List five essential characteristics of cloud computing defined by NIST. Select one characteristic and elaborate on why moving to the cloud might be beneficial to businesses.?
Transcribed Image Text: I would like to know the type and value of each expression.
(a) Python’islower( )
(b) ‘Python’lower)
(9 len(‘Python’)
(d) Python’index(T)
(e) Python’==’python
c). Information systems affect organizations economically and behaviorally. Describe the ways in which each of these applies to an understanding of the working of the organization.
Four married couples have bought 8 seats in the same row for a concert. In how many different ways can they be seated: Without any restrictions?
list four (4) examples of embedded systems that you typically use in your day-to-day activities but have never thought of them as embedded computer systems .
Transcribed Image Text: Solving the following Recurrences Using Induction
Consider the recurrence t,=2tn-1 +1, n21 with initial condition to=0.
Obtain the solution using the substitution method.
Write a relational expression which would evaluate to true if the sum of variable x and y was equal to the value of a variable z.
Given the following logical expression, place the operations in the order in which you would apply, from first operation to last. ~p ? q ? r
Write assembly code that writes the sum of the numbers up to 200, divisible by 5 and natural numbers not divisible by 3, to address 800h.
Varied models are used in software development, with each model having a different relevance depending on the application. Please classify those models according to your preferences.
POST in booting process stands for- i) Pre Operating System Test ii) Power Operating Self Test iii) Power On Self Test iv) Pre On System Test
The Intra-Site Automatic Tunnel Addressing Protocol is used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network. Is it true or false?
How does the size or width of a Bus affect or influence the architecture of a computer system with regards to data transmission. Explain with examples.
Write short notes on the following Customer Relationship Management Enterprise Resource planning Supply Chain Management What are the benefits and challenges in implementing each of these?
Task Tracker and Job Tracker are both phrases that are used in the workplace. Could you please explain how these two systems operate in brief terms?
Varied models are used in software development, with each model having a different relevance depending on the application. Please classify those models according to your preferences.
Transcribed Image Text: 1
Android applications are packed and distributed in
O a. apk
put of
O b. exe
uestion
O c. obj
O d. dex
It is the science of analyzing raw data to make conclusions. Select one: a. Big data b. All are correct c. Data analytics d. Cloud storage
16. In asymmetric clustering other machines perform operations while one machine is in a. hot standby mode b. standby mode c. reset mode d. undefined mode
Transcribed Image Text: Figure 2.1
92
1
1 Transcribed Image Text: Which of the strings 0001, 01001, 0000110 are accepted by the dfa in Figure 2.1?
What are the major differences between searching and sorting in Java? In what instances can searching and sorting algorithms be used? Provide specific examples of each
PLZ help with the following in java TRUE OR FALSE An interface can contain defined constants as well as method headings or instead of method headings.
Varied models are used in software development, with each model having a different relevance depending on the application. Please classify those models according to your preferences.
What are the most significant distinctions between a local-area network and a wide-area network, and how do these differences influence the architecture of a distributed database?
Write a C++ program that reads 10 intergers from user and store them in an array and then print the smallest value of all of them.
What are the IPSec header fields that allow an IPSEC gateway to determine which encryption technique is being used to encrypt the IPSEC packets it receives?
Transcribed Image Text: A database management system (DBMS)
enables the data in the database to be shared
among multiple applications and users.
Select one:
True
False
The above case study deals with Twitter. What’s the difference between Twitter and the rest of the social media platforms? Support your answer with relevant examples.
write the | code in r language for factorial check all cases Transcribed Image Text: write the
code in r language for factorial
check all cases
When it comes to virtual machines If I’m running four different operating systems on VMware, how can I create a new unique network under VMware Fusion?
Write an if statement that displays the message “The number is not valid” if the value referenced by speed is outside the range 0 through 200.
Unlike TCP, IP does not need any connections to be established. What makes it possible for these two protocols to coexist in the same protocol stack?
34 In excel,Statistical calculations and preparation of tables and graphs can be done using. Select one: a. Power Point b. Excel c. Adobe Photoshop d. Notepad
Read a string input from user and print If the string contain any upper case alphabet or not. Print yes or no in output in C++.
Predict the output of following Java ProgramProgram 1//filename Main.javaclass Test {Protected int X,y;}class Main{public static void main(String args[]) { Test t = new Test(); System.out.println(t.x+””+ t.y);}}
None Transcribed Image Text: Write a program to convert string into int
and display that print
For ex :- “300” Prints 300 on console
In Java
Assume the following statement has been executed: number = 1234567.456 Write a Python statement that displays the value referenced by the number variable formatted as 1,234,567.5
Truth tables simplifies the operations of the various logic gates. Draw a truth table to represent the logical operation {A+B +A’C)(B+A+AC’) and comment on your output
) Derive in classical predicate logic formula ¬(?xc(x)??xd(x))??x(¬c(x)?¬d(x)), or prove in any other way that this formula is derivable (in such case explain the method first).
Transcribed Image Text: QUESTION 9
Each SQL Server database can contain
O Multiple tables
O None of these
All of these
Multiple stored procedures
Multiple views
What are implicit heap-dynamic variables, when, how, and why should they be used, and when should they not be used are all covered in this article.
Explain three methods to prevent and/or detect buffer overflow attacks. (nt: for the buffer overflow lab we disabled some defenses. feel free to google those defenses).
answer quickly Transcribed Image Text: niQjwrite and apply a Program to eValuate the Sollowing
8’erries Sor (n) and limits
X- 5 x3
21
13 X
i.
Transcribed Image Text: Question 15
What is the complexity of Dijkstra’s Algorithm for shortest path?
O(IEI)
O 0(? log |V)
O O(I\V)
O O(IVI log JEI)
Transcribed Image Text: int val = a[3][4]; in this statement
will take 4th element (column)
from the 3rd row of the array.
O yes.
O no.
83. A single threaded process of operating system programs has a. One program counter b. Two program counters c. Three program counters d. Four program counters
In your own words, describe why the class is the smallest reasonable unit for testing within an OO system. Subject : SOFTWARE ARCHITECTURE, DESIGN AND TESTING
i need the answer quickly Transcribed Image Text: 1.Write the PEAS description for English Language Instructor
Agent Type
Performance
Environment
Actuator
Sensor
Measure
English
Language
Instructor
True or False: Extracting and analyzing data from mobile devices is complicated because manufacturers of these devices store and manage data in a variety of ways._______________
513. A buffer where the data will be read into and written from is a. LPVOID Buffer b. LPOut Buffer c. LPIN Buffer d. LBLOCK Buffer
What text characteristics may a reader utilise to get a sneak peek a What are the distinctions between the synoptic and incremental approaches? t a text?
None Transcribed Image Text: What is the output of given code:
#include
using namespace std;
int add(int a,int b){
return (a+b);
int main(){
int a=5,b=3;
cout<
Write a program in c++that will display square root of any number entered by the user, until the inputted number, is zero. Using loop. Subject: C++
None Transcribed Image Text: We can access to any cell in any other
: sheets by the same workbook by write
Sheet_name#cell_name O
sheet_name&cell_name O
Sheet_name!cell_name
I need the answer as soon as possible Transcribed Image Text: From the Workspace, you can view and
* .search for previously run statements
true
false
287. Functions available for the application programmers is provided by a. application programming interface b. application program interface c. application programming interfacing d. application program interfacing
What is the range of numbers returned by Math.random() method? i) -1.0 to 1.0 ii) -1 to 1 iii) 0 to 100 iv) 0.0 to 1.0
What is SDLC? Why a commerce student must learn about SDLC and its phases? How SDLC could help a commerce graduate in career growth and success
1.) True or False: A.) A float typically uses more memory than a double (True/False) B.) A float typically provides more precision than a double (True/False)
using the appropriate design pattern quickSort, (maybe strategy pattern) insertionSort, bubbleSort. Write a C ++ code that can switch between these different algorithms dynamically with ease.
uotient and remainder of a given _ end and divisor, Transcribed Image Text: code in C++
the quotient and remainder of a given
dividend and divisor.
What are the IPSec header fields that allow an IPSEC gateway to determine which encryption technique is being used to encrypt the IPSEC packets it receives?
Which of the following are some of the concerns that 5G cellular networks raise? How soon do you think we’ll be able to utilise 5G technology?
We must prioritise quality while building software, and there must be a few elements that impact quality in some way along the process; describe those factors.
Transcribed Image Text: Which of the following allows a programmer to use an object of a class inside another class?
Select one:
a.Composition
b.Encapsulation
c.Polymorphism
d.Inheritance
In this article, the many types of image noise are discussed. Detail impulse noise and how it varies from other types of noise in your response.
Give a reason why collisions occur in switched networks running Ethernet technology. Explain in brief a technology that can be used to mitigate the collision problem.
What specific role does an operating system (OS) play? What is the relationship between an operating system, applications, and other software with regard to computer hardware?
Transcribed Image Text: In a data flow diagram, external entities are represented by:
a.
Rounded boxes.
b.
Square boxes.
O C. Circles.
O d.
Open rectangles.
write a program to evaluate the arithmetic expression: X = (AB-C) ÷ (DE+F) 1) Assume a memory-to-memory architecture with two-address instructions. plz solve in 40 minutes
What are the benefits of enforcing the integrity constraints as part of the database design and implementation process (instead of d oing it in application design)?
Transcribed Image Text: Q1: Write a program to compute the summation of following scries (use 100
terms).
10 20 30 40 50
14 21 28 35
If a system hangs after being used for several hours and you suspect overheating, what can you do to easily monitor the CPU and system temperature?
Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type.
. Create a script that will take 2 integers then show all “Fizz”, “Buzz”, and “FizzBuzz” between those two numbers (2 integers included) c language please
write a function to read the array a[5] . and write another function to print a real address and value of each element in this array
What are the two sorts of services provided by the Internet to its applications? What are some of the distinguishing features of each of these services?
If A, B , and C are all of them [6×6] float matrix input by users. Find Y as below equation. Y= 4(2A+B+2.5C) in C language
What is the definition of an endless recursion? What is the definition of a direct recursion? What is an indirect recursion, and how does it work?
What is the purpose of technical analysis? Explain how and why it is used by technicians; note how it can be helpful in timing investment decisions.
Transcribed Image Text: WHICH OF THE FOLLOWING DYNAMIC PARTITIONING PLACEMENT ALGORITHM IS SAID TO BE THE FASTEST IN PLACEMENT PERFORMANCE?
Select one:
a.BEST-FIT
b.FIRST-FIT
c.NEXT-FIT
d.SECOND-FIT
write some code that repeatedly reads a value into the variable n until a number between 1 and 10(inclusive) has been entered. This program uses Python
Rihanada want to convert a number from base 10 to base 16 .. You have to help her in java. You should take number from user
Describe some of the features of POSIX and how the shell helps the user leverage these features. Include at least standard IO, pipes, variables, and paths
Transcribed Image Text: In requirements validation the requirements model is reviewed to ensure its technical feasibility.
Select one:
?. True
O b. False
TOSHIBA
ALFAJR 3aI
Transcribed Image Text: 16
A language is a regular Language if and only if
accepted by DFA
accepted by RE
accepted by CFG
accepted by PDA
Why do you think that progress bars frequently behave erratically, moving from 10
to 90 percent in one step and then getting stuck on 90 percent?
Task Tracker and Job Tracker are both phrases that are used in the workplace. Could you please explain how these two systems operate in brief terms?
Given an array of size 10, fill it with 2-digit random numbers and print the average of all numbers of the array in output. Language- C++
Question 4 A larger number minus a smaller number is always———– A smaller number minus a larger number is always————- choose term negative it depends positive
1) A private cloud refers to cloud services that belong to a (an) a) Government agency b) Internet service provider c) Cloud provider d) Specific organization
Upvote for correct answer.Thanks. (5) Please perform the following Binary arithmetic. SHOW ALL WORK (5.1) 00111 + 11101 = ? (5.2) 11011 * 10101 = ?
Define the term “TCP connection” and what it means. The Internet is a connectionless packet-switched network, therefore does the concept of a TCP connection contradict that?
What are the many cyber security dangers that you will be expecting and planning for when you build a thorough information security strategy for your MIS?
What is the worse case complexity of this recurrence relation: T(n) = T(n-1) + n represents ? A)Quicksort B)Mergesort C)Quicksort and Mergesort D)None of the above
Write a java program to swap the first and the last elements of the array without creating a new array. The array may have any length.
Java Input class main { publicstaticvoid main(String args[]) { boolean a =true; boolean b =false; boolean c = a ^ b; System.out.println(!c); } } Find output.
Transcribed Image Text: Question 15
It is the nature of the application that determines the classification of the resulting linear programming formulation.
