only needs to call the super() constructor if we intend to instantiate the superclass. True

This is for java Transcribed Image Text: When we extend a class, the subclass’s constructor only needs to call the
super() constructor if we intend to instantiate the superclass.
True
False

Write a function in C++ that receives a double array and the number of items stored in the array. The function returns the largest and the smallest items using reference parameters.

Transcribed Image Text: If I have a class titled MyClass, then which of the following is a valid constructor
header?
O def _init__(self):
O def MyClass(self):
O def _MyClass_(self):
def _create_(self):

Transcribed Image Text: Structural in-dependence exists when it is
possible to make changes in the file structure
without affecting the application program’s
ability to access the data.
Select one:
True
False

Transcribed Image Text: Question 3
1 Point
There are 7 chairs in a row. In how many ways can 3 persons occupy any three of them?
A
260
210
240
120

Transcribed Image Text: Which choice represents the expected upper bound for the run time of a push operation on a stack?
O Ologn)
O 01)
O O(n)
o Onlogn)
O On?)

Think critically about the advantages of writing tests before code is written. What kind of compromise must a tester make in order to see the code before or after creating tests?

4) Convert the decimal number 431 to binary in two ways: (a) convert directly to binary; (b) convert first to hexadecimal and then from hexadecimal to binary. Which method is faster?

Write a program to take input for two numbers you assume that these numbers must be integer. You have to multiple and divide the numbers and print the result. In pascal

Transcribed Image Text: 2. As a student of computer science what will help this subject on your journey?
3. Do you have advanced knowledge about networks and communication? Enumerate and
explain.

Using an english like syntax create an algorithm for converting degree celsius temperature to degree fahrenheit. Using an english like syntax create an algorithm for getting the product of three numbers.

51. A register capable of shifting its binary information either to the right or the left is called a a. parallel register b. serial register c. shift register d. storage register

Is there a method that someone like Peter can use to avoid forgetting his or her password that is safe to use, apart from key recovery, to prevent this from happening?

please answer in 3-4 sentence.

Is the programming format concept the same as writing a letter with different format also?, Is indentation and spacing important? and Are rules or standards important?

Specify the appropriate primitive numeric data type to use for each of the following values: a. 24 dollars b. 12 bananas c. 14.5 inches d. 83 cents e. 2 concert tickets

To add two 4-bit binary numbers, we need: a-  A complete collector b-  4 half collector c-  Half collector + 3 full collector d-  3 complete collector Choose the correct one

Please use Python to write the code Transcribed Image Text: Write a code to count and print the number of “@” character in the file “myfile.txt”
(Maximum 3 lines of code)

?????? Translate the following to Propositional Logic Let: If Liron is not eating, then Liron is  hungry E=Liron is eating H=Liron is hungry ???????? E ?¬H E¬ ?H E ?H E^¬H

44. What is the name of the software which can be legally compiled and often used for free? a. Shareware program b. Public domain program c. Firmware program d. Mind Ware

Write a program that will read a message from another text file and surround each occurrence of an abbreviation with <> brackets. Write the marked message to a new text file

3.1. Discuss five of the factors that can influence an organisation’s decisions to hire information security professionals? (In other words, discuss five of the skills or knowledge the candidate should have.)

114. What is the full form of RAID? a. Redundant Array of Independent Disks b. Reliable Array of Independent Disks c. Redundant Asset Increment Data d. Reliable Aggravation of Immaculate Data

During the semester, we established a clear distinction between Methodologies and SDLC. Briefly explain in your own words, SDLC and how does it relate to Methodologies as applied in Software Engineering?

Transcribed Image Text: Q#2. Construct Binary Trees from given list of numbers and then verify the tree.
35, 5, 40, 27, 13, 46, 55, 33, 5, 50, 27, 52, 35, 40

In a(n) _______ configuration, the administrator types the port numbers, the IP addresses, or other characteristics, using the VLAN software. a. manual b. automatic c. semiautomatic d. none of the above

Transcribed Image Text: Are there programming languages that do not
implement templates or generics? Write an article
in your own words to discuss this matter (Note: not
more than 3 pages).

Explain why it is important that software products are developed quickly.  Why is it sometimes sensible to deliver an unfinished product and then issue new versions of that product after delivery?

Draw Data Flow Diagram (DFD) for Food Ordering System and show (a) context diagram & next level . (b)all information needed to complete the processes & stored and accessed the processes

Three basic methods are integrated for the security of the system architecture in EPIC-style active hardware metering. What, in general, are these three methods and how do they assist with security?

Which Windows tool can you use to install the drivers needed so that a user can open a data file using an application that is normally not used with the file?

Please help me with this in Python In python Create a Right Triangle to compute its area and perimeter please create it in Class Right Triangle user input of each sides

In excel,except for the ______ function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result. Select one: a. IF b. NOT c. OR d. AND

Write a program in c++ You have 12 temperatures in your array. You want to calculate the average and determine the results that are greater than or equal to that average.

Matlab code please Transcribed Image Text: Write a script to plot functions ( Inx, tanh ,
x^2 – 3x + 1) where x E [0, 2]. Using
fplot command.
Matlab please

64. ________ is normally referred to as mB/nB coding; it replaces each m-bit group with an n-bit group. a. Block coding b. Line coding c. Scrambling d. None of the above

Give an example of how process modeling may be helpful for any project, not just IT system development. To what extent is logical process modeling utilized in thorough systems requirements analysis?

Which of the following commands should be run following the installation of a shared library to update the /etc/ ld.so.conf and /etc/ld.so.cache files? a. ldd b. updatedb c. ldconfig d. dpkg-reconfigure`

65. A technical communication document intended to give assistance to user using a particular system is called a. program manual b. user manual c. detailed manual d. hard copy of manual

A category in Disruptive Technology where in discovery or technology that changes a fundamental understanding of nature or enables what had seemed impossible a Morphers b Enablers c Superseders d Breakthroughs

Transcribed Image Text: Q-1: Why we create one or more objects of a class in java, Explain it with real life example?
AND write one simple program related to class objects.

mobile programing,android studio,java Transcribed Image Text: Answer the following question
1. What is the purpose of using Intents?
2. List of lifecycle methods of activity?
3. What is the android Manifest.xml?

Transcribed Image Text: Question 1)
1. Write a console programme that reads in firstName (String), sureName (String), age
(int) and salary (double) through the keyboard and prints them on the screen.

Experts give correct Answer i will upvote else ten times will downvoted Transcribed Image Text: Check the following two DFA are equal or not,
1
1
9,
92
93
93
96

In FTP, when we _______, it is copied from the server to the client. a. retrieve a file b. retrieve a list c. a and b d. none of the above

Which Cloud Foundry component is used to collect component metrics and stream application logs to an appropriate collection point? Select one: A. BOSH Director B. Router C. Cloud Controller D. Loggerator

cbcbnbncdggeg rrhgfhfh sdghfhfh gfg d Transcribed Image Text: Create an Inline Salesforce object query language (SOQL) to find the contact id and name of
the contact object in the descending order.

39. If user doesn’t know anything about the complexity of database application then that user is called as _____________. a. Naive User b. Database Manager c. Database Operator d. Database Administrator

Given L ={ambn | m< n }. Derive (i) a context-free grammar that accepts L (ii) a PDA accepting L by empty store (iii) a PDA accepting L by final state. (a) What do you understand by inconsistency in requirement? Explain it with suitable example? (b) What do you mean by incompleteness in requirement and how to resolve it? Give suitable example? in c++ how would i sort an array in ascending order by the first digit of the elemen so [811, 424, 111, 542, 234] would be [111, 234, 424, 542, 811] C++ WAP in c++ that reads the file FIRST.TXT and creates a new file named SECOND.TXT, to contain only those words from the file FIRST.TXT which start with a lowercase vowel. What is secret key cryptography, and how does it work? Please include a short explanation, such as how it worked in the past. How is it working for you right now? The type of encoding in which manipulation of bit streams without regard to what the bits mean is ………………… a. Destination encoding b. Entropy encoding c. Source encoding d. Differential encoding Transcribed Image Text: Which of below should NEVER be used for sending passwords or other sensitive information Select one: O a. REQUEST O b. Response O c. GET O d. POST what scenario is depicted in the signage of “BE CAREFUL SAFETY IS EVERYBODY’S JOB” are there any ways to prevent this kind of disaster to happen? List down the possible answers Assume the variable data_entry references an Entry widget. Write a statement that retrieves the data from the widget, converts it to an int, and assigns it to a variable named var. Transcribed Image Text: The recent popular applications of ICT that have “flattened” the world included . …. Select one: ?. ICT ?. IoT C. All the other three solutions D. Internet Restarting a computer that is turned on is called Warm Boot Transcribed Image Text: Restarting a computer that is turned on is called Warm Boot Select one: O True O False 91. If the global depth in extendible hashing is equal to local depth then the operation must be performed in directory array is a. adding b. subtracting c. halving d. doubling Write a Phyton program that will enter 10 numbers from 20 to 30. If the number is even, it should be stored in List1 else it should be stored in List2. This is the common name for the networking device that can send traffic between networks for networked hosts. a) Network Bridge b) Default Gateway c) IP L3 Routing d) L3 Switch i need the answer quickly Transcribed Image Text: Q2) Using Vectors only, write a MATLAB program that calculates the series given below for any (n). (i- 1)! Vi! S = i=1 Transcribed Image Text: Describe what is propose of using OSI Model then list the name of layer ordering from bottom to up Describe each layer of OSI model in short answer Consider the registration system at a university. The system will manage student registration for the university’s numerous courses as well as examinations. Determine the hazards that such a software system entails. Is there a method that someone like Peter can use to avoid forgetting his or her password that is safe to use, apart from key recovery, to prevent this from happening? Scenario – “Generate ERD of ERD” Task to do: i. Identify Entities with atleast 10 attributes per Entities. ii. Identify all relationship from the given Scenario iii. Generate Entity Relationship Diagram 382. In processing state of data till its completion, data is stored in a file known to be a. Execution file b. Run time file c. Compilation file d. Transaction file Which of the following is the correct Python syntax to extract a portion of a string? Select one: a. s[2-5] b. s[2:5] c. s[2;5] d. s[2,5] e. None of the above Q4. Make the HTML form which exactly includes: name, email, password, phone number, file field, placeholder and disabled attributes. In addition, include the “Fill Again” and “Save” buttons at the end. What is internal processor memory, and what are some of its features, as shown by examples? What is secondary memory, and what are some of its features, as shown by examples? Solution by C++ Transcribed Image Text: Q3: b- Write a program to exchange he main diagonal elements with the secondary diagonal elements of a two dimensional square matrix. Solution by C++ Give clear explanation else i will downvoted sure… Sub:- Ds ,DAA frm cse Let X = a,a,b,a,a,b,a,b,a,a and Y = b,a,b,a,a,b,a,b. Find a minimum-cost edit sequence that transforms X and Y. You should go into more depth in terms of specifics, examples, and assistance when you’re talking about the security considerations that you would think about when outsourcing data to the cloud Q.5.1 Below are the elements of the data hierarchy. Rearrange them so that they appear in order from the smallest element to the largest element. Elements: file, field, character, record, database Elaborate on whether using a waterfall strategy is appropriate to the project by examining the pros and cons of the waterfall methodology in relation to the project described in the article. Is it true that if other functions are defined before main, the programme will still run from the beginning? Do you concur with this assertion? Why do you think that is? Explain please please Transcribed Image Text: a service locator is the Select one: O a. DNS Server O b. Domain Controller server O C. Active Directory Server O d. DHCP Server Describe how you would develop object-oriented features of Java for the following: class variables, instance variables, inheritance, polymorphism, abstract classes, “this”, “super”, interfaces, and event listeners. Not less than 300 words Evaluate C, C++andJAVAfor a project to design and implement a newword processor. Youshouldevaluate the languages against the following criteria. • Data modeling • Process modeling • Scale • Level • Efficiency What numbers does the code that follows print to the console?int[] numbers = {1, 2, 3, 4, 5, 6, 7, 8, 9};for (int i = 0; i < 9; i++){ System.out.println(numbers[i]);} Write “Handle Return” use cases for each following functionality: (a) Room reservation (b) Changing the properties of a room (for example, from non-smoking to smoking) (c) Customer check-in (d) Customer check-out It’s recovering from things like ransomware and other calamities that are damaging to your data that constitutes data integrity. Give an example of recovering from a ransomware assault if you can. Let A = {1, 2, 5} and B = {3, 4, 5} be sets. What is the cardinality of the power set p(p((A U B)-B)) [Input numeric value only] Answer: ? (Q.17) Consider this functional dependencies {AB->C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

Write a java program bro find the largest element between first, last, middle value from an array of integers. If the length of array is odd then take the floor value

Using the Web, identify the chief information officer, chief information security officer, and systems administrator for an organisation of your choice. Which of these individuals represents the data owner? Data custodian?

