will be . (hit use draw Kmap) Select one: a. 3 O b.5 O .2

2? Transcribed Image Text: In the expression A + BC, the total number of minterms will be . (hit use draw Kmap)
Select one:
a. 3
O b.5
O .2
O d.4

in  80886 microprocessor What is result of executing the following instruction sequence? MOV BX, 100H MOV [ BX], 0C0ABH MOV AX, BX OR AL, [BX+1] AND AH, OFFH MOV [BX+2], AX HLT

How to tell the difference between Data Inconsistency and Data Redundancy Unstructured data is compared to structured data in this comparison. Please include any examples that may help to substantiate the comparison.

Write a program that accepts two characters and display the message “ The characters are not the same ” if the characters are different, and quits if the characters are the same.

Convert the following numbers from their given base to decimal: a. 0.10010012 b. 0.3A216 c. 0.2A112 What is the decimal value of the following binary numbers? a. 1100101.1 b. 1110010.11 c. 11100101.1

491. For I/O bound jobs, in a uniprogramming process CPU can be in idle state for a. 10-20% of time b. 30-40% of time c. 60-70% of time d. 80-90% of time

ving add() ,print( b?th these functlnn;are_ functlnns Transcribed Image Text: 1 Make a singly linked list in java
2 from scratch having add() ,print()
3 functions .both these function are necessary
4

Transcribed Image Text: Design
domino
circuit whose output is
@ Y = À +5 C
? Y = (ã + Bu C)+ A?
A.B.C + AB = A (BC +B,
9.
%3D

Transcribed Image Text: An object is
that can be treated as an individual unit or component.
state und contents
O file and data
O formatting and color
O programming code and data

True or false? Transcribed Image Text: If x is 2, it will be 3 after the
evaluation of the following
expression: (x >= 0) && (x– > 1).
O True
O False

C++ Program Transcribed Image Text: 4. Write a program that will display the prescribed output below using nested loops.
?
1
1
2
1
1
3
4
1
2
3
1
2

Transcribed Image Text: 14
if we have a picture called pic1 located on D
drive then to load the picture by code we use:
pic1.image=picture.fromfile(“d:\pic1.jpeg”)
none
pic1.image = image.fromfile(“D:\pic1.jpeg”)
O pic1.load (“D:\pic1.jpeg”)

None python Transcribed Image Text: 7. Operators with the same precedence are evaluated in which manner?
a) Left to Right
b) Right to Left
c) Can’t say
d) None of the mentioned

What is the value of x in the following system of equations: x = 5y – 3 3x – 4 = 2y x= -2 x= 3 x= 5 x= 4 x= 2

JAVA Transcribed Image Text: Create a program that will ask the user to input 10
numbers.
Identify how many even and odd numbers from the
inputs.
use array as storage of data.

Suppose you are provided with a random number generator that outputs numbers between 0 and 1. Describe a simple computer experiment to test if the numbers are uniformly distributed on the interval.

Transcribed Image Text: Questions (a)-(b) are based on data below.
45, 36, 76, 23, 89, 115, 98, 39, 41, 56, 69, 48
Determine the sequence using:
Traversal algorithm
Result
Preorder:
Inorder:
Postorder:

theory of computaion Transcribed Image Text: Let L be the language {zzk : z belongs to E*}. Use the Pumping Lemma to show that L is not regular, where E= {m, n}.

Suggest the most suitable sensor type which should measures distance to target for the identification of an object or should perform presence or absence detection. Please state the reasons for your selection

Write C++ program to take input 4 strings of minimum length 1 and make a new string of length 4 by the first character of all strings in order of their input.

Please use visual basics to answer the following question Transcribed Image Text: Exercise 2e
Similarity
Software and cathedrals are
much the same – first we build
them, then we pray.
A Quote

373. File operation used with random access files to first position pointer to a specific place in a file, is known to be a. Pointer b. Cursor c. Current locator d. Seek

I need the answer as soon as possible Transcribed Image Text: Which of the following means that.29
there is no contradictions between
.requirements specifications
Complete O
Understood O
Correct O
Consistent O

82. A deadlock avoidance algorithm dynamically examines the __________ to ensure that a circular wait condition can never exist. a. resource allocation state b. system storage state c. operating system d. resources

Connecting network Transcribed Image Text: Tool
ols Help
O Mode –
Delay
erarchical networks use a tiered design, where can you use Three-tier Campus network and Two-tier Network?
Type here to search

If you would like to play a song stored in a CD through a speaker , which one these you would choose 0 DAC O Full Adder 0 Flip flop O ADC

The new Samsung S21 comes in different options: 6 colors 5G or 4G plain Amoled,TFT,TN panels 1,2,or 3 camera array Optional stylus How many Variations can you purchase on this new phone?

Transcribed Image Text: Information systems are designed to support companies as a whole, departments, and employees.
List and describe one type of information system that supports each one of the mentioned
categories.

Transcribed Image Text: Q) 1. Answer the following:
A. Write a program that counts the number of 0’s in a word store at the location 4000H and
writes it in to BL.

Discuss the concepts of reach, frequency, and impact as they relate to Super Bowl advertising. How does consideration and planning for these concepts differ between the Super Bowl and other television events?

Transcribed Image Text: 8 Find the physical address of the memory locations referred in the following
instructions if DS=0223H , DI =0CCCH ,SI =1234H.
a) MOV [DI], AL
b) MOV [SI][56H] ,BL

Explain the relative benefits of utilizing databases versus flat files in terms of performance. Comparing and contrasting database models and applications is essential. Incorporating both benefits and drawbacks is a good idea.

A ______ value is a special value that is used to terminate a loop when a set of data is being entered. Select one: a. Break b. Marker c. Control d. Sentinel

Consider an array of 6 elements (keys should be alphabets in your name i.e Prashant). Apply merge sort steps manually, and show the changes in array till your whole array is sorted.

Write a java program(UDPAddClient) using UDP Sockets that would read two integer bytes (less than 50) and send those two bytes to Server and then prints the result(sum) returned by the server

185. An Oracle __________ is a set of tables and views that are used as a read-only reference about the database. a. Database dictionary b. Dictionary table c. Data dictionary d. Dictionary

In a system an RSA algorithm with p=5 and q=11, is implemented for data security. What is the value of the decryption key if the value of the encryption key is 27?

None Transcribed Image Text: Q1) Write a MATLAB script to obtain the figure below for 0 s xS 2n
sine function
1.5
0.5
-0.5
-1
-1.5
2
3
4
7
x(rad)
(xjujs

How to tell the difference between Data Inconsistency and Data Redundancy Unstructured data is compared to structured data in this comparison. Please include any examples that may help to substantiate the comparison.

Transcribed Image Text: Convert the state diagram given below to ASM chart. Additionally, implement the control circuit
using multiplexors.
A/1
00
01, 10
11
11.
C/O
01,10
00
ó1,10
B/0
11
00

What lets you to create new presentation by selecting ready-made font color and graphics effects in MS PowerPoint Select one: a. Design Template b. Presentation Template c. Animation Scheme d. Master Slide

Transcribed Image Text: FOR COMPETING PROCESSES THE OPERATING SYSTEM PROVIDES A MECHANISM TO SHARE SOME RESOURCES IN CERTAIN WAYS AND ALLOW PROCESSES TO
PROPERLY INTERACT WITH EACH OTHER.
Select one:
a.FALSE
b.TRUE

Transcribed Image Text: Map the following ER-Diagram into schema Diagram.
Note: Must state the PK/FK
example R3(A7/Pk, A5, A2/Fk)
A1
A2
??
B1
B2
RELATION1
RS1
RELATION2
RS2
RELATION3
C1
C2
C3

To find a single object in a bigger collection of data, such as an array, several methods called as have been devised. seek procedures b. request techniques c. traversal procedures algorithmic search

Identify the production phase that includes both hardware specifications and a list of security-related properties necessary to prevent hardware backdoors? The design level. The fabrication level. The post-fabrication level. The pre-fabrication level.

Transcribed Image Text: Which of the following protocol may be used by any organization to monitor the devices such as
WLC?
a. NTP
O b. FTP
O c. SNMP
O d. HTTPS

True or False: When asking user for data, we can always turn an algorithm that uses a user-confirmation loop into one that uses a sentinel loop. Select one: a. False b. True

Please solve Quickly Transcribed Image Text: We can check changes in transmitting data by implementing
O DES
O SHA-512
CMAC
O DES or SHA-512
O SHA-512 or CMAC
O None of them

Bus arbitration type of control pins are needed in a microprocessor to regulate traffic on the bus, in order to prevent two devices from trying to use it at the same time?

Transcribed Image Text: (b) (i) Which port of 8051 has no altemate functions?
(ii) In 8086, what are the names of the registers that can be paired with
no optional segment register?

Transcribed Image Text: when class A has an association
relationship with class B, we implement
this relationship in class A as: *
O Local variable
O Data field
O Method
Inheritance
3.

Determine the time complexity of the following algorithms: Transcribed Image Text: Algorithm
Search in a binary search tree
Best Case
Average Case
Worst Case
Breadth first tree traversal
Depth first tree traversal

1 Elaborate on whether using a waterfall strategy is appropriate to the project by examining the pros and cons of the waterfall methodology in relation to the project described in the article.

In C++ programming language. 1. Write a program to print first 25 natural numbers with only 5 numbers in one line. Output should contain 5 lines with 5 numbers in each line.

Please give a rationale for your request. When it comes to multiprocessor systems, they are classified according to the manner by which they link the central processing unit and the memory unit.

