: A row vector. A column vector. A row vector concatenated with a null vector. error What is the definition of physical security? What are the most serious risks to physical security in today’s world? What manifestations do they take in assaults on the organization and how do they show themselves? Transcribed Image Text: is a statistical metric indicating how well a model fits the data? O a. Relative Squared Error O b. Relative Absolute Error O. Root Mean Squared Error O d. Coefficient of Determination Transcribed Image Text: /*Write C++ program to creat a class named (Student) which includes functions getName, getMark and displayInfo to enter and display the information (names and marks) of 5 students using array of objects*/ An Abstract Data Type (ADT) is a data type that contains just variables, without information about their values. ADTs have many benefits. By reducing the issue to its simplest parts, it becomes easier to solve. Transcribed Image Text: Write a MATLAB program that used to calculate the factorial of any integer number that may read from the key board by using a)Script file only. b)By using function and script file. computer science dont post copied answer posting mutliple times Transcribed Image Text: Provide the type (I, R, or J) I and hexadecimal representation (begin with Ox, e.g., OXAA230103) of the following instruction: sw $s1, 4($t2) C++ Programming double slope (point* other ) Calculate the slope of this point and the other point. The formula for slope is m=(y 2 – y 1 ) / (x 2 – x 1 ) Answer both questions must else downvote Transcribed Image Text: 1. Write a Python program to print every key-value pair of a dictionary line by line. 2. Write a Python program to merge two Python dictionaries. Which of the following is the “part-whole” or “a-part-of” relationship in which objects representing the component of something are associated with an object representing the entire assembly? a. Generalization b. Specialization c. Aggregation d. None Explain whether “undecidable” is a way to represent null value or default value if a student has not chosen a major at a university and the value of “undecided” is entered for the major field. Choose which answers are correct Which among the following is not a method to do unit commitment ? a . Dynamic programming b . Lambda iteration c. Brute force technique d . Priority list method In programming Languages that support bytecode (i.e. Java), the bytecode may beused by a byte code interpreter or a JIT compiler to be translated into the assembly code of the target machine. True or false How do you fix the if statement in java, so that city can equal to multiply different cities Transcribed Image Text: if ((province.equals(“ontario”)) & (age.equals(“yes”) & (city.equals (“toronto” & city.equals(“scarborough”) & city.equals(“etobicoke”) & city.equals(“brampton”))))) { Aim: – Subtract two numbers, check for negative. IF the result is negative store the number in 2000H. If it is positive, increment the result once and store it in 2005H. ? Platform Required:- sim8085 In your own words, make a compelling argument for and against the benefits and drawbacks of division of duties in an organization’s information security policy, drawing on a practical example from your own professional experience. Is security policy different from information security standards in that it is considered as static or dynamic, as opposed to the latter? What variables could play a role in deciding the outcome of this scenario? Transcribed Image Text: Which of the following is/are examples of dynamic programming? I) Tower of Hanoi II) Merge sort III) Knapsack problem IV) Strassen’s matrix multiplication IV None O I, III, IV O I, III Transcribed Image Text: A digital system of an n bit. The total number of its samples 1024. The value of n i . Select one: O a. 11 O b.8 O c9 O d. 10 Given two integers in the program, write a program to check whether sum of those numbers is greater than 100 or not. For sample output take numbers as 62 and 57. Use Kotlin programming language. Write in decimal form the IP address 11000001. 00000001. 10000000. 10000001 Group of answer options 193.1.128.129Links to an external site. 193.1.64.65Links to an external site. 63.101.128.129Links to an external site. 193.1.128.229Links to an external site. Design a method to draw the following pattern: The name of the method has the following prototype: private static void drawPattern (int height) Transcribed Image Text: 1*1 12**21 123***321 1234****4321 12345*****54321 123456******654321 1234567*******7654321 12345678********87654321 123456789*********987654321 i need the answer quickly Transcribed Image Text: 5/ The modulus operator uses character. A. + B. * C./ D. % 6/ Variable names must begin with ?. S A. letter C. number D. # In java create a function that writes student name surname and id to a text file and call the function (registerstd) in main function.  the function must accept the arguments name , surname and ID Explain how database management software helps business professionals and supports the operations and management of a business. How should a business store, access, and distribute data and information about its internal operations and external environment a) What are the different varieties of COTS software? Give an example for each of them. b) Differentiate among: font, font size, and font style. c) Describe issues that might arise when using legal software. What is the difference between screened host architectures for firewalls and screened subnet architectures for firewalls? As a result, which of these provides more protection for information assets that stay on the trusted network? Why? Transcribed Image Text: factoring O Adding new functionalities 18. The X-axis of the sequence diagram represents O Time O objects O Activation O Messages 19. Understand and define the context and the external interactions wit None Transcribed Image Text: 2. For 80286 processor which has a 24 bit address bus, maximum amount of addresses for single operation is b) 4 M d) 16 M a) 2 M c) 8 M 160. ISDN is a group of __________ standards relating to digital transmission across conventional copper wire telephone lines, as also other media. a. CCITT b. ITU c. Both a & b d. None of these 22. The message 11001001 is to be transmitted  using the CRC  polynomial  x3 +1 to protect it from errors. The message that should  be transmitted is : a. 110010011001 b. 11001001 c. 110010011001001 d. 11001001011 Transcribed Image Text: What type of RJ45 UTP cable do you use to connect a PC’s COM port to a router or switch console port? O Straight-through Crossover cable Crossover with a CSU/DSU O Rolled Human Computer Interaction There are some important features of interactive system in website design. Give a brief description with example for the given feature below: “Systems which can self-adapt intelligently in response to user performance” A security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific example of what you mean. Transcribed Image Text: O Maintenance 6. Any constraint on the development process is: * O Functional requirement O External requirement O Product requirement O Organizational requirement 7. Which of these factors may affect porfe ma Transcribed Image Text: Which term is used for minimizing attack surface in Operating Systems? Your answer: O Operating system hardening O Operating system minimizing O Operating system fortifying Operating system empowering O Operating system leveraging Transcribed Image Text: 2.12 LAB: Divide by x Write a program using integers user_num and x as input, and output user_num divided by x three tim Ex: If the input is: 2000 2 Then th q19 Transcribed Image Text: Building the entities, attributes, constraints, and relationships in a particular RDBMS is called the physical-level design a O conceptual design .b O entity-relationship (E-R) design .c O information-level design .d O 137. What is a search key in sequential file organization? a. A number assigned to each record b. Necessarily the primary key c. Any attribute or a set of attributes d. None of the mentioned what is the correct answe Transcribed Image Text: Which of the following mechanisms is used to implement the reuse of the operations depending upon the instance? a. Encapsulation b. Abstraction O . Polymorphism d. Inheritance A _________ is the second smallest unit represented in the data hierarchy and is represented is composed of a series of _______that can take on either a 0 or 1 value. -character;bit -byte;bit -field;bit -field;character Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. When_________organization is used, a hashing procedure determines where data is stored. Write a program to calculate the energy bill. Input the meter readings and find the energy bill when consumed energy is greater than or equal to 300 units then the rate is 3.50/unit otherwise 1.50/unit. Write a C++ function to take input two positive integers from the user and return true if the last digit of both numbers is same, else return false. Also test the function inside main function. I need the answer as soon as possible Transcribed Image Text: We had a file named a.txt and something is written on it. Write a program in python to get the letters in that file 15) In the e-government audit approach; the key indicators of the user level’s assessment are all of the following, except: Select one: a. Visitor base growth rate b. User satisfaction c. Awareness d. User recommendation i need the answer quickly Transcribed Image Text: ) ??????? Write C++ a program takes an array and checks if it is a square matrix or not , then print the diameters .(Use the function) The famous “1984” commercial was revolutionary in that it framed the computer revolution as a battle between an upstart rebel company and “Big Brother” . . . or Apple versus IBM a. True b. False ________ is a type of transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal. a. Attenuation b. Distortion c. Noise d. Decibel Transcribed Image Text: 12- Find the result for the following. a- (-27)10 +(-41)10 (in binary, then convert the answer to decimal) b- (45)10 +(78)10 in BCD code c- (CF)16 – (56)s in Hex.(using two method) Transcribed Image Text: Construct an E-R diagram for a local car-insurance company in Salalah, whose customers own one or more cars each. Each car has associated with it zero to any number of recorded accidents. Use the construction given in the proof of Theorem 1.49 to give a state diagram of an NFA recognizing the Kleene star L ? of the language L = {w|w contains at least three 1’s}. Transcribed Image Text: Head ??? A D 5 3. 2. In the above Self Organizing List, how the list would look like after the following 2 operations? Access D “Transpose” Access F “Move to Front” Transcribed Image Text: Which one is true for cookies? O They contain data about the client. O They are stored in the server. O They send data to the server. O They are executable programms. What must the attacker perform in order for a sniffer attack to be successful? Is it possible for an attacker to obtain access to a network in order to make use of the sniffer system? 182. Which of the following is a myth in testing? a. Tester can find bugs b. Any user can test software c. Missed defects are not due to testers d. Complete testing is not possible dr java Transcribed Image Text: What is the result of executing the following code? int i = 1; do { i++; } while (i > 5);
System.out.println (i) ;
3
4.
O 2
O 1

67. The command in high level programming which completes the release of buffers and perform other cleanup operations remaining is classified as a. read command b. find next command c. close command d. insert command

Explain briefly the following Object Oriented concepts. (a) Local variable (b) Instance variable (c) Method (d) Inheritance (e) Constructor (f) Encapsulation (getters and setters) (g) Method overloading (h) Method overriding (i) Super keyword (j) Interface

1. Write a program in C++ to find the Greatest Common Divisor (GCD) of two numbers iteratively. Sample Output: Input the first number: 12 Input the second number: 8 The Greatest Common Divisor is: 4

Answer within 1 minute else I will dislike for wasting my question. Write C ++ program to add two numbers a=16 and b= -8 and print the sum. Add output screenshot. Needed Within 1 minute.

14. The media file is streamed to the client but is only played and not stored by the client in : a. progressive download b. regular download c. real time streaming d. virtual time streaming

Suppose a processor executes 12 instructions.  Each of these instructions required 5 clock pulses to complete.  The processor has a clock period of 4 nanoseconds.  What is the CPU time of these instructions (in nanoseconds)?

The cloud computing characteristic that gives the illusion of infinite computing resources provisioned or released according to demand is known as: Select one: Measured service Resource pooling Ubiquitous network access Rapid elasticity On-demand self service

Choose the best Transcribed Image Text: In which of the following computer language, translation is not required?
O a. Assembly Language
O b. Low Level Language
c. None of these
O d. gh Level Language

Q: Find a recurrence relation and give initial conditions for the number of bit strings of length n that do not have two consecutive 0s. How many such bit strings are there of length five?

Transcribed Image Text: What is the output after excuted the following statements:
int y=1, x;
y=y+2*4;
X—y;
if(x)
cout<
using namespace std;
void myfunction(int num2, int num1);
int main(){
myfunction (5,2);
return e;}
void myfunction(int num1, int num2)
| {if (num1>3)
cout<<"A1"; else if (num1<3) cout<<"A2"; else cout<<"A3";} Transcribed Image Text: An example on propositional logic O a. “x + 2 = x 2.” O b. “x is the parent of y.” O C. Socrates is a man O d. “x is human.” Registers are small, quick, stand-alone data storage places that are used to temporarily store information. in the central processing unit (CPU). List any three different kinds of registers and explain what they are used for. When it comes to detecting fraud, what types of processes are in place: In the context of network reconnaissance, network sniffing may be defined as follows: (a) (c) Is the potential of wiretapping a consideration? In the transport layer, TCP offers full duplex, connection-oriented and dependable delivery services. TCP is a transport protocol. We use the terms connection-oriented, dependable delivery, and full duplex interchangeably, but what exactly do they mean? Write and test a function to meet this specification. toNumbers (strList) strList is a list of strings, each of which represents a number. Modifies each entry in the list by converting it to a number. Transcribed Image Text: What value would p take after the following statement: p = 1; X = 3; if (x > 1)
p = p
x;
if (x > 2)
p =
x;
p 3D

Identify an acceptable usage guideline that is fair to both students and instructors. Internet usage during school hours and breaks should be governed by rules that also govern the use of cellphones and social media.

Transcribed Image Text: Processor must be able to perform the following…. (select as appropriate).
Select one or more:
a.
Fetch data.
b.
Write data.
?.
Interpret instruction.
d. Fetch Instruction.
e.
None of the above.

Software entity running on one or more machines and providing a particular type of function to a priori unknown clients is called________. (a) Client (b) Server (c) Service (d) Process (e) None of the above.

Investigate the importance that wireless networks play in the developing countries today. In certain locations, LANs and physical cables have been replaced with wireless systems. Is there a benefit or a drawback in doing this?

I need the answer as soon as possible Transcribed Image Text: Which of the followings are .21
advantages for prototypes? [Multiple
Answers]
Reducing the development effort
Improving usability O
Helping in requirements
elicitation
Improving maintainability

fill6-)Dynamics for s during deccelaration % s1=s, s2=sdot, x=[s1,s2]’; ODE: ds1/dt=s2, ds2/dt=sdotdot=? fill7-)%Dynamics for s during accelaration % s1=s, s2=sdot, x=[s1,s2]’; ODE: ds1/dt=s2, ds2/dt=sdotdot=? whats the answer of fill6-7 f_L=@(t,s)[s(2); %FILL6% ]; f_U=@(t,s)[s(2); %FILL7% ];

Which architectural pattern is best for applications in which one component generates data and another uses it? Explain the pattern with two real-life examples, or write a piece of code to demonstrate how it works.

66. If the current number of records are 92, blocking factor is 20 and the number of file buckets are 5 then the file load factor is a. 0.85 b. 0.92 c. 0.35 d. 0.46

Which configuration topology has a single master, a single proxy node, and then three worker nodes and is great for a non-production testing environment? Select one: gh Availability installation Standard installation Test installation Simple installation

Transcribed Image Text: QUESTION 1
HBRCOA19: Analytics competitors know how their operational costs relate to their financial performance by using
all of these
none of these
complex models
time and motion studies
credit card records

Compiler is a translator that translates a high level program into its equivalent machine language program. Does compiler affect CPU performance. If yes? Then how does it possible? Justify your answer with some valid reasons?

Assuming 8-bit memory addresses, show the active-high chip enable (CE) logic for a 32 x 8 memory module if its placement occupied the range of locations … (a) 32 to 63 (b) 96 to 127

1. Explain 2 suitable MIS application software in CRM.
2. Compare both software in term of business functions supported, technology platforms, cost and ease of use.
3. Choose 1 software of that and give reason.

Don’t copy Transcribed Image Text: Suppose an integer a has order, r =
5, under mod M, where M = 100. If
we take quantum sampling, what will happen to the order under mod M?

arrayA = ([[1, 2], [3, 4]]) arrayB = ([[5, 6, 7], [8, 9, 10]]) python numpy code to multiply array a and b to get result below arrayB = ([[5, 12, 7], [24, 36, 10]])

Cloud computing is a kind of abstraction which is based on the notion of combining physical resources and represents them as _______resources to users. a. Real b. Cloud c. Virtual d. none of the mentioned

Transcribed Image Text: Q7/ Suppose you have the following figure, find out the following constrains:
For the map coloring problem on the left:
(CLO 4Y
Variables:
Domains:
•Constraints: –
Solution:
WA
NT
SA
NSW
V.

Transcribed Image Text: QWrite a Fortran 90 program to read all positive five digits
integer numbers which have the suum of the three interior
digits are equal to the sum of the two external digits.

I need solution in bash code with algorithm Transcribed Image Text: pm
main.bash
1
Task 2 (c)
Check whether the given input is palindrome or
not
input
Command
Standard Input: O Interactive Console
O Text

What is the difference between screened host architectures for firewalls and screened subnet architectures for firewalls? As a result, which of these provides more protection for information assets that stay on the trusted network? Why?

Predict the output of following program int f(int n){ if(n <= 1) return 1; if(n%2 == 0) return f(n/2); return f(n/2) + f(n/2+1); } void main(){ cout<< f(11); } nOTE: SOLVE AS SOON AS POSSIBLE Transcribed Image Text: Consider the Markov chain with three states, S={1,2,3}, that has the following transition matrix YA P= Draw the state transition diagram for this chain. If we know P(X1=1) =P(Xi=2)=1/4, find P(X1=3, X2=2,X3=1) A security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific example of what you mean. A user opens multiple internet applications on his PC. The user’s PC will differentiate the applications currently running on it based on _____. a.source port number b.destination IP address c.source IP address d.destination port number Please write the code in the nodejs and use the localhost server to show the current date and time by creating a function. Please write the code only in Node js the address: – http://localhost:8080/ What would happen – over time – to packets arriving at Router M in the following scenario? Explain Transcribed Image Text: A R= 10 Mb/s R= 12 Mb/s Queue of packets buffered at M link How may auditing and accountability improve an IT infrastructure’s overall architectural design, according to NIST SP 800-53 Rev 4 Appendix F: Security Control Catalog – AU: Audit and Accountability? Give concrete instances if you can. computer science dont post copied answer posting mutliple times Transcribed Image Text: Provide the type (I, R, or J) I and hexadecimal representation (begin with Ox, e.g., OXAA230103) of the following instruction: sw $s1, 4($t2) 51. The command used in high level programs to transfer the record block in to the main memory buffer is classified as a. modify command b. insert command c. read command d. find next command Which of the timer is responsible for keeping the window size information flowing even if the other end closes its receiver window? A. Retransmission timer B. Persistent timer C. Keep alive timer D. Time-wait timer What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? What is the triple constraint? What other factors affect a project? computer science dont post copied answer posting mutliple times Transcribed Image Text: Provide the type (I, R, or J) I and hexadecimal representation (begin with Ox, e.g., OXAA230103) of the following instruction: sw $s1, 4($t2) Design an algorithm to align two sequences A and B so that the beginning part of at least one of the sequences and the ending part of at least one of the sequences are included. Transcribed Image Text: 10 The concept is primarily applied to random-access memory and consists of the access time plus any additional time required before second access can commence. Controller Transfer rate latency Memory cycle time Transcribed Image Text: What rules of inference are used in this argument? “It is either colder than malaya today or the pollution is harmful. It is hotter than malaya today. Therefore, the pollution is harmful.” When it comes to creating software, what four qualities are most important? Please give your views on the additional four characteristics that should be included into the software development process in order to improve efficiency. Identify the attack that exploits the TCP three-way handshake to deplete the resources of the targeted server and prevent it from responding to legitimate connection requests? SYN Spoofing UPD Flood Ping to death ICMP Flood How many times will the following code will print “Final Test”? three times none one time four times Transcribed Image Text: int i 3; do { i–: System.out.println (“Final Test”); } while (i > 0);

In Python language- Write a program to read a string input from user and print the first 3 characters of that string. You can assume that string length is always greater or equal to 3.