Transcribed Image Text: Consider a scenario of ROP radar system used on Oman roads to issue fines on speed limits, by
taking your own example, explain the logical operators.
“and
or

136. Curve that shows that hardware exhibits relatively high failure rates early in its life is known as a. exponential curve b. straight line curve c. bathtub curve d. constant curve

(Q.17) Consider this functional dependencies {AB->C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

Transcribed Image Text: Q9/ The minimum sum- of- products for the following function is
F(A,B,C,D,E)={m(0,1,15,16,17) +Ed(14,24,25,30,31) using Quine – McClusky
method *
None of them
B’C’D’+A’BCD
A’B’C’D’+A’BCD+AB’C’D’
O B’C’D’+BCD
O B’C’D+AC’D’

1. Two main measures for the efficiency of an algorithm are A – Processor and memory B – Time and space C – Complexity and capacity D – Data and space

Programming language Visual Basic choose the correct answer Transcribed Image Text: The variable that does not change the value during executing of program is
Numeric
String
Constant
None of the above

Transcribed Image Text: 8.
Consider the following AVL tree; after deleting
(15), what is the left child of the node 24?
20
15
24
22
27
O 22
O 15
20

Transcribed Image Text: void fact(int num)
{
int k,f=1;
for (k=1;k<=num; k++) f=f*k; cout<< f; int main() { int arri[3]={3,2,1} ; for(int i=0;i<3;i++) fact(arri[i]); } 261 O 621 O 7 462 Write a program that will evaluate the factorial of a given number. The main function of the program must not exceed 4 statements. Also write a sample output of your program. q14 Transcribed Image Text: A major goal of normalization is minimizing redundant data a O clarifying field names b o selecting suitable primary keys .c O increasing functional independence d O Transcribed Image Text: WHICH OF THE FOLLOWING REPRESENTS TOTAL AMOUNT OF RESOURCES NOT ALLOCATED TO ANY PROCESS? Select one: a.RESOURCE VECTOR b.AVAILABLE RESOURCE VECTOR c.RESOURCE CLAIM MATRIX O d.RESOURCE ALLOCATION MATRIX 17 Several gaps should be bridged to reach a successful implementation of e.government services, except: Select one: a. Gold b. All answers are correct. c. Human capital d. security e. Privacy Question 3: Could you please convert the given NFA to DFA: Input/State |0 |1 Q0| {q0, q1}| q0 q1 |q2 |q1 q2| q3| q3 q3 (final state)| ? (null character)| q2 Transcribed Image Text: 5. Construct a truth table for each of these compound propositions (10) 5.1. (p O q) V (p O ¬q) 5.2. (? — q) V (? — 9) Q.2.9 Below are the elements of the data hierarchy. Rearrange them so that they appear in order from the smallest element to the largest element. Elements: file, field, character, record, database 6- Which HTML code allows embedding an audio content in a webpage? a. b.

create an array with four elements in a single row, separate the elements with either a comma (,) or a space. Using matlab code. Give detailed solutions. and attach the simulation;

40. The most important attribute of a systems analyst is a. excellent programming skills b. very good hardware designing skills c. very good technical management skills d. very good writing skills

Write a program to take two 1nteger and print there product in Py Transcribed Image Text: Write a program to take two integers as
and print there product in Python.
input

Transcribed Image Text: A firewall dependent on
to identify what traffic is permitted through it.
O a. Channel bank
O b. Number portability
O c. ACL Rule
O d. Point-to-point protocol

The following declaration was used to create the volts array: int volts[500]; Write a function header for a function named sortArray() that accepts the volts array as a parameter named inArray.

.Write a program: How to find odd number between 100 to 500 in java Transcribed Image Text: .Write a program:
How to find odd number between 100 to
500 in java

Assume that the following main module is included in a programme that contains the binarySearch function demonstrated in this chapter. Why is the pseudocode in the main module failing to execute?

With an acceptable heuristic, depth-first search always grows nodes by at least as much as A search. Is this statement correct or incorrect? Use just one phrase to explain your responses

Transcribed Image Text: |in C language means:
O Equability
Exclusive OR
Two’s complement
O One’s complement
O Inequality
O Logical AND
OLogical shift right
O Logical OR
O Logical shift left

None Transcribed Image Text: Use the . to join, or
….. …….
concatenate, one or more text strings
.to produce a single piece of text
! 0
%
& O
%24

Assembly language No need existing Answers will down voted if any copy paste contents Transcribed Image Text: Explain the functions of following instructions of PIC16 with example of each: SUBWF ,INCFSZ

Transcribed Image Text: a)
Internet
Cardholder
Merchant
Certificate
Authority
Payment
gateway
Issuer
Payment
Network
Acquirer
Explain the security issues of the approach of encryption and security designated for the
scenario above.

Discuss five (5) computer security assaults that have occurred both within and outside of a business, as well as related mitigation methods that have been proposed to minimize the security concerns.

create a php file that converts seconds and prints out to days, hours,minutes and seconds. Also create an html file that asks for input of seconds. that connects to php file.

i need the answer quickly Transcribed Image Text: Q2) Using Vectors only, write a MATLAB program that calculates the series given
below for any (n).
(i- 1)!
Vi!
S =
i=1

Transcribed Image Text: After I/O or event completion, a
Process which is in the Waiting
state moves to
a. Running State
b. Ready State
O c. Terminate State
d. Running State

Transcribed Image Text: Write a program to read an array 7×7 , (choose your own numbers ) and write a
.function to return the maximum number and sum of odd numbers

Write a PHP program to take input the name of a person input from user and it output print the message before name of user,”Welcome! ” Input: Andrew Output: Welcome! Andrew

Which of the following topologies can assist you if you’re worried about the availability of your data on a network and don’t want the connections to be disrupted at any time?

1.WHICH OF THE FOLLOWING MEMORY ALLOCATION TYPES ALLOCATES THE SAME AMOUNT OF MEMORY AS THE PROCESS SIZE? Choose one: a.PARTITION OF EQUAL SIZE d.UNEQUAL-SIZED PARTITION b.BUDDY SYSTEM c.DYNAMIC PARTITION d.UNEQUAL-SIZED PARTITION

Suppose that speed is a variable of type double and you want to assign Math.round(speed) to the variable approxSpeed, which is of type int. How do you write the assignment statement?

Question 2: Q.2.1: Explain why testing can only detect the presence of errors, not their absence? Q.2.2: Define the following terms: Unit Testing System Testing Black Box Testing White Box Testing

88. One reason for the popularity of windows 95 was its ability to run applications that were developed for this operating system a. DOS b. UNIX c. Linux d. Mac OS

Using C++, show the coding of the problem. Apply repetition or looping statements Transcribed Image Text: Prob. #16 Write a program to print the figure shown.
M57973
13579 S31
MS797n3
LO7975

Transcribed Image Text: How do people typically read through a PowerBl dashboard?
O Top left to bottom right
Bottom left to top right
Bottom to top
Bottom right to top left

The usage of conversational sound has long piqued the interest of system designers and engineers. Why does the rule-based technique of synthesis produce more words than the concatenation method of synthesis?

Write the C program code that lists the integers 71-2206 whose sum of the cubes of the place values ??is equal to the number itself and saves it in array A.

Salesforce object search language query Transcribed Image Text: Create an Inline Salesforce object query language (SOQL) to find the contact id and name of
the contact object in the descending order.

Transcribed Image Text: 3. An 8*1 Multiplexer can be implemented
using
three (4*1) multiplexers
two (4*1) multiplexers and one
(2*1) multiplexer
two (2*1) multiplexers and one
(4*1) multiplexer
four (2*1) multiplexers

IntServ vs DiffServ are two different types of QoS architecture. Explain what they are and how they operate. Give some instances of when each architectural type is most appropriate to utilize.

Transcribed Image Text: Which one of the following is the range of
Registered Ports?
a. 1024 to 49151
b. 0 to 1023
C.
49152 to 65535
O d. 1 to 1024

Transcribed Image Text: Suppose m =
[[1, 2, 3, 4], [5, 6], [7, 8, 9]], match the following lengths:
len(m)
[Choose ]
len(m[])
[Choose]
[Choose]
([0][O]w)u
len(m[3])
[Choose]
len(m[1])
[ Choose]

Select two articles from the RSS feed that speak to enterprise systems. Summarize each article and include a concluding paragraph that explains how you as a professional would use this information

1)Which of the following types of network have devices that function both as server and as a client?

a.
Client Server

b.
Web server

c.
Peer to Peer

d.
FTP Server

Instructions: Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. T F Graphics are animated sequences of images.

In order to ensure that Software Assurance is secure, several security standards must be followed: The following are some of the key principles: Explain A. Unlocking security systems requires two keys

I need the answer as soon as possible Transcribed Image Text: 16. Which of these factors may affect perfective maintenance. [Multiple Answers] *
Team stability
Ethical responsibility
Hardware Specifications
Program structure

Learn how to start 1D and 2D arrays in the C computer programming language by looking at several methods. Discuss their memory representations with the other members of the group, too.

With and without using LXI command how you will transfer one byte from memory location whose address is 2450 H to another memory location whose address is 2550H( 8085 SIMULATOR ).

4. Assume you are the manager of a retail store and need to hire a CIO to run your new computer system. What characteristics would you want in a new CIO?

200 to 250 words Research ONE of the following emerging technologies.  Define the term.  What are the applications of this technology?  Give specific examples. Artificial Intelligence Internet of Things (IoT) Robotics

The Lifetime of a variable is the amount of time the variable resides in memory while the programme is running. life span run time time to live half life half life

Which file systems should you use if you have a 20 GByte disc volume and want a cluster size of 8 KByte (in order to avoid wasting space on the disc)?

use java Transcribed Image Text: Problem 1
1.
Reversing Strings. Write a recursive
function that computes the reverse of
a string.
Example Input Example Output
a
a
ab
ba
abcde
edcba

Transcribed Image Text: lek A=B= {,2,3347 and R={casbai a=b}
write MR and show that its equivalent of
hot
1
2 show by using lawof gte algebra of
proposítian. [iPA(99AK)]V (9Ar) V(ea)=r

Depending on your Web browser, you may be able to identify a cookie containing folder or file on your computer. Examine the folder or the file.Mention three websites that you’ve visited.

Transcribed Image Text: a. c. Consider the 5N, 3N and 2N vectors shown in the diagram below and determine
the magnitude and direction of their resultant.
5N
3N
30″
50°
2N

Loops module Java Question 3- Write a Java program to take input an postive integer n from user and print the sum of integers from 1 to n in the output.

Transcribed Image Text: In Android Studio create a layout as shown.
Requirements
1. ImageView without border
2. TextView
3. Button
4. Checkbox
5. RadioButton
6. Switch
TextView
BUTTON
CheckBox
RadioButton
Switch

source code for javafx connection with oracle database show code in fxml controller and jjava main class and please describe how u made the connection from beginning javafx connection to eclipse

q23- There are several different classes of malware, or malicious software. Briefly name and describe one class of malware, mentioning how it works and what harm it may cause. Malware- virus

Transcribed Image Text: Let Q(x, y) be the statement “x+y=x-y.” If the domain for both variables consists of all integers, what are the truth values of 3xQ(x, 2) ?
True
False

C++ Write a program which counts and displays the number of characters (including blanks) in its own source code file. [plz give correct answer i have to prepare for my exams..]

Provide all the differences of LINUX, SOLARIS , and MAC OS as operating systems in terms of the command line, graphical user interface and the type of numbers of processors supported.

Transcribed Image Text: list the peaks you would expect to see:
wavenumbers and corresponding functional
group for IR; shifts, splitting, and number of H
for 1H NMR; shifts for 13C NMR.

FOR JAVA Write a method that takes an integer array and returns the difference between the sum of even indexed elements and the sum of odd indexed elements in that array.

In Python language write a program in which user enters height in inches and program converts that height in foot. Print the height in feet. Given 1 foot = 12 inches.

Subtract the binary number 111010011 from the binary number 110010101 which integrates the binary number 2 using the (2’s complement) method, . Describe the steps of the process you have performed.

146. Telecommunications networks come in a wide range of speed and capacity capabilities. Select the best fit for answer: a. Extranets b. Switching alternating c. Bandwidth alternatives d. Inter organizational networks

Transcribed Image Text: A. Use Karnaugh map to reduce the Boolean expression:
F=A’BC + A’B’C+A’BC’ + AB’C + ABC
B. Draw the digital circuits for both the original and simplified expressions.

Consider the following scenario: you have several TCP connections on your workstation that are in the state FIN WAIT 1. What is most likely taking place? Whose fault is it, exactly?

Fast Transcribed Image Text: C program to compute the
sum of the two given integer
values. If the two values are
?
SI
WO
the same, then return triple
their sum

Transcribed Image Text: Some web application security flaws are caused by flaws in application logic which allow users who are not
supposed to do something to do that something.
True
False

3. The worst case occur in quick sort when the pivot is: A. the median of the array B. the middle element C. the smallest element D. None of the mentioned

With an acceptable heuristic, depth-first search always grows nodes by at least as much as A search. Is this statement correct or incorrect? Use just one phrase to explain your responses

A router receives a packet with destination address 205.12.48.91 Show how it finds the network and the subnetwork address to route the packet. Assume the number of subnetwork required is four.

Transcribed Image Text: 8.
Consider the following AVL tree; after deleting
(15), what is the left child of the node 24?
20
15
24
22
27
O 22
O 15
20

You began a programme by pressing F5 on the keyboard or clicking the Start Debugging button. When an exception is thrown, the application stops running and Visual Studio switches to mode.

Transcribed Image Text: 1. Show that the following language on E= {a, b, c} is not context free using pumping lemma
for context free languages.
L = {a”b°c*: k> n, k>j}

Explain what the GRANT declaration does and how it affects protection. What are the different types of privileges that may be obtained? What are the chances of them losing their licenses?

Create a Visual C# Form application as an artillery or missile game or simulation in 2D. Air resistance should be taken into consideration. The program should be constructed in object-oriented approach.

Given an integer n passed to the function as a parameter, write a python program to find the number of zeros at the end of the factorial of the number n.

Do you agree that “there is no concept of client and server sides of a communication session” for a P2P file-sharing application? Is there a good reason or a bad reason?

What are the problems associated with file systems? How do they challenge the types of information that can be created from the data as well as the accuracy of the information?

Overload the function call operator () (int i, int j) for the Trans class of Program 11-13 to return the string concatenation of all vector entries in positions i through j.

Instructions: Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. T F Graphics are animated sequences of images.

You’re on your PC at midnight and an electric storm pops up. What’s the best way to protect your PC. unplug the PC and remove phone line from the modem w

Explain how it is possible for an outsource vendor to achieve economies of scale that are not possible for the hiring organization. Does this phenomenon justify outsourcing? Why or why not?

Take input a string from user and then print the frequency of every character in the string. Given: String contains alphabets only. In C++ without using map and using an array.

Assume that the following main module is included in a programme that contains the binarySearch function demonstrated in this chapter. Why is the pseudocode in the main module failing to execute?

Compare the features of various software testing techniques. What is the influence of software testing on software quality? What types of test cases will you create for an ATM software system?

Is it true that a router routes packets to MAC addresses? If you answered yes, describe how; if you answered no, describe what gadget can accomplish that and how it works.

15)Which function enables the switch to automatically configure an interface for a straight-through or a crossover Ethernet cable connection.

a.
auto-MCIX .

b.
auto-MUDIX .

c.
auto-MADIX .

d.
auto-MDIX .