None Transcribed Image Text: Q5) You have two boxes (bl and b2). bl contain 10 apples, b2 contain 5 oranges. Write a
program in C++ to swap bl contents with b2 contents.

What are the dangers of having an ubiquitous security infrastructure in place? What are the factors that prevent such infrastructure from being in place? What are the alternatives to the current situation?

Write a program that will use WheelsFX shapes to create a Car. Car must contain 6 parts (wheels, body, etc.) : Car must use 3 different kinds of shapes (Rectangle, Ellipse, etc.)

SQL Database Write PL/SQL or T-SQL procedures to retrieve and output the reservation ID, trip ID, number of persons, and trip price for every reservation whose customer number is stored in I_CUSTOMER_NUM

Transcribed Image Text: What is the name of the default event handler method for
RadioButton and CheckBox objects?
Select one:
O a. Clicke
O b. CheckChanged
O C. KeyPresse
O d. SelectedIndexChanged

Transcribed Image Text: 37. The object-oriented design process includes the following [Multiple Answers] *
Define the context and the external interactions with the system
Develop design models
Specify object interfaces
Define subsystems

13. Which of the following is an advantage to using fiber optics data transmission? a. resistance to data theft b. fast data transmission rate c. low noise level d. all of above

Transcribed Image Text: To encrypt and to secure data traveling between client agent and server agent,
which is of the following can be used
SSH
SMTP
MUA
No option is correct
HTTP

Transcribed Image Text: QUESTION 10
A GROUP BY clause returns a row for
Each Field
Each Table row
Each unique value combination in GROUP BY list
None of these
All of these

Question 16 The PAM modulated signal has constant amplitude of the carrier signal. varied amplitude of the carrier signal. varied frequency of the carrier signal. none of the given answers are true.

Write a Java program that get the name of the user as input and stores each character in a stack. then print the characters in opposite order. Input : Alan Output: Nala

To what extent is recent identity theft linked to a data breach of personal information? Identify theft may be prevented by doing the following things. Give an illustration of what I mean.

I need code in bash with algorithm Transcribed Image Text: main.bash
FunEt
1
Task 2 (b)
Local
Variables
Varialelu
Check whether the given input is a number or a
string
Registers
Register

47. Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address? a. Hub b. Switch c. Gateway d. Modem

How should TCP handle the lost packet? Mention the name of the method you used. Explain why did not choose the other one OR if both the method mean the same thing.

393. File organization system that uses two files for every data file is said to be a. Cluster sequential files b. Indexed sequential files c. Cluster random files d. Indexed random files

1. Logical port numbers are assigned by a) Open Systems Interconnection (OSI) b) Internet Engineering Task Force (IETF) c) Institute of Electrical and Electronics Engineers (IEEE) d) Internet Assigned Numbers Authority (IANA)

q30 Transcribed Image Text: :The most common format used for data modeling is
Data Flow Diagram diagramming a O
process modeling .b O
decision table diagramming .c O
entity-relationship diagramming d O

Explain the distinction between reference semantics and value semantics in the context of function calls and their implications. When should you pick one over the other? What are the benefits of each?

Desktop publishing programs Transcribed Image Text: Desktop publishing programs
Select one:
O a.
known as page layout programs
O b. Mix text and graphics
A and B
O d. None of above

Simulate the BFS algorithm for the graph in the picture below Transcribed Image Text: 2
3
3
2
7
4
2
2
3
4
8
2
5
6
1
2
2
4

Transcribed Image Text: Translate code starting at address 0x300 to assy lang.
Memory
Address
44
02
??030?
44
00
??0308
f2
92
??0306
Ob
b8
??0304
54
04
??0302
d2
d2
??0300

Transcribed Image Text: Which of the following are the edges in the
?minimum spanning tree of the given graph
b
26
6.
4
20
a) (a-c)(c-d)(d-b)(d-b)
b) (c-a)(a-d)(d-b)(d-e)
c) (a-d)(d-c)(d-b)(d-e)
d) (c-a)(a-d)(d-c)(d-b)(d-e)

Which of the following statements is correct? To raise the value of a variable, use increment; to reduce the value of a variable, use decrement. The word “system testing” should be defined.

Plot the function given below in Matlab and attach code and screenshot of output. F(t) = 2t 2 + 12t -10 t ranges from 0 to 1. t= 0: 0.01 : 1

In which client-server program can an administrator control the distant computer, but does the connection between client and server not encrypt or secure? a. Telnet b. Remote Desktop c. FTP d. SSH

How to tell the difference between Data Inconsistency and Data Redundancy Unstructured data is compared to structured data in this comparison. Please include any examples that may help to substantiate the comparison.

How to tell the difference between Data Inconsistency and Data Redundancy Unstructured data is compared to structured data in this comparison. Please include any examples that may help to substantiate the comparison.

Simulate the working operation of Insertion Sort for the array: [ 38, 23, 12, 7, 18]. Show your work at each step by writing the status of the array after every insertion.

if it is correct or incorrect Explain why if it’s false. ” Because Standard Library algorithms treat containers directly, a single algorithm may typically be used to a wide range of containers.”

Can someone help me explain how ETL strategy is used when migrating data a missing data to a Data Warehouse ? Probably better with a process flow and diagram . Thank you.

Suggest the most suitable sensor type which should measures distance to target for the identification of an object or should perform presence or absence detection. Please state the reasons for your selection

Correct and detailed answer will be Upvoted else downvoted An exception is __ A – Runtime error B – Compile time error C – Logical error D – None of the above

Q 3) If a teacher wants to communicate students in different location and he has to share course material, assignments, quizzes. Which network component role he will be using? Justify your answer.

Transcribed Image Text: Apply PERCEPTRON learning algorithm (till 6th iteration) in the following dataset.
Input
Target
X1
X2
b
t
1
1
1
1
1
-1
-1
1
1
-1
-1
1

Machine organization question The following operations are performed on a stack :PUSH A, PUSH B, POP, PUSH C, POP,POP,PUSH D, PUSH E, POP, PUSH F.What does the stack contain after each operation?

Take input an Integer n from user and then take n integers as input. From the n inputs find the number of unique integers entered by the user and print them. C++

493. A system having main memory less than total memory required by process, results in a. Memory efficient utilization b. Memory under utilization c. No loading of process d. Loading of process

Write a Template function body called swap( ) to swap the values of the two values of integer, doubles and character respectively using reference variables for swapping. (Write only template function body)

Write a java program to find the area of a polygon and in which you have you take number if side from user and length of each side from user in centimeters

7. In computer network nodes are a. the computer that originates the data b. the computer that routes the data c. the computer that terminates the data d. all of the mentioned

A_________ is software that enables users with an Internet connection to access and view webpages on a computer or mobile device. a. search engine b. wiki c. browser d. digital media player

1. Explain what the effect of each of the following commands would be if entered at the Bash prompt? Be as specific as possible d) ls | wc –l e) rm [!A-Z]???

Transcribed Image Text: Q5: Write a complete program that has another function beside the
main function. This function calculates and returns the area of a
circle. Where Circle Area
Raidus x n.

Visit the websites of three big technological companies (Microsoft, Oracle, and Cisco), as well as two more that you select. Look for optimal security procedures on the internet. What do you discover?

The class “Student” has the following attributes: studentId (int), name (String), surname (String), deptCode (String). Write a constructor method for the “Student” class that takes values as parameters for all these attributes.

Transcribed Image Text: Write a program in scala programming
language to check which number is nearest
to the value 100 among two given integers.
Return 0 If the two numbers are equal.

Which of the following is the part of a program in which a variable is visible and may be accessed by a programming statement? 1. segment 2. lifetime 3. scope 4. Module

Q1) Prepare the sample questioner containing 15-20 questions to distribute among the patients for implementing social audit in primary health care. The questioners should be related to Patients’ Voices, Rights and Responsibilities.

3 The audit and evaluation of an e-government system principally refer to a systematic and transparent way of assessing the performance of all associated e-government activities. Select one: a. False b. True

2 Transcribed Image Text: 2
If, A, B, C are square matrices of the same order, then the inverse of AXBXC is equal to
O A-‘B-‘C-!
O A-‘c-‘B-”
O c-‘B-‘A-!
O c-‘A-‘B-!

Create a simple C++ Trainee Information Program that can show and delete  the information of the trainees: The program must include: Trainee ID Number Full Namec Birthday Address Gender Department Year Training

The sequence in which operations are entered determines the order in which they will be performed in Access expressions (operations are always executed from left to right). 10) TRUE FALSE a) b)

Write a paragraph in your own words describing the significance of operating systems and whether or not it is feasible to communicate with a computer without the need of an operating system.

Transcribed Image Text: Consider the following T flip flop timing diagram: What type of clock trigger is used?
Clk
Q
No Correct answer
Falling Edge Trigger
Rising Edge Trigger
Falling and Rising

Use C code to using typedef, declare a structure Programme that can store the following vehicle details: ? programmeTitle (e.g. Diploma in Information Technology) ? mqfLevel (e.g. 4) ? fees (e.g. 18000.00)

Explain the relative benefits of utilizing databases versus flat files in terms of performance. Comparing and contrasting database models and applications is essential. Incorporating both benefits and drawbacks is a good idea.