O True
O False
Write a program in juliya to print the square of number from 1 to 15 . Please do that. I am very beginner in this language
The method of top-down design is to break a problem into sub-problems and then solve the original problem by solving each sub-problem. a. True b. False
Python program Write a program in python to reverse the list using reverse method which is inbuilt in python and print the list in both instance
Transcribed Image Text: ekfok am
otitute of Excelinee
Assignment
Describe SSD (solid-state drive), its internal structure, and the mechanism used to
read and write data.
1.
Explain in detail the syntax and functionalities of the following Mongoose code: x.findOneAndUpdate({“clientID”: req.query.clientid}, {“status”: req.query.status}, {new: true}, function (err, data){ /* statement block */ });
Define Java Collection Framework (JCF). What are different types of collection classes are available in JCF. List down all the common methods to the JCF classes
Describe what a challenge–response system for authentication is and how it works. What makes it more secure than a conventional password-based approach is not immediately obvious.
One of the benefits of a Hadoop installation is the high degree of computational redundancy it offers. What makes this so crucial in a hospital setting?
A reference typea.contains datab.points to data in another variable, unlike a data type. c.points to data in a different internal storage location. none of the preceding
1. Describe the various considerations in choosing the means of financing a project. 2. Evaluate the use of project management software to enhance project cost management.
Transcribed Image Text: MC7:
is a sublayer in data link to decide who sends next frame on a multi-
access link.
OFDM
O TDM
CSMA
???
In what ways are fixed-length instructions better or worse than those that are variable-length in nature? It’s hard to tell which is more popular right now.
Interconnecting networks that connect part of a company’s internet resources to the intranets of its customers or suppliers. What will be the best match for you?
Multiplexing methods that are utilized by the physical layer include TDM, FDM, and CDM. Begin by explaining the advantages and disadvantages of each of these methods.
The number of exchanges needed to sort an array of N integers using Selection Sort is N.
Choose one of the following options: True or False.
Alaska wants to swap two floating point integes. You have to help her without using temporary variables You have to take input from user in c
Transcribed Image Text: ?????? )2(
Which of the following tag is used
for inserting the smallest heading in
* ?HTML
h3
h5
h2 O
h4
h1
Print natural numbers from 1 to 50 using Swift language. Note: All the numbers should be printed in same line without any space. Attach output screenshot.
Which of the following words has the CCCV syllable structure ? Select one : a . spray b . girl c . stay d . pray
wRITE A PROGRAM IN Ruby langauge to type a string with uppercase letter to lowercase letters String will = “RUBY IS NEW PROGRAMMING LANGUAGE” Typecast it
Define a CFG that generates the language over the alphabet ? = {?,?,?} defined by the regular expression: ?(? + ?)*???(? + ? + ?)*? .
Why is it essential to conduct a penetration test on a web application and a web server before to deploying the application in a production environment?
Don’t copy Convert the following JAVA code into MIPS assembly language. Assume that input is an instance of Scanner object. num=0 while(num<1000){ x=input.nextInt(); num*=x; } System.out.write(num);
If global variables may be used everywhere in the program, why not make all variables global instead of only global inside specific contexts? Defend your response.
Why Was The Decision Made To Make Padding Apply Outside Of The Width Of A Box, Rather Than Inside, Which Would Seem To Make More Sense?
Why is it essential to conduct a penetration test on a web application and a web server before to deploying the application in a production environment?
Discuss the following questions relative to compilers: a) Which phase of a compiler would give you a syntax error? b) Which phase complains about undefined variables?
List four criteria that would be used to compare the software development project tracking tools that companies employ to keep track of their software development projects.
A computer with CPU speed around 100 million instructions per second & with the word length of around 64 bits is known as Super computer explain?
What specific role does an operating system (OS) play? What is the relationship between an operating system, applications, and other software with regard to computer hardware?
Rehna wants to find how many years are present between 2000 and 2100 in which the Sunday is on 1st january. Print the number of years
Machine learning algorithms are sometimes grouped into two broad groups of lazy and eager algorithms. Clearly explain the difference and give one example from each group
MATLAB In this time the square is given in which circle is fitted .find the area of square and take the radius of circle from user
62. ________ is the process of converting digital data to a digital signal. a. Block coding b. Line coding c. Scrambling d. None of the above
Write a java program to find hiw much time required to execute a function which only have a print statement and also print it’s units also.
Transcribed Image Text: Write the full command line to compile the C source file called map.c, and put the
executable program into a file called map.
What is the definition of a system model, as described by James MacGregor Burns? What key issues should be covered when working on a baseline model?
In PYTHON Write the code that will open and read the data from a file named Numbers .csv and write it to a file named justAsNumbers.csv
(python) When creating variables, the names can consist of which of the following: Upper case letters Lower case letters Underscores (_) Digits All of the above
Transcribed Image Text: Write a java program to take the string and
word from user and check whether the string
starts with that word or not
Given the importance of innovation management, explain how this is achieved in the business understudy.
3. Outline THREE (3) challenges faced when setting up a business.
Asap Transcribed Image Text: JavaScript program to print object of a
student having its data like name age class
and cgpa and print this on console
Using any application of your choice, create an interactive presentation explaining the differences between various types of relationships between tables in an enterprise relationship diagram (ERD).
Unix/Linux
Several questions regarding the commands and shell programming
Purpose: know popular commands/utilities without google/textbook
h) run program in background; check out process; kill a process
Suppose d = {“jack”:40, “cera”:45}. To obtain the number of entries in dictionary which command do we use? a) d.size() b) len(d) c) size(d) d) d.len()
Display employee first name and the position of the second ‘a’ character in the first name if exist, otherwise display a message: Not contains two a
Transcribed Image Text: What is the Pre-Fix expression for
the following infix expression?
((A+B)*C-(D-E))&(F+G)
Select one:
a. -&+ABC-DE+FG
b. &-+ABC-DE+FG
c. None of Above
d. &+-ABC-DE+FG
Write a C++ program to take input the length of three sides of a triangle. Check whether the three sides form a right triangle or not.
The heuristic function of greedy best-first search is Select one: a. f(n) > h(n) b. f(n) < h(n) c. f(n) = h(n) d. f(n) != h(n)
A subject that can modify or write to an object but not having the authority to read it is known as what? Read-Only Append Execute Read-Write
Consider a completely populated full binary tree of height 10. 1. How many branches are on the tree? 2. How many leaves are on the tree?
Give some examples of benefits and drawbacks, such as the following: The service that does not need a connection The service that is based on connections
A graph G has 21 edges, 3 vertices of degree 4 and other vertices are of degree 3. Find the number of vertices in G. Help.
Explain briefly how Mobile Cloud Computing is different than simple mobile computing and simple doud camputing? 05: Explain the term M Baas in your own words?
Write a PHP program to read input string from the user and print “True” if the entered string start with “PHP” otherwise print “False” in output.
Which of the following device is used to connect two systems, especially if the systems use different protocols? a. hub b. bridge c. gateway d. repeater
48. What is the size of the ‘total length’ field in IPv4 datagram ? a. 4 bits b. 8 bits c. 16 bits d. 32 bits
116. Which of the following is considered a broadband communications channel? a. fiber optic cable b. satellites systems c. microwave circuits d. All of the above
i) Write a swift language program to take input radius of a circle(in cm) input from user and in output print the area of the circle.
89. A ________ bridge can forward and filter frames and automatically build its forwarding table. a. simple b. dual c. transparent d. none of the above
Transcribed Image Text: Which of the following is not a sequential circuit?
Select one:
a. register
O b. multiplexer
O c. filp flop
O d. counter
Please tell me what does this loop do in step by step for i in range(10): for j in range(5): for k in range(3): print “Aloha”
Task Tracker and Job Tracker are both phrases that are used in the workplace. Could you please explain how these two systems operate in brief terms?
> Fed . d qub o poe W e gen Komap. Transcribed Image Text: Find no. quads ond þaires in the quen
guen
K-map.
->
AB
Write a program in C that calculates the voltage value (V) of the voltage source using a Function. (R = 0,02 ?, I = 10 kA)
Show your work Using 7 bits to represent each number, write the representations of 23 and -23 in signed magnitude, 1’s complement and 2’s complement integers.
True or False: Extracting and analyzing data from mobile devices is complicated because manufacturers of these devices store and manage data in a variety of ways._______________
Write an i f I else statement that assigns 1 to x if y is equal to 100. Otherwise it should assign O to x .
Transcribed Image Text: Cookies were originally designed for;
O Server-side programming
O None of the mentioned
O Both client-side programming and server-side programming
O Client-side programming
Which pattern of the following design patterns makes relationships between high level and low level objects de-coupled Select one: a. Observer b. Decorator c. Abstract factory
list four (4) examples of embedded systems that you typically use in your day-to-day activities but have never thought of them as embedded computer systems .
Transcribed Image Text: Q3. The term gigabyte refers to :
a) 1024 bytes
b) 128 kilobytes
c) 1024 megabytes
d) 1024 bits
e) None of these
Open address bar in your browser and type “chrome://help” and explain the features in help and propose how you can protect organization’s computers from similar attacks.
Write a paragraph describing in your own words what the differences are between DRAM and SDRAM in terms of qualities such as speed, size, and price.
Using an example of an array of length 10, explain the following sorting algorithms: a. Merge sort b. Heap sort c. Quick sort d. Radix sort
After the execution of the following program the content of the register with address 410 is 59H: ORG 410H DATA DB “Y” Select one: True False
Take a look at the ADT for the cave system. This ADT may be implemented using a graph. Implement the algorithm using the class you created.
Computer science: True or False. “When the object in the response was last modified can be indicated in the HTTP response message by the Date: header.”
Transcribed Image Text: =??
1 Normal
1 No Spac. Heading 1
?eadirkj 2
Tit
Paragraph
2) To which network address does the IPV4 address 10.100.254.252/8 belong?
What are the strategic options for legacy system evolution? When would you normally replace all part of a system rather than continue maintenance of the software?
suppose the RSA cryptosystem is used for sending secret messages with the private key (15,3) and the cipher text “4” is received. what is the plaintext?
q18 Transcribed Image Text: The bit exponent (characteristic) of the machine number
0 01100000111
010100110001 is
Select one:
a. 775
b. 773
C. 776
d. 774
In artificial neural networks we use activation functions. Explain why you would select on activation function over another (for instance the sigmoidal function and tanh function)?
102. A _______ is a three-layer device that handles packets based on their logical addresses. a. repeater b. bridge c. router d. none of the above
62. A step by step instruction used to solve a problem is known as a. Sequential structure b. A List c. A plan d. An Algorithm
What are the most significant distinctions between a local-area network and a wide-area network, and how do these differences influence the architecture of a distributed database?
47. The reserved area that holds one block in main storage is classified as a. disk address b. buffer address c. hardware address d. software address
Write a program that uses default comparator in sort function to sort an integer array in descending order. Given array: {1,12,-4,2,13,9} Show output after sorting. C++
Game design and reinforcement learning are often grouped together. What are some games it may be easy to train an agent to solve using reinforcement learning?
Explain the distinctions between personal ethics, professional ethics, and computer ethics to a client, as well as why these principles must be observed during an inquiry.
9 ?????? which of the following help in algorithm design ? ???????? writing a program designing a flowchart calculating the running time the programming language used
If global variables may be used everywhere in the program, why not make all variables global instead of only global inside specific contexts? Defend your response.
In a Boolean algebra, if A=1, then the value of (A . A’ )’ +A’ +A is equal to 0. Select one: O True O False
Make comparisons and contrasts between test data, an integrated test facility, and a parallel simulation environment. Identify the stages, as well as the benefits and drawbacks.
401. Operating system’s module that is responsible for protection of files is known to be a. File management b. Command interpretation c. Security d. Process management
What is the least fixed point of the kleene closure operation, assuming the natural order of set-inclusion; i.e., of f ( L ) = L ?
The number of exchanges needed to sort an array of N integers using Selection Sort is N.
Choose one of the following options: True or False.
129. Which of the following layer decide the transmission rate in a Network? a. Physical layer b. Data link layer c. Network layer d. Transport layer
Note: Please do not handwritten. Transcribed Image Text: (i) What is Timing diagram?
(ii) Draw the Read Cycle Timing diagram for minimum mode of 8086 microprocessor.
Prompt the user to enter an integer n and in output print the number of digits equal to 5 in the entered number. In JAVA language.
1. Suppose that you are network technician who happens to have a problem with a user experiencing network connectivity problems. Use TCP/IP to diagnose the problem
Transcribed Image Text: Draw the derivation tree for the Prolog query reach(a X), where
reach(X Y):- edge(X,Y).
reach(X,Y):- reach(Y,Z), edge(ZX).
edge(X,Y)
edge(X,Y)
edge1(a.b).
edgel(b.c).
edge1(X,Y)
edge1(Y,X)
Transcribed Image Text: Interviewing users and distributing questionnaires helps the analyst understand the
for a new system.