7 What PowerPoint feature you will use to apply motion effects to different objects of a slide? Select one: a. Slide Transition b. Animation Scheme c. Animation Object d. Slide Design

Transcribed Image Text: QUESTION 4
HBRCOA03: Analytics apps in organizations have the potential to be
O method of last resort
all of these
none of these
O supporting tool
strategic weapon

1. Recognize the differences between vulnerability, danger, and control. 2. Describe the significance of the main information systems that exist. What kind of protection tools [authentication and access control] are there?

Write program in Java language to take input two integer values x,y from user and print the value of log(x)+ log(y) in output. Given: Both x and y are positive integers.

Transcribed Image Text: Which of the following is used to hold each row processed from a cursor?
Answers:
scalar variable
a.
b. record variable
c. table variable
d. none of above

The ability of a controller of an object to revoke a subject’s designated access (to that object) is referred to as what? Rescind access. Release access. Change security level. Create object.

Operating Systems: In this section, we will discuss and explain the four memory allocation methods taught in the course. Practically speaking, which two of the four terms are most often employed?

80. Collection of useful working routines and programs that are only available to users with authorization is classified as a. directory library b. library package c. program library d. software library

Which among the following techniques an analyst also uses to acquire information from the user to perform requirement analysis ? a. Integration b. Joint Application Development c. Solution Design d. Testing

_______ conversion is the process of changing one of the characteristics of an analog signal based on the information in the digital data. a. Digital-to-analog b. Analog-to-analog c. Analog-to-digital d. Digital-to-digital

What is secret key cryptography, and how does it work? Please include a short explanation, such as how it worked in the past. How is it working for you right now?

Which of the basic data structures is the most suitable if you need to access its elements by their positions in time?

A. Array
B. Queue
C. Linked list
D. Stack

86. Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine? a. POP3 b. IMAP c. SMTP d. DMSP

We need to send 265 kbps over a noiseless channel with a bandwidth of 20 kHz. How many signal levels do we need? a. 1024 b. 512 c. 256 d. 128

Please help me with this question it is trickey. Write a program to find all even numbers between 100 and 400. The number obtained should be printed in comma seperated sequeance

Identify two strengths and weaknesses for the following. Product and Geographical Org Chart erarchical Org Chart Flat Org Chart Holacracy Org Chart Matrix Org Chart Tribes and Squads Functional Org Chart

Question 15 The amplitude shift keying is based on a digital carrier. a sophisticated digital modulation technique. is based on the frequency modulation of a digital carrier. none of the preceding

START ITEM A ACTIVITIES B C D E F G END ITEM H Prepare your own Network Diagram in order to reach the end item. Explain how you reach Item H.

Indicate which of the following two declarations are valid or invalid. If invalid, give reason. int primes = {2, 3, 4, 5, 7, 11}; float elapsedTimes[] = {11.47, 12.04, 11.72, 13.88};

(Q.17) Consider this functional dependencies {AB->C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

i need the answer quickly Transcribed Image Text: write a program c ++ input
hours to find day and
months and years… use
function with arguments
passed and no return value

Consider the Markov chain with three states,S={1,2,3}, that has the following transition matrix P= Draw the state transition diagram for this chain. If we know P(X1=1) =P(X1=2) =1/4, find P(X1=3, X2=2,X3=1)

Transcribed Image Text: What value will be stored in the variable d after each of the following statements executes?
For Blank 3
1. d=(1<12); 2. d=(2>0);
3. d=(5==(3*2));
4. d =(5==5);

184. The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as: a. modulation b. demodulation c. synchronizing d. digitising

class main { publicstaticvoid main(String args[]) { int var1 =5; int var2 =6; if((var2 =1)== var1) System.out.print(var2); else System.out.print(++var2); } } Give result for the code Java Try to do ASAP

Provide a list of the security measures that you would consider adopting in order to defend against the specific data loss and data theft risks that you have identified. check circle

Show the steps to convert 326.14 to binary and octal numbers. Also show the steps in shortcut method to convert the same number from binary to octal and hexadecimal to octal.

class Output { public static void main(String args[]) { Integer i = new Integer(557); float x = i.floatValue(); System.out.print(x); } } What will the given code prints on the output screen.

EEE has defined the specifications for a wireless LAN, called _______, which covers the physical and data link layers. a. IEEE 802.3 b. IEEE 802.5 c. IEEE 802.11 d. IEEE 802.2

The word expensive means costing a lot. Identify the best criticism for the definiens.
A. Being circular
B. Being vague
C. Being ambiguous.
D. Failing to indicate the context of definiens

Write a Phyton program that will enter 10 numbers from 20 to 30. If the number is even, it should be stored in List1 else it should be stored in List2.

Transcribed Image Text: If we have a subnet address as 212.10.22.0/24, how many
hosts could we have in this subnet at most?
A 1024
B 256
C 512
D 128
2.

(Q.17) Consider this functional dependencies {AB->C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

Transcribed Image Text: In PUSH instruction, after each execution of the instruction, the stack
pointer is
incremented by 1
decremented by 1 O
incremented by 2 O
decremented by 2 O

vertically passes through a stack of platters Transcribed Image Text: vertically passes through a stack of platters
Select one:
O a. Cylinder
O b. Platter
O c. Sector
O d. Tracks

13 In excel,the option to move the text automatically to next line is. Select one: a. Bold and Italic b. Merge and center c. Wrap text d. None of the above

Transcribed Image Text: How do you initialize an
array in C?
a.
int arr[3] = (1,2,3);
b. int arr(3) = {1,2,3};
C.
int arr(3) = [1,2,3];
Od. int arr[3] = {1,2,3};

I need the answer as soon as possible Transcribed Image Text: to divide all elements of the matrix B by 4
we write this code : >> B/4
False O
true

In a few words, describe IPSec. What are the advantages and disadvantages of putting security at the network layer rather than the application or transport layers, and how do they compare?

261. The minimum bandwidth of the digital signal is nb times greater than the bandwidth of the a. analog signal b. digital data c. analog data d. None of the above

A channel has a 1-MHz bandwidth. The SNR for this channel is 63. What is the appropriate bit rate? a. 4 Mbps b. 6 Mbps c. 8 Mbps d. 12 Mbps

Transcribed Image Text: Find the recurrence relation and solve it using back substitution and master theorem
Votd Pracice Clnt n)
if (n>i)
for Ci=0; ?2n;ït+)
stmt ;
Practice (Y2);
Practice (n);

Consider a B-Tree with order as 3. Which of the following will be the correct B-tree for the given key value sequence? 12, 13, 7, 16, 19, 20, 25, 3, 6

For a P2P file-sharing program, would you agree with this statement: “There is no concept of client and server sides of a communication session”? What are your reasons for or against?

Distinguish between social engineering and hacking; and elaborate at least five (5) activities that amount to hacking. Furthermore, discuss at least five (5) types of information hackers are always looking for.

What is the output of the below java program:- class Test { public static void main (String args[]) { System.out.println(10 * 20 + “Javatpoint”); System.out.println(“Javatpoint” + 10 * 20); } }

Dear expert need correct Answer if any wrong i will down vote Sub :- cse (dld) De – Morgan’s theoram:- Transcribed Image Text: (9) AB = ? +B
(f) A+B
A-B.

Transcribed Image Text: Part3:
Write a method to compute the following series:
Write a test program that displays the following table:
i
Sum(i)
1
0.5000
1.1667

19
16.4023
20
17.3546

I need the answer as soon as possible Transcribed Image Text: T(n) = T(n-1)+O(n) is eval
method to:
a) O(n)
b) O(n )
c) 0(2)
d) O(n )
b
a
d

423. Concurrent processing of a fixed number of jobs is called a. Multiprogramming with concurrent jobs b. Multiprogramming with parallel jobs c. Multiprogramming with variable jobs d. Multiprogramming with fixed jobs

Why are there so many different ways to get user response, such as nextDouble()? Explain why and when you would choose to utilize one technique over the other and provide examples.

WAP to take Input a string and an integer. You have to find whether the entered integer is equal to the string length or not. Print “Yes” or “No”. In C++

Answer only if you are 100% sure . Correct and detailed answer will be Upvoted else downvoted. Thank you! I want  good explanation with Algorithm Transcribed Image Text: Describe Maekawa’s algorithm.

Write a program in C++ that will print largest and the second largest elements of an array. Arraysize will be 10 and the input will be taken from user.(using c++ only)

Given a string as parameter to a function, write a program to replace all lowercase alphabets in the string by ‘*’ and display the string in output. Write program in C++.

42. Multimedia systems require _________ scheduling to ensure critical tasks will be serviced within timing deadlines. a. soft real time b. hard real time c. normal d. none of the mentioned

: Write a Bash script to output the following sequence using any of the loops. * *             *             * *             *             *             *             * *             *             *             *             *            *             *

Transcribed Image Text: Q1) Write a program to find the largest
of 30 (8-bit) numbers stored at
memory locations starting at offset
100H, and store result at memory,
assume DS= 3000H?

What is the system development life cycle phase breakdown? (SDLC) Think about five main types of systems development tasks. Outline tasks necessary for defining, setting requirements, designing, and implementing the solution.

Show that if f(x) and g(x) are functions from the set of real numbers to the set of real numbers, then f(x) is O(g(x)) if and only if g(x) is ?(f(x)).

157. Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose? a. Fax b. Modem c. Scanner d. Keyboard

In python how to use map to convert strings in int new_statements = [‘False’, ‘Mostly False’, ‘Pants on Fire!’,’Mostly True’, ‘True’] output should be like this: [0, 0, 0, 1, 1]

Transcribed Image Text: 6. List the output of Di and Bo
1
1
0 0
Bin
Di
?
1
FS
B
??
B –
Bin)
h 8 s e d cba

We must be concerned about what impact cloud computing will have on our society. Is there a succinct way to sum up computers and their history? More importantly, it is secure.

Evaluate the use of project management software to enhance project cost Page 2 of 3 management.Evaluate the use of project management software to enhance project cost Page 2 of 3 management.

176. Waterfall model phase which acknowledged that software is delivered to customer who evaluates delivered product and provides feedback based on evaluation is a. deployment b. construction c. planning d. maintenance

In this world of fast changing computer technology, one of the most important factor to be considered while purchasing a PC is, it should have a provision for  self upgradability why?

Describe the unique threats to a data centre posed by disgruntled employees. Describe how you would identify such people, if possible, and how you would protect your system from these threats.

Does the class PrintWriter have a constructor that accepts a string (for a file name) as an argument, so that the following code would be legal? PrintWriter outputStream = new PrintWriter(“stuff.txt”);

Can someone help me explain how ETL strategy is used when Implementing data from a Source Database to a Data Warehouse ? Probably better with a process flow . Thank you.

c++ If you pass a variable by ________________ to a function, the function will have access to the parameter’s original argument.  Changes to the parameter are also made to the argument.

1.WHICH OF THE FOLLOWING MEMORY ALLOCATION TYPES ALLOCATES THE SAME AMOUNT OF MEMORY AS THE PROCESS SIZE? Choose one: a.PARTITION OF EQUAL SIZE d.UNEQUAL-SIZED PARTITION b.BUDDY SYSTEM c.DYNAMIC PARTITION d.UNEQUAL-SIZED PARTITION

I need the answer as soon as possible Transcribed Image Text: Convert the following RDF code to graph




Kex:ingredient rdf:resource=”http://example.org/greenMango”/>
1lb

Semantics web

24. If a system is 64 bit machine , then the length of each word will be ____ . a. 4 bytes b. 8 bytes c. 16 bytes d. 12 bytes

Write a program to read a file and print that in haskell language on console. You should maintain like if any blank line in file then it must be on console.

In python Write a program to take input from user and check the number is even or not if even then print wow it’s even else print aww this is odd

The arrival time for processes A,B,C and D is 0,2,4, and 5 while the required CPU burst time is 7,4,1 and 4 respectively. Using SRTN, what is the average waiting time?

In order to ensure that Software Assurance is secure, several security standards must be followed: The following are some of the key principles: Explain A. Unlocking security systems requires two keys

Write a program in c language to check whether the user entered number is of even type or odd type and print according to that. The input is of integer type

Transcribed Image Text: 1. In operating system, each process has its own
a. address space and global variables
b. open files
c. All of the mentioned
d. None of the above

It is claimed that, despite the challenges, engaging with and utilising Big Data is crucial for driving organisational value and competitive advantage. Critically evaluate the role of Big Data in organisations.

Microprocessor Transcribed Image Text: ?-
1- What is segmentation? What are its advantages? How is segmentation implemented in
typical microprocessors?
2- What is the difference between near call and far call?

Which Windows tool can you use to install the drivers needed so that a user can open a data file using an application that is normally not used with the file?

Which of the following methods is a method of wrapper Integer for obtaining hash code for the invoking object? a) int hash() b) int hashcode() c) int hashCode() d) Integer hashcode()

Give an example of how process modeling may be helpful for any project, not just IT system development. To what extent is logical process modeling utilized in thorough systems requirements analysis?

Two transport-layer protocols may be used by certain application applications (UDP or TCP). How does a computer determine which transport layer is engaged after a packet has arrived at its destination?

Please do fast in 8085. Handwritten please. Transcribed Image Text: Statement :
Write a program to shift an eight bit data four bits right. Assume that data is
in register C.

Transcribed Image Text: Façade Pattern hides its complexity by making it into simple interface
Select one:
O True
O False
Next p
dterm Exam
Jump to…
Chapter 1 (Introduction)
-3 S1

S/w testing methodology Transcribed Image Text: Using reduction procedure convert flowgraph whose links are labeled into a path expression.
Explain each step with flowgraph as shown in figure.
d.
m
Figure

I am beginner in julia language . Can you help me to print this string “julia is developed by MIT, for distrubted parallel execution, mathematical precision”. Code and output are necessary

Elaborate on whether using a waterfall strategy is appropriate to the project by examining the pros and cons of the waterfall methodology in relation to the project described in the article.

What are Real numbers? What method you use to find the common elements of the two groups of numbers? Can you identify specific element of prime, composite, integers and natural numbers?