Transcribed Image Text: Choose the correct file modes to open the files for reading and writing and truncates the file to zero length.
Select one:
a. o+
b. a+
c.r+
d. w+

120. The type of server in two-tier architectures which provides the data to client stored on disk pages is called a. transaction server b. functional server c. disk server d. data server

can you answer question 3? Transcribed Image Text: 2) Explain the purpose of the Contact header field in an INVITE message.
3) What is the purpose of the Via header fields?
ww

Transcribed Image Text: QUESTION 25
Indicate if the following expression is True or False
Assume the variables int a=3, b=4, c=6;
4 != -b || c != (a + 3);
True
False

In Chen model, a derived attribute is depicted as _____________. An oval connected with a line. An oval connected with a dashed line. An oval connected with double lines. A double oval

While putting a second hard drive in your computer, you notice that the hard disk is not connected to the motherboard through a wire. How do you know which cable to purchase?

When a network administrator configures a router to use a certain path between nodes, what type of route is created? a. Trace route b. Static route c. Default route d. Best path

Define the following terms a ) DU path b ) Definition clear path segment Transcribed Image Text: Sun
Mon
1
3
4
Begin
8
7
6.
End
Wed
Tue
Figure: Control Flowgraph

How will participation help you—
Question a. Improve your physical body?
Question b. make use of your ability to think?
Question c. make a friends?
Question d. to become a good person?

Please help me quickly Transcribed Image Text: Q2) Do not explain but compare again
do not explain but compare and only
compare among the methods used in
the detection of FM signals.

webdevelop Transcribed Image Text: Create an html page with all the different text styles (bold, italicand underlined) and its
combinations on separate lines. State style of each line through internal style sheet.

Transcribed Image Text: 1- Write python programs Order 1 crossover operator’s genetic algorithm?
Parant1
1
2
3
4
5
6.
7
8
Parent 2
3
7
8
2
6
1
4
LO

In C++ Programmin langauge: Reference variables are defined like regular variables, except you place an ________ in front of the name.  This character indicates that the value is being passed by reference.

Transcribed Image Text: 16. Groups of input are generated in which they have common characteristics and should be
processed in the same way in .. testing *
Regression
Guideline-based
Partition
O Group

1 Transcribed Image Text: A channel which has a bandwidth that starts from zero frequency is called a _channel.
a. Bandpass
O b. Low pass
Oc. gh pass
O d. Band reject

(a) Using Java Development Kit (jdk) and text editor, write a println statements to produce the output below: Recruit  Height  Shoe size ========================= Henry       5’6″         9 George     5’8″        11 Mary         5’4″         7

416. A single system wide primary memory shared by all processors is known to be a. Loosely coupled systems b. Tightly coupled systems c. Compound couple systems d. None of the Above

What do you think about email? How does an email travel from A to B? Note your comprehension. What differences and why? Consider the amount of detail (or abstraction) in various models.

Transcribed Image Text: Formal definition is one of point to
define behavior of algorithm *
Ture
False
Other:
The only way to connect between
algorithm and problem is search
space
Ture
False

19 The four forces e-government model, which aggregates relevant drivers to four key developments: convergence and technology, state and politics, society and economy, and citizen empowerment. Select one: a. True b. False

Transcribed Image Text: ADD converts unpacked BCD digits in the AH and AL register into a single
binary number in the AX register in preparation for a division operation *
true
False

5. Coaxial cables are categorized by Radio Government rating are adapted for specialized functions. Category RG-59 with impedance 75? used for a. Cable TV b. Ethernet c. Thin Ethernet d. Thick Ethernet

MCQ: Which of the following ways help in fingerprinting the OS? a. Three-way handshake session establishment b. SYN/FIN scanning using fragments c. Tracking physical path of the network d. Examining error messages

Using the string reverse program as a starti g point modify the program so it inputs a list of (16-bit integers!) from the user, and then display the integers in reverse order

Transcribed Image Text: To encrypt and to secure data traveling between client agent and server agent,
which is of the following can be used
SSH
SMTP
MUA
No option is correct
HTTP

Enter the IP address 140.25.48.3Links to an external site. in binary form Group of answer options 10001100. 00011001. 00110000. 00000011 10111100. 00011001. 00110000. 00000011 10001100. 00011111. 00110000. 00000011 10001100. 00011001. 00111110. 00000011

What is a Digital Signature, and how does it work? When it comes to digital signatures, what is the difference between them and electronic signatures? Give specific instances to support your point.

Calculate the Boolean expression for each set of inputs A, B, C A B C A && (B || C) 01100111 00000000 00000000 11110000 00000000 01100111 00000000 01100111 00000000 11110000 01100111 00000000

Transcribed Image Text: For the following Boolean expressions, which equalities are true?
F1=wy’+w’x’y’+w’yz
F2=wxy’+x’y’+w°yz
F3=wy’+x’y’z’+w°x°z+w°y°z
wwal
F4=w’xy’+wy+yz’
a) F1=F2
b) F1=F3 and F2=F4
c) F1=F2=F3
d) F3=F4
e) none of the above

If RAM (Random Access Memory) and cache memory are both transistor-based, then why do we need cache memory? Is it feasible to use a single kind of computer memory for all applications?

PLZ help with the following in JAva To by pass implementing all methods in the WindowListener interface, make the window listener a derived class of: WindowEvent ActionEvent WindowAdapter None of the above

Provide the output for the given C++ code about sizes #include using namespace std; int main ( ) { static double i; i = 20; cout << sizeof(i); return 0; } Transcribed Image Text: What is the output after executed the following statements t of int x=2, y=5; cout<< ((x>>1) & y )< n 2 0}

What is the lowest number of bits (digits) required in the binary number approximately equal to the decimal number 0.6117 10 so that the binary number has the same or better precision?

Please solve Quickly ?++ Transcribed Image Text: Arrange the text to find the numbers of digits in any
input number
Start
End
No
yes
Read N
i=i+1
N=N/10
N/10==0
print i
N%10

In an AD FS deployment, which of the following is produced on the AD FS server that serves as the claims provider? Federation trust Attribute store Claims provider trust Relying party trust

Transcribed Image Text: Consider this graph:
The term DAG stands for Directed Acyclic Graph. Is this graph a DAG?
O Yes, it is a DAG.
O No, it is not a DAG.

A wristwatch is a very common item. Discuss how object, attributes, behaviors, class, inheritance (imagine an alarm clock), modeling, messaging, encapsulation, interface, and information hiding apply to the idea of a watch.

Change this python code to R code Transcribed Image Text: def flag(height):
t.color(“red”)
a = 165
for i in range(7):
t.down ()
t.begin_fill()
t.forward(long)
t.goto(long/2, a)
t.back(long)
t.end fill()
t.up()
t.goto(-long/2,a-30)
a-=60

Java Write a program that takes string from user and a word from user and print whether that word presents on that string or not and print the results according to situation

Arrays are static in nature, meaning they are of fixed size. This produces shortage or wastage of memory. Does C language offer some techniques to make them dynamic? Illustrate with suitable program.

I need the answer quickly Transcribed Image Text: The three main services used in a
LAN are
File Server O
Print Server O
Modem Server (Sharing Internet) O
All the above O

Transcribed Image Text: What would be the number of zeros in the adjacency matrix of the graph below
1
2
3
4
? ?. 9
??. 12
Oc.
11
O d. 10

Transcribed Image Text: If an ISR is called as a result of the instruction “INT 32”, then it is
an invalid operation
a high priority interrupt
a software interrupt
a hardware interrupt

31. Which of the following is not a type of a 4GL? One originating _______________. a. on Lisp machine b. on report generators c. from database query languages d. from GUI creators

Transcribed Image Text: write object oriented program find
fact(x)+y if z even else find fact(x)-y
if x in class A , y in class B, z in class C
what’s inheritance’s type

Transcribed Image Text: Framework component which manages the access to non-code resources is
O a. View Manager
ut of
O b. Resource Manager
estion
O c. Image view
O d. R file

Write a C++ program in which take integer inputs from user until he/she presses q (Ask to press q to quit after every integer input). Print average and product of all numbers.

I need the answer as soon as possible Transcribed Image Text: a) Write the C++ code to find the number of occurrences of a sub-string in a main
string using string function.

You are purchasing a birthday gift for your sister. You both share a computer. How can you hide your searches? Clear cache. Turn on proxy settings. Use private browsing. Refuse security certificates.

Write an assembly program to find the geometric series of first 7 numbers and then show the sum of all the numbers by using sub routine. Run the program and attach screenshot.

a string from user an —Final string. In Cit Transcribed Image Text: Take input a string from user and add the string “read successfully” to it.
Print the final string.
In C++

Human speech is ___ because it uses continuous (wave form) signals that vary in strength and quality. Most computers are ____, meaning that they recognize only two discrete states: on and off.

207. The type of signaling that have the same circuit and is used for both signaling and voice communication is called a. out-band b. in-band c. signal transport ports d. signal points

Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is a. 101 b. 105 c. 103 d. 107

46. ________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation. a. Semantics b. Syntax c. Timing d. None of the above

A syntax tree: i) is another name for a parse tree ii) should not have keywords as leaves iii) is a condensed form of parse tree iv ) both ii) & iii)

Transcribed Image Text: n 8
View component id is kept in a file called
ed
O a. Android Manifest
I out of
O b. Styles
question
O c. R
O d. Resource

q9) In which of the following linked list there will be no beginning and ending? a. Depends on the Problem. b. Single Linked List. c. Double Linked List. d. Circular Linked List.

Write “Handle Return” use cases scenarios for each following functionality: (a) Room reservation (b) Changing the properties of a room (for example, from non-smoking to smoking) (c) Customer check-in (d) Customer check-out

Consider a system consisting of six resources of the same type that are shared by four processes, each of which needs at most three resources. Show that the system is deadlock free.