Select one:
a.constraints
O b.models
O c.procedures
O d.functions
DO NOT COPY FROM OTHER WEBSITES Write correct and your own answer. Thank you! Q. Why Redundancy & Lack of Flexibility is unavoidable in File Systems
Write a java code fragment to extract and display key and its creation date for alias sdo from keystore available at C:\Users\ITNW4115\.keystore and keystore password “finalexam”
1. Explain the advantages and disadvantages of circuit-switched networks.
2. What are the differences between a site-to-site VPN and a remote-access VPN?
Answer the 2 question
What impact will AI have on the future? What software using artificial intelligence presently exist? Is it frightening to think about the future of artificial intelligence?
None Transcribed Image Text: We can access to any cell in any other
: sheets by the same workbook by write
Sheet_name#cell_name O
sheet_name&cell_name O
Sheet_name!cell_name
Network Security Assessment Transcribed Image Text: Outline and explain any three (3) examples of network-based attacks.
A- BI
E E
Maximum size for new files: 5GB
2. Bits can be send over guided and unguided media as analog signal by a. digital modulation b. amplitude modulation c. frequency modulation d. phase modulation
Alaska wants to swap two floating point integes. You have to help her without using temporary variables You have to take input from user in c
IN ASSEMBLY (not C++, do not submit hand written notes) Declare an array of byte and initialize it to the first 5 letters of the alphabet.
Write a code in python that consits the use of the mod(%) operator in any use case scenario. Also explain what operation does this operator performs.
Write a program in C++ to find the number of moves required to get a 6 for the first time when a fair dice is rolled.
Transcribed Image Text: Protocols for email transmission is an example of
None of them
Both Asynchronous and Synchronous transmission mode
Synchronous transmission mode
Asynchronous transmission mode
Transcribed Image Text: Q-3: What is meant by inheritance in java, give a simple real life example?
AND write a simple java code related to inheritance.
Prioritize identifying and explaining at least three recommended practices to businesses, especially those using the cloud, so that they can safeguard their data and other resources.
Code in C language to create a struct Employee having members int id and int salary. Take input and print one struct variable in main function.
The grammatical category of words THIS , THAT , THESE , and THOSE is called ___________________. Select one: a. classifier b. none c. determiner d. demonstrative
When does Windows schedule the command to run Chkdsk if you wish to use Chkdsk to remedy file system issues and your drive is not blocked?
Transcribed Image Text: Give the grammar Gas S OBI1A, A O1OSI1AA,
B 111SIOBB. Give the leftmost and rightmost
and derivation trees to derive the string
00110101.
Write a JavaScript program to get the difference between a given number and 15, if the number is greater than 15 return double the absolute difference.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). True or False?
The following terms and concepts are used in Java: counter controlled loop, flag while loop, instance methods, inner classes, shallow and deep copying, and so on
5. Software Requirement Specification (SRS) is also known as specification of _______. a. White box testing b. Acceptance testing c. Integrated testing d. Black box testing
In the event of data redundancy, what are the three most probable anomalies to arise? What can be done to avoid future abnormalities of this nature?
A problem’s Input will answer the question, “What information will the computer need to know in order to either print or display the output times?” explain?
This chapter is full of acronyms. Define each of the following ones: a. HTML b. XML c. DTD d. XSL e. SGML f. URL g. ISP
34. Baseband transmission of a digital signal is possible only if we have a ____ channel. a. low-pass b. bandpass c. low rate d. high rate
Transcribed Image Text: 1.
A pointer in C is a variable that store the
of another variable.
O A. identifier
O B. value
Oc. address
operand
None Transcribed Image Text: Draw the curve of the implicit function:
f(x,y) = x2 sin(x + y2) + 5cos(x2 + y) = 0
Only on matlab
Need help with this question. Thank you 🙂 Transcribed Image Text: Write all strings of length at most 5 that match the regular expression a(abuba)*.
Answer:
Transcribed Image Text: When does Exceptions in Java arises in code sequence?
Both Run Time and Compile Time
None of these options
Run Time
Compile Time
C++ DATA STRCUTURES AND ALGORITHMS Build a heap tree from the given information or values. 50 45 65 60 75 90 15 35 70 45 55
make a concept map or a flow chart of how you decide to buy things for yourself. elaborate on your thought process from start to finish.
In artificial neural networks we use activation functions. Explain why you would select on activation function over another (for instance the sigmoidal function and tanh function)?
please assist with a ,b urgent. thanks a) Describe how Java automatically converts between different numerical data types. (b) Discuss the concept of string immutability
What exactly is IDS? With the use of examples, describe the various kinds of IDSs. The following case study is about a commercial Intrusion Detection System:
Question 1
a) List any FIVE (5) potential benefits of the database approach over conventional file
systems
b) List FIVE (5) disadvantages of file processing systems
Using Binsort and keys between 0 and 999, Binsort has to make _____ passes to sort the records. a. 1 b. 2 c. 3 d. 4
Take input 7 integers from user and print them in reverse order of there input, i,e. number entered last should be printed first. Code in C++
Write SQL query to get the Names of all employees which have department alloted to them. Table- Employee( Eno, Ename,address) Department ( Deptno , Dname, Eno)
Q:03: Write a program that finds and displays the sum of positive numbers, if any negative number is entered by the user the loop must end.
Peter wants to start up his computer from the wall socket. Describe the step-by-step process his computer will take in order to show up the desktop.
Write an interface in python for Boolean with the functions {True, False, And, Not}. You only need to define the type and operations, not the semantics.
What are the Classifications of DBMS? Please give an explanation about it (2-3 sentences) What is the purpose/importance of it? (2-3 sentences) 2-3 sentences each question
Which of the following describes the integration aspect of continuous integration and continuous deployment? Select one: a. Run/Ship b. Build/Ship/Run c. Build d. Run e. Build/Ship
What are graphs in MS Excel? What is the importance of graphs in MS Excel? What are the common types of Graphs used in MS Excel?
Write a program to print all the number from which the given number is completely divisible. You have to take this number from. User in c++
Python Module 2.1 Write a program to take input three integers x,y,z from user and print the value of x*y – y*z – z*x in output.
Transcribed Image Text: 3/ How to crente
for emple the
IL
ZF AC.
aspecial
farmula
in Tacel
Lelow ing formada –
for mala :
Kim :
Transcribed Image Text: Question 2:
Explain in your own word the life cycle of a process, give suitable
example for each part of the life cycle.
Explain the distinction between the FAT and NTFS file systems. You must compare file name length, file size, scalability, fault tolerance, compatibility, compression, encryption, and security.
Describe the process through which intra-AS routing is achieved. Give an example of a routing protocol and explain if it is LS or DV in nature.
Q.1. Explain working of a Proxy serverby functionality i.e., by providing secure Internet access to users, reducing cost and providing security. Explain node to node communication.
Write a C++ program to take input a string and print if it contains an upper case alphabet or not. Print Yes or no in output.
In Python write a program to read two integers num1 and num2 from user and print the value of num1*num2 + num1 – num2 + num1/num2
Each of the following methods for storing a relational database has two benefits, which you should list. Maintain a separate file for each of your relationships.
When it comes to virtual machines If I’m running four different operating systems on VMware, how can I create a new unique network under VMware Fusion?
Organisations can transform business work processes and try and automate these processes with the use of ICT. Discuss the advantages and disadvantages of an ERP system.
Transcribed Image Text: Memo can be defined as
messages distributed by
electronic means from one user to
another via a network.
Select one:
True
O False
Transcribed Image Text: 8. Write HTML code to draw a rectangle using Canvas and fill color in
gradient from red to pink from start to end.
Transcribed Image Text: Q1:Use the Fortran language to calculate
the first and second derivative of cos^2 (x)
.at x = Tt/4, assume the value of h=0.6
Write an if state to check if the variable, named value, is greater than 5. If so, output the following: “The value is greater than 5”
Determine the preorder , inorder , and postorder traversals of the ordered rooted tree below. Transcribed Image Text: 8
3
(10)
6.
(14
4
7
(13)
Explain how the convergence of computers, telecommunications, and media has resulted in the development and growth of disruptive technologies and applications such as Amazon and Uber.
Transcribed Image Text: 7. Which function is used to read a single character from the console in C++?
a) cin.get(ch)
b) getline(ch)
c) read(ch)
d) scanf(ch)
what is some information on how widely used tablets, smartphones, and laptops are in modern enterprises? Can you identify threats that are associated to these devices?
POST in booting process stands for- i) Pre Operating System Test ii) Power Operating Self Test iii) Power On Self Test iv) Pre On System Test
Write 8085 instruction to store the 1 byte data 52H into memory location 2000H using indirect addressing mode. Show memory view and assembler output. Sim8085 software.
The basic gate whose output is the complement of the input is the ____________. a. AND gate. b. NOR gate. c. NOT gate. d. OR gate.
The_________is primarily reapknisble for assessment , management and imolementation of security a. security manager b. security administrator c. Chief Information Security Officer (CISO) d. security technician
Write a python program to find out all the odd numbers that are divisible by 5 in the range from 47 to 105 both are inclusive.
True or False: We can always convert a user-confirmation loop method into a sentinel loop when requesting for data from a user. Choose one: true False
____________ is software to store the data in an organized way using tables Select one: a. Cloud Computing b. System Software c. Database d. Embedded software
Predict the output of following Java ProgramProgram 1//filename Main.javaclass Test {Protected int X,y;}class Main{public static void main(String args[]) { Test t = new Test(); System.out.println(t.x+””+ t.y);}}
Could you please tell me if this is genuine or not? Without deleting entries from an array, the length property’s value can be decreased. True False
Transcribed Image Text: 9. Choose the correct XHTML for width attribute and its value.
A. O width=80
B. O width=”80″
C. O WIDTH=”80″
D. O WIDTH=80
Write code in python to check a number is present in the list or not if present how many times it present don’t use count method
When AppArmor is used, the limitations for each application are kept in text files named after the program in the directory where the software is located.
9 An inference technique which uses IF-THEN rules to deduce a problem solution from initial data ???????? forword chaining tree search backward chaining none of above
Examine the use of the edge detection method in picture segmentation and segmentation. When it comes to digital picture edge detection, why is it so important?
None Transcribed Image Text: Q2) Interface an 80286 microprocessor with total memory size 128KB using
RAM chip size of 16KB. Show the detail of your drawing.
Mobile programing,Android studio,java Transcribed Image Text: To display part of activity on screen, which android component is correct from the following:
O View
Manifest
Intent
Fragment
Write a paragraph describing in your own words what the differences are between DRAM and SDRAM in terms of qualities such as speed, size, and price.
suppose the RSA cryptosystem is used for sending secret messages with the private key (15,3) and the cipher text “4” is received. what is the plaintext?
Write a C++ program:: Take 3 inputs and check which one is the largest input and which is the smallest? Then print them in ascending order.
(5) Which device is used to manage the data that flows through the network?
a.
Destination Device
b.
Host Device
c.
Intermediary Device
d.
End Device
In C language ? Transcribed Image Text: write a program to find the length of a square knowing the area.
1.
A-
? I
II
!!
Each of the following is a goal of information security except_____________. a. foil cyberterrorism b. avoid legal consequences c. decrease user productivity d. prevent data theft
Mobile networks are solely wireless when it comes to the air interface between phones and antennas and towers. What else is needed to backhaul cell signals?
Why is planning monitoring and control process perceived as a closed loop system? List out the tools used by mangers for planning, monitoring and control processes.
What is the basic protocol of communication between a browser and a web server under the client-server model? a. FTP b. TCP C. HTTP d. SSL
True or False: SD cards are nonvolatile, meaning that even if the power is turned off on the device, you won’t lose your music or photos.
The general impression of some IT professionals and scientist is that AI can be dangerous and a bad idea. Whilst disproving these theories defend your assumptions
Answer only if you are 100% sure . Correct and detailed answer will be Upvoted else downvoted. Thank you! Q. Describe phantom deadlock with an example.
Fuzzy Set theory defines fuzzy operators. Choose the fuzzy operators from the following. Select one: a. AND b. OR c. NOT d. All of the mentioned
Varied models are used in software development, with each model having a different relevance depending on the application. Please classify those models according to your preferences.
Transcribed Image Text: Expression in which operator is written after operand is called as
a. Infix Expression
b. Prefix Expression
c. Postfix Expression
d. Enfix Expression
446. According to definition, primary objectives of an operating system can be classified into a. Two types b. Three types c. Four types d. Five types
Change in organizations often means change in business processes which may lead to some job positions being redundant. Elaborate on the reasons why change is resisted.
Prioritize identifying and explaining at least three recommended practices to businesses, especially those using the cloud, so that they can safeguard their data and other resources.
Discuss the theory of computation such as the automata theory, computability theory, computational complexity theory and quantum computing theory; and describe their relevance in modern computers.