Language:java Transcribed Image Text: Assume that int a 5 and double d= 5.0, what is the result of a in the following expression?
= 16 + 34 % 4 (60 6% 2)
Enter your anawer

solve (Web development) Transcribed Image Text: In HTML

; the
used to set the name and location of the script that will process the form.
O method attribute
process attribute
O href attribute
action attribute

Transcribed Image Text: Q10: Write C++ program to read x and compute the following:
x2+5x – 20
2x
if x > 0
Y =
if x = 0
x2 + (5x) 2 – 10 ifx<0 In order to carry out a commercial transaction over the Internet, we must ensure safe access from our browser to a Web server that hosts the transaction details using public key and private key encryption. After the execution of the following program, the content of PORTB is: PORTB  EQU  OF81H MOVLW OFFH MOVWF  PORTB BCF  PORTB, 0 Select one: a. 11111110 binary b. 11111101 binary c. 01111111 binary d. 0FFH What sentinel should be put before the first element of an array being sorted in order to avoid checking the in-bound condition j ? 0 on each iteration of the inner loop of insertion sort? Transcribed Image Text: 13. The maximum distance between two antenna for LOS transmission if one antenna is 100m high and the other is at 10 m high is ? * 5 45.5 46.2 64.2 25.4 Please provide a clear answer to your own work. DON’T COPY FROM CHEGG Transcribed Image Text: 8. Show the order of nodes visited during a BFS traversal of the graph below, with start node 0. Use Matlab please Transcribed Image Text: Write a program that generates a vector with 30 random integers between -20 and 20 and then finds the sum of all the elements that are divisible by 3. in C++ Given an array with 35 integers, print out only those numbers that occur more than once. Explain first, in English, how you would do this.  Then write a program to solve the problem. 1. What is operating system? a. collection of programs that manages hardware resources b. system service provider to the application programs c. link to interface the hardware and application programs d. all of the mentioned Transcribed Image Text: What is the output of this code? def main(): x = myfun(5) y = myfun(4) z = myfun(2) print(x +y + z) def myfun(p): ans = p * 3 return ans main() With the help of a program in C language print the pattern shown below: 1 1 2 1 2 3 1 2 3 4 1 2 3 4 5 1 2 3 4 5 6 Transcribed Image Text: (3(1+xn)’ Starting with xo = 2, using the iteration formula Xn+1 = Xn Evaluate b. Xn+2 ?. Xs ?nd x, b. Write a simple program to generate values for x1 and x20 For a mental health support program that exclusively provides services via the internet, what software architectural type would you choose? (mobile app). Justify your response and provide any assumptions you used to get at it. Write sql query to create given table. Transcribed Image Text: TABLE- BONUS WORKER_REF_ID BONUS_DATE BONUS_AMOUNT 1 2015-04-20 00:00:00 5000 2 2015-08-11 O0:00:00 3000 3 2015-04-20 00:00:00 4000 1 2015-04-20 00:00:00 4500 2 2015-08-11 00:00:00 3500 Consider Greg Linden’s illustration of search engines learning by observing which search results users click. What are the advantages of having this information for the search engine company (e.g., Google or Microsoft in Linder’s examples)? Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided The terms front end and back end refer to____________ database systems. Note: Don’t copy from google give a conceptional answer Question: What are some ideal practices for off-page SEO and What should be an ideal Do follow to No-follow backlinks ratio for the site’s backlinks profile? Given the code: int a[10] = {1,2,3}; 1. Write a loop to print the array to the console. 2. Write the output of this code (what you see in the console when the loop runs). To the server 90% of accesses are local, 9% are being outside the server but in the rack, and 1% are being outside the rack will be having average memory latency of 12.09 microseconds why? Write a program to calculate the energy bill. Input the meter readings and find the energy bill when consumed energy is greater than or equal to 300 units then the rate is 3.50/unit otherwise 1.50/unit. Intrusion Detection: Describe the configuration of intrusion detection systems, specifically addressing the following: i. Whitelisting and blacklisting ii. IDS placement iii. Summarize the key aspects of monitoring, logging (auditing), and alerting using intrusion detection systems I need the answer as soon as possible Transcribed Image Text: Consider a system with 80% hit ratio, 50 ns time search the associative registers, 750 ns to access memory. Find the effective access time. 20 – Which of the following options is the correct name of the finite state machine in which the outputs depend only on the current state ? a) O Moore Mode l b) Mealy Model Create a stack and push first 10 odd numbers (start from 1) in it. With the help of another stack convert all the first 10 odd numbers to even number (start from 2). In C++ I need the answer quickly Transcribed Image Text: Homework: Homework01. Write on a paper a Java program that prints a-) the names of your family members b-) their ages c-) the sum of their ages How do cloud computing advantages compare? What are the cloud computing dangers and challenges? Do the advantages of cloud computing outweigh the drawbacks? Is it required to believe? What if you were in these situations: Use Android Studio #22. Create a XML layout in Android Studio IDE for the following requirements. Linear layout(background color = #FFEB3B) TextView (text = CalenderView Demo, background color = #4CAF50) CalenderView Button (text = Next) Write a Swift program to create a new string made of a copy of the first two characters of a given string. If the given string is shorter than length 2, return whatever there is. None Transcribed Image Text: A class which implements the ActionListener interface must implement which method? O void actionPerformed( ActionEvent e) O String getActionCommand( ActionEvent e) O void eventDispatched( AWTEvent e) O void handle( ActionEvent e) DO NOT COPY FROM OTHER WEBSITES Correct answer will be Upvoted else downvoted directly. Thank you! Transcribed Image Text: Find the two… (a) smallest primitive elements mod 109 (b) largest primitive clements mod 113 … Write a Java program to create five threads with different priorities. Send two threads of the highest priority to sleep state. Check the aliveness of the threads and mark which thread is long lasting . Question.a.The parser LEX and YACC produces the explicit state machine. This helps in scanning and syntactically checking the source program.Using object oriented languages, it is convenient to create state machine mechanism.Explain Control as Concurrent Tasks. 7- Speakers use in order to extract the data to user through printed text.True or False Transcribed Image Text: 7- Speakers use in order to extract the data to user through printed text.” True False None Transcribed Image Text: subject Power Quallity: What does FFT mean? What does RSS mean? What does THD mean? What does TDD mean? What does PCC mean? What does FLA mean? What does IEEE mean? Choose one answer.  In deep neural networks local minima are Select one: a. highly unlikely to be a problem b. a serious problem c. guaranteed to never be a problem d. identical to local maxima Ravi thinks of a numbee. He multiplies the number 5 and then add adds 10 design a flow diagram to show the relationship. Represent the input values using × and tge output value using y using Systems Applications and Products in Data Processing,  three features that is appreciative most and  will help make the task of acocuntants flawless and three challenges encounter using SAP Business one as an accounting system. Identity repositories directory systems, authentication systems, and single sign-on services are all attractive targets for attackers. What are the threats on protocols and services such as LDAP, Oauth & OpenID, Kerberos, RADUIS, and Active Directory? Order the following functions by asymptotic growth rate: 4n log n +2n 3n + 100 n log n n 2 + 10n 2 10 4n n 3 2 log n 2 n n log n Create a table of at least 4 columns and fill it with data to simulate the insertion, update, and deletion anomalies. Explain how each of the anomalies would happen and the problem that would arise. When the sender and the receiver of an email are on the same system, we need only ___________. a. one UA b. two UAs c. one UA and one MTA d. none of the above Transcribed Image Text: :02 72%* © Passing data by reference from program to a subroutine and back to the program is done using: ???? ???? ???????? Control hardwar. Pointer to memory locations Registers Control instructions In order to carry out a commercial transaction over the Internet, we must ensure safe access from our browser to a Web server that hosts the transaction details using public key and private key encryption. The equals () method is used to: see if two objects have the same content compare two primitive data type values see if two objects have the same reference assign a content to an object For the 8-bit word 01101011, calculate the check bits. Suppose when the word is read from memory, the check bits are calculated to be 0110. What is the data word that was read from memory? computer science dont post copied answer posting mutliple times Transcribed Image Text: Provide the type (I, R, or J) I and hexadecimal representation (begin with Ox, e.g., OXAA230103) of the following instruction: sw $s1, 4($t2) What are connection pools exactly? They have a number of benefits when it comes to application architecture. Are there any particular advantages? Are there any drawbacks to this? Using connection pools has several significant disadvantages. Transcribed Image Text: Find the values of the two-valued variables A, B, C, and D by solving the set of simultaneous equations. A+ AB = 0 AB = AC AB + AC+ CD = CD In a JK flip-flop, if the current state is 0 and we want to set it to 1. K should be 0 K should be 1 K could be any value J should be 1 To the server 90% of accesses are local, 9% are being outside the server but in the rack, and 1% are being outside the rack will be having average memory latency of 12.09 microseconds why? Transcribed Image Text: 10 Implement the simplified expression for the following figure using NOR gates only: O X NOR Y’) O No correct answer O X NOR Y (X NOR Y’) O X NOR Y) What must the attacker perform in order for a sniffer attack to be successful? Is it possible for an attacker to obtain access to a network in order to make use of the sniffer system? Flowchart with handwritten code In 8085 code Please do fast.. Transcribed Image Text: Statement : Add the contents of memory locations 2000H and 2001H and place the result in the memory locations 2002H and 2003H. Transcribed Image Text: In the instruction MOV [BX+SI+BA H], DX the value present in DL will be stored in MA and the value present in DH will be stored in MA+1. Select one: True False We can’t even fathom a world without the web. Consider how life might be different if you weren’t able to use the Internet. Describe the difficulties you’d encounter if you found yourself in this situation. Design a sequential circuit that can recognize the sequence 1010 using JK flip flop. You haveto find the followings: i) State diagram. ii) State table with Flip-flop inputs. iii) K-map minimization of input and outputs. SEO refers to Oa. Programming keywords to your website Ob. Evaluate each of the website ? C. Amount number of links coming to your website d. Number of search engines sites your site has submitted Transcribed Image Text: Consider the family of Grammar G(n) defined by: S? A;b¡ A;? a;A¡ / (1 <= i<= n) (1 <= j>cout<0)
<. e3x2 x< 0) Transcribed Image Text: Apply the Best fit algorithm to allocate a new job of size 10 (- H1 H2 H3 ?4 H5 H6 H7 H8 H9 22 11 13 12 55 17 6 80 29 After the execution of the following program, the content of PORTB is: PORTB EQU 0F81H MOVLW 0FFH MOVWF PORTB BSF PORTB, 7 Select one: a. 0FFH b. 11111110 binary c. 01111111 binary d. 11111101 binary Grammar: S –> A a | B b A –> B C | C f B –> b | a C C –> e b) Fill the parsing table with suitable error codes / messages

The primary reason why the Internet plays such an important role in e-government is because it serves as a highly efficient worldwide networking and communication infrastructure. Pick a category: A true statement is called “true.”

What will be the output of the following C++ code? #include #include using namespace std; int main() { cout << setprecision(17); double d = 0.1; cout << d << endl; return 0; } Identify if TRUE or FALSE: Question 1. 243 5 is equal to 73 10 Question 2. The signed binary of -6 is 1111 1010 2 Question 3. 0100 0111 bcd = 0111 1010 3-excess code The 8085 programming manual says that it takes seven T States to fetch and execute the MOV instruction. If the system clock has a frequency of 2.5 MHz, how long is an instruction cycle ? Use the Master Theorem to find the complexity class ( ? notation ) of the following recurrences a) T(n) = 4T(n/2) + n3 b) T(n) = 4T(n/3) + n c) T(n) = 4T(n/3) + n2 The three methods for doing a blind search should be explained. Which process do you believe is the most effective? Provide justifications and relevant instances. ‘Artificial Intelligence’ is a term that refers to artificial intelligence. Transcribed Image Text: P Flag question In computer system, the operation of each individual component as part of the structure is the definition of: a. RAM O b. Structure O c. Function O d. Cloud the strlng In C++, use of 1nbu11t fuq;t;??s?isiéilmtéé- – Transcribed Image Text: Take input a string having lowercase alphabets only. Convert the string from lowercase to uppercase. In C++, use of inbuilt functions is allowed. Which configuration topology has a single master, a single proxy node, and then three worker nodes and is great for a non-production testing environment? Select one: gh Availability installation Standard installation Test installation Simple installation Transcribed Image Text: PROBLEM # 2-44 I Prove or disprove that these two gates produce the same output given the same inputs. Cite the laws and theorems used. D Do Figure 2.14: Equivalent gates? #1 . Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards? A. Daughterboard B. Motherboard C. Fatherboard D. Breadboard E. None of the above Cybercrime is any illegal behavior directed by means of electronic operations that targets the security of computers systems and the data processed by them. Briefly discuss any two categories of cybercrimes within the African context. Solve with in 5 min Solve only if you had knowledge else you can skip Write a program in machine independent language to find gcd of two number in recursive manner. Take input from user 1- What is the return type of getAddress() method of InetAddress? byte String byte[] int —————————- 2- What Specify the method name to write the data in URL connection using CGI? CGIWRITE PUT WRITE POST In an encrypted communication path between A and B, Rahman is trying to understand some messages without knowing the keys. This process is known as: a. Cryptanalysis b. Traffic analysis c. Identity spoofing d. Repudiation Java Program that will result to this output like on the picture. Transcribed Image Text: Enter a radius: 10 Menu [A]rea [C]ircumference [D]iameter [Q]uit Enter your choice: A The area of the circle is 314.16 Enterprise information systems gather data from throughout the organization and are often a driving force behind successful ICT implementation. Examine the benefits and drawbacks of enterprise-based solutions for maximizing the use of ICT in businesses. Transcribed Image Text: In the expression A + BC, the total number of minterms will be . (hit use draw Kmap) Select one: O a. 2 O b. 5 O c. 3 O d. 4 hysical security is concerned with protecting computer hardware from human tampering and natural disasters and __________ security is concerned with protecting software from unauthorised tampering or damage. a) data b) cyber c) Internet d) metaphysical Transcribed Image Text: Base on given Ethernet types of networks, complete the correct features for each Feature 10Base2 10BaseT 100BaseFX 100BaseTX 10base5 Supported Media (cable used) Distance [m] Transfer Speed (Mbit/s] Topology or topologies applicable Tell us about IPSec in a few words. What are some of the benefits and drawbacks of implementing security at the network layer rather than the application or transport levels, and how do they compare? 46. What is the name of the software which deals with the running of the actual computer and not with the programming problems? a. Operating system b. System program c. Object program d. Source program Transcribed Image Text: Draw a block diagram of a microprocessor based system interfaced with 8255, 8254, 8259, 8237and RAM.Also show clock generator, buffers, transceivers and address decoder in the diagram: use 8088 in ??????? ??de Transcribed Image Text: 1 The class diagram models * O The interaction view of a system O The context view of a system The dynamic view of a system The static view of a system I need the answer quickly Transcribed Image Text: GNO3:- Simpe fy booleaN Junctidn don’t theN Simplified Junc tion minterms the Fallowing F.together conditions with Care and eupress the in Sum 07 7arm la) F(A,R.e.n)={l03.57.11.15) alAR.CD)-E1,2,4.6.12) Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. When_________organization is used, a hashing procedure determines where data is stored. Is security policy different from information security standards in that it is considered as static or dynamic, as opposed to the latter? What variables could play a role in deciding the outcome of this scenario? Assume you are analyzing a hospital management system, give an example (that is related to this project) for each of the following changes: A change in the application domain A change in the solution domain write  a python programs to perform following operations Searching an element in a binary tree. Finding largest element in a binary tree. Counting the number of leaf nodes and nonleaf nodes in a binary tree. 92. All jobs of OS are not kept in main memory due to its small size so where they resides on disk a. in RAM b. in job pool c. in ROM d. in CD a.) What is the difference between indigenous media and library resources? b.) What is the difference between indigenous media and internet resources? c.) What is the difference between indigenous media and other common media resources? Transcribed Image Text: Which process scheduling algorithm results in the fastest response time for processes that require shortest non-stop execution periods? Shortest Remaining Time First Shortest Process First O First Come First Served Round Robin Using Java sockets, implement the Remote Procedure Call (RPC). Consider the following requirements: 1. RPC contains multiple clients(with stubs), one Binder, multiple servers (with stubs). 2. Apply the RPC on any function with your choice. If x=83. Represent the following Boolean functions in simplest possible form in both Sum of Product (SOP) and Product of Sum (PoS) formats, F (a,b,c,d) =?(1,2,3,5,13,14) d (w.x.v.z)=£(0,4,5,7,14) Note: Minimize the expressions by using K-Mop 6. Microcomputer hardware consists of three basic categories of physical equipment __________. a) keyboard, monitor, hard drive b) system unit, input/output, memory c) system unit, input/output, secondary storage d) system unit, primary storage, secondary storage Use Android Studio #22. Create a XML layout in Android Studio IDE for the following requirements. Linear layout(background color = #FFEB3B) TextView (text = CalenderView Demo, background color = #4CAF50) CalenderView Button (text = Next) Given a string and you have to replace every digit of the string by ‘0’. Write a program in C++ to prompt the user for entering the string and print the modified string in output. A security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific example of what you mean. Using 8 bits, what is the unsigned binary representation of each of the following values: A. 23 B. 55 C. 275 Please show the end result and please explain how you got the end result. PROBLEM STATEMENT: Return the longest String! public class LongestString{ public static String solution(String firstWord, String secondWord){ // ???? your code goes here ???? return null; } } Can you help me with this Java Question Investigate the importance that wireless networks play in the developing countries today. In certain locations, LANs and physical cables have been replaced with wireless systems. Is there a benefit or a drawback in doing this? Please solve Transcribed Image Text: Assignment 2 Write a program to acquire a square wave from a suitable port on the HC12 microcontroller, store it in memory, amplify it and export it through another port. Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. When_________organization is used, a hashing procedure determines where data is stored. I need the answer as soon as possible Transcribed Image Text: Subject Name: Microprocessor and Assembly Language Describe the detailed architecture of 8085 microprocessor with diagram. Explain the various addressing modes of 8085 with example. Unique Words Write a python program that opens a specified text file then displays a list of all the unique words found in the file. nt: Store each word as an element of a set. In your own words, make a compelling argument for and against the benefits and drawbacks of division of duties in an organization’s information security policy, drawing on a practical example from your own professional experience. Transcribed Image Text: Determine the expression tree for the proposition and its truth table. Draw its original combinatorial circuit and also draw its simplified circuit (if possible) by applying logical equivalence. -(p v (-pA g)) I need the answer as soon as possible Transcribed Image Text: 28. The cost of software change includes the cost of * Removing existing functionality Improving existing functionality Implementing new functionality All of the above Transcribed Image Text: a) Consider an unsorted array of elements {25, 17, 36, 2, 3, 100, 1, 19, 7}: iii) Show the steps to search for 25 in the above sequence using binary search algorithm. The three methods for doing a blind search should be explained. Which process do you believe is the most effective? Provide justifications and relevant instances. ‘Artificial Intelligence’ is a term that refers to artificial intelligence. Transcribed Image Text: Write a java program to create a new string of 4 copies of the last 3 characters of the original string. The length of the original string must be 3 and above Transcribed Image Text:
#{myvariable.variable3}
According to the xhtml code above, which of the following can be a
column of the output resultset?
O myvariable
O variable1
O variable2
variable3

The topic is related on Cloud Computing Explain why amazon web service (AWS) is the recommendation for the choice of the public cloud service provider, for the eventual full-scale migration, citing and justifying the reasons.