63. Which layers of the OSI reference model are host-to-host layers ? a. Transport, Session, Presentation, Application b. Network, Transport, Session, Presentation c. Data-link, Network, Transport, Session d. Physical, Data-link, Network, Transport

Objects enable the design practice of ————–—although they may know how to communicate with one another across well- defined interfaces, they normally are not allowed to know how other objects are implemented.

Ex: Write code in VB.NET to solution the following : 10 l_l x+3 0 Transcribed Image Text: Ex: Write code in VB.NET to solution the following:
10
| x + 3
0-

ving add() ,print( b?th these functlnn;are_ functlnns Transcribed Image Text: 1 Make a singly linked list in java
2 from scratch having add() ,print()
3 functions .both these function are necessary
4

Write a program with two functions. One function will create a new file and write some content in it. The second function will read the contents after the first function has completed.

I need the answer as soon as possible Transcribed Image Text: Java
Write a program to print the character in a
string and the string is given . Not need to
take.

What is the best storage media for backing up data utilized by application program users? Choose one (1) appropriate application software and explain your choice in terms of cost, speed, and capacity.

235. We need to send 265 kbps over a noiseless channel with a bandwidth of 20 kHz. How many signal levels do we need? a. 1024 b. 512 c. 256 d. 128

Baud means? a. The number of bits transmitted per unit time b. The number of byted transmitted per unit time c. The rate at which the signal changes d. None of above

C++ Program Transcribed Image Text: 7. Write a program that generates the given pattern below on the terminal:
1
1
1 2
21
123
321
123 4
123 4 554 321
4321

I need the answer as soon as possible Transcribed Image Text: Write a program in which we had a file then
we had to read it and print the contents on
output

The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as a. Bit stuffing b. Piggy backing c. Pipelining d. Broadcasting

Program to concatenate two array. Use arraycopy Sample array ArrA = 1, 2, 3 ArrB = 4, 5, 6 Sample output : [1, 2, 3, 4, 5, 6] Use kotlin language please

58. Which of these is not one of the phase names defined by the Unified Process model for software development? a. Inception phase b. Elaboration phase c. Construction phase d. Validation phase

In ________, the phase of the carrier is varied to represent two or more different signal elements. Both peak amplitude and frequency remain constant. a. ASK b. PSK c. FSK d. QAM

Transcribed Image Text: Q4. Find the
urrence relation and solve it using back substitution and master theorem
Vord Pracfice Cent n)
if (n>1)
for (C=0; ?an;it+)
stnt ;
Practice (2);
Practice C2);

want to implement a network service involving sockets where servers and clients authenticate themselves and encrypt the transmitted data using SSL in py Correct else i downvote.if you dont knowledge skip it

PowerPoint presentations are widely used as.
Select one:
a. Only as Note outlines for teachers
b. Only as Project presentations by students
c. All of these
d. Only as Communication for planning

Visit the websites of three big technological companies (Microsoft, Oracle, and Cisco), as well as two more that you select. Look for optimal security procedures on the internet. What do you discover?

Please help me solve this problem: Transcribed Image Text: Part I.
Name at least five (5) other widgets in Python, and show
the following:
1. Definition / use
2. Syntax
3. Example

Transcribed Image Text: Which sensor, when it comes to sensitivity, will
be favoured as a biosensor, the one with great
sensitivity or the one with low sensitivity? Justify
your position using examples.

Write a java program to display

1 2 3 4 5 6
1 2 3 4 5
1 2 3 4
1 2 3
1 2
1

Do it using for loop

Transcribed Image Text: The schema defines the part of the database
that is seen by the application programs that
produce the information from the data within the
database.
Select one:
True
False

a) Implement a function start( ) that takes as input a positive number a, rounds its logarithm base 4 to the nearest integer n, and returns the value of 1.0 x 2^n.

What is the ideal scenario to implement a Prototyping model of information system development O a. Detailed requirements are ready O b. Currently known requirements Oc. Ambiguous requirements: Od. To understand requirements

None Transcribed Image Text: Choose the correct answer
(2) ¿Lhäi . .. When I read a timetable, I use
…. …. ….
skimming skill O
intensive reading
scanning skill
all of them

Write a program in C++ to print a pattern below: 12345 2345 345 45 5 Transcribed Image Text: Write a program in C++ to print a pattern below:
12345
2345
345
45

Following the development and testing of separate software modules, it is necessary to integrate and test the programme as a whole. The need of properly testing the whole system should be discussed.

A reverse proxy______ a. only handles outgoing requests b. is the same as a proxy server c. must be used together with a firewall d. routes incoming requests to the correct server

What is the name of the operating system that reads and reacts in terms of actual time? (A) Real time system (B) Time sharing system (C) Quick response system (D) Batch system

79. The type of allocation in which blocks of file are allocated to consecutive blocks of disks is classified as a. indexed allocation b. header allocation c. contiguous allocation d. linked allocation

Solve it quickly please Transcribed Image Text: What will be the output of below given program:
class Main
public static void main(String[] args)
{
int x[]={20,30,50,60};
for(int i=2;i main() { char s[20] = “Hello\0”; printf(“%d %d”, strlen(s), sizeof(s)); }

Explain the following, please use your own words (0% Plagiarism) Human existence as a being-in-the-world Difference between Being-alongside and Being-with entities in the world Difference between human temporality and ordinary clock time

What is a Digital Signature, and how does it work? When it comes to digital signatures, what is the difference between them and electronic signatures? Give specific instances to support your point.

Write a 2 pages note on Software requirements and specifications. What is Software requirements and specifications why it is important. What is the difference between software requirements and specifications and Requirements engineering?

Transcribed Image Text: (b) (i) Which port of 8051 has no altemate functions?
(ii) In 8086, what are the names of the registers that can be paired with
no optional segment register?

What are the dangers of having an ubiquitous security infrastructure in place? What are the factors that prevent such infrastructure from being in place? What are the alternatives to the current situation?

Transcribed Image Text: 2. ] Prove the identity of each of the following Boolean equations, using
algebraic manipulation only:
Y + XZ + XY = X+ Y + Z
B)
| (AB+C)(A+B)(B+AC)=ÃBC

wap a program in C that take 10 sentences and find frequency  of each word. Show in program which word has highest frequency and all sentences with that word in given  sentences

Define the following terminologies as used in Object Oriented Programming and provide a simple python example of each: i. this keyword ii. Local variables iii. Instance variables iv. Instantiation v. super keyword

I need the answer as soon as possible Transcribed Image Text: Consider the following NFA for E = {g, a, t, e}
a
g.a.te
Find the number of states in equivalent DFA.

Write a C++ program to take input a char value from user and print the Country of user. A/a- America C/c – China R/r – Russia Else country not listed in records.

Intranets make use of Web browsers and servers, TCP/IP client/server networks, hypermedia databases hosted on networked Web sites, and so forth and so on. What will be the finest match will be?

Visual Studio format programming What’s wrong with the following code segment? (Print hello 10 times) Dim intIndex As Integer For intIndex = 1 To 10 Step 1 Console.WriteLine(“hello”) intIndex += 1 Next

What is the outcome of the following given that isAwake = true, num1 = 7, num2 = 56, name = “John” and specialSymbol = “o”; !(!isAwake || name.contains(specialSymbol)) Select one: True False

Please show an example  of how or how to to solve coding the problem from Starting out with Java from control structures through data structures 4th edition: chapter 18  programming challenge 7

The operating system (OS) is responsible for a variety of tasks. Is there a connection between the relationship between an operating system, applications, and other software, and the relationship between computer hardware?

Transcribed Image Text: PaoBLEM# 39 I Simplify the following expressions using Boolean
algebra. Cite the laws and therorems used.
• AB + A(CD + CD’)
• (BC’ + A’D) (AB’ + CD’)

Find the binary expansion of 2/3 and determine which machine number x? or x+ (left-shifted, with 23-bit mantissa) is closer to 2/3. Then find the relative rounding error associated with this approximation.

What is the piece of hardware that allows a device to physically access a network? a. A client program b. A server program c. A network interface card d. An operating system

Transcribed Image Text: In Android Studio create a layout as shown.
Requirements
1. ImageView without border
2. TextView
3. Button
4. Checkbox
5. RadioButton
6. Switch
TextView
BUTTON
I CheckBo
RadioButton
Switch

What are the advantages of distributing objects in a client-server environment? Explain the basic concepts that govern a distributed object model. You may use a diagram to illustrate aspects of the model.

Q 02: While developing a software, we need to emphasize over the quality as well and there must be few factors which somehow affects the quality during the process, explain those factors.

5 Transcribed Image Text: 5
The matrix A = A(Transpose) where A is any matrix is
O always symmetric
O symmetric about the secondary diagonal
O another general matrix
O skew symmetric

What is meant by the elimination of epsilon (E) productions? Also eliminate E-productions from the grammar. S ? aA | aB A ? aaA | B|€. B? b | bB D? B.

Which of the methods are used to manage result sets using both associative and indexed arrays? a) get_array() and get_row() b) get_array() and get_column() c) fetch_array() and fetch_row() d) mysqli_fetch_array() and mysqli_fetch_row()

Take user input of two integers a and b, add both the numbers and print the result in output but add both the numbers without using addition operator . Use C++ language.

Class Files (package java.nio.file) is one of many classes throughout the Java APIs that have been enhanced to support Streams. State whether the statement is true or false. If false, explain why.