Educate these stakeholders on the advantages of utilizing a spreadsheet solution and how simple it was to process data in order to generate the information provided in the report in Excel

Can you please clarify the distinctions between Trojan Horse, computer virus, and worm? Thanks. Which kinds of viruses are known to use methods that are particularly intended to avoid being detected?

How to reading information from file to parallel arrays ,by using c programming,then do a calcaulation in parallel array, can you write a comment to understand what you do? Thank you

Design a combinational circuit with three inputs and one output. (a) The output is 1 when the binary value of the inputs is less than B. The output is 0 otherwise.

Write a C++ function to find nth term of sequence given below, n is passed as argument to the function and function prints the nth term in output. Sequence: 1,4,9,16,25,……..n 2

Transcribed Image Text: Q1. Construct Turing Machines for the given regular expressions.
i.
b (aa + ab’) + (abb’)* + Ã
Answer:
ii.
(a’bbb)’ a’ + (aa)” (X + a)
Answer:

PS:Please type instead of paper writing 5) Find the minterms of the following Boolean expressions by first plotting each function in a K-map correctly: C?D + ABC? + ABD? + A?B?D

I need the answer as soon as possible Transcribed Image Text: Use the algorithm
04X Draw flowchart and algorithm to find value of
Y-(a-x1)(x2-x1) if xl<0 and y= ((xl-a)(x2-x1) if xl>0

consider the following message M = 1010001101. Calculate the cyclic redundancy check (CRC) for this message using the divisor polynomial 11011. Recompute the CRC at receiver side to verify your answer.

55. The simplest way of remove deadlock from the system is to … a. preempt a resource b. rollback c. kill one of the processes d. lock one of the processes

What is internal processor memory, and what are some of its features, as shown by examples? What is secondary memory, and what are some of its features, as shown by examples?

Consider the registration system at a university. The system will manage student registration for the university’s numerous courses as well as examinations. Determine the hazards that such a software system entails.

Transcribed Image Text: Shortest Job First Preemptive Scheduling is also known as:
a. P: Shortest remaining Time(SRT)
b. Q: Shortest Next Time(SNT)
OC. Both P &Q
d. None of the above

What will be the output of the following Java program? class Output { public static void main(String args[]) { Double i = new Double(257.5); Double x = i.MAX_VALUE; System.out.print(x); } }

Java Transcribed Image Text: Write the output of the following code.
String proverb =”Java has lambda expressions”;
System.out.println(proverb.charAt(10));
O a. a
O b. s
C. u
? ?.u
O d. e

A router receives a packet with destination address 205.12.48.91 Show how it finds the network and the subnetwork address to route the packet. Assume the number of subnetwork required is four.

Consider the array : char arr[5]; If address of arr is 100 then what will be the address of arr[4]. Given each char occupies 1 byte in a byte addressable system.

I need the answer as soon as possible Transcribed Image Text: on te
Q3: A: Write a program in visual Basic language to calculate the following arithmetic formula.
5.6
4 100

Transcribed Image Text: Write a java program to take the last 3
characters from the given string and add the
three characters at both the front and back
of the string.

Transcribed Image Text: Compare and contrast germany and the USA
for – Strong vs Weak Uncertainty Avoidance.
Identify at least TWO differences or
similarities. Refer to the Hofstede Compare
Countries website.

In order to be successful and appealing to users, Linux has a number of essential features. Name five (5) of these features and describe them in your own words. Thank you.

c programming – solve with function  please Code The function named “odd_ even” to find out whether the integer sent into it is odd or even and prints to the screen.

I need the answer as soon as possible Transcribed Image Text: T(n) = T(n-1)+O(n) is eval
method to:
a) O(n)
b) O(n )
c) 0(2)
d) O(n )
b
a
d

i need the answer quickly Transcribed Image Text: 1- Show the design of BCD to 7- segment convertor to display (A, b.C.d. E.F.G.H.
1, J) characters using decoders of 2-selectors only.

Write a short essay on how you can utilize and effects of the use of technology in yourself, your community, and the relation to others and with the environment you live.

Q1: write a C++ program to find by using function. Transcribed Image Text: A
y = X + +
xn
Ql: write a C++ program to find
by using function.
LLLLLLLL

Write a method called manipulate-2-Dim that receives a two-dim array of integer numbers called a matrix. The method should return the sum of elements in the even rows of the array.

Need help with this question. Thank you 🙂 Transcribed Image Text: Write all the words of length s 5 that belong to the language represented by the regular expression ((aaa*)u(bbb))*
Answer:

Have you used top-down design principles before? If so, in what context. Write about at least one example of top-down design and how it makes a project manageable for a team.

Java Transcribed Image Text: What is the output of the following code?
double x=0.5,y=-1.5,z=3.5;
boolean result;
result=x>yl|| y brackets. Write the marked message to a new text file

Write a program to convert the string to integer and  you cannot use parseint method. For checking the string is converted into into you have to  add 10 to the result.

Define buffer overflow. Describe how a stack buffer overflow attack is implemented. List and briefly describe some of the defenses against buffer overflows that can be used when compiling new programs.

Networks where end user workstations are tied to LAN servers to share resources and application processing. a. Client/Server networks b. Internetworked enterprise c. Information super highway d. Business applications of telecommunications

Create a script in python to generate a comparison report that reads at least 3 text files and then create a new folder with each of the differences listed in it.

Policies and standards are considered tools of governance and management, respectively, and procedures and guidelines the purview of operations. Briefly explain IT policies, standards, Procedures and guidelines to a non-IT student.

Multiple software’s installed on the system of Linux are difficult to maintain with its latest updates and version control, which feature or utility of Linux can help in solving this problem.

Transcribed Image Text: What is wrong with the following
program?
1
int main ( )
2
{
int a,b,c,sum;
4
sum 3D a + b + ?;
return 0;
6.
}

A modem that is attached to the telephone system by jamming the phone’s handset into two flexible receptacles in the coupler? a. bridge b. gateway c. acoustic coupler d. time-division multiplexer

Explain how do you balance between complexity and simplicity from the perspective of the ERP software vendor and a manufacturer: from the view of a consultant advising on an ERP implementation

Write a C program to find the first repeated alphabet in a given string. Sample Input : Input a string: hello world Sample Output : The first repeated character is: o

Transcribed Image Text: Write a JS script that is to invoke a pop-up when a hyperlink is clicked.
For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).
BIUS
Paragraph
Arial
14px

1.WHICH OF THE FOLLOWING MEMORY ALLOCATION TYPES ALLOCATES THE SAME AMOUNT OF MEMORY AS THE PROCESS SIZE? Choose one: a.PARTITION OF EQUAL SIZE d.UNEQUAL-SIZED PARTITION b.BUDDY SYSTEM c.DYNAMIC PARTITION d.UNEQUAL-SIZED PARTITION

Transcribed Image Text: :Single inheritance means
one class inheriting from one super classes
more classes inheriting from one super class
more classes inheriting from more super classes
None of the above

i need the answer quickly Transcribed Image Text: Which of the following is not assignment operator?
Select one:
of
O a. =
O b. ==
O c. +=
O d. %=

40.Which of the following is a communication protocol that uses a three-byte frame that travels around a logical ring of workstation or servers? a.Frame ring b. CSMA/CA c. CSMA/CD d.token ring

Please solve Quickly ?++ Transcribed Image Text: What is the output of the C Code?
int x:
x=(3<2) ? 10:20; printf("%d",x); ?. 10 o b. 20 O C. 2 d. 3 You typically use comments in a Java application to a. describe code that is difficult to understand b. separate blocks of code c. provide user instructions d. none of the above Artificial Intelligence Transcribed Image Text: Path from A to G using ucs B C A E D. 2 F O ADFG O ADEF O All of above O None of above 170. The management information system (MIS) structure with one main computer system is called a a. erarchical MIS structure b. Distributed MIS structure c. Centralized MIS structure d. Decentralized MIS structure Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address? a. Hub b. Switch c. Gateway d. Modem What will be printed in output ? main() { int i = 2; { int i = 4, j = 5; printf(“%d %d”, i, j); } printf(“%d %d”, i, j); } What are the risks of having an all-encompassing security architecture in place? What are the reasons preventing such infrastructure from being built? What options do we have to the present situation? Transcribed Image Text: 4. Sketch the Q output waveform for an SR latch if its inputs are changed as given in the Figure below. R. Cayright A Eer A ig e What is the obvious lower bound to the problem of finding the median value of a given n-element sequence of integers? Is this obvious lower bound a TIGHT lower bound, why? A router receives a packet with destination address 205.12.48.91 Show how it finds the network and the subnetwork address to route the packet. Assume the number of subnetwork required is four. What are the main differences between computer architecture and computer organization? The CPU, hard disk, and RAM are just a few examples of the numerous components that make up a computer. To make it easier for your users to run an executable JAR file for a console application, you can create a script that uses the ____________ command to start the application. mov al,[di+02h] cmp [si+02h],al jne NZ inc si dec di loop P2 Plz describe all the lines. which line works how. it is a part of assembly language code (8086 microprocessor). Transcribed Image Text: Employee name -id. Salary input C) Outputc) Sales Engianer -marketing Commission.cate Overtime Outputc) tatal-Salay () input() output.() tatel-Sglory() Where tobal.salady Salag+(marketing Comissim.cate). wheres total-Salacy= Salary Covertima ovedine ate), Q7: Based on the Survey Report of ‘Best Training Practices within the Software Engineering Industry’ explain the Executive Summary, Background and Enablers of the Company A, Company B, and Company C. Asap Transcribed Image Text: A. Write a C++ program to find and print the value of Z using if statement. X3+² X =-1 Z = ?X/5 X = 1 otherwise 8. Course: TCP IP Programming Consider the scenario:  user wants to send secured data via web server and web browser. For what kind of layered technology he needs to use. Explain it. 4 Transcribed Image Text: If myList is initially empty, what sequence of comments creates the list [75, 76, 68]? myList.Insert(68,0) myList.Insert(75,0) myList.Insert(76,0) myList.Insert(76,0) myList.Insert(75,0) myList.Insert(68,0) myList.Insert(68,1) myList.Insert(75,0) myList.Insert(76,2) myList.Insert(68,0) myList.Insert(75,0) myList.Insert(76,1) I am doing a research in astrophysics. I need to deproject the galaxy images to face-on orientation. Please give me a Python code to get the face-on orientation of the images. 64. ________ is normally referred to as mB/nB coding; it replaces each m-bit group with an n-bit group. a. Block coding b. Line coding c. Scrambling d. None of the above For a P2P file-sharing program, would you agree with this statement: “There is no concept of client and server sides of a communication session”? What are your reasons for or against? 156. What is the name of the device that converts computer output into a form that can be transmitted over a telephone line? a. Modem b. Teleport c. Multiplexer d. Concentrator The type of encoding in which manipulation of bit streams without regard to what the bits mean is ………………… a. Destination encoding b. Entropy encoding c. Source encoding d. Differential encoding Explain in detail about concept of pipelining and state the pipeline stages elaborately with neat diagram . Discuss about delay that occurs in clock cycles. Draw the hardware organization of pipeline In light of the importance of excellent design, explain any five aspects of successful interface design and create an interface in accordance with the five points you provide in your discussion. If the node at which we started is the same as the node on which we ended, then the path is, by definition, a closed path or a loop. True False Assume in the below statements that any capital, single letter (e.g. A,B,C) represents a predicate. Show the following are equivalent (or not!): 1) ~ P AND (==>Q) and ~(Q => P)

In Python: Which of the following set methods removes an element, but does NOT raise an exception if the element is not found? discard( ) remove( ) delete( ) erase( )

Hello , i’m stuck on an assignment . this is the question : Write a conditional that assigns True to fever if temperature is greater than 98.6 . I wrote fever=temperature>98.6

Is there a method that someone like Peter can use to avoid forgetting his or her password that is safe to use, apart from key recovery, to prevent this from happening?

Using Matlab, A=[1 2 3;4 5 6;7 8 10]; a)Create a vector version of the original matrix A. b)Extract those entries of the original matrix A that are greater than 5

Transcribed Image Text: Specifying which font to be substitution is called Font Styles
True
False Transcribed Image Text: Text is probably the most common form of information delivery
True O
False

I need the answer as soon as possible Transcribed Image Text: 25. Which of the following are examples of
non-functional requirements [Multiple
Answers]
Usability Requirements
Programming language
Process standards
Execution speed

Technology is changing at a rapid pace and more change is a certainty. Discuss any five (5) trends in computer or communication that reflects on the direction computer development is heading.

18. This keyword will stop the execution of more code and case testing inside the block. break continue None of the Choices default Give an explanation for the answer. Thank you

Using the brainstorming methods come up with three topics might like to deal with in an upcoming speech. For each topic, devise a specific purpose statement suitable for the speech assignment.

(Q.17) Consider this functional dependencies {AB->C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

Transcribed Image Text: Complete the following PHP code to establish session data for the three given values :
$stfC=’D@3′; // the staff code
$stfN=”Ahmed Al-Shahri”; // staff name
$stfT=’D’;//’D’ means Dean

Question 29: Consider a system with four low-bit-rate sources of 20 kbit/sec, 30 kbit/sec, 40 kbit/sec, and 60 kbit/sec. Determine the slot assignments when the data streams are combined using TDM.

Describe the dos and don’ts for protecting personal information online. What are the dangers posed by using a single password? Why keep personal and professional contacts separate in social media sites?

a)Describe the undefined or race condition of SR latch with an example circuit. b)ImplementF(A, B, C) = ?M(1,3,5,6) using one 2-to-1 line mux and logic gates. Drawtruth table and logic diagram

1. Recognize the differences between vulnerability, danger, and control. 2. Describe the significance of the main information systems that exist. What kind of protection tools [authentication and access control] are there?

Transcribed Image Text: This flag is used by the instructions that perform BCD (binary
.coded decimal) arithmetic
Carry Flag O
Parity Flag O
Auxiliary Carry Flag O
the Direction Flag O

C# Transcribed Image Text: What will the following program segments display?
(1) x = 2;
y = X++;
Console.Writeline ($”{x} {y}”);
(2) x = 2;
%3D
y = ++X;
Console.Writeline($”{x} {y}”);

None Transcribed Image Text: 30. int a[5] = {1,2,3}
What is the value of a[4]?
A. O 3
B. O 1
C. O 2
D. O 0
E. O Garbage Value

Compare the features of various software testing techniques. What is the influence of software testing on software quality? What types of test cases will you create for an ATM software system?