Which of the following Visual Basic constants advances the insertion point to the next line? a. Advance b. ControlChars.Advance c. ControlChars.NewLine d. none of the above
Explain how the convergence of computers, telecommunications, and media has resulted in the development and growth of disruptive technologies and applications such as Amazon and Uber.
In PYTHON
Write the code that will create an array named squaresA, that contains the squares of the elements in the array A.
A = [2,7,4,5,12,8]
Transcribed Image Text: ii.
“Using Referential Integrity Constraint with Cascading option risky from Data Viewpoint for
Production Database”? Explain with reason with help of real-time example
When the programme loop should run at least once before testing for the halting condition, the do/while loop is commonly employed. Is it true or false?
Besides the ArrayList class in Java, do you think there are other classes that are implemented with an array. Name those predefined Java classes, if any.
Explain the distinctions between personal ethics, professional ethics, and computer ethics to a client, as well as why these principles must be observed during an inquiry.
Transcribed Image Text: The addElement operation for both the linked and array implementation of a Heap is:
O O(logn)
O O(nlogn)
O O(n²)
O(1)
O O(n)
106. In flowchart, symbol of rectangle with one curvy side is used to show a. document printed b. document written c. data stored d. display output
If you have a database system that never fails, you’ve got a winner! If so, does this system need a recovery manager to function properly? Why?
make a new code using Structure of the ML using TensorFlow and save as 201916791 and take a picture with result then send it to me
Discuss file streams that are used to connect to files as sources or sinks of data. Also show that file streams both text and binary input/output
In Python write a program to read two integers num1 and num2 from user and print the value of num1*num2 + num1 – num2 + num1/num2
Why is it essential to conduct a penetration test on a web application and a web server before to deploying the application in a production environment?
Write a program that reads 10 numbers, finds the largest number, prints it, finds the smallest number, and prints it.Without using arrays.without using max,min.without using Limits.h
After the execution of the following program the content of the
register with address 410 is 58H:
ORG 410H
DATA DB ‘X’
Select one:
True
False
Multiplexing methods that are utilized by the physical layer include TDM, FDM, and CDM. Begin by explaining the advantages and disadvantages of each of these methods.
can I get a multiple table Query Topic That is simple and easy to create in MySQL and the steps of how to do it please?
Design the logic and either draw a structured flowchart for a program that outputs every number from 1 through 15. I’m using C++ for this assignment.
In Python Z3, how do you use the function Distinct? Can you give me a direct example? I can’t find one example online Subject: Python Programming
Write a python program to find out all the odd numbers that are divisible by 5 in the range from 47 to 105 both are inclusive.
java Transcribed Image Text: Which of the following is a java documentation generator?
O a. Javadoc
O b. JRE
O c
c. javac
O d. jar
Transcribed Image Text: Use cases should be small and direct. They were originally written on 3 x 5 note cards to help enforce this.
True
False
List all strings in L whose length is less than 5, where L is defined by the regular expression (a + b)* ba (a + ab)*
182. WAIS stands for a. Wide Area Intellectual Service b. Web Access Information system c. World wide Application of Intelligent System d. Wide Area Information Service
349. Any program, no matter how small, occupies an entire partition. This is called ____________ a. fragmentation b. prior fragmentation c. internal fragmentation d. external fragmentation
True or False. Transcribed Image Text: Normalizing an audio file prepares a file for DVD replication.
O a. False
O b. True
Next page
Previous page
Write a program in java to take the value of x from user and find the value of 2*x^3 -3x^2+ 5*x+ 16 and print the results
i need the answer quickly Transcribed Image Text: Q2: write a program which take data as input and
show there sum and average of the data?
What are the three requirements that must be met in order for a network to be successful and efficient? Explain one briefly in your own words.
427. Depending on CPU utilization during course of processing, jobs can be classified into a. Two types b. Three types c. Four types d. Five types
Explain multiple access control (MAC) in the context of multimedia and elaborate on the multiple access control types stating how it is relevant in radio communications.
Transcribed Image Text: Acknowledgments, sequencing, and flow control are characteristics of which OSI layer?
O Layer 2
O Layer 3
O Layer 4
O Layer 5
Please Help ASAP!!! Transcribed Image Text: In the space provided below, briefly describe the reference-counting garbage collection algerithm.
Edit
Format Tale
12pt v
Paragraph
BIU
Av
The system 2x + 3y ? 4 (mod 7) 3x + 4y ? 5 (mod 7) has a unique solution modulo 7. Select one: True False
87. A common reason for changing an information system is a. new technology b. new requirements c. problems in the existing system d. all of these
Rewrite the following statement using the ternary conditional operator (? :): if (i < 10) { j = 8; } else { j = -2; }
Transcribed Image Text: Write a Java program to design GUI-based
Very Simple Calculator : Two Values
Adder.
For the toolbar, press ALT+F10 (PC) or
ALT+FN+F10 (Mac).
What is the output if the following bash function is executed? #!/bin/bash function hello2() { echo yes; } hello2 Question 67 options: yes no hello2 hello
159. What is the name of the device that connects two computers by means of a telephone line? a. bus b. Tape c. cable d. modem
The residential lock most often used for keeping out intruders is the a. privacy lock b. passage lock c. keyed entry lock d. encrypted key lock
How do you create an access list that prevents a certain machine from being accessed? Could you perhaps clarify in more detail and offer an example?
Task 2: Machine Learning with SVM [5’] Step 1: Assign training data and labels. Make ‘Click on Ad’ as labels; use the remaining variables as data.
Transcribed Image Text: What will be the output of the program ?
#include
int main ()
{
int arr[1] = {10};
printf(“%d”, 0[arr]);
return 0;
}
When using subtype associations, talk about the database table choices that are accessible. Decide the design you want to employ and talk about the relevant issues.
Varied models are used in software development, with each model having a different relevance depending on the application. Please classify those models according to your preferences.
Give me correctly explained answer. Else i will downvote . Show that a simple connected planar graph with 8 vertices and 13 edges cannot be bichromatic.
What is Two Tier Client-Server Architecture? (2-3 sentences)
How does it work? (2-3 sentences)
What is the purpose/importance of it? (2-3 sentences)
2-3 sentences each question
Transcribed Image Text: What is the use of & and * operator in C with respect to pointers? Explain in detail with an example.
Paragraph
BIU
I need the answer as soon as possible Transcribed Image Text: Write a program in java to find the boundary
elements of the matrix of 3×3
The most common technique to change an analog signal to digital data is called __________. a. PAL b. PCM c. sampling d. none of the above
i need the answer quickly Transcribed Image Text: Question : Write a program in C++ language to find and print the
Multiplication of two array size(5×4).
What worries do you believe the database’s designers have? when it came to making this important resource accessible on the internet to the public at large?
None Transcribed Image Text: Using the Symbolic Math Toolbox solve the following:
Matlab
3. Evaluate the following expressions.
(c) log2(5)
x3+x+1
4- let f (x) =
1. Define the concept of organization in general and from the behavioural view.
2. Analyse the information system needed for an organization based on the definition.
Transcribed Image Text: Write a program that demonstrates the
similarities and differences between the
concepts oop of Java and c++, and explain
each one of them
Write a program to print all the number from which the given number is completely divisible. You have to take this number from. User in c++
Write a java program to find hiw much time required to execute a function which only have a print statement and also print it’s units also.
Transcribed Image Text: Solving the following Recurrences Using Induction
Consider the recurrence t,=2t-1 +1, n21 with initial condition to=0.
Obtain the solution using the substitution method.
please assist with a ,b urgent. thanks a) Describe how Java automatically converts between different numerical data types. (b) Discuss the concept of string immutability
Transcribed Image Text: Write a python program to get the document
file content of some inbuilt modules.
You can assume two modules are calendar
and Mimetypes
Which one of the below defines the result of a move from a given state? 1.Transition model 2.Terminal model 3.Actions 4.Utility function Note: Select 1 answer
Consider a system with transmission time 50 msec, propagation time 25 msec then link utilization (%) of channel if stop and wait protocol is used ?.
None Transcribed Image Text: 3. What are the attributes of good
software? [Possible Multiple Answers]
Easy to understand
V Easy to use
V Dependable
V Maintainable
B. Answer the following questions on engineering design. i. Sketch the Engineering design process loop. ii. Discuss any FOUR of the five steps in your loop.
Is it permissible to make the following statements? new IOException(“Hello Houston!”); throw sos; IOException sos = new IOException(“Hello Houston!”); throw sos; IOException sos = new IOException(“H
Write a program that print the numbers 2 to 10 in increments of 2. The output of your program should be: 2 4 6 8 10
Transcribed Image Text: When the inheritance is private, then the private members/methods of parent class are
in the child class.
Select one:
a.public
b.protected
c.inaccessible
d.private
Transcribed Image Text: How to get the Current date and current time
in python.
Date format is month/dd/year
Time format min/sec/hour
Print both on different lines
Transcribed Image Text: ????? ??????
Write c++ file read 3 student( name
average ) from txt file then increase
average 5 and record it again
??????
Distinguish between system programming and application programming using examples and explain in your own words how each of these may be accomplished in a computer system.
When you want to use Chkdsk to fix file system errors and the drive is not locked, when does Windows schedule the Chkdsk command to run?
If two classes are defined “Parent” and “Child” then which is the correct type upcast syntax in C++? Parent *p=child; Parent *p=*child; Parent *p=&child; Parent *p=Child();
Machine learning algorithms are sometimes grouped into two broad groups of lazy and eager algorithms. Clearly explain the difference and give one example from each group
Why do you think the arguments to a base class constructor are speci?ed in the de?nition of the derived class constructor rather than in the declaration?
34. Baseband transmission of a digital signal is possible only if we have a ____ channel. a. low-pass b. bandpass c. low rate d. high rate
Transcribed Image Text: It is possible draw a graph that : is it a tree,
.has 5 vertices, and has 6 edges
true O
False O
What is the definition of a system model, as described by James MacGregor Burns? What key issues should be covered when working on a baseline model?
Why is it essential for you to study information systems? What are you hoping to gain from this course that will make it valuable for you?
Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type.
Question-2 In Fix-Price Project why increasing the Cost of Software Development will result in decrease in Software Quality. Explain with help of example with proper justification
Design PLC controller to control the operation of beverage machine to choose pepsi, seven up or coca cola drinks using ladder diagram and functional block diagram
Which of the following are some of the concerns that 5G cellular networks raise? How soon do you think we’ll be able to utilise 5G technology?
Python Assignment Lab 3- 1. Prompt the user to enter two integers x,y and then print the value of x 2 + y 2 in output.
Transcribed Image Text: Minimize the function using Karnaugh map
method.
F(A, B, C, D) = E(1, 2, 3, 8, 9, 10, 11, 14) + Ed(7, 15).
Create a function func_1.m to analyze the following function: The function needs to ask for x and plot the y(x). Select the range of x y=2*x.^2.*cos(x)./exp(0.1*x);
177. Placing multiprocessor boards of the computer system on same chassis is called a. multiprocessor b. multiple hardware c. blade servers d. both a and b
Write a C++ program that takes an integer from the user and check whether the number is the power of 2 or not using “bitwise operators.”
#software Transcribed Image Text: 4. Which of the following activities is done to
be sure that the requirements can be
checked?
Completeness
Validity
O Verifiability
Traceability
1 a)Expand on the word entropy. Efficiency of a code and average codeword length. b) cyclic code and means by which the codeword is determine Codeword.
What do you call it when a security test for an application finds a flaw that doesn’t exist? What does the tail command’s -3 argument do?
Predict the output of following Java ProgramProgram 1//filename Main.javaclass Test {Protected int X,y;}class Main{public static void main(String args[]) { Test t = new Test(); System.out.println(t.x+””+ t.y);}}
Transcribed Image Text: QUESTION 2
In order for a method to be accessible to external Java packages, we must use this keyword:
external
public
protected
private
I need the answer as soon as possible Transcribed Image Text: Are the following two languages equal:
L1= (a* |b*)*
L2= ((2 |a)b*)*
Justify your answer.
35. One that is not a type of multiprocessor of the computer system is a. dual core b. blade server c. clustered system d. single core
Write a C++ program to find the sum of elements of each row of matrix. ? note : the two matrices are (3 * 3) dimension
Take an array of size 10 from user and display the message “This is in array” if a number given by user is in the array.
Write a C program to prompt the user for input of 5 positive integers and then find the sum of only those numbers which are even.
Please Help ASAP!!! Transcribed Image Text: In the space provided below, briefly describe the reference-counting garbage collection algerithm.
Edit
Format Tale
12pt v
Paragraph
BIU
Av
Write a program that uses default comparator in sort function to sort an integer array in descending order. Given array: {1,12,-4,2,13,9} Show output after sorting. C++
As a newly employed system analyst in an organization, what would be your core principles in designing an effective and efficient information system for that organization?