At which address (Internal RAM location) the value FCh and 9Dh will be available after execution of the following code: SETB PSW.4; SETB PSW.3; CLR PSW.4; MOV R3, #0FCh; MOV R5, #9Dh;

ving add() ,print( b?th these functlnn;are_ functlnns Transcribed Image Text: 1 Make a singly linked list in java
2 from scratch having add() ,print()
3 functions .both these function are necessary
4

Transcribed Image Text: Q3- Classified.each code if its
A. Prefix-free Code,
B. Uniquely Decodable Code
C. Instantaneous Code
Codel
Code 2
Code3
00
1
01
10
10
00
001
11
11
0001

What are the dangers of having an ubiquitous security infrastructure in place? What are the factors that prevent such infrastructure from being in place? What are the alternatives to the current situation?

Write 8085 code to do logical AND of two 8-bit numbers stored at locations 0004H and 0005H in memory. Store the result at location 0008H. Show assembler output and memory view. Sim8085

I need the answer as soon as possible Transcribed Image Text: Q3: Write a VB program to enter 8 values for a student’s grades representing 8 subjects and
find his average ?

Given an array arr of type int, along with two int variables i and j, write some code that swaps the values of arr[i] and arr[j]. Declare any additional variables as necessary.

31. Which is true for a typical RISC architecture? a. Micro programmed control unit b. Instruction takes multiple clock cycles c. Have few registers in CPU d. Emphasis on optimizing instruction pipelines

I need the answer as soon as possible Transcribed Image Text: Is information security policy considered static or dynamic? Why do you think this scenario will turn out the way it does?

What are the dangers of having an ubiquitous security infrastructure in place? What are the factors that prevent such infrastructure from being in place? What are the alternatives to the current situation?

Create a Python program to print the given string 5 times. “Strings are immutable in Python.” Print the strings in separate lines  by leaving space of one line in between two strings.

Analyze the 7 Fundamental Software Testing Principles and briefly describe how each principle relates to bug tracking, assuming you are working on a project that aims at developing a health information system.

Max num of tree pointers in B tree Node Keys = 10bytes Block = 512 bytes Data pointers = 8 bytes Block pointers = 5 bytes Max value of p = ?

Following the development and testing of separate software modules, it is necessary to integrate and test the programme as a whole. The need of properly testing the whole system should be discussed.

Would you agree with the following statement about a P2P file-sharing program: “There is no notion of client and server sides of a communication session”? What are your arguments for and against?

The e-government service maturity models clearly differ from each other, which allows to classify them into five groups according to their overall development scope/highest development stage.
Select one:
a. False
b. True

173. A protocol is a set of rules governing a time sequence of events that must take place a. between peers b. between an interface c. between modems d. across an interface

Transcribed Image Text: Question 16
For an array of size n, the time taken by the bubble sort in the worst case is:
O(log n)
b. 0(2 n)
Oc C(n3
d. O(n)

What is the outcome of the following given that isAwake = true, num1 = 7, num2 = 56, name = “John” and specialSymbol = “o”; !(!isAwake || name.contains(specialSymbol)) Select one: True False

1 (The POOH-POOH theory proposes that speech developed from the instinctive sounds people make in ______________________. Select one: a. academic circumstances b. none of the above c. emotional circumstances d. difficult circumstances

Python Programming Give the smallest expression, containing only the number 3 and the operator / and parentheses whose value is 9.0. THE ONLY USABLE OPERATOR IS “/” for example (3**3/3) is invalid

How many RAID 5 drives are used depends on the database administrator’s preferences. What are the costs, reliability, failure performance, and rebuild performance trade-offs between having fewer disks and having more disks?

DO NOT COPY FROM OTHER WEBSITES Correct and detailed answer will be Upvoted else downvoted directly. Thank you! Transcribed Image Text: A. 3897 (BCD)+ 4678 (BCD)
B. 8977 (BCD) + 9765 (BCD)

hello, i am having problems with this hw question, Explain the problem with the following code: int a[] = {1, 2, 3, 4, 5}; a[5] = 10; cout << a[5] << endl; 32. Which of the following 4GLs invented at IBM and subsequently adopted by ANSI and ISO as the standard language for managing structured data? a. SQL b. PROLOG c. C d. JAVA What is the difference between a hard drive password and a BIOS/UEFI password? How does the password for a hard drive fare if the disk is transferred to a different computer system? given a BST, you’re asked to remove a node from it. You need to show the tree after removal of the node. How to do this, with explanation to help me prepare To what extent is recent identity theft linked to a data breach of personal information? Identify theft may be prevented by doing the following things. Give an illustration of what I mean. Write a C++ program to read two character variables char a and char b from user. If a and b entered by user are same then print “Matched”. Otherwise print “Not matched”. (Subject: MATLAB) Hello dear, l need to answer in a short time, less than an hour. Transcribed Image Text: Q1/ What is the type of program files that MATLAB allows to write? Please take input as float remember not interested C++ Write a program to print a table for a number the number taken from user. The user entered number must be floating point None Transcribed Image Text: Write a Matlab code to read 10 integer numbers and find the even and odd numbers, after this find the sum of the * ?odd and even numbers An explanation accompanied by a graphic illustration What is the main purpose for software engineering’s existence in the first place? It is difficult to overestimate its importance in the software development process. What are the dangers of having an ubiquitous security infrastructure in place? What are the factors that prevent such infrastructure from being in place? What are the alternatives to the current situation? Write a java program to display 1 2 3 4 5 6 1 2 3 4 5 1 2 3 4 1 2 3 1 2 1 Do it using for loop Transcribed Image Text: Which of the following lists are valid.7 non-functional requirements Specification, performance, interface, privacy, environmental Unique, privacy, operational, quality, environmental Security, reliability, operability, compatibility, maintainability Security, performance, quality, unique, complete None Transcribed Image Text: The number of tokens in the following C code segment is switch(inputvalue) { case 1: b = c* d; break; default : b = b++; break; %3D } Transcribed Image Text: Write a Matlab code to determine Which values occur exactly three times in the input vector x? e.g. if x= [125227 833 13 88 8] then, y= [2 3] Transcribed Image Text: What I/0 device number will activate this decode circuit? Remember that I/O device numbers are given in hex. A7 A6 A5 A4 C2G ?? diG IG A2 A1 A0 Transcribed Image Text: “Please wait while I open the file” is an example of: Select one: O a. a feedback O b.a remark O c.a warning message O d. a prompting cue Write the function definition for a function called list_total that accepts a list of integers as a parameter.   The function should sum all the numbers in the list and return the total. Complete the C++ function given below: bool checkPT(string str){ /*returns true if str contains equal no. Of ‘P’ and ‘T’ */ } Test the function for some sample string of your choice. Determine the value ranges that may be represented by the following data types: int short int long int float double I am very thankful to the expert that can help me :) What is a Digital Signature, and how does it work? When it comes to digital signatures, what is the difference between them and electronic signatures? Give specific instances to support your point. 236. Calculate the theoretical highest bit rate of a regular telephone line. The signal-to-noise ratio is usually 3162. a. 34.860 kbps b. 17.40 kbps c. 11.62 kbps d. none of the Mentioned Is it correct to say that a function that accepts an array as a parameter has access to the original array or that it just has access to a copy of it? Transcribed Image Text: 1. Analyze the following sequential circuit. Derive the (a) state equations (b) state table and (c) state diagram of the following sequential circuit Cnt FF1 Clk DQ FF2 DQ In which client-server program can an administrator control the distant computer, but does the connection between client and server not encrypt or secure? a. Telnet b. Remote Desktop c. FTP d. SSH Transcribed Image Text: Consider the value of a=36 and value of b=34. a=a+b b=a+b c=a+b d=a+b+c print(c) print(d) What is answer for the statement print(c) What is answer for the statement print(d) Rewrite this java method in SWIFT and GO languages Transcribed Image Text: static int[][] ordered2DArray(int row, int col) { return Intstream.range (0, row).mapToobj(x -> Intstream.range (x*10, x*10+col) .toArray()
). toArray (int[]::new);
}

Visit the websites of three big technological companies (Microsoft, Oracle, and Cisco), as well as two more that you select. Look for optimal security procedures on the internet. What do you discover?

Encryption – what is it and how does it work? Distinguish between private and public key encryption by providing definitions and examples. How is sender authentication and secrecy provided by public-key cryptography?

Using the Basics Transcribed Image Text: Write a program for the numbers of 5
degrees in the S.F file, and then calculate
the sum of the degrees in the file?
10:07 AM

Transcribed Image Text: Let x and y be two Boolean variables and F(x, y) be a Boolean function defined as:
= xy +z
F(x,y)
Write F(x,y) as a sum of products.
y+7)

108. A data dictionary doesn’t provide information about: a. where data is located b. the size of the disk storage device c. It allows a many-to-many relationship d. It is conceptually simple

If RAM (Random Access Memory) and cache memory are both transistor-based, then why do we need cache memory? Is it feasible to use a single kind of computer memory for all applications?

Explain the term structured exception handling (SEH) as used in systems programming and give a practical example to illustrate how it can be used to handle errors in a block of code.

ving add() ,print( b?th these functlnn;are_ functlnns Transcribed Image Text: 1 Make a singly linked list in java
2 from scratch having add() ,print()
3 functions .both these function are necessary
4

how to differentiate the normal natural voice and cloned voice? is there an application to detect weather an audio is cloned or not? if yes please list the name of the application.

Transcribed Image Text: Complete the table below to convert the decimal number 13697 to hexadecimal. Use as many rows as you need.
n div 16
n mod 16
The hexadecimal number is

What is the value stored at y, given the statements? int y; y = 6 / static_cast   (4.5 + 6.4); A. None of that B. 0.6 C. 0 D. .275229 E. .3

Select the direct connection service from one major CSP (e.g., AWS Direct Connect, Azure ExressRoute, or GCP Cloud Interconnect). Research online for information on its benefits, features, supported connection speeds, and pricing.