None Transcribed Image Text: Q4) An (5,10) array with integer elements from 1 to 50. Write a program in C++ to find
the number and sum of all integer elements which are divisible by 5.

We can’t even fathom a world without the web. Consider how life might be different if you weren’t able to use the Internet. Describe the difficulties you’d encounter if you found yourself in this situation.

Transcribed Image Text: :???? ,’E? ,’5? ,’I’ ,’?? ,’?? ,”ST’,’ ,?1? ,?M? 1=[10] charalpha
Figure Q4
(a)
Write a C program to perform sequential search that display the alphabet
and position in the array, alpha[].

I need the answer as soon as possible Transcribed Image Text: We had a file named a.txt and something is
written on it. Write a program in python to
get the size of that file

Solve it fast fast plz Transcribed Image Text: What is an array and how it is useful?
Write a java program to display even index values in sorted order of an array having n elements.[

Solve only if you had knowledge else skip it Question : a single-sided double intensity 8 in floppy disk has tracked numbered 0 to 76 and sector  0 to 25 .total capacity of disk ?

None Transcribed Image Text: Which of the following logic
expressions is wrong?
O 1 XOR 0 = 1
O XOR 0 = 1
O o XOR 1 = 1
O 1 XOR 1 = 0

Binary to Decimal

1.) 1111 1111
2.) 1 1101 1011
3.) 1 1001 1010
4.) 11 0000 1101

please give me the a complete solution so that I can deeply understand the topic thank you!

Was Denver Airport Baggage System the failure of software project management? Define a process in project management with the help of an example? How can a system be a technical success but an organization failure?

Bob has developed a very secure solution for data integrity in a cloud. This solution requires adding a $20 TPM chip to each computer in a data center. Is this solution practical? Please explain briefly.

Suggest what unoptimised intermediate code Babycino might produce for the following MiniJava code occurring inside a method, where x, y and z are local variables of type int: x = (y + z) * 7;

13 Transcribed Image Text: Write the required HTML and CSS code to create the following list.
01. Home
02. I.T. Department
O IT diploma
o Networking
a. SISco
b. E-Security
o Database
03. Business Studies

A.) Define Type Casting. Name the different forms of Type Casting in C#. What is the need of Type Casting? B.) How many ways are there to pass parameters to C# methods? Explain each briefly.

Subject: Discrete Structures Topic: Combinations and Permutations A coin is flipped eight times where each flip comes up either heads or tails. How many possible outcomes. a) contain the same number of heads and tails?

Transcribed Image Text: Determine whether the relation R on the set of all people is reflexive, symmetric, antisymmetric, and/or
transitive, where (x, y) E R if and only if x and y have same birthday

langueage : assembly pic18 Transcribed Image Text: Determine the value of TOCON (binary or decimal) to set timer0 as the following:
16 bit – internal clock – 1:8 prescaling – increment on rising edge
Answer:

Provide the output for the given C++ code about sizes #include using namespace std; int main() { int a = 5; float b; cout << sizeof(++a + b); cout << a; return 0; } kindly answer the ff questions. 1. Where is the mapping from virtual addresses to physical addresses stored? 2. Can the virtual addresses 0x100000 and 0x100008 be mapped to 2 far apart locations in physical RAM? • Describe in detail the procedures necessary to do the following activities in Microsoft Office Word: 4) Insert a heading into the document. 5)Insert a hyperlink to another document to which you want to connect. A form should collect information such as full name, email address, contact number and the enquiry that a user has. The form should also include submit and reset button. in HTML5 code would be appreciated wnm Transcribed Image Text: java program take an array ( 11 size) of character from user and make a string from these entries and print this string in reverse order I am beginner in java Java Question Transcribed Image Text: 3. Write a simple GUI program using swings, that will read in two inputs (using textbox), and display the total. (You are allowed to use the SwingEditor in Intellij IDE) 4) Write an ALP for 8086 microprocessor to solve the following equation Y = (A x B) + C. A, B and C are 8 bit input variables in HEX. Note: Please do not handwritten. choose the correct answer Q/ Check Boxes are similar to Radio Buttons, but different. Where a group of Radio Buttons allows only one choice from the group, Check Boxes allow any combination * 1-true 2-False Transcribed Image Text: For the graph given below print the DFS and BFS traversal of the graph, and also show the Stack and Queue contents. You can consider s as a starting vertex. Once y Q10 Transcribed Image Text: Find the minterm of the given expression. Choose the equivalent form of F(A,B,C) = ? (6,7) O a. (xyz’)+ (xY’Z) O b. (XY’Z’)+ (xYZ) O c. (XYZ’)+ (xYZ) d. (X’YZ’) +(x’Y’Z) Create a program that uses INITIALS M and P to create a pattern using nested loops. The pattern is up to you; however, your initial needs to appear at least eight times in the pattern. C++ Write the one line of C++ code to assign the value 88 to the array element at the index. (Assuming an array of integers called grades , and an integer variable called index ) Transcribed Image Text: In the given 4-to-1 multiplexer, if c1 = 0 and co = 1 then the output M is Select one: O a. XO O b. X1 O c. X3 O d. X2 Find the Time Complexity = Find the Space Complexity = Transcribed Image Text: Exercise 6 scanf (“%s”, str); ww int len = strlen(str); wwwww for (int i=0; i
using namespace std;
void myfunction(int num2, int num1);
int main(){
myfunction (5,2);
return e;}
void myfunction(int num1, int num2)
| {if (num1>3)
cout<<"A1"; else if (num1<3) cout<<"A2"; else cout<<"A3";} Write a program that converts Celsius temperatures to Fahrenheit temperatures. The formula is as follows: F=95C+32 The program should ask the user to enter a temperature in Celsius, then display the temperature converted to Fahrenheit. Construct the truth table for the compound statement (p ? ~q) ? r. Fill in the empty values of the truth table. Start with the first four rows. Now fill in the final four rows. computer science dont post copied answer posting mutliple times Transcribed Image Text: Provide the type (I, R, or J) I and hexadecimal representation (begin with Ox, e.g., OXAA230103) of the following instruction: sw $s1, 4($t2) Transcribed Image Text: Now you have to measure how long codes takes to execute in nanosecond and the code is finding the factorial of 7 using recursion in java and compare the difference between them In the transport layer, TCP offers full duplex, connection-oriented and dependable delivery services. TCP is a transport protocol. We use the terms connection-oriented, dependable delivery, and full duplex interchangeably, but what exactly do they mean? Assume you are requested to design a WLAN of 400 access points. a.     Are you going to use autonomous or light weight access points? b.     What are the advantages and limitations of autonomous access points? What options do you have to open more than one connection to a website at once in your browser? What are the benefits and drawbacks of using a high number of TCP connections at once? Choose the correct answer Transcribed Image Text: 9. The space located above the oil zone and filled with free gas is kaowa as des sed -e Oil gap ewater gap d- None of the above. digital desgin Transcribed Image Text: If (0101) is a number in 1’s complement representation, which of the following is its negation (in the same representation)? Select one: O 1011 O 1010 O 1100 O 1001 26. Conceptual design a. is a documentation technique. b. needs data volume and processing frequencies to determine the size of the database. c. involves modelling independent of the DBMS. d. is designing the relational model. We identified three (3) broad classifications of Software Engineering Methodologies. Tabulate and mention three (3) examples under each, in the pattern of the table below: Type Classification 1 Classification 2 Classification 3 1. 2. 3. Transcribed Image Text: What is the name of the class in the below given instance specification? Rosylls : Apartment flatNum = 458 a. Rosylls O b. Apartment O . Flat number O d. Not shown Transcribed Image Text: In a CURSOR FOR Iloop, which command is used to open the cursor? Answers: FETCH a. b. ??EN FOR LOOP C. d. The cursor is opened automatically by a CURSOR FOR loop. write an applet in java that creates a black colored filled rectangle on screen. inside this rectangle the word “GO” with Calibri font and size 18, bold face needs to be printed. Justify your syntax. Under database management systems solve question 2 write very clearly or type Transcribed Image Text: Questions: Q1. Explain “File Manager” and “Data (Disk) Manager” Q2. By giving an example, define “External Schema” and “User View” A security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific example of what you mean. Transcribed Image Text: Determine one of the conditions used to test whether a value is in a specified set of values O a. BETWEEN . AND O b. Logical O . Membership O d. LIKE A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires 100 nsec and a memory cycle requires 250 nsec. What percentage of memory’s total operating time is required for refreshes? Python: Write a function to get Nth node in a Linked List Example: Input: 10 -> 40 -> 30 -> 80 -> 90, index = 2 Output: 30 The node at index 2 is 30

None Transcribed Image Text: In python
Write a program to take input from user
and check the number is even or not
if even then print wow it’s even else print
aww this is odd

I need the answer as soon as possible Transcribed Image Text: We had a file named a.txt and something is
written on it. Write a program in python to
get the letters in that file

(Don’t copy) pop all flasks Random, rand, 0, 50 `:: IfWinActive { WinActivate SendInput 2 Sleep rand SendInput 3 Sleep rand SendInput 4 Sleep rand SendInput 5 Sleep rand SendInput 1 Sleep rand } return

With clearly labelled diagram(s) and in more than sixty words (60), outline three (3) modern methods you would implement. ( This is a Database Management Systems question ) kindly include the labelled diagram ) Thanks

A comparison of the types of dynamic ram in terms of their manufacturing method and properties. Transcribed Image Text: A comparison of the types of
dynamic ram in terms of their
manufacturing method and
properties.

Write a C++ program find the distinct integers present in an integer array. Take the array as input from user and print all the  distinct integers in output. Note- Order of elements should remain same.

Input class ternary_operator { public static void main(String args[]) { int x = 3; int y = ~ x; int z; z = x > y ? x : y; System.out.print(z); } } Find output

i need the answer quickly Transcribed Image Text: Q2/B- Mention how the following instructions differ:
1- NEG & NOT
2- DIV & IDIV
3- CMP & SUB
4- SHR & SAR
5- AAM & AAD

Identify the incorrect statement: A. FTP stands for File Transfer Protocol B. FTP uses two parallel TCP connections C. FTP sends its control information in-band D. FTP sends exactly one file over the data connection

what technology is behind quickdraw with google? discuss the technology involve in this project (from what you understand in your search) explain the technology like you were explaining it to a 10 year old kid

Transcribed Image Text: In which of the following modes, the command “ip
address 10.10.10.10 255.0.0.0” can be executed?
a. Interface mode
O b. User exec mode
O c. Line Mode
O d. Privilege exec mode

Don’t copy from google or any other source Write a program that finds and shows the minimum and maximum values of an array filled with 100 random integer numbers belonging to [1000,2000]. In C++ please!

Apply the Blue state method on each of the following FA’s and check whether the FA accepts a word or not? Transcribed Image Text: a, b
a
a, h Transcribed Image Text: a, h
a.

Suppose you have a max-priority queue that contains objects with its respective key values. Suppose one of the object’s key value needs to be increased. How would you increase the key value of this object?

Write in C 1) Compute fun(2), fun(3), fun(4) 2) Write a C function called fun() Transcribed Image Text: Consider the following recursive definition:
(5
fun(n) =
when n= 1
3n + fun(n- 1) when n>1

Identify an acceptable usage guideline that is fair to both students and instructors. Internet usage during school hours and breaks should be governed by rules that also govern the use of cellphones and social media.

Of the following, which website functions the most O a Free report downloads O b. Collect as many contacts as possible C-Offer lot of free & helpful information Od. Invite potential clients to your website

Transcribed Image Text: Determine the prefix codes and the
uniquely decodable codes of the
following codes *
O b and c
A=0, B=10, C=110, D=111
O A=0, B=1, C=00, D=11
O A=0, B=01, C=011, D=0111

Draw the associations that are described by the business rules below. Include the multiplicities for each relationship A patient must be assigned to only one doctor, and a doctor can have one or many patients.

With the advancement of technology, the majority of appliances are wireless-capable nowadays. Is it true that wireless information appliances and services have an effect on corporate Internet and Web usage in the business sector? Why?

For the given decision algorithm, find how many outcomes are possible. HINT [See Example 1.] Step 1: 4 outcomes Step 2: Alternative 1: Step 1: 5 outcomes Step 2: 1 outcome Alternative 2: 2 outcomes

Which of the following is/are the primary features of a DBMS? (A) To provide an environment that is congenial to user (B) To store the information (C) To retrieve information (D) All of the above

Please answer the question in the screenshot. Transcribed Image Text: Use the conclusions from the truth tables
to simplify the following two
statements into the same form (thus they are logically equivalent).
P=(Q=R),(P ^ Q)=R

To safeguard files on your computer, such that they can never be read by a hacker who can access your computer, what kind of encryption (public or private key) would be the most suitable? Explain.

Assume you are the security administrator for an organization. You suspect sniffing attempts against your network. Write any six possible types of data or information the hacker can capture and understand from your organization’s network.

Take input a Char input from user and find whether that char is an digit, lowercase or uppercase Alphabet. Print the result obtained. In any other case print “Might be an special character.”. In Java

Indices can speed up query processing, but it’s usually a terrible idea to index every attribute, and every combination of attributes, that could be used as a search key? Why do you think that is?

Please answer the following in 10 minutes I need answers asap. Convert: A. From the 32 bit floating point number 4212400016 to decimal B. 1313.312510 to 32 bit floating point (express your answer in hexadecimal).

Transcribed Image Text: THIS IS A COMMON TRANSITION WHERE THE CURRENTLY RUNNING PROCESS HAS REACHED ITS MAXIMUM ALLOWABLE TIME FOR EXECUTION.
Select one:
a.RUNNING –> READY
b.READY –> RUNNING
c.RUNNING -> BLOCKED
d.RUNNING -> EXIT

Transcribed Image Text: If a base class has a non-virtual member function named print, and a pointer variable of that class is pointing to an object of a derived class, then the code
ptr->print(); calls

How might Nordstrom’s decision to move many of its technology innovators out of its central Innovation Lab and into the business groups allow the retailer to better focus on the soft side of implementing change?

Transcribed Image Text: Write a java program to test if the first and the last
element of the array of integers are same. The length
of array must be greater than or equal to 2

Which of the following is not an attribute of a project? a. Projects are unique. b. Projects are developed using progressive elaboration. c. Projects have a primary customer or sponsor. d. Projects involve little uncertainty.

Transcribed Image Text: A Moving to another question will save this response.
Question 8
Miniature replica is an example of
Model
Conceptual design
Physical design
Logical design
Moving to another question will save this response.

Comparing and contrasting the most important connections between mobile devices and cloud computing is an excellent way to understand their differences. With cloud computing, mobile devices get the benefits of accessing applications and data remotely.

To safeguard files on your computer, such that they can never be read by a hacker who can access your computer, what kind of encryption (public or private key) would be the most suitable? Explain.

The following variable names give an indication of the data each stores. For each variable, specify the format string that you think is most appropriate. a. discountPercentage b. atomicWeight c. retailPrice d. quantityPurchased e. degreesKelvin

When you use a Hadoop installation, you may benefit from the high level of computational redundancy that it offers. This is important in a hospital setting since it is a key component of patient care.

A function is a block of code that performs .a specific task True O False O Transcribed Image Text: A function is a block of code that performs
.a specific task
True O
False O

Registers are small, quick, stand-alone data storage places that are used to temporarily store information. in the central processing unit (CPU). List any three different kinds of registers and explain what they are used for.

Your project requires a software tester in the tenth month of the development. Which one of the following is related to this context?

a. Organizational interfaces

b. Resource Requirements

c. Contractor requirements

d. Resource Constraints

dr java Transcribed Image Text: The following code displays
for (int i = 3; i > 0; i–) {
System.out.print ((i * 2) + ” “);
O 64
O No print out
O 42
642

java do not use the work of others Transcribed Image Text: What statements will create a stack called myStack of the three strings “Jill”,
“Jane”, and “Joe”, in that order with “Jill” at the top?

Assume the following variables are defined: i nt age ; double pay; cha r sec tio n ; Write a single ci n statement tha t will read inpu t into each of these variables.

f S = {1, 2, 3, 4, 5 }, A={2 ,4 } B={1, 3, 5 } C= {2, 5}. What is the elements of the sets corresponding to event (B’ and C) is Blank 1

Create a variable Y and assign the value of a real number ‘e’ (base of natural logarithm(use exponential function for that purpose),end the statement with no semicolon. Note how many decimal places are echoed out.