The Lifetime of a variable is the amount of time the variable resides in memory while the programme is running. life span run time time to live half life half life

(Q.17) Consider this functional dependencies {AB->C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

Descriptive Analytical Question: Q.No. 4: In relation to MIS, describe each of the following applications and evaluate their benfits? Supply Chain Management System b. Database Management System details answer avoide pligirisim

Which Windows tool can you use to install the drivers needed so that a user can open a data file using an application that is normally not used with the file?

Transcribed Image Text: Given the following code, what is the final value of variable i?
int i;
for ( i=0 ; i <= 4 ; i++ ) { printf("i is:\n", i); Note:- Please need a full explanation for this question in your own words. Please do not copy and paste from somewhere else. Transcribed Image Text: Explain and compare .data and .text. Write a method named isEven that accepts an int argument. The method should return true if the argument is even, or false otherwise. Also write a program to test your method. Would you agree with the following statement about a P2P file-sharing application: “There is no concept of client and server sides of a communication session” Why do you think that’s so? Write a program in java to check how many times punctuation is present in a string and you have to take the string from user and print the result in last. In matlab Calculate the sum 1-1/3+1/9-1/27+1/38 by using a while-loop 1) let the loop stop when the terms are smaller than 10 -6 2) what value does the series converge to? Discuss the significance of identifying and defending against system or software vulnerabilities after reading the CVE site. Also, talk about how hackers use system and software flaws to launch an attack. Write a method called manipulate-2-Dim that receives a two-dim array of integer numbers called a matrix. The method should return the sum of elements in the even rows of the array. Describe the viewpoints of different software engineering researchers on what constitutes high quality software. describe the variables that have an impact on software quality and provide a short explanation of each create flowchart that will arrange the value of A, b and c assending order  where a gets the lowest value c gets the highest value  the value of a=15 b=10 c=20 Transcribed Image Text: To build a System Sequence Diagram there are several steps. List and explain in your own words these steps. it of A – ? I ? ?? !!! What is the correct answer Transcribed Image Text: Which among the following may represent the behavior of a student object? a. Marks O b. Drop Course c. Level O d. Name Which Windows tool can you use to install the drivers needed so that a user can open a data file using an application that is normally not used with the file? Transcribed Image Text: Write a recursive method called add(int n). This method adds the integers from 0 to some value n. For example, the call to add(4) would return 10 (4+3+2+1=10). Given a character. Your task is to check whether the given character is lying I’m range of alphabet or not. In kotlin You have to handle the upper case letters also Q1: write a C++ program to find by using function. Transcribed Image Text: A y = X + + xn Ql: write a C++ program to find by using function. LLLLLLLL In a function file, the input() function – to gather user input from the command window – should essentially never be used. In Matlab Explain that statement, and support your reasoning. Will the following C code set the value of integer variable “a” to 3? True or False int a; int *p; int **q = &p; *q = &a; **q = 3; Write a program in java to check how many times punctuation is present in a string and you have to take the string from user and print the result in last. System development can be done in a variety of ways, including Agile, XP, JAD, and RUP. Choose any two that you believe are the best for your situation and explain why. Transcribed Image Text: What is the size of the following array declaration? char[] N = {‘A’, ‘E’, ‘I’, ‘O’, ‘U’}; ?. 4 b. 6 O c. No size O d. 5 assign true to the variable has_dups if the string s1 has any duplicate character(that is if any character appears more than once) and assigns false otherwise. using loop statements and python Transcribed Image Text: SIM card is protected by using O International Mobile Subscriber Identity (IMSI) O Mobile Subscription Identification Number (MSIN) O Personal Identification Number (PIN) O Mobile Identification Number (MIN) Meet attached Transcribed Image Text: Discuss the networking factor(s) which positively affect your Google Meet connection during the live online lecture sessions, and what could be done to make it/them better. What is the Relative Frequency for the data x=3 given in the frequency table below: X f 2 5 3 2 4 4 5 3 6 3 7 3 8 5 ke ot o weger w ond pud e § Ji gresten fhen S W Transcribed Image Text: Take infut a integen and frunt number I digits greater thom s im it- Transcribed Image Text: – For the given IP address 128.168.0.1/20, calculate the Subnet mask, Network address, total number of host addresses possible in the network and possible range of host addresses? Transcribed Image Text: Suppose the following Hamming codes were created using even parity, determine if the code is correct or not. If not correct, find the correct Hamming code. b.) 101110001100 Give an example of how process modeling may be helpful for any project, not just IT system development. To what extent is logical process modeling utilized in thorough systems requirements analysis? C++ Transcribed Image Text: Question 4 1 Point What is the output of below C++ Code:- for(int i-2;i<-3;i++) for(int j-ij<=3:j++) cout<> Picture menu Select one: a. Clipart, From File, Shapes b. Clipart, Pictures, Shapes c. Clipart, From Files, AutoShapes d. Clipart, Pictures, AutoShapes

158. If the high level data manipulation language is used in standalone interface manner then this language is considered as a. host language b. sublanguage c. query language d. scheming language

I need the answer as soon as possible Transcribed Image Text: 23. Software Engineering involves: *
Using theories and methods to solve problems
Development process
Project management
All of the above

Using Java, Write a program with a method named getTotal that accepts two integers as an argument and return its sum. Call this method from main( ) and print the results.

Transcribed Image Text: After the execution of the following program the content of the
working register is.11H:
MOVLW OH
ADDLW 8H
ADDLW 9H
Select one:
O True
O False
search
DELL

I need the answer as soon as possible Transcribed Image Text: Riders to the Sea is a good representative
…. ….
Irish drama
English Drama
All of the options
Tragic Drama

Transcribed Image Text: (Yes/No). Would the following be considered a violation of user access agreement?
Visiting social networking sites during lunch breaks.
Question 15 options:
A) Yes
B) No
C) Maybe

i need the answer quickly Transcribed Image Text: 9. Write a near procedure that cubes the contents of the CX register. This
procedure may not affect any register except CX.
10

Transcribed Image Text: Which of the following is a member of the language given by the regular expression below?, where e
denotes the empty string.
(101U€U00) (111)*
00111
11101
0111111
101

You should go into more depth in terms of specifics, examples, and assistance when you’re talking about the security considerations that you would think about when outsourcing data to the cloud

Hello Expert! Write a C++ program in which a character variable ch is taken input from the user and it’s ASCII value is printed in the output. Please do it asap.

Using the EMP_2 table, write a single SQL command to change the EMP_PCT value to 5.00 for the people with employee numbers 101, 105, and 107 (hint: use the IN keyword).

Discuss five (5) computer security assaults that have occurred both within and outside of a business, as well as related mitigation methods that have been proposed to minimize the security concerns.

Given a string as parameter to a function, write a program to replace all lowercase alphabets in the string by ‘*’ and display the string in output. Write program in C++.

Q-2 Suppose that you pick a bit string from the set of all bit strings of length ten. What is the probability that the bit string has more 0s than 1s?

27

From a user perspective, having a single point of access to various information and service offerings is convenient and rises the user’s search effort.
Select one:
a. False
b. True

Write a Java program that computes how high the ball will be above the ground after x seconds in the above example? Where x is an input provided by the user.

Transcribed Image Text: Which of the following is a correct parameter passing?

O

O

135. In client -? server architecture, the system which consists of software’s and peripheral devices for archiving, printing and accessing files is called a. server b. host c. module d. client

Transcribed Image Text: If we have to write the calculations, for example +, -,
or divide, in flowcharts, the “box name” that we
use to represent these calculation is called
box.

The ability of a controller of an object to revoke a subject’s designated access (to that object) is referred to as what? Rescind access. Release access. Change security level. Create object.

Construct a single Python expression which evaluates to the following values, and incorporates the specified operations in each case (executed in any order). c) Output value: ‘100% pythonic’Required operations: f-string /

Do not copy paste from other websites. Write your own answer. Thank you! Q. What tool do we use to check whether an authenticated user has permission to read a file?

Why do we need to configure a layer 2 switch with a default gateway address, in addition, to configuring one of its SVI with an IP address and a subnet mask

MATLAB In this time the square is given in which circle is fitted .find the area of square and take the radius of circle from user. i want code with output

ETL functions in a data warehouse are the most important, challenging, time-consuming, and labor-intensive processes. Define and expound on the six different but important processes involved in the extraction-Transformation-Loading (ETL) process

Describe the I/O subsystem in detail. Describe how various input and output devices operate, including what they transmit and receive, what they input and output, and how they may be linked.

Transcribed Image Text: Which of the following sorting algorithms can be used to sort a random
linked list with minimum time complexity?
Insertion Sort
Quick Sort
Heap Sort
O Merge Sort

A thread is a______ : lightweight process where the context switching is low lightweight process where the context switching is high is used to speed up paging None of The Above

Short notes inserted in various areas of a programme that describe how certain elements of the programme function are referred to as. remarks manuals of reference demonstrations documentation from other sources

Given a string as parameter to a function, write a program to replace all lowercase alphabets in the string by ‘*’ and display the string in output. Write program in C++.

Transcribed Image Text: General Instructions: Construct the truth table of the following given compound propositions.
Show your complete solutions.
3. ( ? @ ?) ? ((AvB ?T) ? (?> ??? ))

Consider and discuss the following statement, “Tablets are computers”, giving clear arguments and justification “for” or against Formulate your discussion points/posting in 400 – 600 words based on the above question

When an application written for Windows XP does not work in Windows 7, which tool should you attempt to use first to solve the problem, Compatibility Mode or XP Mode? Why?

Transcribed Image Text: Examine the following C++ code and determine the output.
int x:
x – 7.5 + static_cast (7.4)/2;
cout << x; a. None of these Ob10 Oc 102 Od9 Write two process communicating sysem with Signals. In your system, Process_A writes to chat.txt and waits the Process_B to read it. Than Process_B writes to chat.txt and waits Process_A to read.. Step count need Transcribed Image Text: (b) What do you mean by performance analysis? Glve the algorithm for matrix multiplication and find the time complexity of the algorithm using step-count method. Contrast the waterfall process model with a cross functional team (working in short development bursts to frequently deliver full product increments). Describe the COVID-19 process model in detail using several diagrams. Transcribed Image Text: ?????? ????????? ??????????? ?????? Functional requirements capture the intended behavior of the system. Select one: O a. True O b. False means that requirements should not have con Can you please clarify the distinctions between Trojan Horse, computer virus, and worm? Thanks. Which kinds of viruses are known to use methods that are particularly intended to avoid being detected? 7- Which of the following shows correct way to set a text responsive? a. p {font-size: 100%;} b. p {font-size:20 px; responsive;} c. p {font-size: 20 vw;} d. p {font-size: auto;} 152. Which one of the following is not an application layer protocol used in internet? a. remote procedure call b. internet relay chat c. resource reservation protocol d. File Transfer Protocol Consider a 64-bit word-based four-way set associative cache. The number of words each line is 8, and the total number of sets is 4096. What is the size of the cache? Transcribed Image Text: The transfer function of a Causal DZD system is given below. Impulse of DZD system Calculate the answer. 0.3 + 0.4z H(z) 1 – 0.2123z-1 + 0.0225z | Transcribed Image Text: Question 21 It is possible for different keys to hash to the same array location. This is called as O Initialization O olision O Folding O Load factor Transcribed Image Text: Implement the following Boolean function with a (4 X 1) multiplexer and external gates. F(A, B, C, D) = E(1, 2, 5, 7, 8, 10, 11, 13, 15) a)Describe the undefined or race condition of SR latch with an example circuit. b)ImplementF(A, B, C) = ?M(1,3,5,6) using one 2-to-1 line mux and logic gates. Drawtruth table and logic diagram Please give me code in 8085 Online simulator https://www.sim8085.com/ Transcribed Image Text: Siatemant : D register. : Subtract the BCD number stored in E register from the number stored in the List two ways in which the OSI reference model and the TCP/IP reference model are the same and list in which they differ. Note:- Need osi and TCP/ip reference models figure Consider the registration system at a university. The system will manage student registration for the university’s numerous courses as well as examinations. Determine the hazards that such a software system entails. None Transcribed Image Text: Q6: Fill the blanks 1- . logic gate has output equal 1 if the two inputs have equal value. 2- …. and . are universal logic gates. Data structures and algorithms Please help Transcribed Image Text: Q2. Calculate the Hash Index for the keys below using Mid Square Hashing Method. ?ey (?) K? H(K) 3547 9016 6578 8214 Transcribed Image Text: Let G = ({S,A},{0,1},P,S) where P:S-OS, S? A, .A – 1A, A- 1. Then L(G) = {0m1″|m > 0, n > 1}
:Select one
True
False
??? ???????

Transcribed Image Text: If the program running time is O( n^2) and it
takes 2 seconds to run 1000 elements, what
would be the time for 3000 elements?
Enter your answer

Transcribed Image Text: Default size of a linear layout is_
a. Custome size
O b. Full width and height of screen
O c. Full height only
O d. Half the screen

Given the for loop below, what are the values for x?
for x in range(4):

a.

4

b.

0, 1, 2, 3

c.

1, 2, 3, 4, 5

d.

0, 4

Cloud computing has the potential to have a significant impact on our civilization. What are some key points about computer history, and what about could computing? In addition, it is secure.

During the semester, we established a clear distinction between Methodologies and SDLC. Briefly explain in your own words, SDLC and how does it relate to Methodologies as applied in Software Engineering?

Consider a 64-bit word-based four-way set associative cache. The number of words each line is 8, and the total number of sets is 4096. What is the size of the cache?

Now, in continuation of part a we also have to find the absolute, square absolute and phase angle of a given complex number and print those results. In julia language please.

Transcribed Image Text: Q3. For larger programs designed in Python program, multiple developers use to code, what is the
Importance to work In a team and how it should be Integrate?

Transcribed Image Text: Which one of the following Graph with a Cycle but No Deadlock?
R,
R.
R2
R.
All of them have a deadlock
R,
R
Ps
P3
R
R.