75. The fact that the same operation may apply to two or more classes is called what? a. Inheritance b. Polymorphism c. Encapsulation d. Multiple classification
Write C++ program to take input 5 Integers from user and print the result where result is: Product of first 2 * Submission of last 3
None Transcribed Image Text: Which of these methods can be used to determine the type of event ?
O getEvent()
O getEventObjeet()
O getEventType()
O getSouree(
What are the two sorts of services provided by the Internet to its applications? What are some of the distinguishing features of each of these services?
Should businesses outsource all technical needs to software service providers? Why do you support or oppose? What managerial, organizational, and technical factors does this decision consider?
Write a python program to find out all the odd numbers that are divisible by 5 in the range from 47 to 105 both are inclusive.
Visual Basic Transcribed Image Text: Question#3
Write down Pseudocode that will take marks of physics, chemistry and math as input,
calculates the average and displays output.
Bank Management System (Must contain JavaFX, thread and socket. During project presentation, it will be checked how much features you have completed.) time : 8 hours
Transcribed Image Text: The most important rule when assigning
wherein the assignment operation always
takes place from right to left, and never the
other way.
Answer:
Transcribed Image Text: For a channel with C/B ratio= 5, Signal to Noise (S/N) Ratio in dB equals
(where C=channel capacity and B = Bandwidth )
188. The _______ is that part of main memory available for storage of copies of disk blocks. a. Buffer b. Catalog c. Storage d. Secondary storage
Visual Basic Transcribed Image Text: Question#3
Write down Pseudocode that will take marks of physics, chemistry and math as input,
calculates the average and displays output.
Which access control concept restricts a user’s access to the precise information that is necessary to complete the work that has been allocated to him or her?
We stated that only one method at a time can be active within each thread running in the JVM. Why do you think this is the case?
Create an algorithm to calculate the price of a pizza per square inch given the radius of the pizza in inches and the price of the pizza.
A ______ is a diagram that graphically depicts the steps that take place in a program. 1. flowchart 2. step chart 3. code graph 4. program graph
What exactly is an interrupt service routine? Why is the IRET instruction used instead of the RET instruction as the final instruction of the interrupt service routine?
This type of malware uses recent or unknown vulnerabilities to attack a system before it is known a) Zero-day virus b) Single-day virus c) Spyware d) Ransomeware
CD sub Define the terms quadruple, triple and indirect triples. Give their representation for the assignment statement A=B * (C-D) by generating an appropriate three address code.
Transcribed Image Text: What is the running time of the following piece of code for a given integer n:
x=2;
while(x
Modern forensic biotechnology labs use sophisticated machines to analyze ________, such as D16, and to determine the number of specific genetic repeats in the samples.
Select one:
Explain the following, please use your own words (0% Plagiarism) Difference between Being-alongside and Being-with entities in the world Difference between human temporality and ordinary clock time
34. One megabyte memory storage in the form of bytes is equal to a. 1024 bytes b. 1024 kilo bytes c. 1056 bytes d. 1058 kilo bytes
Transcribed Image Text: An Entity Relationship Diagram (ERD) should be designed properly to
help programmer team developing a system.
List FIVE (5) recommendations in designing an ERD.
90. A bridge can use the _________ algorithm to create a loopless topology. a. binary tree b. spanning tree c. multiway tree d. none of the above
The best way to improve your website rank is O a.Video Ob. Blog O C.500 words of text per page O d. Lot of graphics per page
The IBM _________ analytics appliances combine high-capacity storage for Big Data with a massively-parallel processing platform for high-performance computing. a) Watson b) Netezza c) InfoSight d) LityxEQ
You must use the –e switch with the ps command to view daemon processes because they are not associated with terminals. Is this statement true or false?
The ____ translates internet domain and host names to IP address. a. domain name system b. routing information protocol c. network time protocol d. internet relay chat
By means of an example, show how methods can be overloaded. Each method must contain one or more instructions in its body to further clarify your illustration.
What are the Common Criteria for Information Assurance, and what function does each of the criteria play in creating a trustworthy system? Don’t be vague; be precise.
What is the minimum number of gates required to implement the Boolean function (AB+ C) if we have to use only 2-input NOR gates? Draw circuit .
Given an array below, write a Java program to find the elements in the array which are positive and multiple of 3. int [] array = {1,-3,27,4,-18,7,15,9,0,11}
Based on the topic ” Why computers are so powerful”. How is computer so powerful nowadays in Education System, Include SPEED, RELIABILITY and CONSISTENCY, ACCURACY and COMMUNICATION
What term does Windows XP use to describe file sharing in a method that does not allow for control over who has access to a shared file?
When designing a web-based mental health application, what sort of software architectural style would you use? (mobile app). What assumptions did you use to make your decision?
Java program do quickly Transcribed Image Text: get the element in a tree set which is strictly greater than
or equal to the given element ***java program***
18) Machine learning can be used to detect fraud by looking for unusual patterns in spending behavior in comparison to historical data. True or False? True False
59. In _______ transmission, a start bit and a stop bit frame a character byte. a. asynchronous serial b. synchronous serial c. parallel d. (a) and (b)
The variety of data is one of Big Data’s properties. Explain why this feature has necessitated the use of languages other than SQL for Big Data processing.
Create a code to sort a certain amount of data, which is a word, with the sorting algorithm you choose to use! write it in C Language
Find grammars for ? = {a, b} that generate the sets of: a) all strings with exactly one a b) all strings with at least three a’s.
(python) Count the number of loops (can be an infinite loop) and display any output created by the following code: i= 1 while i < 10: print(i)
Transcribed Image Text: In
type of system ,we
are not measuring the output.
O a. Static
O b. Closed loop
O c. Dynamic
O d. Open loop
Technical feasibility is a measure of how well a proposed system solves the problems and takes advantages of the opportunities envisioned for the system
True or false
69. Multithreaded programs are : a. lesser prone to deadlocks b. more prone to deadlocks c. not at all prone to deadlocks d. none of the mentioned
Why is this true? A single-channel system has a wait time more than double that of a two-channel system with two servers operating at the same pace.
i am working in api project , and i am using fetch api but it is giving cors error and how to solve this error in nodejs
21. Which of these software engineering activities are not a part of software processes ? a. Software dependence b. Software development c. Software validation d. Software specification
44. The communication between the components in a microcomputer takes place via the address and a. I/O bus b. Data bus c. Address bus d. Control lines
Take, for example, the UDP header 12 03 00 OF 00 lE A3 lE A3 10. Who knows how much time the UDP will take in total.
27. Windows operating system is used to a. coordinate computer activities b. access files on computer c. open and close programs on computer d. all of these
Transcribed Image Text: Use Hamming code to examine the given code:
a. 111000 0 12
b. 0101110 12
c. 01110 1 1 02
d. 011111 0 12
Raman is working on the subfolder we forget which is main directory he is working in. You have to get the the current directory in java program.
Write a c++ program to print fibonacci series without using recursion and using recursion. Input: 10 Output: 0 1 1 2 3 5 8 13 21 34
130. The middle computer system which is accessed to access database server is classified as a. host server b. application server c. database server d. client server
Need help to create a Python Azure Function to rotate Key Vault secrets for SQL servers and Storage Accounts. Must rotate secrets by utilizing Event Grid Trigger.
In java programming (object-oriented programming in general) Why is it important to invest additional work and additional code to prevent highly coupled classes? Give three basic reasons
In C language take input an integer from user and find the number of digits equal to 0 in it. Note- Number do not contain trailing zeroes.
25. If you were to create client/server applications, which model would you go for? a. WINWIN Spiral Model b. Spiral Model c. Concurrent Model d. Incremental Model
This is a java program question don’t copy from the internet please and write correctly Transcribed Image Text: 1) What is difference between wait() and sleep() method?
What is the definition of a virtual machine (VM)? Why would I want to utilize a virtual machine? What are the benefits of utilizing a virtual machine?
Assume you’re pitching your users on the data warehouse concept. For them, how would you characterize multidimensional data analysis? How would you describe the benefits to them?
Represent the following graph using Adjacency matrix and Adjacency list Transcribed Image Text: c) Represent the following graph using Adjacency matrix and Adjacency list
[2 Marks]
A
Why is it a smart thing for the DEMS to automatically refresh the catalog as thedatabase configuration changes?Can users wreak havoc by manually updating the catalog? Justify.
A(n)______________presents a set of key performance indicators about the state of a process at a specific point in time to enable managers to make better real-time decisions.
When do you think it is better to have all data and programs stored in-house, and when it is better to move them to a cloud environment.
Transcribed Image Text: Write a java program to measure how long
some codes takes to execute in nanosecond
and the code is finding the factorial of 7
Consider the following hypothetical search space and trace using the depth-first-search algorithm on it where the goal is node 13 . Transcribed Image Text: (5
9.
10)
Transcribed Image Text: Q3: write a program in C++ language to
read array X (6,6) , then print only the
square of each number in odd rows.
A(n) is working model of a system developed to enable users to interact with the system and provide feedback so developers can better understand what is needed
Transcribed Image Text: Question 4: Use a proof by contradiction to prove that the sum of an irrational number x and a
rational number y is irrational.
What is the value of input for the following function call: scanf(“%d”, &input); if the input stream contains This is not the input you are looking for.
In what circumstances would it be possible for a user’s attempt to add data to the database to result in a record that violates an enabled constraint?
Transcribed Image Text: 1- What is the output of the following
script? X = [14 7; 2 5 8; 3 6 9], Y
=X(end : -1:1) *
72. Which of the following browsers does not support the Ogg audio format? Group of answer choices a. Google Chrome b. Microsoft Edge c. Opera d. Safari
Write a program in outhon to check a number is present in list or not and take number from user. . You have to use count method
Simplify the following Boolean function F together with the don’t-care conditions d, and then express the simplified function in sum-of-minterms form: F(A,B,C,D) = and d (A,B,C,D) =
The two main characteristics for technology curriculum are pre-vocationality and _________. Technology can be explained as meeting human needs through the creative process of designing and ________.
For a matrix (two-dimensional array)utilizing for loops.USE following numbers to read from monitor by using “scanf”and for loop: 11 2 ?3 7 ?5 ?4 0 0 2
Identify the Actors and the Use Cases from the customer requirements for each following functionality: Changing the properties of a room (for example, from non-smoking to smoking)
Using C language in programming how to work this functions? 1. if n = 3 then the result should be 1 + 2 + 3 = 6.
Write a program to find Largest No. in a block of data. Length of block is 0A. Store the maximum in location result. Using assembly language (8086)
Video transmission Explain in your own words the difference between interlacing and progressive scan in the transmission of video signals and briefly describe how both methods work.
Transcribed Image Text: Question 1
“In the
method, a special packet called a
circulates through the ring.”
reservation: control frame
token passing: token
polling: poll request
PDU;ticket
Answer please Transcribed Image Text: If (123)s = (X3), then the number of possible
values of x is
%3D
(a) 4
(c) 2
(b) 3
(d) 1
67. The most common technique to change an analog signal to digital data is called __________. a. PAL b. PCM c. sampling d. none of the above
what is the name of the service in Linux that runs every minute an checks for tasks to complete? a) cron b) at c) ntp d) crontab
Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned
Computer Networks 2 (CCNA) Topic: Redundant Networks Electing a Root Bridge What are the criteria used by the STP algorithm in electing or selecting a root bridge?
To find out how many rows there are, use Array.length, and to find out how many columns are in a certain row, use array[ FALSE or TRUE
Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study?
Computer is an electronic device that can store, retrieve and process both qualitative and quantitative data quickly and accurately. is the appropriate definition of a computer why/
Q3 b. Surely computers cannot be intelligent- they can do only what their programmers tell them. Is the later statement true and does it imply the former?
Transcribed Image Text: 3. Design a portion of MIPS datapath that deals with feeding input to the program counter by considering
jump, branch and regular address calculation.
What Windows 7 utility can you use to migrate user information and settings from one machine to the new installation of Windows 7 on another device ?
During Unit Testing, a particular module/unit is tested using different test-cases. What different aspects of a module are tested during Unit Testing. Only list down those aspects
None Transcribed Image Text: 10
What is the Project Browsers function?
List the properties
Modifies Objects
Its Like a Table of Contents in a Book
Opens Projects
Transcribed Image Text: Question no. 04:
Consider the Alphabet E = {a, b, c, d}. Write down the all types of regular expressions from the
given alphabet
Which is not one of the eight principles adhered to by the Software Engineering Code of Ethics and Professional Practice (SE Code of Ethics and Professional Practice)?