Transcribed Image Text: Write
program
to
compute
Rea
Q2:
a
in the circuit shown. All resistors in the Fig, shown are 50 each. And draw
the flow chart for this program.
R

What are the advantages of distributing objects in a client-server environment? Explain the basic concepts that govern a distributed object model. You may use a diagram to illustrate aspects of the model.

Transcribed Image Text: Q3: Design 4-bit parallel adder (use blocks of full adders) and show the sum and
intermediate carries when the binary numbers are (A = 1011) and (B =010 1)

JavaScript An array is given of integer of 10 enteries and one another array also given of 2 entry .copy those 10 entry without using concat and loops.You can use other methods

55. CASE tools do not include which of the following features? a. Help to draw data models b. Help to generate code c. Help to manage people d. Create an information repository

Suppose list1 is [4, 2, 2, 4, 5, 2, 1, 0], Which of the following is correct syntax for slicing operation?

a.
all of the these

b.
print(list1[:-2])

c.
print(list1[0])

d.
print(list1[:2]

If two search heuristics h1 (s) and h2(s) have the same average value, the heuristic h3(s) = max(h1(s), h2(s)) could give better A* efficiency than h1 or h2. Select one: True False

When doing qualitative data distribution analysis, statistics are often made on the category of an attribute. In addition to the pie chart, the object’s ______________ () method is often used for calculation.

Exercise 5.2 Draw the diagram of the DFA that recognizes the entries whose at least one of the last 3 symbols is ‘a’, with ?= {a, b}. (DFA: Determined Finite Automata) Thanks.

Transcribed Image Text: Q5. (A)_ What is the result of the following code;
a = 10;
while( a < 15 ) fprintf('value of a: %d\n', a); a = a + 1; end QUESTION 70 Explain how to send an email securely (confident, integrity and authenicated) QUESTION 71 Traceroute is implemented using  ___  protocol QUESTION 72 What is the purpose of nonce in authentication protocols? In C++, Write a program that asks the user to enter two numbers, obtains the two numbers from the user and prints the sum, product, difference, and quotient of the two numbers. Visit the websites of three big technological companies (Microsoft, Oracle, and Cisco), as well as two more that you select. Look for optimal security procedures on the internet. What do you discover? The requirements shown in Question 11 have changed. The dentist’s office would like to add the date of the patient’s last payment. In which relation (table) would you place this attribute? Why? Under database management and system please write very clearly or type Transcribed Image Text: Q5. What is the purpose of clustering? Explain. Give an example to the “intra” and “inter” file clustering. Course: TCP IP Programming Suppose the router receives a Protocol Data Unit greater than the next hop’s Maximum Transmission Unit, what are the two options for the router to do………….. and ………………… sum from n equals 1 to infinity of left parenthesis negative 1 right parenthesis to the power of n plus 1 end exponent cos squared n converges conditionally Select one: True False q4) Which of the following sorting algorithm uses the “Comparision of digits in the number ” for sorting the data? a. Bubble sort b. Selection sort c. Merge sort d. Radix sort Which of the following derivations generated by Predictive Parser? 1. Leftmost derivation in reverse 2. Rightmost derivation in reverse 3. Rightmost derivation 4. Leftmost derivation Note: Select 1 answer from 4 options. 42. Which of these software characteristics are used to determine the scope of a software project? a. Only performance b. Only context c. Information objectives, function, performance d. None of the above Consider the relation sec course, which is the result of a many-to-one connection set sec course. Do the relation’s main and foreign key constraints enforce the many-to-one cardinality constraint? Please explain why. c++ programming Transcribed Image Text: 1. What is a reference in C++? 2. What is a pointer in C++? 3. What is the difference between a pointer and a reference in C++? C++ – No library functions like atoi Write a machine language program to input two one-digit numbers, add them, and output the one-digit sum. Submit your “machine code” followed by a ‘zz.’ //Write C++ program to creat a class named (City) which includes function getName, getPop and displayInfo to enter and display the information (names and population) of 4 cities using array of objects. 12.A type of education where the medium of instruction is computer technology is (a) e-learning (b) e-teaching (c) c-teaching 13.Communication technologies are generally categorized as asynchronous (a) synchronous (b) di-sychronous (c) multi-sychronous. Please solve Quickly ?++ Transcribed Image Text: Find the output of the given C program. if((3<2) && (2 == 2)) 3%3D printf('true"); else printf("false"); ?. b. true O C. 1 d. false I need the answer as soon as possible Transcribed Image Text: What is the expected output of the following program * Python i=1 j=1 while (j==1): if(i%7==0): break print(i) i+=1 your answer How computer applications are supporting Daraz.pk in the process of accomplishing five discussed quality outcomes? In your opinion what new computer applications must be integrated into Daraz.pk? Give valid reasoning with examples. How are these concepts related to each other: Cloud Computing, Big Data, Virtualization, Data center, Data Analytics. Draw a diagram showing the order of development and implementation in a hierarchical layering system. The term “scope creep” refers to a growth in a project’s scope that may substantially raise costs. Give an example of how a good system context model keeps the scope from expanding. i need the answer quickly Transcribed Image Text: Q7: Write an algorithm to print the multiplication table for number 9? 08. Weite an oleorithm te calculete the averege nuumbers thet the foctori Write a C++ program to print 5 numbers in reverse order of their input.See sample I/O below: Input: 1 2 3 4 5 Output: 5 4 3 2 1 nt: Use stack. The CISO request you to address violations by developing a security document (Rules of Behavior) stating at least 15 rules about what activities employees are not allowed to conduct on the network. Transcribed Image Text: Quèstion 37 In HTML, the head of the document is enclosed in a pair of and
O and and
O and

Q 02: While developing a software, we need to emphasize over the quality as well and there must be few factors which somehow affects the quality during the process, explain those factors.

A syntax tree: i) is another name for a parse tree ii) should not have keywords as leaves iii) is a condensed form of parse tree iv ) both ii) & iii)

digital design Transcribed Image Text: The
is used to overcome the Racing Problem in
Select one:
O Master-Slave JK-Flip-Flop, JK-Flip-Flop
O JK-Flip-Flop, Master-Slave JK-Flip-Flop
O T-Flip-flop, Master-Slave JK-Flip-Flop
O Master-Slave JK-Flip-Flop, T-Flip-Flop

485. CPU time allocated to each user in a time sharing system is said to be a. Very short periods b. Very long periods c. Short cycle time d. Long cycle time

In Hadoop, above the file systems comes the ________ engine, which consists of one Job Tracker, to which client applications submit MapReduce jobs. a) MapReduce               b) Google c) Functional programming d) Facebook

None Transcribed Image Text: 14
Revit Start up view shows what?
Sheets, Spools and Isometrics
Views
Options for Job Setup
Opening of Projects and Families or Creating
new ones from a template

I need the answer as soon as possible Transcribed Image Text: Write a MATLAB command to create
a matrix X with three rows and four
columns with all zero elements.
Your answer

Result Calculator: Create a percentage calculator in which user enters the total obtained marks and total maximum marks and program prints in output the percentage obtained by the user. Use Python language.

What is the name of the application architecture and design approach that decouples the application from any specific physical resource? Select one: Platform as a Service DevOps Cloud native Automation Container orchestration

Do fast in 5 minutes. write code in machine independent language for finding the trailing zeroes in factorial of a number .take number from user input and then make a separte function.

(7) After typing En in the command prompt of a switch, which symbol can be pressed to check which are the available commands in that mode?

a.
?

b.
{

c.
@

Transcribed Image Text: The average waiting time is:
Process
Duration
Order
Arrival Time
P1
3
1
P2
4
2
P3
3
3
Suppose time quantum is 1 unit.
5.30
5.33
4.33
4.30

Take input coefficients of a quadratic equation from user and solve that quadratic equation. Find the roots of that quadratic equation and print them. In Octave/MATLAB. Attach your output and code screenshot.

Transcribed Image Text: REPRESENTS THE STATE WHERE A PROCESS HAS BEEN RELEASED FROM THE EXECUTABLE PROCESSES EITHER BECAUSE IT IS HALTED OR ABORTED FOR
SOME REASON.
Select one:
a.RUNNING
b.EXIT
c.BLOCKED
d.READY

Compare and contrast Java and C++ what features of Java make it better than C++? make comment on the features of Java that makes it good programming language and better than C++.

Transcribed Image Text: Please show each step and label (if needed) what
you did, thanks!
Rewrite the number 847387 in:
a) base 2
b) base 7
O base 8
d) base 16

I need the answer as soon as possible Transcribed Image Text: What is the expected output of the following program –
i = str(5)
j
= int(i)
%3D
print(j*i)
your answer
Python

200-500 words per discussion. Write and discuss the algorithms of the following tree searches below. Use your own examples in explaining them. Binary Search Tree Spanning Tree Tree Traversal AVL Tree Heap

61. Which of the following traits need to exist among the members of an agile software team? a. Competence b. Decision-making ability c. Mutual trust and respect d. All of the above

Write a statement that creates a two-dimensional list with 5 rows and 3 columns. Then write nested loops that get an integer value from the user for each element in the list.