Transcribed Image Text: Briefly explain what pipelining is, and why perceived performance is important for the user.
Edit Format Table
Paragraph v
|BIUA? ?? ???? * |
12pt v
Book
20
F1
F2
F3
F4

please dont copy from google. i already posted this question and got plagiarised ans Transcribed Image Text: (c)
Construct an ARM assembly code to perform the following equation r3 = 5x² – 6x + 8.

Prove that the following language is regular. L = {x | x ? {0, 1}?, x does not contain five consecutive 0’s or five consecutive 1’s} nt: You may take advantage of some closure properties.

Transcribed Image Text: 3
Consider the following T flip flop
timing diagram: What type of clock
trigger is used?
Clk
T
Falling Edge Trigger
Rising Edge Trigger
O No Correct answer
O Falling and Rising

130. What is the main function of DSLAM? a. Convert analog signal into digital signal b. Covert digital signal into analog c. Used in router to detect the loss packets d. None of the above

What steps do you believe are necessary to ensure the security of data at rest and in transit? Furthermore, which security method is more successful in terms of data integrity protection and user authentication protection.

The researcher uses ethical practices throughout collecting data, such as:
a.
Respect the site of research
b.
All mentioned above

c.
Gain a permission before enter the site

d.
Respect the culture of the participants

None python Transcribed Image Text: 9. Which of the following is an invalid statement?
a) abc = 1,000,000
b) abc = 1000 2000 3000
c) a,b,c = 1000, 2000, 3000
d) a_b_c = 1,000,000
%3D

Determine the time complexity of the following algorithms: Transcribed Image Text: Algorithm
Insertion in a binary search tree
Deletion in a binary search tree
Best Case
Average Case
Worst Case
Insertion in an AVL tree

Instructions: Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. A(n)___________is a model of a system that is built during systems development.

.Which of the following is a valid declaration of an object of class Box? a) Box obj = new Box(); b) Box obj = new Box; c) obj = new Box(); d) new Box obj;

OBJECT ORIENTED PROGRAMMING JAVA Transcribed Image Text: Create a program that will ask the user to input 10
numbers.
Identify how many even and odd numbers from the
inputs.
use array as storage of data.

Please show me how to make a multiple line comment in Python. I know how to do a single line comment but unable to do it for multiple lines as a whole. Thanks in advance.

Which of the following is FALSE with respect to Logical DFD? It shows only the collections of Data It shows business controls It shows only permanent data collections It shows how the data are stored

Consider Greg Linden’s illustration of search engines learning by observing which search results users click. What are the advantages of having this information for the search engine company (e.g., Google or Microsoft in Linder’s examples)?

Transcribed Image Text: Realize the digital filter described by the
following difference equation: y[n] = x[n] +
2x[n-1] + … + 8x[n-7] Make assumptions
wherever necessary.
Draw response on matlab and obtain H(z) on
notebook

Transcribed Image Text: on 10
The following act as bridge between the data source and the view
et
red
a. context
d out of
O b. ListView
g question
O c. Adapter
O d. Adapter View

Transcribed Image Text: Write a program in VB to perform the following design and explain each
properties you have changed:
mynotpad
file
Type Here
new
Ctri+N
Spen
Ctrl+o
copy
Ctrl+C
paste
Ctrt+V
cut
Ctrl+X
Type Here

Talk about the benefits and drawbacks of remote access, which includes the use of remote desktops. What are some of the difficulties that may arise as a result of enabling customers to connect to Remote services.

Transcribed Image Text: log log n = 0(log n).
True
False
if f = 0(g), then g= 0(f).
True
False
if n2 + 10n + n log n = n² + O(n log n).
True
False

Your client owns a bookstore, and you will find attached; a text file called Samsbooks.txt with titles of all the books in the store. Write and Print all the duplicate titles to a file called SamsDuplicate.txt.

Your colleague sent to you a message which is encrypted using a Playfair cipher, with key “ABABRDRCD” and the encrypted message which you received is “EC AK CK HD IA CV” what is your colleague message?

Design your own java console application about any valid problem that the application must solve the application must use arrays loops inheritance constructors and information hiding must be in a form of a report the console

Look carefully at how messages and mailboxes are represented in the email system that you use. Model the object classes that might be used in the system implementation to represent a mailbox and an e-mail message

Transcribed Image Text: Q2: Given the Boolean function
F = xy’z + x’y’z +w’xy + wx’y + wxy
(a) Obtain the truth table of the function.
(b) Draw the logic diagram using the original Boolean
expression.

Java Conditional Statement Program that will output like this one in the picture Transcribed Image Text: Enter a radius: 10
Menu
[A]rea
[C]ircumference
[D]iameter
[Q]uit
Enter your choice: A
The area of the circle is 314.16

When the sender and the receiver of an email are on different systems, we need only _____________. a. one MTA b. two UAs c. two UAs and one pair of MTAs d. none of the above

Using C++ !! Transcribed Image Text: QI/A) Write an algorithm, draw a flowchart, write a C++ program to find and print the sum
for the even and odd numbers for M-entered numbers. Use the conventional form.

What is Future Internet Architecture, and how does it work? What is the goal of this project? What are the most essential components of the Internet’s infrastructure? What is the operation of the Future Internet architecture?

23. Identify the disadvantage of Spiral Model. a. Doesn’t work well for smaller projects b. gh amount of risk analysis c. Strong approval and documentation control d. Additional Functionality can be added at a later date

Transcribed Image Text: Which of the following statements will display a syntax error in the web browser window:
O $n= round (2.75,1);
O $w = Sony;
O foreach ($bok as $k=>$w) {echo $w;}
echo “

“;

What practice enables practitioners to work together with a common set of practices and a common platform to create and deliver software? Select one: a. Continuous monitoring b. Continuous operations c. Collaborative release d. Collaborative development

What are the differences between top-down and bottom-up approaches to information security? Bottom-up vs. top-down: why is one superior than the other? Compare and contrast each concept to fully see how it fits within an organization.

Artificial Inteligence Transcribed Image Text: Apply Greedy best Search TO FIND THE PATH FROM A TO Z.
11
14
a
17
21
18
12f
14
18
O a-b-e
O a-d-f-z
O none of above
00
4.

Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. T F When the Internet was first developed, it was called Mosaic.

Transcribed Image Text: What happens if a programmer does not create a constructor inside a class?
Select one:
a.Compiler provides a default constructor to avoid errors
b.Objects can’t be created
c.Syntax error occurs
d.Logical error occurs

What steps do you believe are necessary to ensure the security of data at rest and in transit? Furthermore, which of the following measures is more successful in terms of data integrity and user authentication protection?

Transcribed Image Text: Which of the following security assessments systematic evaluation of exposure of assets to attackers?
O a. Vulnerability Assessment
b. Web Application Testing
O c. Penetration Testing
O d. Network Security Assessment
Jump to…

q29 Transcribed Image Text: :If each employee can have more than one skill, then the attribute SKILL is referred to as a
gerund .a
multivalued attribute b O
repeating attribute .c O
nonexclusive attribute d O

Transcribed Image Text: (p ? r) V (q ? r) is logically equivalent to
O a) (p^ q) v r
O b) (p v q) ? r
? ?) (??q) —r
? d) (? —q) —r

I need it with details and pseudo codes Transcribed Image Text: 2. Draw a flow chart that displays the squares of all the positive integers up (and including)
100 (e.g. 1, 4, 9, 16, 25 …).

List at least two ways we can avoid race conditions with OpenMP when performing global sum calculations. • You can exemplify if this makes it easier for you to answer the question. Total_Sum + = Partial_Sum;

What’s the difference between a hacktivist and a cyberterrorist, in your opinion? Should a country’s deployment of hacktivists against hostile groups be deemed a war crime? Why do you think that is? What about employing cyberterrorists?

In the development of AI systems the environment where they will be operating is
one of the consideration. With use of examples, discuss how the environment affects
the complexity of the AI system to be developed.

How to use multithread in ArrayList? The ArrayList contains 100 Element. but the program only load 10 Element while it done 10 elemnt it continue load 10 element next until the program load all 100 Element.

A Processor has a 2-Way Set-associative cache size of 8 MiB, and uses blocks of 64 bytes. It also uses 35 bits for block address. How many bits are used for the Tag, index, and offset?

Human Computer Interaction Select the content of the e-Commerce website that is not related to cultural marker a. Arrangement of the content b. Language usage c. Use of metaphor d. Images used in the website design

What are some of the possible uses for cloud-based collaborative tools? How does the cloud make it easier for employees to collaborate with one another? Give a few of examples to support your point of view.

Suppose an 8-bit data word stored in memory is 11000010. Using the Hamming algorithm, so determine: – what check bits would be stored in memory with the data word. – Show how you got your answer.

A university professor working with sensitive medical records shares a confidential file with a graduate student, who shares it on a public Internet forum. What are some ways to prevent such a leakage of sensitive data?

The ciphertext of the message ” SUNRISE” after encryption by using Simple Substitution cipher and the key =SULTAN will be: a.PRIPDIA b. PRIPAQ c. PRIIDIB d. PRITOY e. PRIODZA f. PRITSY g. ALL OTHER CHOICES INCORRECT

Create the Singly Linked List after having executed the following methods. Each item must have a headand tailreference. Whenever a method is not expected or invalid, write Exception. Only the process not the code •addTail(“Football”) •removeHead()

Write a function prototype and a function definition called sum that receives an array of type integer , and the number of elements in the array. It returns the sum of the numbers in the array.

In C Language Transcribed Image Text: Write a C program to display the following output using nested loops.
nt:
The last line, there is a | character followed by 8 _ character, followed by \ character

Microprocessor Systems I want to create a Desert mini rover that will always follow the sunlight. Choosing only one between the two ICs (Microprocessor and Microcontroller), what should I use? and why? Give three specific reasons

Transcribed Image Text: Trace the Euclidean algorithm by filling in the table below to compute gcd(664, 80). Use as many rows as you need.
a
a mod b
Enter your final answer below:
gcd(a, b) =

Transcribed Image Text: What will be the output of the clocked D flip-flop
if
i) Q is connected to input?
ii) Q’ is connected to input?
Assume that initially Q (output of D flip-flop) = ‘0’.

Transcribed Image Text: Is (((Væ)(A?(B ? C))) = (((Jz)A) A (B? C))) an absolute theorem schema?
If you think yes, then give a proof (lbert or equational style). If you think no, construct a
countermodel –

Transcribed Image Text: If a computer is controlled by a microprogram,
the machine’s instruction set is determined by
the microprogram. Unless the architecture is
rebuilt, this instruction set cannot be modified. Is
it TRUE or FALSE?

Write a java method called sumOfParentsOfLeaves that receives a reference to  a binary tree root and find the sum of values in non-leaf nodes whose children are leaves. Assume that the tree nodes contain integer values.

Which is correct with respect to the size of the data types? a) char > int < float b) int < char > float c) char < int < float d) char < int < double An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? Antivirus Software Data Backup Operating System Patch Software Update Transcribed Image Text: Which git command would you use to update a remote repository with the current changes made in a local repository? O pull O clone O commit O add O None of the above Is it possible for a web server and a mail server entity to have the exact same hostname alias (for example, abc.com)? What would the RR form including the hostname of the mail server look like? An ordinary queue implemented using an array of size CAPACITY gets full when: a. Front = (rear + 1) mod CAPACITY b. Rear = front c. Front = rear + 1 d. Rear = CAPACITY – Is it still required to backup an Oracle database in the age of RAID storage devices? Please be as specific as possible and type in text rather than handwritten, as handwriting can be difficult to understand. How does using a cache improve performance? Group of answer choices It makes loops faster It keeps frequently used data in a faster memory It speeds up main memory access It groups frequently used instructions together using R Studio Using built-in dataset, create R code to extract first 15 english letter in lower case and last 15 letters in upper case and extract letters between 10th to 20th letters in upper case Transcribed Image Text: The arcpy.mapping module can do all of the following except: O Create a new mxd from scratch Save a copy of a mxd Update text elements on a map layout Repair data sources Transcribed Image Text: Examine the following C++ code and determine the output. int x; x = 7.5 + static_cast (7.4) /2;
cout << x; O a. 10.2 O b. 10 C. 9 d. None of these Give screenshot for the output. #include using namespace std; int main() { float f1 = 0.5; double f2 = 0.5; if (f1 == 0.5f) cout << "equal"; else cout << "not equal"; return 0; } Transcribed Image Text: (b) The traditional Turing architecture is not energy-efficient. Explain what cause this issue in the Turing computer and how Steve Furber’s SpiNNaker, as an example of a non-Turing computer, addresses the above issue. Transcribed Image Text: The statement “Linear collection of self-referential class objects, called nodes, connected by pointer links” is best describing a/an 7. O A. data structure B. union O c. array list O D. linked list None Transcribed Image Text: What is the default data type of the input in JOptionPane in the following statement:? float number = Float.parseFloat( JOptionPane.showlnputDialog( “Enter a number:” ) ); float O String O Int O char a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame  is used for encapsulation why? Transcribed Image Text: • Write a program to calculate the remainder of any two numbers. • Use logical operators to check if the two numbers are equal or not. (You do not have to use ‘if) Microprocessor Systems I opened a broken Coin Pusher Arcade game to fix, and I saw a burned IC. Between Microprocessor and Microcontroller, what kind of IC do you think is that? And why? give specific reasons Transcribed Image Text: 3. What is the output of the following java code? Scanner input = new Scamer(“15 10”); String sum = ingutnextlat+ inputnextt0: Sustemaut.printin(sum); a. 150 b. 1510 c. 15 10 d. An error message In a PowerPoint presentation Select one: a. Both cannot be inserted b. Sounds clips can be inserted but not movie clips c. Both can be inserted d. Movie clips can be inserted but not sound clips Q.No3. Discuss why the design of your interaction, if simply implemented as is, may not lead to the ideal software design. Consider how the design of interaction and the design of software often have different goals NEED HELP WITH PYTHON PLEASE  COPY N PASTE UR INDENTED AND WORKING CODE HERE Write one line of code ONLY. Create two variables named car1, car2. Assign the value Volvo to car1 and BMW to car2. In terms of significance, what are the four most critical aspects of software development? In order to enhance overall software performance, which of the following four characteristics should be included into the development process? Explain why. Each of the following is a reason it is difficult to defend against today’s attackers except____________. a. complexity of attack tools b. weak patch distribution c. greater sophistication of attacks d. delays in patching software products Answer only if you are 100% sure . Correct and detailed answer will be Upvoted else downvoted. Thank you! Transcribed Image Text: Find the weather the lists M= [abb,aa,aaa] and N= [bba,aaa,aa] have a pcp solution. Which of the following will evaluate to true? I. True AND False II. False or True III. False AND (True or False) a. I and II b. II and III c. II d. I python 3 Transcribed Image Text: Exercises: 1. Write a program that will compute and display the sum of all whole numbers between 1 and 100 inclusive. (Solve using the do while … loop or do … loop while). 46. Which of the following devices takes data sent from one network device and forwards it to all devices on the network regardless of the intended recipient? a. DNS Server b. Switch c. Hub d. Gateway If it exist then show with the help of a ] Transcribed Image Text: Is there any function to rotate a array in C++ STL? If it exist then show with the help of a program. Q.No3. Discuss why the design of your interaction, if simply implemented as is, may not lead to the ideal software design. Consider how the design of interaction and the design of software often have different goals In c++ please Transcribed Image Text: 1. WAP to generate a Fibonacci series up to n terms. Input Input number of terms: 10 Output Fibonacci series: ?, 1, 1, 2, 3, 5, 8, 13, 21, 34 Draw the design and timing diagram of a 6-bit shift register for storing the data (001010). Transcribed Image Text: Q1. Draw the design and timing diagram of a 6-bit shift register for storing the data (001010). Create a program that will ask the user to enter a string. If the string input is the same with the magic word, display “You got it right…”, “Try again later…” otherwise. Magic word is “ITE001A-WeGotABET”. Deepak was working in an IT company and wanted to develop unique software, he formed a group of likeminded software developers. s group is a. Study Group b. Formal Group c. Research Group d. Informal Group Transcribed Image Text: 17 Implement the simplified expression for the following figure using NOR gates only: F No correct answer O (X’ NOR Y)’ O (X NOR Y’)’ O (X’ NOR Y’)’ O (X NOR Y)’ What series of println statements would produce the following output? This is a test of your knowledge of “quotes” used in ‘string literals.’ You’re bound to “get it right” if you read the section on ”quotes.” Write a recursive C++ language program in which user enters a string and an integer and and the program prints the string n times in different lines in output. Input : 2, “Hello!” Output: Hello! Hello! Describe the actions you take and the tools you need to execute a Java program. What’s the difference between a program’s source files and bytecode? At each stage, what kinds of mistakes are being looked for? a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame  is used for encapsulation why? 152. The features which allows users to update the database and specifying retrievals are part of a. basic set of operations b. basic set of design c. basic set of modules d. basic set of instructions Operating systems are traditionally constructed with several levels of functionality. Tell me what it signifies and how it functions. Explain the pros and cons of the software structure in a distributed system, which consists of layers. #using python  to answer the question Execute and show the python program to get five students marks out of 100 in ANN and show “pass” or “fail” (nt: mark >=60 as Pass mark <=59 as Fail) Write a program in python language to read a string and an integer from the user. If the length of string and integer matches then print “Correct, Observation.”  Otherwise print “Better luck next time!” in output. Define the following function using C language Transcribed Image Text: 2. int findLargestEven(int array[], int size); – returns the largest even element in the array list – if there is no even number, it returns -1 Action in animation usually occurs in three sections. The setup for the motion, the actual action and then follow-through of the action. Question What is the significance of the sections in relation to a novel animation. plz solve it within 30-40 mins I’ll give you multiple upvote Transcribed Image Text: Suppose f(x) is O(2″). Then f(x) is also (choose all that apply): O O(x*) O O(1) O O(1.5″) O O(n!) O 0(n”) Talk about the benefits and drawbacks of remote access, which includes the use of remote desktops. What are some of the difficulties that may arise as a result of enabling customers to connect to Remote services. Write a program in Python with a loop to compute the sum of all odd digits of an input. For example, if the input is 32667,the sum would be 3 + 7 + 7 = 17 Write an Internetwork Operating System (IOS) commands for configuring the following ports: (Note: Network Address between Router0 and Router1 is 192.168.10.0/24 and Network address for Gig0/0 is 168.10.10.0/16). (i) Router0 – Gig0/0 (ii) Router1 – S0/0/0 Create a program that will calculate the following in assembly language: 65 + (13 – 27). Create a directory named math_operators and store the program code inside. ( Write an algorithm and code for the solution Transcribed Image Text: If an array is already sorted, which of the following algorithms will exhibit the best performance and why? Be precise in your answer. Selection Sort Insertion Sort • Merge Sort • Quick Sort I. Which of the following relation is a one-to-one function? Write your answers on the space provided.. (d) Height to student (e) Person to telephone number (f) Height to age (g) Birthdate of a family member Need help with implementing of this program in C# by using Interface. Task: RenameFile Create an interface IUndoable to represent actions that can be reversed. Create a class that renames a file, and make it undoable. Transcribed Image Text: Drived the formula fos Newton method. Find the roots of Raphson following equation by using the also waite Raphson which Newton method Use Newton ++ for Salving the -1-1=0 method Raphson following equation Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characters with a period at the end. For example: “This is a possible value of sentence.” In Python: What gets printed by excecuting the following code? def teststrings(): str1 = ‘X University’ str2 = ‘Computer Science’ print(str1[0].isupper()) # str3 = str1.replace(“university’,’ ‘) str2+=’ ‘ +str1 print(str1) print(str3.rstrip()) print(str2) def main(): teststrings() main() Don’t copy Transcribed Image Text: Insert into a radix tree that has nodes of degree 5 the following: 7 5 68 97 13 2 12 54 547 3 04 Then show the tree C++ uo 1:06 Just write a basic C program to read your name and roll number from input and print them. Assumption for your ease- Take input only your first name, max length of name is of size 15. Which of the INT 21h functions would you use to check the standard input buffer to determine whether a character is ready to be processed and which would you use to check the standard output buffer? Transcribed Image Text: Q2: a- Write a program to pass two integer numbers as parameters to a function; this function is used to calculate and return the result of multiplication and division of the two numbers. Please solve Quickly ?++ Transcribed Image Text: flowchart to calculate the result of .(number (N) to power (M start Yes No End No Yes print m==0 i=i+1 ?<=M p=p*n p=1, i=1 Read N, M print 1 Write an Internetwork Operating System (IOS) commands for configuring the following ports: (Note: Network Address between Router0 and Router1 is 192.168.10.0/24 and Network address for Gig0/0 is 168.10.10.0/16). (i) Router0 – Gig0/0 (ii) Router1 – S0/0/0 Assume you work as a system analyst for a business. What parallels or contrasts do you notice between the system development life cycle and the system maintenance activities? Use convincing arguments to back up your answer. Transcribed Image Text: What will be the output of the clocked D flip-flop if i) Q is connected to input? ii) Q’ is connected to input? Assume that initially Q (output of D flip-flop) = ‘0’. What steps do you believe are necessary to ensure the security of data at rest and in transit? Furthermore, which of the following measures is more successful in terms of data integrity and user authentication protection? Transcribed Image Text: Which of the following logic expressions is ?wrong 1 = 1 1 1 O No correct answer 1 = 0 1 O 1 = 0 1 1 O 0 = 1 1 O Do quickly as possible. Transcribed Image Text: Realize the following functions using a PROM of size 8 x 3 F =E m(0, 4, 7) F2 =E m(1, 3, 6) F3 = E m(1, 2, 4, 6) Which one increases by 8 the value of the element with index 7 in the ‘list’ ArrayList? a. list.set(7, list.get(7) + 8); b. list.add(7, 8); c. list.get(7) + 8; d. list.get(7) += 8; e. list.set(7, 8); Solve quickly. Transcribed Image Text: 33.which of the following is not true about worm? O a. break in to computer by email Ob. Not spread to other computer O c effect computer functionality Od. Copy itself Express and plot continuous time convolution ?(?) = ?(?) ? ?(?), where ?(?) = { ? ; ? < ? < ?; ?; ????????? ?(?) = { ? ; ? < ? ? ?; ?; ????????? Transcribed Image Text: Examine the following C++ code and determine the output. int x; x = 7.5 + static_cast (7.4) /2;
cout << x; O a. 10.2 O b. 10 C. 9 d. None of these Transcribed Image Text: What is a “string”? An individual ASCII code A 1-dimensional array of elements that are each of the type “char” A 32-bit storage location that holds real numbers OA 32-bit look up table Transcribed Image Text: Session Section 10 CPT 220 Final Exam The number of edges from the root to the node is called of the tree. a. Height b. Length c. Depth d. None of the mentioned solve only if you had knowledge Transcribed Image Text: Draw an ASM chart and state diagram for the circuit shown in Figure 15.36. Z output X input D, Q, Do Qof Qo CP Figure 15.36 Fxamni Transcribed Image Text: What is correct about function A5 used in GSM : Oa stronger version of it is used in GPRS Oweak function and it is flawed Ocan not be disabled Oit is stream cipher Do you know any risks of IoT such as data storage, security, lack of standards and more (Please list one and why it is a risk) . Explain your answer in not more than 100 words. Assume you work as a system analyst for a business. What parallels or contrasts do you notice between the system development life cycle and the system maintenance activities? Use convincing arguments to back up your answer. Transcribed Image Text: In an binary tree having A at root and B as left child and C as right child, what will be the output of INORDER traversal? O ABC ??? ? ??? O CAB Show complete solution & box final answer Transcribed Image Text: Find the sum in Hexadecimal between augend which is the 376.44¢ aud difference between the subtrahe nd and minuend; that is 409.354,0 respectively. the and 870C.391h Network Security Assessment Transcribed Image Text: Outline and describe any three (3) techniques used by attackers to monitor network traffic from a LAN switch? A- B I E E Maximum size for new files: 5GB II In the linked list below, find the value of “TEMP->Next->Data”.