The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer
Plz do it c programming in a basic way as possible and ((plz do the it with one loop and explen the codes as a comment line))
The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer
Python Suppose d = {“john”:40, “peter”:45}, to delete the entry for “john” what command do we use? a) d.delete(“john”:40) b) d.delete(“john”) c) del d[“john”] d) del d(“john”:40)
Transcribed Image Text: d) Apply tree traversals on the following binary tree
(A
Level 0
B
Level 1
G
Level 2
H.
J.
KL
M
Level 3
Write a class that maintains the top 10 scores for a game application, implementthe add and remove functions. use a singly linked list instead of an array.
Transcribed Image Text: Write program in C++ to
calculate the sum and
average of six students
degrees and print the
appropriate result in the
screen?
Your answer
CAPTCHAs’ only function is to prevent spam bots from posting. All CAPTCHAs must be text-based, image-based, and audio-based. Is there any security concern related to text-based CAPTCHA?
Transcribed Image Text: Why are strings usually primitive (or near-primitive) in modern programming languages?
efficiency
readability
readability and writeability
readability, writeability, and efficiency
EO O O O
3. A. The following transfer statements specify a memory. Explain the memory operation in each case. i. M[AR] ? R5 ii. R1 ? M[R5] iii. R2 ?M[AR]
AIM: To write 8085 instruction sequence to calculate and display Fibonacci Series for first 10 numbers. Store the numbers sequentially in the memory. ? PLATFORM REQUIRED: SIM8085
Discrete mathematics Transcribed Image Text: Using the encryption function f (x) = (10–x) mod 26,0 < x <
25, to decrypt the message "DKPG K XCIG HKM".
Find two compatible total orders on the poset {2, 4, 6, 12, 24, 36, 72} ordered by (a|b) or ‘a’ divides ‘b’ and create a Hasse diagram.
8. Communication channel is shared by all the machines on the network in a. unicast network b. multicast network c. broadcast network d. none of the mentioned
Transcribed Image Text: 4. Write SQL CODE to make changes as shown in the following table: [5]
Parking
Student_ID
Car_Model
Volkswagen
Parking_Number
Course
225
14
Business IT
Transcribed Image Text: 4. Given one 4-digit hex number a and b, how many bits of storage space
needed to store a? a+b
? ? — 6?
For a matrix (two-dimensional array)utilizing for loops.USE following numbers to read from monitor by using “scanf”and for loop: 11 2 ?3 7 ?5 ?4 0 0 2
Create an algorithm to calculate the price of a pizza per square inch given the radius of the pizza in inches and the price of the pizza.
Transcribed Image Text: The instruction that pushes the contents of the specified register/memory
location on to the stack is
PUSHF O
POPF O
PUSH O
?OP O
With the increase in access to information and communication technologies, most businesses should engage in e-commerce. Do you agree or disagree with this statement? Explain your position?
The software development process is contrasted with the guidelines for producing academic papers in this comparison. What similarities do you see, and what contrasts do you notice?
14. The unit of storage that can store one are more records in a hash file organization are a. Buckets b. Disk pages c. Blocks d. Nodes
We have to generate all n bit binary numbers using recursion. Take input n from user and recursively generated all binary numbers of n bit in C++
Transcribed Image Text: Designed a program in (Visual Basic 6.0) that
calculates the area and perimeter of a rectangle
**using
(1 command button ,4 text boxes, 4labels)
54. A direct method of deadlock prevention is to prevent the occurrence of ………….. a. Mutual exclusion b. Hold and wait c. Circular waits d. No preemption
Transcribed Image Text: 2. Removing a duplicate code in the program is an example for *
O Reverse engineering
O Bad smell
O Fixing faults
O Refactoring
What is the reason 802.11 will not fully break down since the SSID (Service Set Identifier) and MAC (Media Access Control) of every access point is different.
110. Quadrature amplitude modulation (QAM) is a combination of ___________. a. ASK and FSK b. ASK and PSK c. PSK and FSK d. none of the above
Transcribed Image Text: If F(x, y, z) = (xy + z’) (x’z + y), what is the complement of F (you don’t have to simplify it) ?
The AWS Compliance Program helps customers to understand the robust controls in place at AWS to maintain security and compliance in the cloud. True or false ?
230. A step in waterfall model that involves a meeting with the customer to understand the requirements. a. Requirement Gathering b. SRS c. Implementation d. Customer review
After software modules have been written and tested individually, they must be combined and tested as a whole. Discuss the significance of thoroughly testing the whole system.
Matlab will not stop you from overriding “built-in” identifiers. With that in mind,which variable name below should be avoided? a) e b) q c) J d) a
Describe and differentiate UCS, GBFS, and A* search in terms of path cost and estimated cost. Also mention the data structure used for the above-mentioned Search Strategies.
Please provide assistance with the following question: When it comes to parity bits, what is the maximum number of mistakes that may be detected in a message?
In a logic families, the amount of noise voltage that the digital circuit can tolerate without disturbing or causing an error in its output is called as?
i = 1 while (i < n) do s = s + i i = i * 2 enddo Is the step count dependent on which term?
In today’s technological development, most appliances are wirelessly capable. Do you believe wireless information appliances and services have an impact on corporate Internet and Web use? Why?
Discuss the advantages of the centralized database management approach to organizing, accessing and managing the data resources within an organization. Give an example to illustrate your answer?
What are the typical DBMS Components ?
(Definition please)
2-3 sentences
Please also explain to me the importance and purpose of those components in DBMS
2-3 sentences
What approach would you have used if you had been in charge of information technology and wanted to prevent a disastrous ERP system installation in your company?
Transcribed Image Text: CONSIDER A GRAMMER E ? E +E
E ->E
E > Id
TO CONSTRUCT BOTTOM OP PARSER
FOR THE 1/P STRING id +id +id.
“The sole purpose for having relations is to record instances of functional dependencies,” the author says in the passage. What does this imply, in your own words?
T F In a word processing document, the Enter key is always pressed at the end of each screen line to move down to the next line.
You must use the –e switch with the ps command to view daemon processes because they are not associated with terminals. Is this statement true or false?
48. which of the following devices is used to connect different network segments and manage the traffic between them? a. Bridge b. Hub c. Gateway d. Repeater
Is this statement true or false? The term “null” refers to a column in a database table that does not contain any data and is thus empty.
(a) What is/are the benefit(s) of computing entropy for the source coding? (a) What is the difference between variable length source coding and fixed length source coding?
Using T Flip Flop Transcribed Image Text: (PLO-4, CLO-3)
Design a counter with the irregular binary count sequence shown in the
state diagram below:
01
101
(5)
None Transcribed Image Text: For the following array A=[1,-3,2;-3,3,-1;2,-1,0]
find the values of the second column after applying the
initial operations
H12(-1), H23(1), H21, K23(-1), H13, H1(-1)
A channel has a 1-MHz bandwidth. The SNR for this channel is 63. What is the appropriate signel level? a. 2 b. 8 c. 4 d. 16
Transcribed Image Text: A mechanism for grouping
related classes together in the
same namespace is called
a. Package
O b. Method
O c. Variable
o d. Program
Discuss the benefits and drawbacks of remote access technologies, particularly remote desktops. What are some of the difficulties associated with enabling customers to connect to remote services?
156. The first operational computer network in the world was the _________ for the United States Department of Defense. a. ARPANET b. ERNET c. SKYNET d. DARPANET
Computer science @ S/w Transcribed Image Text: (a) Use KV chart to minimize
F = B’C’D’ + A’B’C’D’ + ABC’D + A’BCD+ ABD + B’CD’ + A’BC’D
Suppose the binary data stream 000011110011 is differentially encoded and then transmitted sketch each of the following codes Unipolar NRZ Polar RZ AMI (Alternate Mark Inversion) Manchester
Which characteristic in IS0-9216 is not Boolean. Explain reason for your answer with help of Example. Example without explanation will not be accepted (ISO-9216) available on internet
Python program to check if a number is prime or not taking user input the number. please i am beginer to not include so much advance concept.
19. ________ is a type of transmission impairment in which an outside source such as crosstalk corrupts a signal. a. Attenuation b. Distortion c. Noise d. Decibel
211. When the Cable TV is used for data transfer then the downstream band has a. 11 channels b. 22 channels c. 33 channels d. 44 channels
Question: What does it mean for a variable to be endogenous? Is it possible the variable “age” is endogenous? Please explain in a general way in3/4 sentences.
Transcribed Image Text: for the following confusion matrix:
Predicted
Cat
Dog
Rabbit
Actual
Cat
5
3
Dog
2
3
1
Rabbit
11
compute accuracy, recall, and precision
Use C++ Programming to implement this function double average_score () Returns the average score of the entries in the scoreboard. If the scoreboard is empty, return 0.
In _____, the level of the voltage determines the value of the bit. a. NRZ-I b. NRZ-L c. both (a) and (b) d. neither (a) nor (b)
Transcribed Image Text: A(n) diagram is a type of workflow diagram that describes the user activities and their sequential flow.
Select one:
a.statechart
b.class
c.use case
d.activity
Detailed answer please Transcribed Image Text: 3. List down and then explain 1 ethical issue/ challenge, 1 privacy issue/ challenge and 1 social issue/ challenge of
“M-Commerce”.
What is the maximum number of routers that can be registered if the timestamp option flag in an IP datagram is set to the value of 1?
Transcribed Image Text: Design a Salesforce Query to fetch the Unique
records of Account on contacts.
Try to show the Output of the query on annoynmous Window.
Identify the Actors and the Use Cases from the customer requirements for each following functionality: Changing the properties of a room (for example, from non-smoking to smoking)
Compile a list of the five operations that a database management system can do. Justify the problems that would arise if each responsibility’s duty was not met.
124. The process of converting the requests into results between three-schema architecture internal, external and conceptual levels is called a. mapping b. pitching c. transforming d. dependence
To find out how many rows there are, use Array.length, and to find out how many columns are in a certain row, use array[ FALSE or TRUE
Subject: Discrete Structures Given the word “REKLAMADOR” how many arrangement of 5 or more letters can be formed if each letter is not used more than once.
Users want to view high-quality films without lagging (e.g., on YouTube) (i.e., slow loading). Explain why UDP is superior than TCP for streaming videos in this situation.
What is the difference between a context diagram and a diagram 0 in this context? Which of the following symbols does not appear in a context diagram?
4- Which of the following values is the decimal representation of the hexadecimal number 4D? a. 01001101 b. 77 c. 178 d. 4D e. B2 f. 10110010
Transcribed Image Text: B- What two conditions can terminate the operation performed by the instruction LOOPNE?
C- What flag condition is tested for by the instruction JNS?
Transcribed Image Text: When 16000,, is converted to floating point notation, the biased exponent is
10
OA. 100011002
OB. 000011012
OC. 000011002
OD. 100011012
Rationale:
Reset Selectcion
Transcribed Image Text: Let L be the language accepted by the automaton in Figure 2.2. Find a dfa that accepts L2. Transcribed Image Text: a, b
92
42. In asynchronous serial communication the physical layer provides a. start and stop signalling b. flow control c. both (a) and (b) d. none of the mentioned
Transcribed Image Text: 1. Is a computer with a 4GHZ clock always more efficient than a computer with a
3GHZ clock? Explain why in your own words.
131. What is the use of Bridge in Network? a. to connect LANs b. to separate LANs c. to control Network Speed d. All of the above
If you had to explain how database design can impact data architecture, what would you say? What example would you use to demonstrate or establish your explanation?
What is the obvious limit-to the problem of finding the median of a given array of n-elements? Is this obvious lower bound a TIGHT lower bound, why?
Urgent Help Needed ASAP!!!!! Transcribed Image Text: 4. Provide the instruction type and hexadecimal representation of the following instructions:
srli x5, x7, 16
lw x9, 240 (x5)
Given a string s and an integer i. Write a C++ program to print the character at index i in string s. Given i>=0 and i< s.length().
I need to write a program in java. write an ordered linked list that searches for words (String), the words can be written in the main code.
Which of the following is not a conditional, or Boolean, expression? Select one: a. x + y b. False c. p != q d. x == y
Data structures and algorithms. Transcribed Image Text: Code
int k=0;
for (int i =0; i
cout<<"The result is ";
reutrn result;
I need the answer as soon as possible Transcribed Image Text: The execution of a breakstatement in a
switchstatement immediately exits the
switchstructure
Ture o
Fuls o
87. A _______ regenerates a signal, connects segments of a LAN, and has no filtering capability. a. repeater b. bridge c. router d. none of the above
496. Before execution an entire process doesn’t need to be in memory, in technique of a. Offline storage b. Online storage c. Virtual memory d. Procedural memory
None Transcribed Image Text: The “variable” defined in the
parameter statement is not a variable
but rather a constant whose value
can change *
true
O false
Given the following class public class student { private String name; private String email; private int id; } Write two possible overloaded constructors for the class student
52. What will be the output of the following Python code snippet? x=3.3456789 ‘%s’ %x, str(x) i) Error ii) (‘3.3456789’, ‘3.3456789’) iii) (3.3456789, 3.3456789) iv) (‘3.3456789’, 3.3456789)
2. Why Facebook needs to focus on creating a violence law and new privacy rules? 3. Why Facebook needs to focus on increasing growth and user management.