Transcribed Image Text: 4. Using the machine language introduced in the class, write a program that
multiplies the numbers located in M1 and M2 and then stores the result in M3.

Transcribed Image Text: (1)
a, b
a
Dak
a.b
(2)
b
92
a
2. Give the languages accepted by the dfa and nfa in the above 6 (1) and 6(2), respectively.

28. Which of the following life cycle model can be chosen if the development team has less experience on similar projects? a. Spiral b. Waterfall c. RAD d. Iterative Enhancement Model

Transcribed Image Text: Write a Python function which reads a string and prints the string backwards.
Example
Input : str
Output : str
“ali ahmad siti suzy”
“suzy siti ahmad ali”

You have downloaded a program that can be run on Windows or on macOS. What term is used to describe this type of software? Cross-platform Open source Proprietary Site licensed Single-platform

Transcribed Image Text: Given an array of N integers. Your task is to print the sum of all of the
integers.
Example 1:
Input:
4
1 2 3 4
Output:
10

c++ if the value of count is 0; limit is 10. The following expressions is evaluated to true count == 0 && limit < 20 or (count != 0)||(limit < 20) A network administrator is configuring the services provided by the company’s network by giving highest priority to browsing and email services, which characteristic of network architecture is applied to this configuration? 1082_A_5_OS What is file fragmentation and how it is produced? Propose a method to prevent file fragmentation from being produced and a method to reduce the severity of existing file fragmentation. Ingress examines all inbound packets and then permits or denies entry to the network based on information in the packet header. It is a form of packet filtering. True or False A file contains 2 million bytes. How long does it take to download this file using a 56-Kbps channel? a. 1-2 mins b. 5-6 mins c. 2-4 mins d. 7-8 mins Explain the terms compiler, linker, assembler, loader and describe how a C program or any other high level language program is executed in a system. Indicate entire process with a figure. 6 Transcribed Image Text: When there is a collision and the “colliding” element is placed on a list associated with that position in the table, this resolution technique is known as: causes more ray collisions, so you have to transmit slower Select one: a. Twisted pair cable b. Thin Fiber-Optic cable (8.3/125 microns) c. Thick Fiber-Optic cable (62.5/125 microns) d. Coaxial cable Write a Python program that asks the number between 1 and 10. If the number is out of range the program should display “invalid number”. Write in python and show output How to solve using big omega notation. Please show me step by step with explanation. Transcribed Image Text: Asymptotic Notation – Big Omega, Q Examples n³ = Q(n?) n2.0001 = Q(n²) None Transcribed Image Text: Given a vector x where x (1,2,3,.,500) Write a Matlab script to find y values using for loop where: Y = 1/x?+ tan x +0.5 Plot y Transcribed Image Text: 10 The simplified Boolean expression of A’B+ AB’+ AB is equivalent to ‘ (A + B) O No correct answer O ?? A + B O A’B O Transcribed Image Text: The following function will correctly return true if its argument is an odd integer bool Isodd (int x) { return (x / 2 == 1); } True False i need the answer quickly Transcribed Image Text: (2) jlubai The BCD code for four digits decimal number requires 8 bits O 32 bits O 16 bits O 4 bits O 11 For displaying your idea and thoughts for a presentation which view you will use: Select one: a. Normal View b. Outline View c. Slide Sorter View d. Slide sorter View Please solve Quickly ?++ Transcribed Image Text: What is the output of the C Code? int x: x=(3<2) ? 10:20; printf("%d",x); ?. 10 o b. 20 O C. 2 d. 3 92. The ______ scheme uses three levels (+V, 0, and -V) and three transition rules to move between the levels. a. 4B5B b. 2B1Q c. MLT-3 d. none of the above Networks where end user workstations are tied to LAN servers to share resources and application processing. a. Client/Server networks b. Internetworked enterprise c. Information super highway d. Business applications of telecommunications Think critically about the advantages of writing tests before code is written. What kind of compromise must a tester make in order to see the code before or after creating tests? A rule-based classifier is built through indirect method from a decision tree. The decision tree turns out to be overfit on training data. What will be the impact on rule-based classifier? main() { int a = 1, b = 2, c = 3: printf(“%d”, a + = (a + = 3, 5, a)) } Output of the given program will be ? The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as ____ 1. Forward 2. Backpressure 3. Forward signaling 4. Backward signaling Write C++ program to take input an integer (Age) from user and check if user is eligible for vaccination or not. Given:Person of age 18 or above is eligible for vaccination. For a P2P file-sharing program, would you agree with this statement: “There is no concept of client and server sides of a communication session”? What are your reasons for or against? Data structures and algorithms Transcribed Image Text: Example – 2 Construct a Binary search tree for the values below: 15, 23, 8, 27, 36, 99, 45, 2, 64, 71, 82, 56. float theRealQuestion (int x, float y) { int z; if (x > 15) z = x; else z = y; return z; } Code the function prototype for the given function.

93. ODL supports which of the following types of association relationships? a. Unary b. Unary and Binary c. Unary and Binary and Ternary d. Unary and Binary and Ternary and higher

Denote a regular expression for the language that accepts all strings in which ‘a’ appears tripled over the set ? = {a} and also construct the finite automata for the same.

Pros and Cons of Biometrics What are the privacy issues that biometrics proponents should be concerned about? Are you either in agreement or disagreement with these concerns? Please, tell me more.

Transcribed Image Text: Consider T(n) = 6T(n/2) + n³; then T(n) is equal to
Select one:
a. (n2 log n)
O b. O(n³)
O c. O(n³ log n)
O d. (n/2)

A channel has a 1-MHz bandwidth. The SNR for this channel is 63. What is the appropriate bit rate? a. 4 Mbps b. 6 Mbps c. 8 Mbps d. 12 Mbps

The process-to-process delivery of the entire message is the responsibility of the: Select one: a. Application layer b. Physical layer c. Transport layer d. Network layer e. Transport and Network layer

26. The ________ address, also known as the link address, is the address of a node as defined by its LAN or WAN. a. physical b. IP c. port d. specific

Asap Transcribed Image Text: A. Write a C++ program to find and print the value of Z using if statement.
X3+²
X =-1
Z =
?X/5
X = 1
otherwise
8.

Can cloud collaboration be used for anything? How is it that the cloud makes it easier for employees to work together? Let’s look at some examples to help explain your argument

———— is a computer system that can recognize and act on patterns or trends that it detects in large sets of data. a.Neural network b.Voice recognition system c.Learning system d.Vision system

Transcribed Image Text: Describe briefly what we mean by Accidental Duplication Problem in Solid
Principles and provide your answer with an example of your own.
A-
BI
E E
!
?

1. Any program that uses the Scanner class should have a statement near the beginning of the file, before any class definition. Type in this statement in the box below. JAVA

If the origin is taken as the centre of projection, then what will be the perspective projection when the projection plane passes through the point P(4;5;3) and has normal vector (1;2;-1).

Transcribed Image Text: a)
Internet
Cardholder
Merchant
Certificate
Authority
Payment
gateway
Issuer
Payment
Network
Acquirer
Explain the security issues of the approach of encryption and security designated for the
scenario above.

A workstation has just been installed on an Ethernet LAN, but cannot communicate with the network. What should you check first? verify the link status on the computer’s network card why?

152. Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as a. Aloha b. Amplitude c. Amplitude modulation d. Amplitude-shift keying

Convert the following EBNF grammar to ordinary BNF: ? {b } // 0 or more ? a [b] // optional {, }, [, and ] are metasymbols.

Create a C++ Program for displaying the tabular format as seen below: CODE PRODUCT SRP a Coca-Cola 24.99 b Pepsi 22.99 c Royal 24.99 d Sprite 24.99 e Mountain Dew 22.99

Answer only if you are 100% sure . Correct and detailed answer will be Upvoted else downvoted. Thank you! Discuss in brief about the following. (1) Strict two-phase locking (ii) Granularity.

Can you write the truth table for these two figures Transcribed Image Text: A
A’
3
A.
1
1
A’+B’
3
(A.B)’
1
3
B
B
B’
Fig. 5
Fig. 6

Write a program in elixir programming language to make a map without generic so that as key and value you want to put, you can put and get value using key.

1) Describe the Graph Data Structure: What’s the difference between an undirected and a directed data structure graph? There’s something called a weighted graph in relation to the data structure graph.

Note:- Please need a full explanation for this question in your own words. Please do not copy and paste from somewhere else. Transcribed Image Text: Explain PC-relative addressing mode of MIPS.

Transcribed Image Text: Give a context-free grammar for each of the following languages.
a. L={a’b” In, m, k 20 and n = 2m + 3k}.
b. L= {0″1″0″1″ |n, m 20}.

A dequeue is a list from which elements can be inserted or deleted at either end a. Develop an array based implementation for dequeue. b. Develop a pointer based implementation dequeue.

Write a rust program to print the given string 8 times along with the line number. See sample output below. “1. Rust Programming” “2. Rust Programming” . . “8. Rust Programming”

In Python, you can use ______ to create Strings. single quotes (‘) double quotes (“) three single quotes (”’) All of the above A and B only None of the above

Secure the transfer of data across networks and comprise of firewalls, anti-malware systems, white listing, and blacklisting, encryption, virtual private networks, secure socket layer, employee monitoring systems. ? Communication Controls \sTrue/False

Transcribed Image Text: Create Minimal Spanning tree from the given graph. Show all the steps
1
2
3
4,
2
4
11
8
14
4
6
10
7
5
2
00

Write a Phyton program that will enter 10 numbers from 20 to 30. If the number is even, it should be stored in List1 else it should be stored in List2.

Write the output for the following printf() functions. Indicate a blank space with the symbol $. i) printf(“%04d”,23); printf(“value=%-6.2f”,-3.45678); printf(“Your name start with letter %4c”, ‘W’); printf(“The %8.10s price is %5.2f\n”,”Apple”,1.455);

Given the following devices:
2911 Router
DHCP Server
2960 Switch
DHCP Client PC1
DHCP Client PC2

Design a network (using 2911 model Router as a relay agent of the DHCP Server)

Simplify the following expression as much as possible Transcribed Image Text: Simplify the following expression as much
* ? as possible
(A + B)C · C + (A +?)C
????? ???

Transcribed Image Text: Which of the following are valid Java identifiers?
A. $myvariable
B. OReilly_&_Associates C. _score
D. my
E. !digit
F._9Levels
G. interface
H. 9pins
I. main OJ. This_is_an_insanely_long_varia
variable

1. What is the significance of using hyperlinks that navigate around your presentation instead of just using keyboard shortcuts? 2. Cite three instances where objects can help you improve your presentation

Transcribed Image Text: Q) Derive the Boolean logic
expression for x3 for the common
bus encoder ( see table 5-7) then
draw the logic diagram circuit.
Minimize the number of gates.

I need the answer quickly Transcribed Image Text: 3.3 Write the result of the following C++ statements
float x = 3.444, y 8.0
a. cout< à
à a | a à b | b à c | c

Transcribed Image Text: Write the VHDL code for the following state diagram. No need to include user
constraint hle.
B’
B’
Re?et
B’
B
On
Off
Initial
Count = Count +4

The word UNFORGETFULNESS has ___________________________________. Select one: a. the root and 3 affixes b. the root and 4 affixes c. 3 affixes and no root d. the root and 2 affixes

Transcribed Image Text: Using the S-box in the index page, compute the output of DES S-BOX 3, if the input is “011011”.
O 1101
O 1011
1001
O 0011
Jump to…

: Write SQL queries DDL Queries to implement the following Relational Model i.e. create the Nurse and Care_Center relations (including primary key and foreign key). Intelligently write data types. Show Output.

Which protocol layer would be the most suitable for providing such a security service, and why? Make a distinction between services that want to provide anonymity and those that do not.

Plot the sine wave at frequency fm and the sampling signal at frequency fs1. Write a MATLAB program to take input both fm and fs1 and plot the curves mentioned above.

True or false? A call to a method with a void return type is always a statement itself, but a call to a value-returning method cannot be a statement by itself.

q8) Which of the following searching algorithm, search for the data by the “Sequential” method? a. Linear Search Algorithm b. Bubble Sort Algorithm c. Binary Search Algorithm d. Non-Linear Search Algorithm

Which one of the following function operates similarly to fgets(), except that it also strips any HTML and PHP tags form the input? i. fgetsh() ii. fgetsp() iii. fgetsa() iv. fgetss()

Given a class C network IP address 197.20.11.0 and subnet mask is 255.255.255.240 1. How many bits are for the subnet ID? 2. What is the subnet address of subnet 5?

(Q.17) Consider this functional dependencies {AB->C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

Write a java program(UDPAddServer) using UDP Sockets that would accept a packet containing two integer bytes sent by client, perform the sum of received bytes and return the result(sum) to client

In a(n) _____ configuration, the stations are automatically connected or disconnected from a VLAN using criteria defined by the administrator. a. manual b. automatic c. semiautomatic d. none of the above

A system security engineer is evaluating methods to store user passwords in an information system. What may be the best method to store user passwords and meeting the confidentiality security objective?

a) Write a recursive function to calculate the sum of numbers from 0 to 10 Expected Output: 55 b) Write a function to Return the largest item from the given list

(Q.17) Consider this functional dependencies {AB->C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

Determine the memory location of operand 2 of the following instructions: a) MOV AL, [0100] b) MOV CL, [BX + 0200] Assume CS = 2300, BX = 1000H, SI = 0100

18 In powerpoint,What lets you to create new presentation by selecting ready-made font color and graphics effects? Select one: a. Design Template b. Animation Scheme c. Master Slide d. Presentation Template

Transcribed Image Text: “In RIPR model, weakly killing mutant satisfies which two of the below?”
O Reachability and infection
O Propagation and revealability
O Reachability and propagation
O Propagation and infection

Is it true or is it not true? CPUs are now huge machines containing electrical and mechanical components, such as vacuum tubes and switches, that need a large amount of power.

i want answer in 10 min..i will give you feedback also. Write a python program that takes multiple input in input statment and check that multiple input are even or odd.

10. Which of the following communication modes support two-way traffic but in only one direction at a time? a. simplex b. half duplex c. three-quarters duplex d. none of the above

The only locations in our code where we would ever want to add a remark are immediately before a function and immediately preceding a class. if it is true or false:

Learn how to start 1D and 2D arrays in the C computer programming language by looking at several methods. Discuss their memory representations with the other members of the group, too.