list1

a.
David

b.
Leah

c.
Robert

d.
Miriam Transcribed Image Text: Inserting into a doubly linked list
TEMP
listData
David
Joshua
Miriam
Robert
Leah
newNode

No direct or plagarised answer please! Correct and detailed answer will be Upvoted else downvoted. Thank you! Transcribed Image Text: Create a TM that accepts {w E {a, b, c}* : Sa = #b + #c}.

What is the formula used for encryption of data using affine cipher(a,b are constants and x is the numerical equivalent of a letter to be encrypted)? 1. ax+b 2. (ax+b)%26 3. a(x^2) +bx 4. (a(x^2) +bx)%26

Transcribed Image Text: If a computer is controlled by a microprogram,
the machine’s instruction set is determined by
the microprogram. Unless the architecture is
rebuilt, this instruction set cannot be modified. Is
it TRUE or FALSE?

Please use Python to write the code Transcribed Image Text: Write a function that takes one integer argument and returns the sum of all numbers from
1 to the given integer.
(Maximum 5 lines of code)

If the initial sequence number is 1 and it increment the counter by 2,56,000 for every 2sec, how long does it take for the counter to wrap around? I will downvote if you do it wrong

opeating system Transcribed Image Text: Which process scheduling algorithm results in the fastest response time for processes that require shortest non-stop execution periods?
Shortest Remaining Time First
Shortest Process First
First Come First Served
Round Robin

Transcribed Image Text: 1. List what the 32 bits (expressed in hex) 0xC4630000 represent when expressed as a) a two’s compliment integer
b) an unsigned integer c) a MIPS instruction, and d) a floating point number.

Transcribed Image Text: The provides() function and the
exportsobject are used to
a) Register the module’s API and Store
their API
b) Call the modules api
c) Store the module’s API
d) Register the modules api

Network Security Assessment Transcribed Image Text: Outline and describe any three (3) techniques used by attackers to monitor network traffic
from a LAN switch?
A- B I
E E
Maximum size for new files: 5GB
II

What is the output of statement System.out.println(mystery(3)); whereas the definition of method mystery() is  given below? public static int mystery(int n) { if (n <= 1) return 1; else return ( mystery(n-1) + n ); } Give a brief description of two well-known best methods for developing IP models. Explain how various methods compare in terms of their ability to solve larger instances of lIP issues in the shortest amount of time. E-government describes the electronic handling of administration and democracy processes in the context of governmental activities by means of information and communication technologies to support public duties efficiently and effectively Select one: a. True b. False Transcribed Image Text: Question 22 The algorithms available for solving BIP problems are much more efficient than those for linear programming which is one of the advantages of formulating problems this way. O True O False Question#2 What is the signature of the addHandler method of the Controller interface in JUnit ? a) void addHandler(Request request, RequestHandler requestHandler) b) void addHandler(RequestHandler requestHandler); c) void addHandler(RequestHandler requestHandler); d) void addHandler(Request request, Request requestHandler); Transcribed Image Text: One property of a system is that it functions in some regular way is highly randomized in its processes cannot be accurately modeled consists solely of inputs and outputs exists only in models Talk about the benefits and drawbacks of remote access, which includes the use of remote desktops. What are some of the difficulties that may arise as a result of enabling customers to connect to Remote services. 18. ________ is a type of transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal. a. Attenuation b. Distortion c. Noise d. Decibel Write a program in c language to read multiple DNA sequences from user. Create non returning function named reversedna that takes a single pointer to char parameter. The function should reverse every dna passed to it. The names Sam, Tom, Bill, and so on are in the same group as you. The permissions column on a file called answer that you created has the value ——r——-. Who has access to the file? #2 What is the signature of the addHandler method of the Controller interface in JUnit ? i. void addHandler(Request request, RequestHandler requestHandler) ii. void addHandler(RequestHandler requestHandler); iii. void addHandler(RequestHandler requestHandler); iv. void addHandler(Request request, Request requestHandler); Thank you. Transcribed Image Text: draw the implementation of the function Q = X+ Y as logic circuit using 2×4 Decoder below (with depicting the internal structures). Indicate the input and output values on each connection I need the answer as soon as possible Transcribed Image Text: B: Minimize the following expression F (A, B, C, D) = II (0,3,4,5,11,12,13,15) and the terms 2,6,8 are don’t care, then draw the final circuit. Transcribed Image Text: Convert the hexadecimal expansion of each of these integers to a binary .expansion 16(135AB) 1011 1010 0111 0011 1O 1111 1010 0101 0011 1O 1011 1010 0101 0011 10 1011 1010 01010111 10 Make a program that would ask the user to input examination score and return the letter equivalent of the input: (using function) Score               Letter Equivalent 100-90             A 89-80               B 79-70               C 69-60               D Below 60         E This course is routing and switching and wireless essentials cisco Transcribed Image Text: Exclude the following addresses from the 192.168.11.0/24 address range: • Exclude the .1 through the .9 address. · Exclude the .254 address. R1(config)# —————–is a method of scheduling that considers limited resources when creating a project schedule and includes buffers to protect the project completion date. a. Parkinson’s Law b. Scrum c. Critical path analysis d. Critical chain scheduling Write a Fortran program to declare two strings of length 7 each and then form a new string by concatenation of the two strings mentioned above. Print the two strings and concatenated string in the output. Transcribed Image Text: With the help of examples, discuss under what circumstances would you prefer using each of the following machine learning models. (a) K nearest neighbor (k-NN) (b) k-mean clustering (c) Regression (d) Deep learning Transcribed Image Text: c) Derive “bbaababa” using leftmost derivation tree and rightmost derivation from the grammar given below. S- bB | aA A ? b | bs | aAA B > a | as | bBB

What’s the difference between path loss, multipath propagation, and interference from other sources in terms of wireless channel impairments? Which of these kinds of channel impairments will a network engineer be able to deal with effectively?

Transcribed Image Text: Which of the following instructions do not affect the status of the flag register ?
Select one:
O None of the provided answers
? ??PF
O SCASW
O SAHF
? ???
O STD

Transcribed Image Text: Q1: Draw a flowchart to calculate and print the area, perimeter, centroid in x and y for the following
shapes
a. Tringle with Base B and Height H
b. Circle with Radius R

120. The data communication support should include, but is not restricted to a. file and database access b. file transfer and transaction processing c. terminal support, electronic mail and voice grams d. All of the above

Step 1 a) False, Overloading relates to the change in parameter passed into functions/methods meanwhile overriding changes the definition of the method. Step 2 b)False, There are various types of linked list, singly, doubly, circular etc.

Transcribed Image Text: Example: translate the following C statement to assembly language and machine code.
x-y*(y+z);
Assume x,y and z are stored in memory locations 0,1 and 2 and there are general purpose registers called A,B,C…etc

Transcribed Image Text: If a computer is controlled by a microprogram,
the machine’s instruction set is determined by
the microprogram. Unless the architecture is
rebuilt, this instruction set cannot be modified. Is
it TRUE or FALSE?

Use an example to discuss how a simple/basic web server is prepared, created and configured. Your discussion must include the following topics: • Describe the example; • Preparation; • Creation and configuration; • Implementation and usage.

Transcribed Image Text: 4. Say you wish to configure the following memory component to have 16k x 32 size.
Calculate values of m and n.
a(0)
a(1)
ar-1)
d_in(0)
d_in(1)
d_out(0)
d_out(1)
d_in(m-1) d.out(m-1)
en
wr

Topic: Fibonacci Sequence 1. If F23 = 28 657 and F25 = 75 025, F24 =? 2. If two successive terms of a Fibonacci sequence are both odd, then the next term is? Type a message…

The system must be very reliable and you are requested to build it as a software engineer. For such software, whatever process model would you suggest? Provide a detailed diagram to support your suggested process model.

I need the answer as soon as possible Transcribed Image Text: For which one of the following statement, x[1] = 1 does NOT cause an ERROR?
O x=”1,2,3″
O All of them
Ox=range(14)
Ox= (1,2.3)
Ox-[1.2,3]

write  a c++ program to store last two digits of your id card number as private data variable and your registration number as public data variable in class.Access both data into child class using inheritance concept?

answer quickly Transcribed Image Text: L
Write about PTE (positron
emission tomography ) for
your self not copy past from
internet please follow the
rules which wrote below
Table of contents Table of
figures Abbreviations
Acknowledgments

22. Once a file is compressed : a. it has a better quality b. it takes up less space for storage c. it cannot be delivered to the client more quickly d. none of the mentioned

Consider the following code:

import pandas as pd

df = pd.DataFrame({‘state’: [‘Ohio’, ‘Ohio’, ‘Ohio’, ‘Nevada’], ‘year’: [2000, 2001, 2002, 2001], ‘pop’: [1.5, 1.7, 3.6, 2.4]})

How can you sort the data?

df.sort_values(by=[‘year’])

Select one:
True
False

Describe and distinguish between the SHA, RSA, and AES algorithms. Is there a place for hashing in Information Assurance? Which of the CIA Triad’s three algorithms, SHA, RSA, and AES, offers the greatest value and why?

What are the differences between top-down and bottom-up approaches to information security? Bottom-up vs. top-down: why is one superior than the other? Compare and contrast each concept to fully see how it fits within an organization.

How many camparisons would be needed to sort an array containing 100 elements using selection sort if the original array values were already sorted a) 10,000 b) 9900 c) 4950 d) 99 e) None of Above

I need the answer as soon as possible. Transcribed Image Text: Create the following table (using only HTML)
March Bills
Price Due Date
Phone
$50 March 1st
Car insurance $100 March 5th
Internet
$70 March 10th

Transcribed Image Text: 4. Given the following array declaration. What is the value
stored at index 5 in a?
?. 2
b. 5
?. 9
d. 16
int [Ja = {2, 1, -2, 5, 16, 9}:

Rewrite the following for loop using a while loop. Assumethe variable, x , has been declared as an integer. for (x = 300;  x >= 1;  x = x – 3) cout << x << endl; Each of the following is a reason it is difficult to defend against today’s attackers except______. a. complexity of attack tools b. weak patch distribution c. greater sophistication of attacks d. delays in patching software products Input class Output { public static void main(String args[]) { int x , y = 1; x = 10; if (x != 10 && x / 0 == 0) System.out.println(y); else System.out.println(++y); } } Find output Transcribed Image Text: A(n) is a collection of interrelated components that collect, process, store, and provide as output the information needed to complete a business task. Select one: a.design model b.management system c.information system d.architecture plan Transcribed Image Text: Q1) for the gated D latch, determine the Q and Q for the inputs in the figure below, show them the proper relation to the enable input, assume the Q starts RESET. EN 2.Create a C++ program that will display a boat shape on screen Transcribed Image Text: 2. Create a C++ program that will display a boat shape on screen 2 of 3 Press anv kev to continue List 2 advantages and two disadvantages of each of the following strategies for storing a relational database: Store each relation in one file and Store multiple relations (perhaps even the entire databases) in one file . Transcribed Image Text: Write a program in scala programming language to check whether a string ‘Dr’ appears at index 0 in a given string. If it appears return a string without ‘Dr’ otherwise return original string. C++ Celsius to Fahrenheit Write a program that converts user input in Celsius to Fahrenheit temperature. The formula is F=95?C+32 F is the Fahrenheit temperature, and C is the Celsius temperature. Keep one digit of precision. Write a R program to create FOUR(4) vectors A, B, C, D with 4 integers. Combine the four vectors to become a 4×4 matrix where each column represents a vector. Print the content of the matrix. Transcribed Image Text: 7 Indicate which string can be represented by the following context-free grammar: G = ({S, A}, {a, b}, S, P) P: S ? aaSb| b Choose all correct answers: ?aab baaa aaaabbb aabaa Write a function that takes the cube of the difference of the 3 entered numbers (the function’s name is as differencekup). Then, using this function, enter 3 different numbers. run the function and show the answer Complete the query to create a new table whose data and structure are copied from another table EmployeeInfo SELECT * INTO ________ FROM EmployeeInfo WHERE 1 = 0; _______ TABLE ________ AS SELECT * FROM __________; In ______ transmission, we send 1 start bit (0) at the beginning and 1 or more stop bits (1s) at the end of each byte. a. synchronous b. asynchronous c. isochronous d. none of the above Transcribed Image Text: To provide an optimal viewing experience across a range of devices, a of a website must be created. O a. Reactive design O b. Responsive design O c. Open design d. Active design Examine the potential users of your data warehouse. Can you classify the users into casual users, regular users, and power users? If this method of simple classification is inadequate, discuss how your users may be classified. 46. Which of the following devices takes data sent from one network device and forwards it to all devices on the network regardless of the intended recipient? a. DNS Server b. Switch c. Hub d. Gateway Transcribed Image Text: I. MEASURES OF CENTRAL TENDENCY (UNGROUPED) Find the mean, median and mode of the following numbers: 15 PTS 40, 35, 50, 67, 34, 67, 56, 34, 56, 35, 28, 35, 34, 53 1) Logic Desgin Transcribed Image Text: a. Simplify the function F(A,B,C)= E(0,1,4,5,6,7) using Boolean theorems and axioms. b. Draw the logic circuit using Universal gates for simplified Boolean function obtained in Q2.a (Use of Logisim is Optional) Tell if the statements are true or false. Let p: 2 + 1 = 3; q: 16 ? 9 = 7. (a) ~p ? q TrueFalse (b) ~p ? ~q TrueFalse (c) ~(p ? q) TrueFalse When dealing with Linux, it provides a set of procedures that ensure atomic actions on a variable, which may be used to prevent basic race situations. But what happens when working with uniprocessor and multiprocessor systems? Whenever a peripheral is being controlled by the CPU, it is said to be online. If additionally, the computer files are updated as soon as any change takes place, the system is called real time system? Discuss how you would connect AIT’s two campuses (Sea View and Knowledge City), including the technologies you would employ depending on the distance between them and the network size category they fall into. Justify your selections. Write a user-defined function in python that will accept five(5) numbers and calculate the sum, average, and product of those numbers that are less than or equal to 50 and greater than or equal to 25. 150. In Three-Schema Architecture, the schema which gives the description about physical data model, access path and details of storage of data is called a. logical schema b. conceptual schema c. internal schema d. external schema Please use python idle program and take a screenshot of the executable code Transcribed Image Text: Question 4 Write a program to find the factorial value of any number entered through the keyboard. Show the answer. Transcribed Image Text: Which of the following is completed in the transition phase of the UP? Select one: a.design and implement the core architecture and functions b.resolve high risks c.prepare for deployment d.complete the beta test Transcribed Image Text: If the present state = (001) the Ta,Tb,Tc * (—–) = %3D %3D ??, ??, ?? %3D010 O ??, ??, ?? %3D111 ? ??, ??, ?? %3101 ? ??, T?, ?? %3D110 ) Give a set of FDs for the relation R (ABCD) with AB as primary key under which condition R is in 2NF but not in 3NF. Warning-Give correct answer , i will report and downvote you Transcribed Image Text: The search for knowledge is very important in artificial intelligence systems. a. Explain why. b. If you are to solve integral problems, how would you solve the problems in terms of intelligent systems. Please solve Quickly ?++ Transcribed Image Text: flowchart to calculate the result of .(number (N) to power (M start Yes No End No Yes print m==0 i=i+1 ?<=M p=p*n p=1, i=1 Read N, M print 1 Why CSMA/CD is not adopted by wireless LAN (IEEE 802.11)? a. due to short length of messages b. due to the hidden terminal problem c. due to weak received signals (fading) d. both b. and c. Draw a block diagram of a microprocessor based system interfaced with 8255, 8254, 8259, 8237 and RAM. Also show clock generator, buffers, transceivers and address decoder in the diagram: use 8086 in maximum mode Please help Transcribed Image Text: Use built in functions to determine and display the nearest lower and higher integer to x. Complete the missing code in the space provided below. { double x; cin>>x;
….
……. ……………
}

Transcribed Image Text: 1. Create a CSV file named Services.csv that contains all of the services running
on the local computer. Then, use Notepad to open the CSV file. What is the
significance of the commas?

A numeric array of length N is given. We need to design a function that finds all positive numbers in the array. a) Describe approaches for solving optimal worst case and optimal average case performance, respectively.

Transcribed Image Text: Question 5
Not yet answered
Marked out of 1
P Flag question
Which of the following is the
logical operator?
a.
b. +
?. OR
d.
**
Previous page
Next page
Previous activity

It often is desirable to ___________ the SIM in much the same way as one would take a physical image of the mobile device or a computer in order to retain a copy for evidentiary purposes.

Transcribed Image Text: Use depth-first search and breadth-first search to produce a spanning tree for the given simple
graph. Choose a as the root of this spanning tree.
(?)
h
d
(b)
d
e
?
m

Write static function in C# that displays the following pattern and call it in main  function which is in another  class 1   2   3   4  5 2   3   4   5  6 3   4   5   6  7

Java Transcribed Image Text: Write the result of the each of the following expression in the space provided below.
int a[]]={{3,-4,5,6},{1,-4,3,2},{5,-2,-3,1}};
Expression
output
a[0][2]-a[2][1]
a[1][3]+a[2][2]
a[2][2]/a[1][1]
a[0][2]%a[2][1]
What is the value of 3rd row 3rd
column?

It is required to integrate and test the program as a whole after the development and testing of individual software modules.. It’s time to talk about how important it is to thoroughly test the entire system.

Create a program that takes in an even-sized String and prints out the first half concatenated with original string separated by a single space. Sample run 1: Enter a single string: HelloThere Output: Hello Hello There

Write a R program to create FOUR(4) vectors A, B, C, D with 4 integers. Combine the four vectors to become a 4×4 matrix where each column represents a vector. Print the content of the matrix.

Transcribed Image Text: 3- Write a Pseudocode to decide whether any given number is an odd number or
an even number.
Draw a flowchart to read two numbers each one has three digits ABC and DEF

Write a program in Python language to take a string input from user and print the characters of the strings seperately. See sample output for more details. Input: Python Output: P, y, t, h, o, n,

MCQ: Which class waits for requests to come from the clients. It performs some operation based on that request, and then possibly returns a result to the client? DatagramSocket class ServerSocket class DatagramPacket class Socket class

Transcribed Image Text: 2. Convert the given truth table in k map and write is simplified boolean equation.
A
B
1
1
1
lo
1
1
1
1
1
1
1
1
1
1
1
1.

Transcribed Image Text: Close
Implement the simplified expression for the following figure using NOR gates only:
O (X NOR Y)
O X NOR Y’)
O No correct answer
O X NOR Y)
O (X NOR Y)y

In MATLAB: Write a program to plot an image and it’s histogram. Take the address of image as: xyz.jpg Please attach a correct code so that I can run it with my image on my system.

Transcribed Image Text: Let G be the grammar S ? 0B|1A, A ? 0 OS| 1AA, B 1|1S|OBB. For
the string 00110101, find (a) the leftmost derivation, (b) the rightmost
derivation, and (c) the derivation tree.

Transcribed Image Text: Write a program in C++
Language to calculate the value of y
from the following:
(2×2
y = {1
x< -4) x = -4} +1 x>-4)
Where x is an input integer number,

Transcribed Image Text: The primary value of a systems analyst is the ability to
Select one:
a.define broad requirements without detailed fact-finding
b.gather the correct information
O c.program in the desired languages
O d.build specific models

The blinking vertical line displayed on the screen that indicates the current location in a document, such as where the next change will be made to the document in a word processing program, is called the__________.

Create a simple binary dataset (6 points in total, 3 for each class) that can be linearly separated. nt: 2D plane, every point will have 2 features (x,y axis), so we need 12 numbers in total.

State the largest and smallest 32-bif IEEE standard Floating- numbers and Derive the largest denormal number. i Transcribed Image Text: State the largest and smallest 32-bit IEEE standard Floating-
numbers and Derive the largest denormal number.

a) Why do Boolean functions play a central role in hardware architectures? b) Describe Composite Gates. c) Describe Multiplexors and Demultiplexors? What is the importance of the use of the selection bit and the data bits?

In C++ fill in the blanks Transcribed Image Text: /function returns true if the parameter is an even number and false otherwise
isEven (
value) {
if ( value
2 ==
) return true;
else
false;

If memory access time is 200 nanoseconds and average page-fault service time is 8 milliseconds, and you want to achieve a performance loss of less than 20%, how many memory accesses must a page fault occur?

True or False : If you specify only a filename when opening a file, Visual Basic will assume the file’s location to be the folder containing the application’s executable file (the file having an .exe extension).

Using MATLAB or Octave Calculate the area of a triangle using the equation A = 1/2*base*height You must prompt the user for the inputs and display an output of “The area of your triangle is: “

27 In Ms-Word, which section setting needs to be done for designing a poster in a blank a document? Select one: a. Page setup only b. All of these c. Views only d. Paragraph, font only

Transcribed Image Text: Write a C++ program to illustrate the order of execution of constructors and destructors, Please describe
the code in details by which I can understand it welland add screenshot of the output. A

Write equivalent expressions for each of the following by using De Morgan’s Law. A. !(x < 5) B. !(y > 2 && !found ) C. !(c == ‘r’ || (( y > 2) && !found ))

Consider using artificial intelligence in the healthcare and agricultural industries, as well as in the schools, the entertainment industry, and in the armed forces. In a short explanation, provide concrete examples to demonstrate how it relates.

Data 61, 30, 52, 92, 35, 73, 27, 18, 84, 20, 22, and 28 will be inserted into an empty binary AVL tree. Visualize insertion process of every data, including rotation and swapping processes (if necessary).

Find the errors if any into the following program. Assume that: int a[ 3 ]; cout << a[ 1 ] << " " << a[ 2 ] << " " << a[ 3 ] << endl; Transcribed Image Text: In SNMP to informs the manager about rebooting operation the following command can be used O Get and MGet No option is correct SNMP manager receive Trap. Get request SNMP manager O Trap. Each of the following is a reason it is difficult to defend against today’s attackers except a. complexity of attack tools b. weak patch distribution c. greater sophistication of attacks d. delays in patching software products Suppose that unfolded boxes are stacked, on top of one another, on a storage rack of height 2m. If each box has thickness 25mm, calculate the number of boxes that can be stored in this way. Transcribed Image Text: Write a program in scala programming language to check whether a string ‘Dr’ appears at index 0 in a given string. If it appears return a string without ‘Dr’ otherwise return original string. Give a brief description of two well-known best methods for developing IP models. Explain how various methods compare in terms of their ability to solve larger instances of lIP issues in the shortest amount of time. Transcribed Image Text: Write a program in scala programming language to check whether a string ‘Dr’ appears at index 0 in a given string. If it appears return a string without ‘Dr’ otherwise return original string. Complete the query to create a new table whose data and structure are copied from another table EmployeeInfo SELECT * INTO ________ FROM EmployeeInfo WHERE 1 = 0; _______ TABLE ________ AS SELECT * FROM __________; Transcribed Image Text: :Choose the correct answer If (text) and (name) contain identical string values, then the (r) value after running int r = strcmp(text,name); %3D * will be +2 +1 O -1 O -2 O Write a program that reads in a number through a text box. If the number is greater than five it displays the cube of the number, else it displays the square of the numbe. in vb.net Transcribed Image Text: What does the following expression represent? Do not perform any calculations: even something like 2 + 3; rather just write out what it represents without doing any arithmetic calculations. 3 2 = =0 Transcribed Image Text: The following code displays 0; i < 3; i++) { System.out.print ( (i * 2) + " "); for (int i %3D } O No print out O 024 O 02 O 24 Distinguish between different forms of malware. Describe what a botnet is and how it operates in detail. Provide an explanation of how botnet assaults are detected and prevented. Botnets are being dismantled; this is being discussed. Cache memory is a critical component of today’s computers, serving a variety of functions. Explain the function of cache memory and why there was no cache memory at all in the early days of computer technology. Attempt the problem given in Image  using two tapes (k=2) and check it with a suitable example. Transcribed Image Text: Propose a Turing Machine that :accepts the following language L = {02n1n; n > 0}
%3D

Transcribed Image Text: Use a proof by contradiction to show that if a code C C {0,1}”, |C| = 2k has
minimum distance d then k to “italic”, “20px” and “Verdana”.

This is a Heading

This is a paragraph.

This is another paragraph.

urgent Transcribed Image Text: FreeRTOS is an open-source Real-Time Operating System.
Birini seçin:
O Do?ru
O Yanl?? Transcribed Image Text: Three magnetometers are required to determine Earth’s magnetic field vector.
Birini seçin:
O Do?ru
O Yanl??

Transcribed Image Text: QUESTION 14
1.
A(n) is a logical grouping of several data files that store data with similar characteristics.
c a procedure cache
c b table space
C C data cache
c d listener

Transcribed Image Text: In SNMP to informs the manager about rebooting operation the following
command can be used
O Get and MGet
No option is correct
SNMP manager receive Trap.
Get request SNMP manager
O Trap.

What’s the difference between path loss, multipath propagation, and interference from other sources in terms of wireless channel impairments? Which of these kinds of channel impairments will a network engineer be able to deal with effectively?

Q3. IF PC = 682 AR=123,DR=A2BF , IR = 567 , then execute the following M[AR] <-- DR IRM <-- [AR] Determine the value of IR after the execution and comment on the type of addressing. Transcribed Image Text: Write the Boolean expression for the logic diagram given below and simplify it as much as possible and draw the logic diagram that implements the simplified expression. D’D D-DD divibn ad B Output Write a program that prompts the user to enter 10 names, each with maximum of 30 characters. Output the names that start with letter A and its corresponding length. Please include the pseudocodes (written as comments). What is your position to the thought that  CIOs should include computer ethics as a core element of IS strategy? Does computer ethics gives a company any strategic advantage? Why or why not. Provide some examples. Digital design Transcribed Image Text: Which Boolean formula represents the F function in this truth table? ABF 001 010 101 111 Select one O F=(A+B)’ O F=A’B+AB” O F=(A’B’)+A O F=(AB)’ – page to search 17 Transcribed Image Text: The basic operation in building a Max- Heap from an existing array is: Select one: a. The heapify procedure O b. The Inserting procedure c. The Heapsort procedure O d. The Maxheap procedure 138. In RAD model, information gathered in business modeling phase is reviewed and analyzed to form sets of data objects vital for business in a. business modeling b. process modeling c. data modeling d. deployment modeling Write an Internetwork Operating System (IOS) commands for configuring the following ports: (Note: Network Address between Router0 and Router1 is 192.168.10.0/24 and Network address for Gig0/0 is 168.10.10.0/16). (i) Router0 – Gig0/0 (ii) Router1 – S0/0/0 Talk about the benefits and drawbacks of remote access, which includes the use of remote desktops. What are some of the difficulties that may arise as a result of enabling customers to connect to Remote services. Design a circuit that implements function p below using AND, OR, and NOT gates. DO NOT change the form of the equation Transcribed Image Text: f(io, i,, i2,) = {i,(i?i, + ?oli)}. (1, + G) %3D What PowerPoint feature will you utilise to add motion effects to various slide objects? Choose one: Animation Scheme c. Animation Object d. Slide Design a. Slide Transition b. Animation Scheme c. Animation Object d. Slide Design Transcribed Image Text: Merge sort uses recursion for Select one: O a. preorder traversal of a tree O b. both b and c c. postorder traversal of a tree O d. inorder traversal of a tree Our knowledge of database design tells us that depending on the needs, it may be split into two or three levels By switching from a two-tier design to a three-tier design, what qualities are gained? Discussbriefly Transcribed Image Text: Write a program in C++ Language to calculate the value of y from the following: (2×2 y = {1 x< -4) x = -4} +1 x>-4)
Where x is an input integer number,

In Python: Which of the following dictionary methods returns the value associated with a specific key. If the key is not found, it returns a default value? get( ) key( ) value( ) pop ( )

What is the name of the protocol used by the worldwide network that spans the whole planet? a. Internet protocol, Inter-networking Protocol, Internet b. TCP/IP, IP c. All of the above d. None of the above

Describe 4 most important sections that you will include in your test plan when testing the enrolment and registration features of an educational institution’s content management system. Assuming you are using the IEEE-829 test plan standard.

Stephanie is in charge of a small network and wants to make it simple but secure. Which network(s) would be the best for Stephanie to set up? a. WAN b. Peer-to-peer c. Server-based d. Master domain

Consider the following regular expression over alphabet ? = {a,b,c}: ??a+??bc Provide two strings that are in the language L and two strings that are not in the language L. w?L: w?L: w /?L: w /?L:

Given a string “Assignment-2”. Answer the questions that follow in programming language of your choice. c) Find the index of ‘-‘ in the string. Please use C++ as I have used C++ in all other parts.

In the context of search algorithms, which of the following issues is determined by the number of steps it takes to find a solution? Select one: a. time complexity b. completeness c. space complexity d. optimality

Transcribed Image Text: c. Given 2 Arrays of Inorder and preorder traversal.
Inorder sequence: {D B E A F C}
Preorder sequence: {A B D E C F}
Construct a tree and print the Postorder traversal.

Solve all questions,please. Transcribed Image Text: is execute at least one…
-2
time
?- for
b- nested for
c- while O
d- do while O
Every Preprocessor directive -3
starts with a
a-$
b-#
d-& O

Please solve it quickly Transcribed Image Text: 3. Write the instructions to load a memory location with 0. Repeat increment the value by 1 until
it reaches the value 8.
Solution 1: (Using LXI and M)

I need the answer as soon as possible Transcribed Image Text: 34. Software specification is where
developers and engineers define the
software that is to be produced and its
constraints on its operation.
True
O False

The best way to tell if a cable within a computer is a data and instruction cable or a power cable is to monitor the connection of the cable to each device connected to the cable?

Ram mohan and sohan took loan of RS x,y,z on rate of intrest are %,p%,q% for time t1,t2,t3 years respectively .calculate simple intrest they will pay and find who will pay the most using ternary operator?

Transcribed Image Text: 3. Show clearly the steps involved in topological sorting starting with vertex ‘A’ for the
graph given in Fig.1. using DFS method. Show the traversal stack and construct the
DFS forest.
Fig.1 Graph

Make use of examples to help explain your point. How conventional personnel practices are coupled with controls and integrated with information security principles to become a component of the information security function is discussed in detail.

Given two 1-Byte numbers at locations 8050H and 8051H. Write 8085 instruction to add the data at both locations and store the sum at location 8052H in memory. Show assembler output and memory view in sim8085.

in C Recreate the four examples uses of pointers that cover the following four cases: non-constant pointer to non-constant data, constant pointer to non-constant data, non-constant pointer to constant data, and constant pointer to constant data.

When dealing with Linux, it provides a set of procedures that ensure atomic actions on a variable, which may be used to prevent basic race situations. But what happens when working with uniprocessor and multiprocessor systems?