C++ Program Transcribed Image Text: 8. Write a program that generates the given pattern below on the terminal:
1
121
12321
123 43 21
12321
121
1
The use of integrated information systems that make it difficult for decision makers to collaborate and share information is an example of computer waste. True or False?
The return statement of a void method may have one of two forms (assuming x is an int). to return x to return a tenth; to return
Transcribed Image Text: What is the correct command to encrypt plain text passwords?
O a. Ping
O b. show running-config
O c. service password-encryption
on
age
ter.5
Which NGFW feature allows a network admin to restrict traffic generated by a specific game? a. Content filter b. User awareness c. Context awareness d. Application awareness
Use tree diagram. 1. In the manufacturing of digital recording tape, electronic testing is used to record the number of bits in error in a 350-foot reel.
Interface two 32KB EPROM to the 16-bit data bus of 8086 based system. Design an address decoder (74LS138) assigning the address range of 50000H-5FFFFH for the EPROMs
This is one of the most critical principles in network security. a) Principle of security control b) Security consciousness c) Risk assessment d) Principle of least privilege
Don’t copy other platform if you don’t know liv it… I want Ref book:- AIS publications What are the two main methods for assigning identifiers to messages?
8
From a provider perspective, the shift from offline to online costs through automatization of public services is a significant benefit.
Select one:
a. False
b. True
Transcribed Image Text: Interrupt service routines MUST be
Select one:
O a. short
O b. All of them
O c. fast
O d. simple
Clear my choice
None Transcribed Image Text: B) Without using the max command, find the maximum value of matrix (y) where
(1 2
y =0 3
8
8 11
10.
(a) What is/are the benefit(s) of computing entropy for the source coding? (a) What is the difference between variable length source coding and fixed length source coding?
Indicate if the following condition is True or False Assume the variables x=5, y=6 and z=8. 7 <=( y-x ) && (z + y)> 4 True False
When you first turn on a computer and you don’t hear a spinning drive or fan or see indicator lights, is the problem hardware or software related?
What happen to a call in fixed channel strategy, if all the channels in a cell are occupied? a) Queued b) Cross talk c) Blocked d) Delayed
After software modules have been written and tested individually, they must be combined and tested as a whole. Discuss the significance of thoroughly testing the whole system.
Transcribed Image Text: It is a simple combinational digital circuit built from logic gates
O Full adder
Half adder
O Null adder
O None of the above
After software modules have been written and tested individually, they must be combined and tested as a whole. Discuss the significance of thoroughly testing the whole system.
An output device that converts data from a binary format in main storage to coded hole patterns punched into a paper tape is Paper tape punch explain?
Transcribed Image Text: diagram models the .12
* .other systems in the environment
The
Sequence diagram O
Use case diagram O
Context diagram O
Class diagram O
Complete the toupper() function in C++ which takes a character as parameter and return the ASCII value of uppercase alphabet of the input parameter. int toupper(char );
In java write a program to take input 4 integers and find the maximum value of those 4 integers.Note- Don’t use any data structure to store them.
List as bullet points why it is preferable to use a link-based list over an array-based list. Keep your answers to the point and under 100 words.
130. LAN network of the computer system is an abbreviation of a. local area network b. loose area networking c. local area networking d. loose area network
Transcribed Image Text: SMTP, FTP, and the HTTP application
layer protocols use the UDP and not
the TCP at the transport layer *
O True
O False
Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on that network access the Internet?
In the continuation of previous question. Where we had finded even number of elements in this question we had to printthe odd numbers from list in python.
Provide a comprehensive overview of the three main components defined in the NIST Cyber Security Framework and how they can be used to reduce cybercrime in general
What happens if a user tries to add data to a database and does so in a way that causes a record to break an enabled constraint?
The following information must be included in an insurance binder except the Period of coverage Amount of coverage Name of the insurance company Age of the property
229. Application developers have no direct access to system calls but they can access through a. memory b. Computer Interface c. application programming interface (API). d. registers
8. Interrupt table of pointers having addresses for each interrupt is located at a. high memory b. low memory c. mid memory d. both a and b
Are the following equations equivalent? Please prove the answer via truth table equivalence. P1 = ((A?¬B) ? C )?¬D P2=((¬A ?C) ? ( B ?C)) ? D
q12 Transcribed Image Text: is most likely to cause a data inconsistency_
deletion anomaly .a O
relational anomaly .b O
update anomaly .cO
insertion anomaly .d O
2-D plot using Matlab Write a Matlab (.m) file to plot triangular using mathematical function Include suitable title, axis grid, axis limit, and legend to the plot.
The utilization of conversational sound has long been of interest to system designers. Why does the synthesis by rule method produce more words than the concatenation method?
Transcribed Image Text: 4.
Implement (in pseudocode) addu with only shifting bit instruc-
tions? (You can use loading and storing instructions just not arithmetic
instructions like add)
Transcribed Image Text: when class A has an association relationship with class B, we implement this relationship in
class A as:
Local variable
Data field
Method
Inheritance
Write a program in java to take a string from user and make it to a palindrome. Don’t copy from other solution. It is wrong. Do fast
No plagiarism should there dont post copied Transcribed Image Text: *What are the security techniques/mechanisms that could be applied to vehicular communications or vehicle
to vehicle communications?
Which of the following methods performs the initializations in applets that would be performed in a constructor for a regular Swing GUI ? run() init() paint() destroy()
Which of the following statements create a dictionary? a) d = {} b) d = {“john”:40, “peter”:45} c) d = {40:”john”, 45:”peter”} d) All of the mentioned
Q3 c. Surely animals cannot be intelligent- they can do only what their genes tell them. Is the later statement true and does it imply the former?
None Transcribed Image Text: Q4) Let there be given a 16 word, 64 kw Main Memory and
128 line cache. Find the corresponding bits in Direct Mapping?
Answer truthfully or falsely. A single TCP segment may contain two different HTTP request messages when there are no permanent connections between the browser and origin server.
108_2_CA Describe the characteristics, one main advantage and one main disadvantage for each of the following three architectures: stack, accumulator, and general – purpose – register architectures.
If a computer uses hardwired control, the microprogram determines the instruction set for the machine. This instruction set can never be changed unless the architecture is redesigned.
Describe in english what this grammar means ->
True or False: float[] price; and float price[]; will both work in Java Programming. Please provide an explanation and proof for the answer. Thank you so much!
In java write a program to take input 4 integers and find the maximum value of those 4 integers.Note- Don’t use any data structure to store them.
Can any of three types of important database incidents begin the recovery process? Give each one an example. The five assets of the transaction should be mentioned.
In this section, we’ll talk about the design objective of the Internet of Things protocol architecture, which is necessary to establish a horizontal system of real-world services.
41. _____ cable can carry signals of higher frequency ranges than _____ cable. a. Twisted-pair; fiber-optic b. Coaxial; fiber-optic c. Coaxial; twisted-pair d. none of the above
CAPTCHAs’ only function is to prevent spam bots from posting. All CAPTCHAs must be text-based, image-based, and audio-based. Is there any security concern related to text-based CAPTCHA?
When you first turn on a computer and you don’t hear a spinning drive or fan or see indicator lights, is the problem hardware or software related?
Transcribed Image Text: The compounded amount of a $5,000 investment at 7% interest compounded semiannually for 4 years is $6,584.05 (rounded to
the nearest cent).
True
False
Write a program in kotlin to find the factors of a given number and you can assume this number is given no need to take the input.
What is the difference between the Object-Oriented and Functional Programming paradigms? – Describe the advantages and disadvantages of adopting any of the two to solve the issue.
What are the potential applications of cloud collaboration? How does the cloud make it simpler for workers to collaborate? Give a few instances to illustrate your point.
i am working in api project , and i am using fetch api but it is giving cors error and how to solve this error in nodejs
Anastasia has a string which is mixup of small case and upper case letters. You task to capitalize all the string and print it. Use kotlin language
Computer is an electronic device that can store, retrieve and process both qualitative and quantitative data quickly and accurately. is the appropriate definition of a computer why/
In python the __________ function removes the first element of a set and the last element of a list. a) remove b) pop c) discard d) dispose
What is the address bus width of the Core i7 CPU? 32 bit (4 GB) 24 bit (16 MB) 36 bit (64 GB) 16 bit (64 KB)
How does context (ex.environment, culture) influence your communication? Consider the language and culture people you grew up with, and the role these play in your communication styles.
Transcribed Image Text: WHICH ONE OF THE METHODS BELOW ASSURES THAT DEADLOCK POINT IS NEVER REACHED?
Select one:
a.Deadlock detection and recovery
b.Deadlock prevention
c.Deadlock avoidance
d.Ignore
What will be the output of the following PHP code?
Suppose your network is connected to another network via a router. Network layer OSI model layer provides the information necessary to direct data between the two networks?
Which kind of network employs robust security measures and enables only authorized users to get access to the network and critical business information is important to consider.
2. (a) What is a single error and burst error? Explain with an example. (b) Find the Hamming code of the following bitstream using even parity. 11011111010111010101110111000010
Automatic movement of the slides is done with the help of Select one: a. rehearse timing feature b. animation feature c. transition feature d. all are wrong
Answer clear answer Transcribed Image Text: Draw a Circuit diagram for the following Expression and write its Truth table.
Y = (AO B). (A. C) + B)
Transcribed Image Text: connects the fast
devices to the Processor-
Memory subsystem.
O a. PCI Bus
b. SCSI Bus
O c. Address Bus
O d. Expansion Bus
Transcribed Image Text: Reduce the following functions using Karnaugh Map method.
F(A, B, C, D) = t (4, 5, 6, 7, 8, 12, 13). d (1, 15).
Which protocol layer, and why, would be most suited to delivering such a security service? Separate services that wish to offer anonymity from those that do not.
Construct an NFA for the state table given below. ? 0 1 – q0 {q0,q1} {q3} q1 {q0} {q1,q3} + q2 Ø {q0,q2} + q3 {q1,q2,q3} {q1}
Human Computer Interaction (HCI) Acourding Data Gathering Techniques for Requirements. Which data gathering technique is suitable tor the following scenarios Explain briefly. The process of visa renewal?
19. ________ is a type of transmission impairment in which an outside source such as crosstalk corrupts a signal. a. Attenuation b. Distortion c. Noise d. Decibel
Transcribed Image Text: What is the first step in the Python script creation workflow?
O Plan code
O Run script
O Share script
O Explore code syntax
Transcribed Image Text: A
is an activity the system carries out, usually in response to a request by a user.
Select one:
a.use case
b.method
c.technique
d.message
Transcribed Image Text: Consider the following NFA M. Which of the following strings doesn’t belong to L(M). *
1
92
0, 1
0,1
1100
1111001
0000110
000011
Users want to view high-quality films without lagging (e.g., on YouTube) (i.e., slow loading). Explain why UDP is superior than TCP for streaming videos in this situation.
35. Frequency of failure and network recovery time after a failure are measures of the _______ of a network. a. Performance b. Reliability c. Security d. Feasibility
Transcribed Image Text: 3. Create class name PatternActivity and write a program
to produce the following output using nested for loops.
C: \Users\lawrence.mashau\OneDrive – University of Venda\Documen
Which of the following are invalid variable names? Why? Click here to view code image Int char 6_05 Calloc Xx alpha_beta_routine floating _1312 z ReInitialize _ A$
178. What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard? a. 4 b. 2 c. 6 d. 3
Regression is one of the most popular machine-learning methods. Often, these models are helpful for prediction forecasting or reducing errors. What are some applications of linear regression?
Write a program in C++ to implement simple Binary Tree and print the tree nodes through In-Order Traversal, also write function to find level of each node.
346. An executing process must be loaded entirely in main memory. What kind of a memory organization is this? a. Physical b. Logical c. Structural d. Simple
Informaticists are knowledge workers who understand the system, procedures, and goals and objectives, allowing them to acquire competence in using system capabilities to improve UI/UX. True False
Transcribed Image Text: 17. Testing a complete version of the software before it is released to users is called *
User testing
Inspection
Unit testing
Release testing
When you first turn on a computer and you don’t hear a spinning drive or fan or see indicator lights, is the problem hardware or software related?
Each of the following is a state of a port that can be returned by a port scanner except_________. a. open b. busy c. blocked d. closed
Which is not one of the eight principles adhered to by the Software Engineering Code of Ethics and Professional Practice (SE Code of Ethics and Professional Practice)?
Use a proof by contradiction to show that if a code C ? {0, 1}^n, |C| = 2^k has minimum distance d then k ? n?d+ 1.