I need the answer as soon as possible Transcribed Image Text: Rust programming
Write a program to check a number is
positive or negative. For example a number
45 is given

Python: Write a function named sum_to(n) that returns the sum of all integer numbers up to and including n. for example, sum_to(10) would be 1+2+3…+10 which would return the value 55.

The Lifetime of a variable is the amount of time the variable resides in memory while the programme is running. life span run time time to live half life half life

Can you please solve it? Transcribed Image Text: Q5.
Design a 4-bit Arithmetic and logical unit from scratch. Explain your design and state how it can be
connected to get output=A.B

What is the technology behind the blockchain? What impact will blockchain have on today’s corporate processes if implemented? To protect a system from both external and internal threats, is often used.

67. In BASIC language statement “300 LET A = 2(X+3)”, syntax error is a. subtraction sign missing b. asterisk sign missing c. GO function is missing d. NET function is missing

Q No.2: During Lexical Analyzer phase, various errors occurred and this phase deal with issues by applying different strategies. Discuss each strategy one by one according to your understanding with example.

Explain why software testing should always be performed in stages and in an incremental manner. What percentage of programmers are the most qualified to test the programs that they have created?

b. Java programing question provide a solution for the following with the most basic understanding of Java so I understand Transcribed Image Text: Name all relational operators and all logical operators

Transcribed Image Text: Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/24.
Select one:
a. 64
b. 128
C. 256
d. 32

None Transcribed Image Text: Use the . . to join, or concatenate, one
….. …. …
or more text strings to produce a single
.piece of text
!
%
& O

Describe the I/O subsystem in detail. Describe how various input and output devices operate, including what they transmit and receive, what they input and output, and how they may be linked.

e) Find the sum of ASCII values of all uppercase alphabets and all digits from ‘0’ to ‘9’ and print the value of sum calculated mod 36 in output. In Java

What authorization, authentication, roles, and mitigation techniques are utilized in small, medium, and big hospitals to restrict access? How can these four security steps mitigate the risk of a ransomware attack?

Transcribed Image Text: Part3:
Write a method to compute the following series:
Write a test program that displays the following table:
i
Sum(i)
1
0.5000
1.1667

19
16.4023
20
17.3546

Transcribed Image Text: In synchronous counters, all the FF
a. reset their inputs
O b. change state simultaneously
O c. do not change state simultaneously
O d. none of the above

Transcribed Image Text: Which sorting algorithm is a divide and conquer recursive algorithm?
O Radix sort
O Insertion sort
O Selection sort
O Bubble sort
O Merge sort
O Heap sort

84. The idea of RZ and the idea of NRZ-L are combined into the ________ scheme. a. Manchester b. differential Manchester c. both (a) and (b) d. neither (a) nor (b)

Write a program in java to check how many times punctuation is present in a string and you have to take the string from user and print the result in last.

Given the following devices:
2911 Router
DHCP Server
2960 Switch
DHCP Client PC1
DHCP Client PC2

Design a network (using 2911 model Router as a relay agent of the DHCP Server)

Consider a 64-bit word-based four-way set associative cache. The number of words each line is 8, and the total number of sets is 4096. What is the size of the cache?

Write a Template function body called swap( ) to swap the values of the two values of integer, doubles and character respectively using pointers for swapping. (Write only template function body)

a) What is the definition of heuristic evaluation? What is the purpose of it? Outline the procedures required in obtaining expert approval. b) Using real-world examples, explain any four Usability Heuristics.

question 8 please Transcribed Image Text: D
100
E) 300
Question 8
In Python, what does the file method “.close()” do?
Use the editor to format your answer
99 minutes remdining

Transcribed Image Text: Q4/A- If (CL) = 03H and AX = 891AH. Determine the new contents of AX and the
carry flag after executing the instructions (SET CARRY=1):
RCR AX, CI.

Write a PL/SQL procedure to change the name of the project to “AL Dahariyah Projects” where place belongs to Ibri, dunk or Yanul. (hint: Project (projectID, projectName, place, startYear, endYear, #DepartmentID)

Can you create a port knocking system only with iptable commands that will open up port 22 (SSH) when the remote host “knocks” on ports 2222, 3333, 4444 within 30 seconds?

In what ways is the Internet of Things (or the Web of Things) different from the World Wide Web? Show three real-world examples of the practical uses of IoT in business.

Write “Handle Return” use cases for each following functionality: (a) Room reservation (b) Changing the properties of a room (for example, from non-smoking to smoking) (c) Customer check-in (d) Customer check-out

What are security policies as part of the planned solution to mitigate the  security gaps withn no configuration change management policy (to reduce unintentional threats ) and no intrusion detection/prevention system

Transcribed Image Text: Select name from instructor where name like ‘%Math’ order by name;
By default, the order by clause lists item in
order.
O Descending
O Ascending
Same
O Any

i need netbean java ide code Q: Write a java program in which you will declare two interface sum and Add inherits these interface through class A1 and display their content.

Version control is an important part of DevOps, why would it be important to a tax company and recommend a tool to use for it. 30 words minumum and 70 maximum

I want solution with steps Transcribed Image Text: Exercise 2
Write a Java program that determines whether a number n given by the user is a multiple of 5
or not.

I need the answer as soon as possible Transcribed Image Text: b. Draw the logic diagram for:
3
A’.? +?.B’ + ((?.C) + A) + ?.?”
c. Calculate: 110011102 x 100112

Write a program in java to check how many times punctuation is present in a string and you have to take the string from user and print the result in last.

I need the answer as soon as possible Transcribed Image Text: Rust programming
Write a program to check a number is
positive or negative. For example a number
45 is given

Discuss the significance of identifying and defending against system or software vulnerabilities after reading the CVE site. Also, talk about how hackers use system and software flaws to launch an attack.

Contrast the waterfall process model with a cross functional team (working in short development bursts to frequently deliver full product increments). Describe the COVID-19 process model in detail using several diagrams.

5

The Relative perspective of the usage frequency of the target dimensions of user loyalty is determined by the number of page impressions per user.
Select one:
a. True
b. False

Transcribed Image Text: 2) Find the least squares plane z=1/(Ax+By+C) for the following data. (Note: Do not solve system
obtained)
X
1
7
1
1
8.
2
8
1
9.
2.

179. A print server use ………………. which is a buffer that holds data before it is send to the printer. a. Queue b. Spool c. Node d. Both b and c

Cloud computing has the potential to have a significant impact on our civilization. What are some key points about computer history, and what about could computing? In addition, it is secure.

1.For a given integer N, print all the squares of integer numbers where the square is less than or equal to N, in ascending order. write in python and show output

HUMAN COMPUTER INTERACTION Draw graphical and textual HTA of  Student Information System. Features of Student Information System Register Students Manage student profile ( Edit  profile , Change Password) Search student records

Let s1 be a variable containing the string “utica”. Which of the following expressions changes the value in s1 to “Utica”? Select one: a. ‘U’+s1[1:] b. s1=’U’+s1[1:] c. s1[0]=’U’ d. s1=’U’+s1

Python language. You Cannot Use dictionary in this program. Think about object destructing… Write a function that return multiple value of string type. You have to print those in main function.

(Q.17) Consider this functional dependencies {AB->C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

Transcribed Image Text: if there is one state of every type of resources then a circuit . that mean :
mutual execution O
None of above
deadlock + mutual execution
deadlock

Write a SQL statement that will create a database named Nam_Team that will store data for all sporting events represented in the country using the Master database in MS SQL Server.

Transcribed Image Text: The ability to write set of tests that can.10
demonstrate that the delivered system meets
:each specified requirement is called
Consistency O
Completeness O
Realism O
Verifiability O

Create new method in the Rectangle class called getArea to calculate the area of the rectangle. Call getArea method from the LengthWidthDemo class to print the area. In JAVA Programming please

Draw the Full Duplex ASK diagram if the bandwidth is 18,000 Hz (500 to 18,500). Also find the carriers and bandwidth in both directions. Assume there is no gap between bands.

Write a recursive C program to find the sum of first n natural numbers. Take input n inside the main function and print the result in output from main function itself.

________ provides service to the user to make the process of sending and receiving a message easier. a. An MTA b. An MAA c. A UA d. none of the above

Do not copy from other websites. Code with comments and output screenshot is must for an Upvote Q. Write a code to find the smallest item in a singly linked list

1.WHICH OF THE FOLLOWING MEMORY ALLOCATION TYPES ALLOCATES THE SAME AMOUNT OF MEMORY AS THE PROCESS SIZE? Choose one: a.PARTITION OF EQUAL SIZE d.UNEQUAL-SIZED PARTITION b.BUDDY SYSTEM c.DYNAMIC PARTITION d.UNEQUAL-SIZED PARTITION

Explain the SQL function categories. Describe the important features and applications of SQL functions. Normalize the relation given below OrderNum OrderDate PartNumber PartName UnitPrice PartQuantity SupplierNumber SupplierName SupllierStreet SupplierCity SupplierSate SupplierZip

What is the best storage media for backing up data that is utilized by users of software programs? Consider cost, performance, and storage capacity while selecting one (1) appropriate application software.

Consider a 64-bit word-based four-way set associative cache. The number of words each line is 8, and the total number of sets is 4096. What is the size of the cache?

Q. _________ is the standard way to separate each SQL statement in database systems that allow more than one SQL statement to be executed in the same call to the server.

None Transcribed Image Text: i. Simplify the following in Sum of Product
F(A,B,C)= E(0,2,4,5,6,7)
O A’ + C
B + C
No Correct answer
O A + C’
B’ + C’

Is there a method that someone like Peter can use to avoid forgetting his or her password that is safe to use, apart from key recovery, to prevent this from happening?

what is a easy way of making a copy of a new checkbox that already exist but just changing the details about my new one show an example c# windows application

Write “Handle Return” use cases for each following functionality: (a) Room reservation (b) Changing the properties of a room (for example, from non-smoking to smoking) (c) Customer check-in (d) Customer check-out

I need the answer as soon as possible Transcribed Image Text: is a standard that 29184
describes recommended
approaches for the
specification of software
.requirements
a. True O
b. False O

HCI What category of users are those who make use of College Information Management System (CIMS) for the first time? a. Casual User b. Novice c. Expert User d. Regular User

Write a C++ program find the number of distinct integers present in an integer array. Take the array as input from user and print the number of distinct integers in output.

write a C++ function that accepts your name (string) as an input and print it in reverse order without using a built-in function. with algorithm and discussion and aim and objective

Transcribed Image Text: Which of the following is a valid function declaration in Python?
def myFunc():
O public static void myFunc():
o def int myFunc():
O def myFunc(int x, int y)

You have several existing datasets. Is it necessary to separate the data into layers? Choose your own layers and describe a set of vector overlays, in reference to the Question above

Transcribed Image Text: Which one is an illegal statement in 8086?
O add ax, [di]
O mov ax, [bx]
O inc [edi]
O aDd bx, [bx]
O None of the mentioned

What type of storage media must be used to create a Windows system image? Select all that apply. a. DVDs b. Internal hard drive c. External hard drive d. Network drive

Transcribed Image Text: Write an R commands to produce the output as below.
Buildings Heights vs Buildings Stories
30
35
40
45
50
55
60
65
Stories
Heights
650
750
850

Transcribed Image Text: Which parameter to the plot) function in matplotlib.pyplot module will give following line on a graph?
O a. ‘go’
O b. g^”
Oc.’g-
O d. ‘g*
Next page

Describe the I/O subsystem in detail. Describe how various input and output devices operate, including what they transmit and receive, what they input and output, and how they may be linked.

‘jaya program L take integer input i Nconsle DO NOT USE SCANP%EF% Transcribed Image Text: java program
take integer input from console and print
in console
DO NOT USE SCANNER CLASS

Write the HTML code of Biography of a student . Create a HTML page of Biography which shows our name picture biography social media accounts links (please write code using notepad

Subject – rcs502 Consider the following schedule: r?(a), r?(a), r?(b), w?(a), r4(c), (b), r?(b), r?(b), w?(c), w?(a) The above schedule is serializable as I will downvote ,if you do anything wrong.

Given that x = 60 what would the following code output? if (x !=64 && x>59) { SP cout << "Cool"; } else if(x > 60) SEP cout << "Hello there! 1.WHICH OF THE FOLLOWING MEMORY ALLOCATION TYPES ALLOCATES THE SAME AMOUNT OF MEMORY AS THE PROCESS SIZE? Choose one: a.PARTITION OF EQUAL SIZE d.UNEQUAL-SIZED PARTITION b.BUDDY SYSTEM c.DYNAMIC PARTITION d.UNEQUAL-SIZED PARTITION 10. A _____ is a device that forwards packets between networks by processing the routing information included in the packet. a. bridge b. firewall c. router d. all of the mentioned Which one of the following is a symlink to the root path as seen by the process? i. /proc/[PID]/root ii. /proc/[PID]/path iii. both /proc/apm and /proc/[PID]/path iv. none of the mentioned 141. The handling of user interface, data dictionary, concurrency control and global query optimization are tasks of a. open programming level b. database connectivity level c. client level d. server level In a sociotechnical system, you need to consider reliability from perspectives namely: a. only software reliability b. only hardware reliability c. hardware and software reliability d. hardware, software and operator reliability Transcribed Image Text: In Android Studio create a layout as shown. Requirements 1. ImageView without border 2. TextView 3. Button 4. Checkbox 5. RadioButton 6. Switch TextView BUTTON CheckBox RadioButton Switch The memory contains an array of 100 elements starting at addresses 500H. Write the assembly code that records the numbers between -10 and +10 in this sequence, starting at address 750h. Give state diagram for Turing machine with one tape that recognizes the following language: A= {w ? {0, 1}? | w contains equal number of ones and zeros (in any order)} The computer program language which is widely used in computer science and engineering and also in business is A. COBOL B. FORTRAN C. PASCAL D. LISP E. None of the above Create an integer array of size 10 and fill it with random values in range 0 to 999. Then find if 999 is present in the array or not. Language- C++ Transcribed Image Text: Sort the following word using Radix Sort. Further, give a short description, whether it is stable sort or not. A=

Simplify the following expression as much as possible Transcribed Image Text: Simplify the following expression as much
* ? as possible
(A + B)C · C + (A +?)C
????? ???

a) What is the definition of heuristic evaluation? What is the purpose of it? Outline the procedures required in obtaining expert approval. b) Using real-world examples, explain any four Usability Heuristics.