None Transcribed Image Text: In Android Studio create a layout as shown.
Requirements
1. ImageView without border
2. TextView
3. Button
4. Checkbox
5. RadioButton
6. Switch
TextView
BUTTON
CheckBox
RadioButton
Switch

In C++ Transcribed Image Text: while (getline (MyReadFile, myText))
The above is most likely associated with:
writing to a file
writing a binary file
reading a file
O reading a binary file

Intranets make use of Web browsers and servers, TCP/IP client/server networks, hypermedia databases hosted on networked Web sites, and so forth and so on. What will be the finest match will be?

Please solve Quickly ?++ Transcribed Image Text: Arrange the text to find the numbers of digits in any
input number
Start
End
No
yes
Read N
i=i+1
N=N/10
N/10==0
print i
N%10

What is the Sliding Window Protocol, and why is it preferable to the simplex protocol in this case? Please keep in mind that you have 30 minutes to complete the problem. Asap

Transcribed Image Text: In
the available bandwidth of the common channel is divided into bands that
are separated by guard bands.
Oa CDMA
Ob TDMA
Oc None of the answers
Od FDMA

The memory contains an array of 200 elements starting at addresses 400H. Write the assembly code that records the numbers between 0 and +10 in this array, starting from address 850h, respectively.

104. _______ conversion is the process of changing one of the characteristics of an analog signal based on the information in the digital data. a. Digital-to-analog b. Analog-to-analog c. Analog-to-digital d. Digital-to-digital

3 In powerpoint, automatic movement of the slides is done with the help of. Select one: a. Rehearse timing feature b. Transition feature c. All other options are wrong d. Animation feature

Transcribed Image Text: 6- Generates a random number between 1 and 10, Asks the user to guess the number
and prints a message based on whether they get it right or not.

Given an integer array arr below, write a function that takes the array as parameter and return the average of only positive numbers in the array. int arr[10] = {-2,5,12,-18,22,-29,-1,76,0,11} In C++

write a fortran 90 Transcribed Image Text: Q.1/ Write a FORTRAN 90 program to print the square root of numbers from 100 to 1200 and
calculate the sum of the resulting values.

Transcribed Image Text: 3
Select the default method called when an activity is removed from memory.
d
O a. onTerminated()
out of
O b. Finished
question
O c. onDestroyed()
O d. onFinished()

A computer need to send three data items EB716, C5D16 and AC916. By using checksum error detection method, find the checksum that need to be sent to the receiver (show your work).

None Transcribed Image Text: Question 5:
Use the eye, ones, and zeros commands to create the following matrices:
A = [0 0] , B=|111
111.
[1110 01
D= 11110
l1110 1
C=

Bottom-up Parsing : Show a complete parse, including the parse stack contents, input string, and actions for the string id + (id * id  + id) using the grammar and parse table

A(n) _____ is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet. a. Internet backbone b. domain name c. IP address d. ccTLD

Variable Length Subnet Masks (VLSM) and Classless Inter-Domain Routing (CIDR) are commonly applied concepts in networking today. i). Explain the difference between VLSM and CIDR ii). Explain THREE benefits of using CIDR

Write a c++ program to read a sequence of numbers and stop when the sum of odd numbers
equal to the sum of even numbers and then print their sum (using while)

Transcribed Image Text: ?Which of the following creates a variable called myNum of type float
float myNum = 5.75;
float myNum = 5.75f;
float myNum = 5.75
None of the above O

475. Process of preventing a job’s memory partition from changing instruction of a job in another memory partition is called a. Memory protection b. Memory copyrights c. Memory bounding d. Memory walls

Write a java program to display

1 2 3 4 5 6
1 2 3 4 5
1 2 3 4
1 2 3
1 2
1

Do it using for loop

Please solve Transcribed Image Text: 3. Test the lexical analyzer using sample of source files from the JavaScript programming
language.
4. Write a Lex program to remove comments from the JavaScript language.

Prompt the user for entering his vaccination status, if user enters 0, print “Not Vaccinated”. if user enters 1, print “Partially Vaccinated” and if user enters 2, print “Vaccinated.”. In C language.

Program to register a new student in a text file with a student list in java and find out who it belongs to when we enter the student number from that list.

Transcribed Image Text: What is the technique to convert decimal number in octal, binary, and hexadecimal
number?
Multiply by their base
Multiply by their weight
Multiply by 2
Divide by their base

Build an FA that accepts language of all words over the alphabet {a, b} that have both the letter a and the letter b in them, but not necessarily in that order.

Transcribed Image Text: A) Write a program to generate the numbers following:
(22, 20, 18, 16, 12, 10, 9, 8, 6, 5, 4, ,3, 2, 1) on ListBox, by using For…Next Loop.

4 Transcribed Image Text: In the expression A + BC, the total number of minterms will be . (hit use draw Kmap)
Select one:
a. 3
O b.5
O .2
O d.4

In which client-server program can an administrator control the distant computer, but does the connection between client and server not encrypt or secure? a. Telnet b. Remote Desktop c. FTP d. SSH

VISUAL STUDIO 2019 C# Generate a console application that allows you to enter values ??and calculate lengths. For example, Kilometers to meters, centimeters, and millimeters. Meters to kilometers, centimeters and millimeters, etc.

None Transcribed Image Text: 8.
is responsible on fetching instructions and reads data from memory and I/O
ports then write the results back.
a) Register
c) BIU
b) EU
d) Address generator

Transcribed Image Text: QUESTION 9
focuses on designing an enterprise-wide database that is based on a specific data model but
independent of physical-level details.
Physical design
Logical design
System design
Interface design

Transcribed Image Text: Which of the following statements will print a variable x with the value 5 as 005?
print(‘%03d’ % x)
print(‘%+3d’ % x)
O print(‘%-3d’ % x)
print(‘%3d’ % x)

Transcribed Image Text: MC6:
is an example of acknowledged connectionless service. Its
frame is sent with retransmissions if needed.
Wired communication 802.3
Wireless communication 802.11
Wireless communication 802.3
O Wireless communication 802.2

Result Calculator: Create a percentage calculator in which user enters the total obtained marks and total maximum marks and program prints in output the percentage obtained by the user. Use Python language.

Transcribed Image Text: To subtract the value of variable number from the value of variable result, you write
number -= result;
result
-= number;
number = result
number;
result = number
result;

Please answer the question in the screenshot. The language used is Java. Transcribed Image Text: Given an arbitrary linear data structure, binary search can be slower than sequential search.
O True
False

d) Take input the number of sides and length of each side of a Polygon from user and then print the area of the polygon in output. Write program in C++ language.

I need the answer as soon as possible Transcribed Image Text: Q3: write a program in C++ to read a two dimensional array A[3||4) then print the elements as
consecutive columns.
C++

Computing And Software Systems Transcribed Image Text: It is important to understand buffer overflow because it is a vulnerability in the C
programming language and most
software is still written in C.

Transcribed Image Text: What is the running time cost of the Merge Sort of N elements?
a. O(N)
O b. O(N)
??. ?(1)
O d. O(N log N)
O e.
O(log N)

Transcribed Image Text: Convert the octal expansion of each
of these integers to
.a binary expansion
8(572)
1110 0111 1O
1010 0111 1 O
1010 0011 1 O
1010 0110 1 O

Q10. Which of the following has the maximum bias stability? Vee Veo v, Transcribed Image Text: Q10. Which of the following has the maximum bias stability?
Voc
Vec
(a)
(b)
(c)
(d)

Transcribed Image Text: Question 13
Not yet answered
Marked out of 1.00
P Flag question
A data structure is composed of related
elements.
Select one:
True
False
Question 14
Not yet answered

Biometrics has many benefits and drawbacks. What are the privacy issues that biometrics proponents should be concerned about? Are you either in agreement or disagreement with these concerns? Please tell me more.

Suggest the most suitable sensor type which should measures distance to target for the identification of an object or should perform presence or absence detection. Please state the reasons for your selection

i need the answer quickly Transcribed Image Text: Q3/ Write a program to find Largest No. in a block of data. Length of block is OA. Store the
maximum in location result.

I need the answer as soon as possible Transcribed Image Text: A(n)
_is a reusuable software component that can take the shape of a date, time, music, or video, among other things.

Machine organization question The following operations are performed on a stack :PUSH A, PUSH B, POP, PUSH C, POP,POP,PUSH D, PUSH E, POP, PUSH F.What does the stack contain after each operation?