MVC is an acronym for Model View Controller. How will you use MVC in the stock exchange industry as an example? Any assumptions should be mentioned clearly.
What are the two ways that the Substitute User identity command can be invoked? Give one example (i.e. write down the command) for each of these two
Complete the toupper() function in C++ which takes a character as parameter and return the ASCII value of uppercase alphabet of the input parameter. int toupper(char );
Answer this question please Transcribed Image Text: 4. Find the error in the following pseudocode.
Display “Enter the length of the room.
Input length
Declare Integer length
Please solve it fast. Program must be easily understood and in python language. Transcribed Image Text: Write a program to create a chess board as shown below:
I want the solution very quickly within 15 minutes Transcribed Image Text: Q4
C++
Q4/ Write a program to find a minimum number between fifteen (15) numbers.
Assume you want to run a computer program to derive the efficient frontier for your feasible set of stocks. What information must you input to the program?
Write program to generate digital signature using DSA private key for text “This is final exam of 21SP” and store it in a file called exam.txt .
Transcribed Image Text: A hypothetical computer system is missing of one of I/O techniques known as the Interrupt.
Will this affect the system performance? Justify your answer.
Solve the following question correctly with detail please. Transcribed Image Text: convert the following
Binary numbers into
Gray Codea) 11011b)
9
Gray code
101011hint: see
lecture 8
Create the statement that will add the word “programming” to the queue. In the aftermath of this insertion operation, what is the index of the final element?
Multiple choice question Transcribed Image Text: Convert (1010.01)2 into normalised form.
1. (1.01001)2 X (2³)10
2. (1.01001)2 x (2³)10
3. (0.011001)2 x (2*)10
4. (0.011001)2 x (24)10
Assume x is 10, y is 7, and z; x and y are int, z is bool. What is assigned to z? z = x < y 269. A system is using NRZ-I to transfer 10-Mbps data. What would be minimum bandwidth a. 500 kHz. b. 1000 KHz c. 2000 KHz d. 5000 KHz 184. SAN network of the computer system is an abbreviation of a. storage area networking b. serial area network c. serial area networking d. storage area network What are the common technical characteristics between PCA and SVM I‘(our answer Transcribed Image Text: What are the common technical characteristics between PCA and SVM Your answer 13. Accessing same data from storage of the computer system is provided by a. serial clusters b. parallel clusters c. Beowulf clusters d. both a and b Is this statement true or false? The term “null” refers to a column in a database table that does not contain any data and is thus empty. What is the average time complexity of the median of three quick sort? I) O(n log n) II) O(n2) III) O(n2 log n) IV) O(n log n2) Create an algorithm to calculate the price of a pizza per square inch given the radius of the pizza in inches and the price of the pizza. Which of the following Assembly language instructions decrements the content of register B by 1? a. DEX B b. DR B c. DCR B d. DEC B Transcribed Image Text: Write a C++ program that will take array size and array elements from the keyword then find the largest three elements in given array. 9) Usage of IaaS, PaaS, and SaaS shift an organization’s IT expenses from being an operating expense to being a capital expense. True or False? True False Learn how mobile devices and cloud computing are connected and highlight their commonalities. As far as mobile devices are concerned, what are the benefits of cloud computing? solve using c++ Consider an array of 10 integers (7,6,8,11,13,12,9,4,2,21). Draw this array after the two iteration of insertion sort by mentioning steps in a tabular form Write a complete C program using 2 functions in order to compute C (not python). C=n! / (n-r)! Use the following function prototypes. int factorial(int); float compute_c(int,int); We can use at most 2N comparisons to put any batch of N keys into an empty binary search tree. Choose one: Is it true or false? Discuss and differentiate the following modeling and simulation methods : a. Agent-Based Simulation b. Discrete-Event Simulation c. System Dynamics Simulation Solutions d. Risk Analysis Simulation (Monte Carlo). Create an algorithm to calculate the price of a pizza per square inch given the radius of the pizza in inches and the price of the pizza. Transcribed Image Text: a) Write a note on stages involved in variant based computer aided process planning. b) State limitations of variant based computer aided process planning Transcribed Image Text: Use proof by counterexample to disprove the following claim. f(n) = 0(s(n) and g(n) = O(r(n)) imply that f(n) – g(n) = 0(s(n) -r(n)) I need answer in python language Program takes the masses of two objects and the distance between them to determine the gravitational force acting between the objects. Write a Python code to accept five names from the user within a for loop when prompted “Enter name” and then write in a file called “name.txt”. Assume the variable big references a string. Write a statement that converts the string it references to lowercase and assigns the converted string to the variable little. 45. What is the main aim of Software engineering? a. Reliable software b. Cost effective software c. Reliable and cost effective software d. None of the above Transcribed Image Text: Q2) To perform the operation R, +R, what are the selector that must be choose by control unit? Draw the circuit with this operation? The modeling diagrams used to represent control flow are (select all that apply): a. Petri nets b. ER diagrams c. Use case diagrams d. Finite State Machines Software requirements engineering Question: No. 4: a.Define the requirements change factors? b.Sometime requirements are constraints on the development process of the system, explain it with an example? Using recursion, create a program that will allow a user to enter five numbers. The program will provide the sum of all five numbers using recursive methods. Answer truthfully or falsely. A single TCP segment may contain two different HTTP request messages when there are no permanent connections between the browser and origin server. Which is not one of the eight principles adhered to by the Software Engineering Code of Ethics and Professional Practice (SE Code of Ethics and Professional Practice)? Analyze the differences between the two schools of thinking on what “information technology” means. (In researching automation) Which one of these services would you use, and why? Briefly explain what functional programming is. As part of your answer, explain the difference between functional programming and non-functional (i.e., procedural or imperative) programming. (150 words max.) Is it true that in the current age of Machine Learning, Data Structures and Algorithms are no longer used? What precisely is the connection between the two? Python program to check if a number is prime or not taking user input the number. please i am beginer to not include so much advance concept. What is the physical address of the following picture: Transcribed Image Text: Virtual Page numbers Page offset Ox00002 Ox753 Ox00000 Ox0002 Ox00001 Disk Ox00002 Ox0006 Ox00003 Ox0008 According to the text, any IT-enabled advantage results from engaging in the following except: A)Acquiring a new system B)Improving processes C)Gathering critical data D)Defining new business models (Reg D- Reg C ) Reg B X (Reg E + Reg D) = @2500H. Write the assembly language and run to simulator. (Paste your program here) Top-down programming is an approach in which the top module is first tested then program modules are added from the highest level to the lowest level why? Complete the first line of a function definition for a function named PrintMenu that has no parameters. PrintMenu returns nothing Not sure what to write here :( What software provides source code management for an enterprise’s continuous integration and continuous deployment pipeline? Select one: a. Git b. Kubernetes c. Jenkins d. kubectl e. Helm C++ Write a function that takes as input a positive integer n and returns the n-th harmonic number. Reminder: the n-th harmonic number is equal to 1+(1/2)+(1/3)+(1/4)+…+(1/n) Transcribed Image Text: 1. Simplify the following Boolean expressions: (?) ??? + ??? + ??? + ?B? (b) ABC + A BC + ABC +A B C Would it be ethical to check the contents of a USB drive found in order to determine the owner? Discuss through the definition of ethics in philosophy Transcribed Image Text: i. What will be the minumum number of table(s) in a relationship if cardinality is reduced to Zero (0). Explain with reason using example. Can you set your window to open several simutaneous Web site connections? What are the benefits and drawbacks of making a huge number of TCP links simultaneously? Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on that network access the Internet? c++ Transcribed Image Text: Which of the following are illegal variable names? (select all illegal names) O dayOfWeek O 3dGraph O _employee_num O June19 Mixture#3 O int 113. The logical to physical page mapping is represented in a ____________ a. Logic physical table b. Transition table c. Wear leveling table d. Logic log table Write nested decision structures that perform the following: If amount1 is greater than 10 and amount2 is less than 100, display the greater of amount1 and amount2. Which requirements in PCI DSS SAQ-D apply to performing internal and external vulnerability assessment scans and penetration testing on production IT infrastructure and credit card transaction-processing servers? Why is this true? A single-channel system has a wait time more than double that of a two-channel system with two servers operating at the same pace. Transcribed Image Text: 10. Please explain the differences among the following network devices: switches and routers, and tell which protocol layer they have?(Application, Transport, Network, Link, Physical) Transcribed Image Text: Write a program that defines symbolic constants for all seven days of the week. Create an array variable that uses the symbols as initializers. If we use 2-bytes pixel values in a 32-bit lookup table representation, how many bytes does the lookup table occupy? how many bytes does the image occupy? 58. Which property of a sociotechnical system depends on the technical system components, its operators, and its operating environment? a. security b. usability c. volume d. reliability Create a Python Program that utilizes an Engineering Formula (use any formula from any discipline) and all of the following structures: Sequential Structures Decision Structures Repetition Structures From a user’s point of view, the two most important characteristics of memory are capacity and performance. What the THREE (3) performance parameters are used in memory Discuss the benefits and drawbacks of remote access technologies, particularly remote desktops. What are some of the difficulties associated with enabling customers to connect to remote services? Programming Language: Rust Write a program to compute the sum of natural numbers from 51 to 99(both inclusive) using loops and print the sum in the output. Transcribed Image Text: Write the code to create a Python calculator with following GUI Interface using tkinter. Calculator 7 8. 9 4 6. 1 %3D 3. 2. Evaluate the following expressions, assume the following declarations: int a=28; int b=4; int c=2; int z=0; z*=a/b-c; What is the value of z after expression is evaluated? Write a query to retrieve the Fname and Lname in a single column as “FullName”. The first name and the last name must be separated with space. Transcribed Image Text: Q4. Write a program to print the elements up the secondary diagonal of matrix : 3 9 [x]: [25 |11 20 30 70 35 Transcribed Image Text: How do you display hyperlinks without an underline? Select one: O a. a {text-decoration:none;} O b. a {underline:none;} O c.a{text-decoration:no-underline;} O d. a {decoration:no-underline;} Create an ALP that rotates the contents of the AL register to the right four times, including the carry, and saves the result in the DH register. find the mode for the given data x f 1 2 2 7 3 8 4 4 5 3 6 8 7 5 8 7 9 2 Demonstrate what the word Dim in VB means. Define by assigning the following functions to the forms in Visual Basic. “Bookmark, label, combo box, and command button” For a matrix (two-dimensional array)utilizing for loops.USE following numbers to read from monitor by using “scanf”and for loop: 11 2 ?3 7 ?5 ?4 0 0 2 Make an ALP that rotates the contents of the AL register four times to the right, including the carry, and stores the result in the DH register. Which manner of operation is vulnerable to the following security flaw: block independence allows an attacker to successfully alter some ciphertext blocks without knowing the key used? Create a program that will calculate the following in assembly language: 65 + (13 – 27). Create a directory named math_operators and store the program code inside Write a Java program to solve the questions given below: 3. Find the sum of natural numbers from 51 to 100. Note: Do not use any loop. Please answer C and D only Transcribed Image Text: 5. Convert the following binary numbers to their hexadecimal equivalents: a. 1001.1111 b. 110101.011001 c. 10100111.111011 d. 1101001.01011 Write a pseudo code for a program which will accept two numbers from the user and calculate the sum and product and display the answer. Subject: C++ 48. which of the following devices is used to connect different network segments and manage the traffic between them? a. Bridge b. Hub c. Gateway d. Repeater Transcribed Image Text: Write a program in MATLAB and then create the following array using one instruction [1 01 F= 1 Lo 1 16 12 8 4] PLEASE HELP!!!! Transcribed Image Text: Why it would be good and, at the same time, bad to prove that P = NP (polynomial class equals NP class)? Is it true that in the current age of Machine Learning, Data Structures and Algorithms are no longer used? What precisely is the connection between the two? Please show your solution/proof why is it TRUE or why is it FALSE. Transcribed Image Text: (d) if f = 0(g), then g = 0(f). True False By using matlap Transcribed Image Text: Write a program to read a string, then replace each character in the string with its following character in ASCII code*. Which of the communication models presented do you believe best depicts the communication process? Why? Aristotle Model, Transaction Model, Schramm’s Model, Berlo’s Model or Shannon- Weaver Model 103. If one machine is in hot standby mode, this clustering of the computer system is a. symmetric b. asymmetric c. serially d. both a and b 44. In SCAN – EDF, requests with the same deadlines are ordered according to : a. SCAN policy b. EDF policy c. FCFS policy d. FIFO policy Transcribed Image Text: Question # 2: Write down algorithm in pseudo-code of any two sorting algorithms with different time complexities. The algorithm can be of your choice Write an assignment statement that adds together the values stored in the decDomestic and decInternational variables and then assigns the result to a String variable named strIncome.