Transcribed Image Text: Solve the following recurrence
using Master’s theorem.
T(n) = 0.7 T (n/2) + 1/n
T(n) = O(n)
O
cannot be solved using master’s theorem
T(n) = 0(log n)
T(n) = 0(n2log n) O

Create a version of the hybrid merge-join method that is appropriate for the situation in which both relations are not physically sorted, but both have a sorted secondary index on the attributes that are being joined.

Transcribed Image Text: 5. Assuming that all of random variables are binary, determine the number of
operations to obtain P(d) in the following Bayesian Network:
a. Using Variable Elimination Algorithm
b. Using the Joint Distribution
A

None Transcribed Image Text: What is the default data type of the input in JOptionPane in the following statement:?
float number = Float.parseFloat( JOptionPane.showlnputDialog( “Enter a number:” ) );
float
O String
O Int
O char

Answer only if you are 100% sure . Correct and detailed answer will be Upvoted else downvoted. Thank you! What ate the points that should be considered before correcting errors?Also , explain the debugging guide -lines.

using R Studio

Using built-in dataset, create R code to extract first 15 english letter in lower case and last 15 letters in upper case and extract letters between 10th to 20th letters in upper cases

18. ________ is a type of transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal. a. Attenuation b. Distortion c. Noise d. Decibel

Details on how to perform these tasks in Microsoft Office Word The document should now have a title. You may also include a hyperlink pointing to an external file that will be used as a connection.

List five benefits of using a database to manage data instead of a file system. List all of the advantages that a database-based strategy has. What are the costs of putting in a database system possible?

When it comes to sorting, basic algorithms have a propensity to take O(N2) time to complete the task. What is the cause of this, and how can more sophisticated algorithms overcome this lower limit of performance?

2. Explain the following terms by writing short notes (at least half a page each) under each A. Mobile blogging B. Video blogging C. Podcasting D. Safe learning E. Disruptive learning F. M-learning as a bridge

kindly answer the ff questions. 1. Does every process have the same mapping of virtual memory addresses to physical addresses? 2.  Can 2 different processes have virtual memory addresses that reference the same physical memory addresses?

I. Which of the following relation is a one-to-one function? Write your answers on the space provided.. (d) Height to student (e) Person to telephone number (f) Height to age (g) Birthdate of a family member

Write a recursive method that will reverse the order of the characters in a given string and return the result as a new string. For example, if “book” is the argument, the result would be “koob”.

25) Internet technology allows individual data packets from any one message to traverse multiple channels through the Internet communications backbone and yet be received at their destination as an intact message. True or False? True False

program using a while loop that lets the user enter a series of integers. The user should enter 10 values and the program will display the two largest numbers. You can only use a number once.

i need the answer of the below qestion in 2 hour. Write a program of your own choice in C++ that inclde input validation, multiple inheritance, constructors, encapsulation, polymorphism, static vairiables, static fnctions, and Late binding?

Is it possible for a web server and a mail server entity to have the exact same hostname alias (for example, abc.com)? What would the RR form including the hostname of the mail server look like?

What can a system designer do to ensure that the user’s memory burden is kept to a minimum? There are other explanations for why expert evaluations are beneficial. Include a list of its limitations as well.

One of the most common types of cybercrime is identity theft. describe how identity thieves use the internet to steal your personal information and what precautions you should take to keep your identity safe from them.

Transcribed Image Text: 16. If the first instruction “LXI H, 1100H” is positioned at address 7000H in memory, at what address
may the next instruction be located? m
7003H
7004H
7001H
7002H
None of the mentioned

The blinking vertical line displayed on the screen that indicates the current location in a document, such as where the next change will be made to the document in a word processing program, is called the__________.

RPC (remote procedure call) is used to a. establish a server on remote machine that can respond to queries b. retrieve information by calling a query c. both a and b d. none of the above

write a sequence of statements that finds the first comma in the string assigned to the variable line, and assigns the portion of line up to, but not including comma to the variable clause. using python

If memory access time is 200 nanoseconds and average page-fault service time is 8 milliseconds, and you want to achieve a performance loss of less than 20%, how many memory accesses must a page fault occur?

Given two 1-Byte numbers at locations 8050H and 8051H. Write 8085 instruction to add the data at both locations and store the sum at location 8052H in memory. Show assembler output and memory view in sim8085.

Transcribed Image Text: QUESTION 8
The term
refers to an organization of components that define and regulate the collection, storage, management and use of data
within a database environment.
structured data
management system
transaction
database system

Given an array A of integer type of length n (n > 7), write a pseudocode of an efficient algorithm for finding the seven smallest elements in A. What is the running time of your algorithm?

Write a program in Python language to take a string input from user and print the characters of the strings seperately. See sample output for more details. Input: Python Output: P, y, t, h, o, n,

Transcribed Image Text: Find the h °g and g °h for following:
a. If g(x) = Vx – 4 and h(x) = x³ + 4
b. If g(x) = x² +1 and h(x) = x +2

Find The Time Complexity and The Space Complexity Transcribed Image Text: Exercise 5
int loop(int N, int *A){
int loop
0;
for(int i=0; i (7.4) /2;
cout << x; O a. 10.2 O b. 10 C. 9 d. None of these Explain the difference between mutating a value and rebinding a variable.  Give a couple of examples of code that might trip up someone who doesn’t get the difference, and explain why it might trip them up.   please assist with a and b urgent.Thanks (a) Can a PrintWriter be used to write binary data? Provide a reason for your answer. [ (b) Discuss the role of BufferedInputStreams when reading a binary file. LANGUAGE:JAVA Code the program that converts uppercase letters to lowercase and lowercase letters to uppercase of a word with a maximum length of 25 characters entered from the keyboard. (After the character library functions are explained) While Linux and UNIX are command-line-based operating systems, they also include GUI support. Please describe how the operating system helps to execute the required action using the information that is provided on the command line. (s) Transcribed Image Text: Exercises: 1. (11111), +(1110), = (?)2 2. (1011001)2-(1001001)2-(?)2 %3D 3-(10001)2-(1001)2- (?)2 4. (110.1)2-(101.1)2-(?)2 5- (111101).-(10001)2- (?)2 6. (101.01)2 – (11.11)2-(?)2 . 7- (1110), – (11)2 – (?): . 8- (1111010). + (11)2-(?)2 , Transcribed Image Text: Construct PDAS that accept each of the following languages. a) {a’b] | 0 0}
d) {a’b’ck \ i+k = j}
e) {a’b | 0sisj<2i} ) {a*+ig'd \ ij> 0}

Transcribed Image Text: Moving to another question will save this response.
Question 5
Virtual 3D representation is an example of
Logical design
Conceptual design
Model
Physical design
A Moving to another question will save this response.

In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy is called  _____. ER modeling and normalization data model verification database analysis and requirements distributed database design

Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. T F An expert system is an example of an office system.

Transcribed Image Text: Which of the following will you find on an SRS?
O end user documentation
O test plans
O who, what, where, when, why of software
O implementation details
O None of the above

Computer engineering question Write in APEX – Anonymous window Please design an Aggregate query over the Opportunity Records by grouping the Compaign Id and the avg amount. Loop over the fetched records and display the records

In the first place, why should the data be split into training and validation sets? When it comes down to it, what will the training set be used for? The validation set’s purpose is yet unknown.

using R Studio Using built-in dataset, create R code to extract first 15 english letter in lower case and last 15 letters in upper case and extract letters between 10th to 20th letters in upper case

Excercise 3.2 Draw the diagram of the DFA that recognizes inputs that do not give a remainder of 0 when divided by n, with ?={ 0 , 1 }. n = 3. Thank you so much

The list Q has numbers 1, square root of 2, x, and x^2, where x>0 and the range of the numbers in the list is 4. quanity A= x quanity b= 2 which quanity is greater?

Transcribed Image Text: A process which is in the Waiting state moves to the Ready state, when
occurs.
O a. Interrupt
O b. /o or Event completion
Oc Terminated
on
O d. /0 or Event wait

What are the differences between top-down and bottom-up approaches to information security? Bottom-up vs. top-down: why is one superior than the other? Compare and contrast each concept to fully see how it fits within an organization.

Transcribed Image Text: 6. If the values of inputs in a full adder are
0, 1, 1, what are the sum and carry
values respectively?
sum=0, carry=1
No correct answer
sum=0, carry3D0
sum=1, carry=0
sum=1, carry=1

Transcribed Image Text: Hendy wants to find the transpose of a 2 d
matrix.
You can assume the matrix as your own and
order must be 3×3 and print it.
Write a java program for that.

Would you agree with the following statement about a peer-to-peer file-sharing application: “There is no concept of client and server sides of a communication session”? What is the reason for this or why is it not?

In how many ways can 4 people be chosen and arranged in a straight? line, if there are 5 people from whom to? choose? A. 5 ways B. 20 ways C. 10 ways D. 120 ways

Write a GUI program named InchesToCentimetersGUI that allows the user to input a measurement in inches, click a Button, and output the value in centimeters. There are 2.54 centimeters in an inch. only program with GUI

I need the answer as soon as possible Transcribed Image Text: Write a program in c++ to delete a node in AVLTree please create separate file (.h) header file (.cpp)
implement file and (.cpp) source file.

If the disk is rotating at 3600 rpm, determine the effective data transfer rate which is defined as the number of bytes transferred per second between disk and memory. (Given size of track = 512 bytes).

java Transcribed Image Text: QUESTION 21
Suppose Vehicle is a class already created. How many Vehicle objects are created by the following declaration?
Vehicle ] vehicles = new Vehicle [10];
Enter your answer here : [a]

Draw a simple UML class diagram for the following system: “A library has sections which store books and users who borrow them.” You should draw the four classes and their relationships only. Justify the relationships briefly

When it comes to software engineering, what is the function of design patterns, and how can they be utilized effectively? Provide three examples of various design patterns, as well as a short explanation of each pattern.

Transcribed Image Text: O True
O False
6. Every aggregation relationship is an association *
O True
O False
7. Removing a duplicate code in the program is an example for *
(1 Point)
Reverse engineering

Transcribed Image Text: Question 14
In which of the following Graphs, the shortest path CANNOT be found?
O Gaphs with negative cost cycles.
Negative weight graphs.
O Positive weight graphs.
O Graphs with positive cost cycles.

Transcribed Image Text: What is the result of executing the following code?
int i = 0;
while (i >= 2) {
System.out.print (i + ” “);
i++;
}
O 01
O 012
O No print out

Create a program that will convert an infix expression entered by the user to its equivalent prefix and postfix expression Sample Output: Enter an Infix Expression: a+b^(c^d-e/(f+g)+(h^i)^j)      Postfix Expression: abcd^efg+/-hi^j^+^+               Prefix Expression: +a^b+-^cd/e+fg^^hij               

In Java Language: Write a program to take input a char variable and an integer(in range 1 to 256)  from user and print the value of ASCII value of char – Value of integer in output.

The best way to tell if a cable within a computer is a data and instruction cable or a power cable is to monitor the connection of the cable to each device connected to the cable?

Transcribed Image Text: Question 11
Proper ancestor of a node v is defined as: Any node,
on the path from the root to the node?
Excluding v.
Including v.
Siblings of v.
Children of v.
OOO

Transcribed Image Text: Ace
V
350-
CompTIA A+ Certification Exam: Core 2 – Ryan Murray
Chut
WhiteBoard
Which of the following is used with WPA2-Enterprise to authenticate wireless clients?
A.
TACACS+
OB.
LDAP
RADIUS
OD.
MDM

Transcribed Image Text: 1. Solving the coin-row problem by dynamic programming for the coin row (5, 1, 2, 10, 6, 2).
2. Write the used function for solving this problem, and clarify your steps in detail.

Allow N to be an array of integers that is not in any particular order. To determine the lowest value, the maximum number of comparisons needed is N.

Take your pick.

Is this correct or incorrect?

Transcribed Image Text: Consider the grammar G = ({S, X, Y, Z}, {a, b, c}, S, P), where:
P = { S?XYZ,
X?AX,
X?E,
Y?ÞY,
Y??,
Z?cZ,
Derive the string (abbc) using the right most derivation.

A series of four or five comparisons and calculations that together determine an employee’s withholding tax value might be grouped using what sort of logical unit? Question options: an attribute a method a class a structure

Write an Internetwork Operating System (IOS) commands for configuring the following ports: (Note: Network Address between Router0 and Router1 is 192.168.10.0/24 and Network address for Gig0/0 is 168.10.10.0/16). (i) Router0 – Gig0/0 (ii) Router1 – S0/0/0

Give screenshot for the output. #include using namespace std; int main() { float f1 = 0.5; double f2 = 0.5; if (f1 == 0.5f) cout << "equal"; else cout << "not equal"; return 0; } Please solve Quickly ?++ Transcribed Image Text: flowchart to calculate the result of .(number (N) to power (M start Yes No End No Yes print m==0 i=i+1 ?<=M p=p*n p=1, i=1 Read N, M print 1 Transcribed Image Text: Consider the following postfix expression. Use stack to evaluate it. 6 3 2 4 + The value of the above postfix expression after evaluation will be: ?. 40 b.-18 c. 1 d. 74 Construct a simple CALCULATOR software and upload on GitHub . Submit a document which contains the following: Software Specification Software Design Program Code Lines (Java or any OO Language) Also, submit GitHub link of your project. Transcribed Image Text: H.W2\| Find the result (X) of the following in Binary Parallel Adder \ Subtractor by using 2S complement with all logical gates and show the result drawing: (54)10 – (43)10 = X : Make use of examples to help explain your point. How conventional personnel practices are coupled with controls and integrated with information security principles to become a component of the information security function is discussed in detail. Transcribed Image Text: (d) Using K-map, find a minimal sum of products expression for the following logic function, indicate the distinguished 1-cells. F(A.B.C.D) = E (0,8,9,13,14,15) + Ed(1, 12), where d is a don’t care condition. The code to open a combination lock is an ordered sequence of four digits chosen from the set {1,2,3,4,5,6}. How many different codes are possible (i) If repetition is allowed? (ii) If repetition is not allowed? Which item goes at the bottom of a page in a word document? Choose one: a. All of these; b. None of these; c. None of these; d. None of these; e. d. Footer c. Header Programming language is: C ( Please write with comments): Two Programs about Pointer : Transcribed Image Text: Write a program to add two numbers using pointers Second program to search an element in array using pointer i need the answer quickly Transcribed Image Text: The following decoder implements the function: Yo Y1 wa Y4 z > wo
ys
Fb
X ?or Y ??r Z
XYZ+X’YZ’
O X’Y+Z
X xor Y xor Z

Which of the INT 21h functions would you use to check the standard input buffer to determine whether a character is ready to be processed and which would you use to check the standard output buffer?

Write an assembly language code to store your middle name alphabets in an Array and print it in Descending order such that it follows the given pattern (print steric and hash signs as well) in MIPS

In agile project management _______________ is a short cycle of development, the output is a shippable product functionality and its duration is between one to four weeks.

a.
Sprint

b.
Phase

c.
Daily Scrum

d.
Release

What is the difference between security policy and information security standards in terms of whether they are static or dynamic? Do you think there was anything in particular that contributed to the occurrence of this problem?

Which of the INT 21h functions would you use to check the standard input buffer to determine whether a character is ready to be processed and which would you use to check the standard output buffer?

Examine the role wireless networks are having in the developing world. Why are some places bypassing LANs and physical cabling altogether and moving to a wireless system architecture? What are the advantages and disadvantages of this?

Artificial Inteligence Transcribed Image Text: is h2 admissible *
A
3
2
H1 H2
?? 3
A| 3
B
4
D
6 3
C| 4
B
5
3 2
3
6
G
O yes
O No

The ________ mode provides synchronization for the entire stream of bits must. In other words, it guarantees that the data arrive at a fixed rate. a. synchronous b. asynchronous c. isochronous d. none of the above

What is the value of num1 on line 7? Transcribed Image Text: 1
var num1 = 2;
2 num2 = 3;
3 while (num2 > num1) {
4.
num2++;
5 }
6 document.write(num1);
7 document.write(num2);
8

Write a R program to create FOUR(4) vectors A, B, C, D with 4 integers. Combine the four vectors to become a 4×4 matrix where each column represents a vector. Print the content of the matrix.

I need the answer as soon as possible Transcribed Image Text: 11
Which of the following relationships
models the following statement: “Both
books and magazines are documents” *
O Association
O Dependency
O Generalization
O Realization

Describe how a home-based business owner dealing with distribution of household consumer products can use online networks to facilitate communications, share data, information, promote the products and transfer funds within his network of distributors and customers.

Describe the difference between Type 1 and Type 2 Hypervisor. Are these Type 1 or Type 2 hypervisors: Microsoft Virtual PC, Oracle Virtual Box, VMware Workstation, Oracle Solaris Zones, VMware Fusion, Oracle VM Server for x86

Create a simple binary dataset (6 points in total, 3 for each class) that can be linearly separated. nt: 2D plane, every point will have 2 features (x,y axis), so we need 12 numbers in total.

How many 8-bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one start bit, eight data bits, and one parity bit and two stop bits?

The security environment related to the logical structure of IoT consists of four different levels, complete the following based on the IoT Security framework. a. Smart objects/embedded systems b. Fog/edge network c. Core network d. Datacenter/cloud

Talk about the benefits and drawbacks of remote access, which includes the use of remote desktops. What are some of the difficulties that may arise as a result of enabling customers to connect to Remote services.

106. The time from when a read or write request is issued to when the actual data transfer begins is called _______ a. Seek time b. Access time c. Average latency time d. Data transfer rate

is the answer 1? and why Transcribed Image Text: What is the result of the operation in the C language below?
4*8%3-1
O a. 5
O b. 2
O c.0
O d. 7
O e. 1

Technology is advancing at a rapid pace, and there will be much more disruption in the future. The current status of computer progress may be summed up by citing five (5) specific computer or communication innovations.

What’s the difference between path loss, multipath propagation, and interference from other sources in terms of wireless channel impairments? Which of these kinds of channel impairments will a network engineer be able to deal with effectively?

End-to-end encryption is a possible challenge for application-level proxies since it is difficult to decrypt. Make a recommendation for a solution that will allow a protocol that encrypts its payloads to pass through an application-level proxy.

Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. T F When the Internet was first developed, it was called Mosaic.