For a P2P file-sharing program, would you agree with this statement: “There is no concept of client and server sides of a communication session”? What are your reasons for or against?

To avoid the race condition, the number of processes that may be simultaneously inside their critical section is A. 8 B. 1 C. 16 D. 0 E. None of the above

96. The first step to the system study project is to a. staff for the study project b. announce the study project c. describe information needs d. define system performance criteria

Describe the I/O subsystem in detail. Describe how various input and output devices operate, including what they transmit and receive, what they input and output, and how they may be linked.

2.) Write the Java statement that creates the object mysteryClock of the CLock type, and initializes the instance variables, hr, min, and sec of mysteryClock to 7, 18, and 39, respectively

Transcribed Image Text: An MLP can be used for regression with the following output layer
O A. A softmax activation function
B. A linear activation function
O C.A sigmoid activation function

Conclude your report by emphasizing on the importance of originality in the academic fields. Transcribed Image Text: Conclude your report by emphasizing on the importance of originality in the academic fields.

the challenges of a move to an enterprise-level analytics solution for companies and individual end users who might have grown accustomed to working with their own customised solutions for generating data.

Transcribed Image Text: Approximately how much time is spent on the Data Science project until the preprocessing phase gets over?
a. 80%
O b. 30%
O c. 50%
O d. 20%

Depending on your Web browser, you may be able to identify a cookie containing folder or file on your computer. Examine the folder or the file.Mention three websites that you’ve visited.

Fill in the blank.
The representation of 60 in binary using 8-bit signed magnitude is ______, in ones complement is ______, in two’s complement is ______, and in excess-127 is ______.

What are the risks of having an all-encompassing security architecture in place? What are the reasons preventing such infrastructure from being built? What options do we have to the present situation?

339. A thread becomes non runnable when? a. Its stop method is invoked b. Its sleep method is invoked c. Its finish method is invoked d. Its init method is invoked

vvnb Transcribed Image Text: Salesforce Assignment: SOQL
Create an Inline Salesforce object query language to find the Account Name and contact
Name where the Account Name is equal to the Tes?’.

In the study of assemblers what is a macro command? What is an example of macro command? When we should program a function, and when we should program a macro command?

There are two programming models in Big Data Ecosystem i.e. Map Reduce and Spark, what are the similarities and differences between them? Why Spark outperform Map Reduce in the execution time?

please show step-by-step solutions. Thank you. Transcribed Image Text: 4. Consider the network in Figure-4 and Calculate the node-betweenness of node A and C.
E
A
F
D
Figure 4
B.

Exercise 5.5 Transcribed Image Text: E={ a , b,c} Draw the diagram of the NFA that recognizes the L language.
L={ w| w = ak b2m cn+1 , k,m,neN } N={0,1,2,..}

Which of the following is not a complicating factor in the architecture of remote environments? Group of answer choices: Physical operation is remote Incomplete feedback Unanticipated interferences Feedback from multiple sources

Draw a recurrent network with ‘4’ neurons, but with no feedback from the same neuron by including the unit delay in output? (please the solution, enter it written on the keyboard)

4. Write a SELECT statement that selects all of the columns for the catalog view that returns information about foreign keys. How many foreign keys are defined in the AP database?

Develop an algorithm for the application “Jackpot” to arrange the data in ascending order using Bubble sort method. Please answer fast i have only 20 minutes ( data structures and algorithms).

In FTP, when we _______, it is copied from the client to the server. a. retrieve a file b. store a file c. retrieve a list d. none of the above

Computer science What unit of measurement is used to quantify the amount of work that a surge suppressor may perform before the circuit is no longer protected from an electrical surge?

Why is it useful for a programmer to have the ability to learn new languages, even though he or she may have a good knowledge of a number of programming languages?

Write a program to take two integers and print there product in Pythor Transcribed Image Text: input
Write a program to take two integers as
and print there product in Python.

Artificial Intelligence Transcribed Image Text: Best path using UCS from s to G *
A
B
C
h-9
h-4
h-2
S
G
h=0
h-7
D
E
h-5
h-3
SDEG
SDBEG
Other:

b)Show the result of the following binary arithmetic a. 11100011 + 1 b. 10101100 – 1 c. 10101111 + 1 d. 10100000 – 1 NOTE: Do not copy from other websites

Write query to create given table. Transcribed Image Text: users
user_id action
start
cancel
date
1
1-1-20
1-2-20
1
start
1-3-20
publish
start
1-4-20
1-5-20
cancel
1-6-20
4
start
1-7-20
N233

Short notes inserted in various areas of a programme that describe how certain elements of the programme function are referred to as. remarks manuals of reference demonstrations documentation from other sources

Write a C++ program that asks the user to type 10 integers of an array. The program must compute and write how many integers are greater than or equal to 10.

Describe the I/O subsystem in detail. Describe how various input and output devices operate, including what they transmit and receive, what they input and output, and how they may be linked.

Transcribed Image Text: What type of algorithm is suitable for the self driving car type of problems?
O a. Supervised
O b. Reinforcement
O . None of these
O d. Unsupervised

Write a program in python language that take s string and character from user and calculate how many times this character repeat in that string without using any kind of loop

Is it true that if other functions are defined before main, the programme will still run from the beginning? Do you concur with this assertion? Why do you think that is?

What are the stages in the cycle of system development? (SDLC) Share five distinct actions related to system development. Define, develop, and execute the processes needed for defining, requirements, and tasks.

Secure the transfer of data across networks and comprise of firewalls, anti-malware systems, white listing, and blacklisting, encryption, virtual private networks, secure socket layer, employee monitoring systems. ? Communication Controls \sTrue/False

Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75? used for a. Cable TV b. Ethernet c. Thin Ethernet d. Thick Ethernet

Transcribed Image Text: string txt = “Noor”; cout 1: . “The
;. .length of the txt string is: ” << 2 txt.string(); txt.length(); III. txt+"; << append(); << , txt[4]; >>

Transcribed Image Text: Given the doubly-linked list students [Tom, Sam], what will be the second node in the list after the
following operations?
list.Insert(“Hal”, list.Size())
list.Insert(“Pam”, list.Index0f(“Tom”))
Pam
Tom
Hal
Sam

______ is a collection of raw facts organized and processed so that it has additional value beyond the value of the individual facts. a. Data b. Information c. Knowledge d. Expertise

Describe the I/O subsystem in detail. Describe how various input and output devices operate, including what they transmit and receive, what they input and output, and how they may be linked.

Transcribed Image Text: In Android Studio create a layout as shown.
Requirements
1. ImageView without border
2. TextView
3. Button
4. Checkbox
5. RadioButton
6. Switch
TextView
BUTTON
CheckBox
RadioButton
Switch

Web 2.0 Requires less human interaction to locate and integrate information Transcribed Image Text: Web 2.0 Requires less human interaction to
locate and integrate information
Select one:
O True
O False

157. Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose? a. Fax b. Modem c. Scanner d. Keyboard

None Transcribed Image Text: #include
using namespace std;
void division(int num,int denom);
int main()
{ division(5,-1);
return e; }
void division(int num,int denom)
{if (denom<=0) return; division(10,2); else cout<C, BC->D, CD->E, E->F} Which of the following functional dependencies is/ are member of the given FD set? A) AB->F B) BC->A C) BC->E D) DEF->C

This kind of security service should be implemented at the lowest possible protocol layer. You should make a distinction between services that seek to provide anonymity and those that do not.

162. In the earlier ARPA NET each node of network consisted a. TIP & a host b. BBN & a host c. IMP & a host d. SAP & a host

Explain why it is so that standard colour printing uses four ink colours: cyan, magenta, yellow and black and what benefits are there in using more than these four ink colours.

doont post copied answers only answer you know Transcribed Image Text: If a computer is capable only of manipulating and storing integers,
what difficulties present themselves? How are these difficulties
overcome?

29. The first step in the problem-solving process is to _____. a. Plan the algorithm b. Analyze the problem c. Code the algorithm d. Evaluate and modify (if necessary) the program

Is there a difference between embedded system software and system software? So what examples do you provide of each? Can Embedded software be utilized without the need of System software? How?

Transcribed Image Text: 2)
x-input (‘enter the x value
if x<10 66 x>5
disp(‘undefined y value’)
elseif x>=10
y-5/x^2;
fprintf(‘the y value -10.2E/n ‘,y);
else
fprintf(‘the y value – id/n’,5);
end

Consider the registration system at a university. The system will manage student registration for the university’s numerous courses as well as examinations. Determine the hazards that such a software system entails.

Transcribed Image Text: Are the two grammars with respective productions
S- aSblab| A,
and
S – aAblab,
A – aAb|A
equivalent? Assume that S is the start symbol in both cases.

Transcribed Image Text: Which of the following must be satisfied while partitioning input domain?
O Complete and optimal
O Disjoint and optimal
O Incomplete and disjoint
O Pairwise disjoint and complete

Write a C++ program to take Input 10 numbers from user and print their sum. Note: numbers can be negative but you have add the absolute value in the sum only.

a) In RSA, given p = 7, q = 13, and e = 17, find n, ?(n), and d. Further, find the ciphertext corresponding to plaintext 8 using RSA encryption algorithm.

Write a function area_of_circle(r) that asks the user for a radious r and returns the area of a circle of radius r. nt : The area of the circle is ?=??2A=?r2

None Transcribed Image Text: 4-
Consider the function f:
function [ ] = f(x)
MATLAB
output = 7;
end
What will be in x after the command:
>> x = f(3);

Student records are stored in ID number order, but accessed by grade-point average for a report. Grade-point average order is a(n) ___________________ order. a. imaginary b. physical c. logical d. illogical

9. Which of the algorithm design approach is used by Quick sort and Merge sort A. Branch and bound approach B. Greedy approach C. Dynamic approach D. Divide and Conquer approach

Write two process communicating sysem with Signals. In your system, Process_A writes to chat.txt and waits the Process_B to read it. Than Process_B writes to chat.txt and waits Process_A to read..

106. If we preempt a resource from a process, the process cannot continue with its normal execution and it must be : a. aborted b. rolled back c. terminated d. queued

How do you check whether a device output is affected by an application? Is it possible to preserve the operating system and its stability and functionality while expanding the user base?

Please dont post answer from another site else down vote directly Provide solution in you own language not in bookish language Define difference b/w constructor and method abstract class and interface

85. The idea of RZ and the idea of NRZ-I are combined into the ________ scheme. a. Manchester b. differential Manchester c. both (a) and (b) d. neither (a) nor (b)

Transcribed Image Text: a. Write a code for every function (e.g. insert, delete, update, create) of link list collection
b. Write type of procedures and also write the difference between them

It’s recovering from things like ransomware and other calamities that are damaging to your data that constitutes data integrity. Give an example of recovering from a ransomware assault if you can.

Which is the first step in securing an operating system? a. Implement patch management. b. Configure operating system security and settings. c. Perform host software baselining. d. Develop the security policy.

We need to send 265 kbps over a noiseless channel with a bandwidth of 20 kHz. How many signal levels do we need? a. 1024 b. 512 c. 256 d. 128

Please show work Transcribed Image Text: f)
What is the value of the postfix expression 5 6 3 24 + –
* +?
A.
1
?.
40
?.
-18
D.
-13

(b)Using the following passwords “ABCefg12” and “KojoGiggs12” as examples, discuss the strengths and weaknesses of each password and discuss what could be done to strengthen them, if they are weak passwords.

“A* search performs better than Greedy best first”. Comment on this statement and justify. How a classification problem is different from clustering? Justify your answer with the help of an example.

find the mean for the given data x f 1 5 2 4 3 5 4 4 5 1 6 4 7 5 8 4 9 5 Group of answer choices

example python code for generating dot plots for two DNA sequence (in a text file, where the first line is the wild type DNA seq, and the second line is mutated).

52. Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? a. FIN b. RST c. SYN d. PSH

diagram to java code Transcribed Image Text: Create a program (class) for the given UML diagram below:
Bank
-bal : double
+deposit(double depAmount): void
+withdraw(double withAmount) : void
+displayBal : void

499. A secondary storage with larger capacity than main memory and is always kept online is known to be a. Virtual memory b. Absolute memory c. Online storage d. Offline storage

True or False (provide explanation for your answer ). If we had a 32-bit machine with 16GB of RAM installed the virtual address space would be larger than physical address space.

75. Software engineers collaborate with customers to define which of the following? a. Customer visible usage scenarios b. Important software features c. System inputs and outputs d. All of the above

Transcribed Image Text: Which parameter to the plot) function in matplotlib.pyplot module will give following line on a graph?
O a. ‘go’
O b. g^”
Oc.’g-
O d. ‘g*
Next page

Choose the correct answer Transcribed Image Text: 10. The first discovered well with oil reserve is known as e
a- primary well
b- discovery well
e- Injection well
d- production well.

Asap Transcribed Image Text: In the course of computer science we had to
find the sum of principal diagonal of integer
matrix and consider this is given of 4×4
In java

WHERE clauses can be used with HAVING clauses, but can they be used together in the same SQL SELECT statement? If this is the case, why are these two sentences different?

Hence a stack is called a FIFO (first in first out) data structure as the element that is inserted last is the first one to be taken out TRUE OR FALSE

What will be the output of the following Java program? class Output { public static void main(String args[]) { Double i = new Double(257.5); Double x = i.MIN_VALUE; System.out.print(x); } }

Using the following password ABCefg12 and KOJOGiggs12 as examples, discuss the strengths and weaknesses of each password and discuss what could be done to strengthen them, if they are weak password

59. Which of the following database activities require a specific knowledge of a DBMS? a. Enterprise modeling b. Conceptual data modeling c. Logical database design d. Physical database design and definition

if it is correct or incorrect Explain why if it’s false. ” Because Standard Library algorithms treat containers directly, a single algorithm may typically be used to a wide range of containers.”