Transcribed Image Text: 2. Assume that XTAL = 12 MHz. Find the TH1, TL1 value to generate a time delay of 5 ms.
Timer is programmed in mode 1. Show your work!
Answer: TH1:
, TL1:

Give screenshot for the output. #include using namespace std; int main() { float f1 = 0.5; double f2 = 0.5; if (f1 == 0.5f) cout << "equal"; else cout << "not equal"; return 0; } Transcribed Image Text: Q2: a- write a basic program using ON-GOTO statement to find the value of p as follows: sin x+3cos y if n=1 x(y +9) p = if n=2 ?? x+y e if n=3 2. Discuss why control procedures over access to the data resource become more critical under the database approach than in the flat-file environment. What role does database management systems play in facilitating control of database environment? Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. T F An expert system is an example of an office system. Transcribed Image Text: 5. Machine Learning: (a) How Facebook using machine learning? Is it Supervised or Unsupervised? (b) What are the types of tasks performed by Amazon Machine Learning? (c) How to use Amazon Machine Learning? Transcribed Image Text: What languages do the grammars with following productions generated? Write the language for each of them. (1)A? bAa / ba (2)? —> ?? ?
(3)S > ??
A? bAa/ ba
B ? Bb/2

Complete the query to create a new table whose data and structure are copied from another table EmployeeInfo SELECT * INTO ________ FROM EmployeeInfo WHERE 1 = 0; _______ TABLE ________ AS SELECT * FROM __________;

Our knowledge of database design tells us that depending on the needs, it may be split into two or three levels By switching from a two-tier design to a three-tier design, what qualities are gained? Discussbriefly

Transcribed Image Text: The correct comment tag in the HTML is :
O a.
O b.
O c.
O d. <-- comment here -->

Stephanie is in charge of a small network and wants to make it simple but secure. Which network(s) would be the best for Stephanie to set up? a. WAN b. Peer-to-peer c. Server-based d. Master domain

I need the answer as soon as possible Transcribed Image Text: *:Testing with customer data is.31
System testingO
Component testing
Acceptance testing O
Requirements validation O
*.Use case diagram is a design model.32
True
False O

Find the complement of each expression Transcribed Image Text: (a) (ab’c’)’ =
(b) (a’ +b +c + d’)’ =
(c) (a’ + bc)’ =
www
(d) (a’b’ + cd)’ =
%D
(e) [a(b’ +c’d)]’ :
%3D

None Transcribed Image Text: ?????? )2(
When you make chocolate chip
cookies, what do you have to do
* ?first
Put the cookies in the oven.
Mix the ingredients.
eat the cookies.
Get all the ingredients.

What features might you incorporate into the operating system so that deadlocks in the
spooling system can be resolved without losing the work (the system processing) that was
underway or already performed by the deadlocked processes?

Transcribed Image Text: In SNMP to informs the manager about rebooting operation the following
command can be used
O Get and MGet
No option is correct
SNMP manager receive Trap.
Get request SNMP manager
O Trap.

MCQ: Ahmed is enumerating the details from port TCP389. What information is he likely to get? a. Email Status from the server b. Time Zone details c. SNMP Passwords d. Contact information from the active directory

None Transcribed Image Text: It can be used and defined outside of class.
ed
O a. Parametrize constructor
d out of
b.
Friend class
g question
C. Empty constructor
d. member functions
e. Friend functions
3.

Which of the INT 21h functions would you use to check the standard input buffer to determine whether a character is ready to be processed and which would you use to check the standard output buffer?

Transcribed Image Text: 3. Calculate number of Page ts ratio for the given memory block sequences
(4,2,1,5,6,2,1,7,3,2,1,2,3,6,3,2,6) if LRU(stack) algoritm is used.
a)
53
55
45
19020198
e)
50
f)
57
O O
O O O

Translate from Nihongo to Eigo. 1.  Anatano ie wa sochira desu ka. 2.  U.C. wa doko desu ka. 3.  Toshokan wa asoko desu ka. 4.  Shokudo wa dochira desu ka. 5.  Kochira wa watashino ie desu.

Given an array of names of Students below, write a program in Swift language to display the names of all students in the array in separate lines in output. names = [“Anna”, “Alex”, “Brian”, “Jack”, “Jhon”]

Multiple choice and True/False Java is a ___________ language, which means that it allows only values of compatible data types to be stored in variables. a. case-sensitive b. strongly typed c. object-oriented d. a and c

Which of the INT 21h functions would you use to check the standard input buffer to determine whether a character is ready to be processed and which would you use to check the standard output buffer?

int main()
{
E();
C();
E();
}
void B()
{…}
void C()
{..}
void D()
{..}
void E()
{
B();
D();
}

A variable declared in function B and only in function B is accessible in?

When is it appropriate to use Excel to create a table in Word rather than a spreadsheet application such as Excel? What are some of the advantages and disadvantages of creating a table directly in Word?

When it comes to security, what exactly does it mean? When it comes to physical security today, what are some of the most pressing concerns? Assaults on the organization are manifested in a variety of ways.

When dealing with Linux, it provides a set of procedures that ensure atomic actions on a variable, which may be used to prevent basic race situations. But what happens when working with uniprocessor and multiprocessor systems?

The blinking vertical line displayed on the screen that indicates the current location in a document, such as where the next change will be made to the document in a word processing program, is called the__________.

Develop a software project specification and plan based on a suitable software development life-cycle modeling approach. Components of a software product should be analyzed, designed, implemented, tested, and documented using suitable software development techniques and tools

Convert pounds into kilograms) Write a program that converts pounds into kilo-grams. The program prompts the user to enter a number in pounds, converts it to kilograms, and displays the result. One pound is 0.454 kilograms.

Transcribed Image Text: T03] What is the the value of sum3?
int suml = 100 + 150;
int sum2 = suml + 250;
int sum3 = sum2 + sum2;
500
350
1000
800
• Previous
Next

Write a C program to print only odd digits in a number. Example Input and Output If the input is 3224589 the output must be 359 If the input is 99241165 the output must be 99115

Solve quickly. Transcribed Image Text: 33.which of the following is not true about worm?
O a. break in to computer by email
Ob. Not spread to other computer
O c effect computer functionality
Od. Copy itself

Talk about the benefits and drawbacks of remote access, which includes the use of remote desktops. What are some of the difficulties that may arise as a result of enabling customers to connect to Remote services.

Transcribed Image Text: The basic operation in building a Max-
Heap from an existing array is:
Select one:
a. The heapify procedure
O b. The Inserting procedure
c. The Heapsort procedure
O d. The Maxheap procedure

Print first 60 natural numbers in output without any space between them. Print all numbers in same line. Use for loop and ‘<' in the program in a must add on condition. Programming language : Swift Transcribed Image Text: Design a network that can provide 65,563 IP address (i.e. the network can host up to 59000 hosts), given that you need only 255 subnets. Divide the IP address accordingly. .Show all work Transcribed Image Text: In the Boolean equation [x+ z{y’ + (z’ + xy’}] {x’ + z” (x +y)} = 1, if x = 1, then a O None of the given options .c O y zd Format.cpp)c++ Write a program that gets two real values from the user, prints their sum and product in scientific notation, and prints their sum and product in fixed point notation. Print answers to three decimal places using R Studio Using built-in dataset, create R code to extract first 15 english letter in lower case and last 15 letters in upper case and extract letters between 10th to 20th letters in upper case q25- Which form of documentation is most appropriate for explaining the purpose of a particular statement within a function? a. A comment. b. A Linux manual page (man page). c. A docstring. d. A README file. Transcribed Image Text: Use python, dont import modules def read(filename) This reads a file and returns a dictionary formatted like below. filename AA, American Airlines US,United States CA Canada read(filename) = (‘AA’:’American Airlines’, ‘US:’United States, “CA:’Canada’) What is the correct JavaScript syntax to change the content of the HTML element below?

This is a demonstration.

#demo.innerHTML = “Hello World!”; document.getElementById(“demo”).innerHTML = “Hello World!”; document.getElement(“p”).innerHTML = “Hello World!”; document.getElementByName(“p”).innerHTML = “Hello World!”;

What is the purpose of constructors in c++.? How to denote the destructors in c++? Give the order of execution of the constructors and destructors in a multilevel inheritance. Explain the same with a suitable program

Consider a database used to record the marks that students get in different exams of different course offerings. Construct an E-R diagram that models exams as entities, and uses a ternary relationship, for the above database.

Use cases is a powerful elicitation technique. However, there is an argument that by some individuals that it is not always wise to use it. Explain three (3) limitations of use cases that support this assertion.

The names Sam, Tom, Bill, and so on are in the same group as you. The permissions column on a file called answer that you created has the value ——r——-. Who has access to the file?

please describe how you would create the program and why, referencing which data structure you would use. Transcribed Image Text: 2. Write a program that creates a list of planets and their distance from the sun.

C programming Transcribed Image Text: Question 4
10 Points
Write a block of code to declare a 50-element integer array called intArray and set all of its elements to 1.
Use the editorto format your answer

in cell d6 enter a formula  using the IFERROR function that uses the  existing VLOOKUP function in cell d6 as the value function arguement and invalid code as the customized error message for value_if_error function arguement.

What would be displayed by the following program?  (The symbol ‘#’ stands for a space character.) int main(void) {     double a, b; a = 37.56; b = 101.117; printf(“Is it%6.1f%9.4f”, a, b); printf(“?\n”); return (0); }

my answer choice was incorrect Transcribed Image Text: If I have a class titled MyClass, then which of the following is a valid
constructor header?
O def _init_(self):
def MyClass(self):
O def _MyClass__(self):
O def _create__(self):

5. A thread is a______ : a) lightweight process where the context switching is low b) lightweight process where the context switching is high c) is used to speed up paging d) None of The Above

Transcribed Image Text: A digital system of an n bit. The total number of its
samples 1024. The value of n is .
Select one:
O a. 9
O b. 8
c. 11
O d. 10

using R Studio Using built-in dataset, create R code to extract first 15 english letter in lower case and last 15 letters in upper case and extract letters between 10th to 20th letters in upper case

Discuss the important  measures needed to be taken to curb the nefarious activities of  notorious Hackers. Your discussion should point out eight key areas of network security which will help bring notorious Hackers to a halt.

cours: DISCRETE STRUCTURES Transcribed Image Text: Question 1
5×3+x?+9x +2
Let f(x)
8x? – 5x +2
1. Use Ad-hoc calculations to prove that f(x) is 2(x)
2. Use limits to prove that f(x) is ( x)

QUESTION 21 1. Code a JavaScript callback function for the Array.map method to • evaluate an array of integers • identify the integers that are Prime numbers • return the Prime numbers in the new array

Consider the simple “Caesar” cipher C = (L + 3) mod 26 giving Letter: ABCDEFGHIJKLMNOPQRSTUVWXYZ (0 1 2      24 25) Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC (0 1 2     24 25) Encode the string “HELLO” What is the deciphering formula?

I need the answer as soon as possible Transcribed Image Text: 1
a
Define Bootstrap program.
1
b List two reasons why caches are useful? What problems do they solve? What
problems do they cause?
1

I need the answer as soon as possible Transcribed Image Text: Q3) Write a c++ program to implement the following equation.
3
4
100
y =
n! +1
n! +2′ n! + 4
n! + 99

Write a function prototype and a function definition called average that receives an array of type integer , and the number of elements in the array. It returns the average of the numbers in the array.

A university professor working with sensitive medical records shares a confidential file with a graduate student, who shares it on a public Internet forum. What are some ways to prevent such a leakage of sensitive data?

77. Which of the following is not a factor in the failure of the systems development projects ? a. Size of the company b. Failure of systems integration c. Inadequate user involvement d. All of these

Write a R program to create FOUR(4) vectors A, B, C, D with 4 integers. Combine the four vectors to become a 4×4 matrix where each column represents a vector. Print the content of the matrix.

Write a Console java program named SimpleUdpServer that demonstrates the basic components of a simple UDP server by binding a dedicated socket on the server for other UDP clients to connect to. solve it without paper

Create a version of the hybrid merge-join method that is appropriate for the situation in which both relations are not physically sorted, but both have a sorted secondary index on the attributes that are being joined.

DON’T COPY FROM INTERNET Sorry, I forgot to mention that you should use if-do block else  i dislike Write a program in clojure programming language to compare two number and print the values according to that

Transcribed Image Text: 4. In a four-bit adder-subtractor and given
that A (0100), B (0101), if the value of
S1= 0, what is the value of M input?
1
cannot be determined from the
given information

Each of the following is a reason it is difficult to defend against today’s attackers except a. complexity of attack tools b. weak patch distribution c. greater sophistication of attacks d. delays in patching software products

Talk about why it’s important to detect and protect against system or software flaws after reading the CVE site Mention the ways in which hackers use system and software vulnerabilities to conduct an attack as well.

In the Allen-Bradley MOV instruction, constants such as 250, 400, 5.5, etc., can be entered into the source location of the MOV instruction rather than a memory address containing the value to be moved. True False

Each of the following is a reason it is difficult to defend against today’s attackers except a. complexity of attack tools b. weak patch distribution c. greater sophistication of attacks d. delays in patching software products

In C++ language write a program to prompt user for entering a string and then form a new string by concatenating the string with its reverse. Print the string formed in output. Input- C++ Output- C++++C

Transcribed Image Text: Exercises:
1. (11111), +(1110), = (?)2
2. (1011001)2-(1001001)2-(?)2
%3D
3-(10001)2-(1001)2- (?)2
4. (110.1)2-(101.1)2-(?)2
5- (111101).-(10001)2- (?)2
6. (101.01)2 – (11.11)2-(?)2 .
7- (1110), – (11)2 – (?): .
8- (1111010). + (11)2-(?)2 ,

PROBABILITY AND STATISTICS

A jar contains 3 red marbles, 7 green marbles and 10 white marbles. If a marble is drawn from the jar at random, what is the probability that this marble is white? *

Fiber Optic Cable uses a. Electronic pulses to transmit Information down copper lines b. light pulses to transmit Information down fiber lines c. Does not send any pulses d. Requires a connector to send any pulses

The Type of IDS which analyze the historical audit records to identify usage patterns and to generate automatically rules that describe those patterns of attack is: Threshold detection Profile based Rule-based penetration identification Rule-based anomaly detection

I need the answer as soon as possible Transcribed Image Text: Java
Write a program to check whether a number
has alternate bits in 0(1) time and 0(1)
space complexity
Don’t use O(n) else I dislike

Which one of the answer below is NOT part f IAM best practices? Have a strong password rotation policies Use access keys for programmatic access Use roles to access services Always use ROOT account to login

None Transcribed Image Text: Answer all the questions below.
* How far refers to.
distance O
quantity O
frequency O
time O
* We
to Spain every summer
fling O
fly O
flies O
flown O

Are the following statement forms logically equivalent: p ? q ? p and p ? (? p ? q) ? Include a truth table and a few words explaining how the truth table supports your answer

python Transcribed Image Text: S(x,n) = 1+ +.
x-n’ (x – n)? (x- n)3
(x – n)”
Plot the function for x E [0,3] and n = 4 (you are required to use the Matplotlib library).

Exercise 5.4 ?= {0, 1}. Convert NFA, whose diagram is given below, to DFA using the subset construction method, draw the diagram and state what kind of inputs it recognizes. Transcribed Image Text: 0,1
0,1
0,1

Given there is a Textfield called studentNameTXT, a Dataset called theData, and a table called Student within the theData, and a field name called first_name. Write a code snippet to bind the student name to studentNameTXT

Trace the following loops showing the generated output and the final value of i? Transcribed Image Text: for (int i = 0; i <= 8; i += 2) Output: System.out.print(i +" "); Final value of i: Please show me how to make a multiple line comment in Python. I know how to do a single line comment but unable to do it for multiple lines as a whole. Thank you in advance. Transcribed Image Text: Type SEU shortcut to do the following: Copy 3 lines from Top to Bottom Deleting last line Repeat 5 lines in the middle Exclude 5 lines 28. Move 5 lines as a block Transcribed Image Text: 6. Write a program to calculate sum and average of three numbers in functions called (“Summation”) and (‘Average”) respectively. Enter the numbers in the command window, call the functions and find the result. Provide an example of a “WORM” attack and how can this be detrimental to a content delivery network? What actions can be taken to prevent WORM attacks? Your answer must be specific towards content delivery networks Transcribed Image Text: a. Design the DFA M that recognizes the language L={w | w contains the substring 20 exactly twice} defined over the alphabet M3{0,1,2}. Give the formal 5-tuple definition and draw the transition diagram. Transcribed Image Text: Question 8 Of the DHCP DORA methods, which of these methods is sent from the DHCP client to the DHCP server? Select all that apply. O REQUEST V DISCOVER O ACKNOWLEDGE O OFFER ble Student(Roll No, Name, Age). If Roll No. is a candidate key the Transcribed Image Text: In a table Student(Roll No. Name, Age). If Roll No. is a candidate key then print all posible super keys Please solve Quickly ?++ Transcribed Image Text: flowchart to calculate the result of .(number (N) to power (M start Yes No End No Yes print m==0 i=i+1 ?<=M p=p*n p=1, i=1 Read N, M print 1 What is the maximum size of data that the application layer can pass on to the TCP layer below? a. Any size b. 2^16 bytes – size of TCP header c. 2^8 bytes d. 1500 bytes Both Having and Where keywords can be used to filter (include or exclude) some data set in the results in SQL. Explain the difference between WHERE and HAVING usage with your own words. Provide some example. Please help me with this in Python In python Create a class Rectangle to compute its area and perimeter in class then self input of length and width like enter length: enter width: then output displays Q.No3. Discuss why the design of your interaction, if simply implemented as is, may not lead to the ideal software design. Consider how the design of interaction and the design of software often have different goals Create the abstract use case for business manager of Amazon to find the top 10 popular items in search and purchase for the past week for a given region. Then, create the corresponding business use case Transcribed Image Text: Question 8 Which of the following functions that would result in a value of 97? a. ROUND (97.857, 1, 2) O b. SUBSTR (97.857, 2, 0) O. TRUNC (97.857) d. ROUND (97.857, 0) What decimal value does the 8-bit binary number 10011110 have if ( Please show the calculation process ): It is on a computer using one’s complement representation? 2.It is on a computer using two’s complement representation?