Compare insertion sort and merge sort on any aspect you can. For the list of numbers given below, which sort algorithm performs better, why? 110 25 40 52 65 73 84 90

I need solution as early as possible.
I will like your answer.
Subject data structures. Transcribed Image Text: Convert the following Infix expression to Postfix expression.
x +y/z + (p/q+r) *s
Answer:

What is the output of this code fragments? (given the declaration int a=1, b=2, c=3;): Transcribed Image Text: 7. if(++a > b++ || a- > 0)
C++3B
else
C-;
cout<<[a+" "+b+" '+c); A 16 bit data can range from _____. a. 0000 H to FFFF H b. 0000 H to 1111 H c. 1111 H to 9999 H d. 1111 H to FFFF H Transcribed Image Text: The level that is responsible for synchronizing processes ir computer system is: O a. gh-language level O b. Machine level C. Assembly language level O d. system software level Transcribed Image Text: Write a complete Program Write a complete C program to calculate and print the summation of the elements of a primary diagonal of an integer square 5×5 ?array ?????? Write a C++ program to print 5 numbers in reverse order of their input.See sample I/O below: Input: 1 2 3 4 5 Output: 5 4 3 2 1 nt: Use stack. 12.A type of education where the medium of instruction is computer technology is (a) e-learning (b) e-teaching (c) c-teaching 13.Communication technologies are generally categorized as asynchronous (a) synchronous (b) di-sychronous (c) multi-sychronous. Can you answer question 2? Transcribed Image Text: 2) Explain the purpose of the Contact header field in an INVITE message. 3) What is the purpose of the Via header fields? ww Linux and UNIX are mainly command-line-based operating systems. Could you please describe how the operating system understands the information given on the command line in order to assist the desired action? (s) Explain when the Waterfall model should be utilized and when the Incremental development approach should be used. Is there any way to tell one of these models is better than the other? 70. Considering the disks, the command with which the buffer is copied into the block of disk is classified as a. write command b. read command c. paste command d. cut command What’s the use of running the server software before the client program in a TCP client-server application? Why may the client software run before the server program in a UDP client-server application? Transcribed Image Text: Code only the method header for brushing teeth. Receives and returns nothing. The name of the method is in the first sentence. //method header Call this method. //method call In Python: Which of the following can be used to determine whether an object is an instance of a class? the isinstance function the in operator The is_object_of function The typeof function Filename: Lab exers Write a measurement conversion program that will read a person’s weight in grams and will display its converted value to kilogram, decigram, milligram and centigram. Display appropriate output. (Python) Write code that concatenates the character strings in str1 and str2, separated by a space, and assigns the result to a variable named joined. Assume that both string variables have been initialized. RGB to gray: Take an image from your system and plot both original image and grayscale image of same image in MATLAB. Provide Matlab code and attach both original and grayscale image. The postfix expression:     5    4    2   *  *      evaluates to: Transcribed Image Text: The postfix expression: 5 4 2 * * evaluates to: 14 ?. O b, 30 40 ?. 22 d. Asymptotic Notation practice question please help thank you Transcribed Image Text: Using the definition of 2, prove 2000n100 [nt: 2(f(n))={g(n)|3 c, no • Vn > no • g(n) > c f(n)} ]

Write “Handle Return” use cases scenarios for each following functionality: (a) Room reservation (b) Changing the properties of a room (for example, from non-smoking to smoking) (c) Customer check-in (d) Customer check-out

What is mean of code? Transcribed Image Text: clear, clc
labels-[dir(*.png); dir(jpeg)1;
for i-1:length(labels).
grayImage iaread(labels(1).name);
cs grayImage;
cs(grayImage<=1)-128; cs(grayImage>1)-255;.
grayImage cs;
if size(gray Image,3)- 3
imerite(repmat(grayTmage, 1,),(rgblabels/ labels(1). name]);
end
end

Network Security Assessment Transcribed Image Text: Differentiate between intrusive and non-intrusive vulnerability scanning based on the
following criteria: how they work, advantages, and disadvantages.
A- BI
Maximum size for new files: 5GB

Transcribed Image Text: To encrypt and to secure data traveling between client agent and server agent,
which is of the following can be used
SSH
SMTP
MUA
No option is correct
HTTP

Transcribed Image Text: One of the following algorithms allocates the largest hole that can accommodate the
incoming process
a. Worst fit
O b. Test fit
O. First fit
O d. Best fit

None Every single process takes 6 second of service time in a single processor system. Calculate the CPU busy fraction of time when processes are arriving at the rate of 15 processes/min.

None Transcribed Image Text: A switch-tail ring counter consisting of 5-FFs. If
this counter has P-states and it counts maximum
decimal number Q the correct values of P and Q
respectively are

The collection of processes on the disk that is waiting to be brought into memory for execution forms the ________. A. Device queue. B. Job queue. C. Priority queue. D. Ready queue.

Transcribed Image Text: To encrypt and to secure data traveling between client agent and server agent,
which is of the following can be used
SSH
SMTP
MUA
No option is correct
HTTP

Algorithm and flowchart have different meanings. Calculate the percentage of the student’s marks in this test and then print it together with his/her roll number and name on a flowchart. Draw it.

Consider X= 11001, perform the logical shift left, circular shift right, logical shift right, arithmetic shift right and circular shift left in an order. Use the previous result to perform next shift.

b) Print the given string 8 times along with line number.Print line number first and then the given string. Line number goes from 1-8. String: “Learning Swift.” WAP in Swift programming language.

When you turn off the power to a computer at night, it loses the date, and you must reenter it each morning. What is the problem and how do you solve it?

176. Application in which set of linked hypertext files are present which displays information using text and limited graphics is a. system application b. embedded application c. engineering application d. web application

Transcribed Image Text: 3-
How many components are allocated by the following statement?
double [,] values = new double [3, 2];
%3D
a)
32
C)
d)
e)
none of the above
6.

Transcribed Image Text: The main goal of scheduling the computer resources is to achieve
O a. Minimum Throughput
O b. Maximum Turnaround time
? ?.
Maximum Throughput
O d. Maximum Waiting time

This part of the computer fetches instructions, carries out the operations commanded by the instructions, and produces some outcome or resultant information. a. memory b. CPU c. secondary storage d. input device

Transcribed Image Text: :Choose the correct answer
???? ?????
If (text) contains the value
(“ProGRam”), then the (text) value
after calling the function strupr(text);
* will be
“PROgrAM”
“PROGRAM”
“ProGRam”
“program” O

] Ruby Programm gLangaage , Print “ruby ic bect language” using loop 15 £ Transcribed Image Text: 1 Ruby Programming Language
2 Print “ruby is
best language” using loop 15 times
I.

I need the answer as soon as possible Transcribed Image Text: Write a MATLAB command to create
a matrix X with three rows and four
columns with all zero elements.
Your answer

Transcribed Image Text: O d. Methodology
Things can be documented at the Object Oriented approach by:
O a. Class diagram
O b. Data stores
O c. Use case diagram
O d. ERD

(1)Which programming technique allows you to execute two alternatives and the condition determines which one gets executed?

a.

list

b.

iteration

c.

alternative execution

d.

chained condition

Just answer without explanation please

The following numbers are inserted into an empty binary search tree in the given order: 10, 1, 3, 5, 15, 12, 16 What is the height of the binary search tree ?

169. If here are no strict separation between internal and conceptual levels, the language used by database designer is a. data definition language b. administering language c. management language d. mapping language

Java Question 17: Transcribed Image Text: What is the name of the method that returns the actual number of
objects in a java.util.ArrayList? *
degree
O List
O index
O length
size

Write a c++ program to calculate x n without using pow function and take input x and n from user. You can assume that x n is less than range of integer.

Calculate the MAD, MSE, and MAPE errors for the following data. Period Demand Forecasted 1 2345 2338 2 2346 2350 3 2350 2344 4 2346 2345 5 2346 2348 6 2355 2357

java Transcribed Image Text: Write an expression whose value is the fifth character of the String name. So if the value of name
were “Jefferson” the expression’s value would be ‘e’.
1

I need the answer as soon as possible Transcribed Image Text: write a C program to find the
average of the only odd numbers
for the 100 entered numbers by
1-
users.

18. Disadvantage of dynamic RAM over static RAM is a. gher power consumption b. Variable speed c. Need to refresh the capacitor charge every once in two milliseconds d. Lower Packing density

The script may be executed in one of two ways if you do not have execute access to the script file. What happens if you don’t have access to the script’s file?

I didn’t know any word in this programming language. But my professor give me an assignment to print this line “Erlang is new programming language “.can you help me In Erlang programming

87. A relationship should be specified how in the ODL? a. One direction starting with the first class b. One direction starting with the second class c. Neither direction. d. Both directions.

Ravi has triangle field and he wants to plant tree at his boundary continuously. Your task is to find how many plants are required using pascal language. Take the sides from user

Transcribed Image Text: Which definition best defines the concept of abstraction?
Select one:
a.Showing the important data
b.des the important data
c.des the implementation
d.des the implementation and showing only the features

79.Binary tree sort implemented using a self balancing binary search tree takes O(n log n) time in the worst case but still it is slower than merge sort. a) True b) False

Translate the following C Code into MIPS code (Base address of A is in $S0) : 5 a) A [3] = A[1] – A [2] b) A[4] = 2 x A [1]

I need the answer as soon as possible Transcribed Image Text: Q3: write a program in C++ to read a two dimensional array A[3||4) then print the elements as
consecutive columns.
C++

Q2 Design a 3-bit arithmetic unit which performs seven distinct operations. Also explain its working by taking a suitable example. Draw truth table showing the inputs and corresponding operation of arithmetic unit.

using c++ Define an array of n integer marks and fill it with random numbers, send it to a function that returns an array of failed marks. nt: use pointer notations only

Suppose you are provided with a random number generator that outputs numbers between 0 and 1. Describe a simple computer experiment to test if the numbers are uniformly distributed on the interval.

Transcribed Image Text: Write the brute force string matching algorithm. Determine the number of character comparisons
made by the brute force algorithm in searching for the pattern RRRRS in the text
RRRRRRRRRRRRRRRRRRRRRRRRS

Java Programming:- Prompt the user to enter a string and then check if the string contains two consecutive characters which are same. Sample Input: “abccde” Output: “Yes” Sample Input: “abcde” Output: “No”

Solve it quickly please
Please Now I want the answer Transcribed Image Text: Differentiate among following: [at least 4 differences]
1. Functional and Non-Functional Requirements
2. White box and Black box testing

Visit the websites of three big technological companies (Microsoft, Oracle, and Cisco), as well as two more that you select. Look for optimal security procedures on the internet. What do you discover?

The statement used to invoke the following method is public static int max(int num1, int num2) { int result = num1+ num2; return result; } ans max(3, 5); max(5); max(“num1” , “num2”);

write an assembly program that has two functions, in first function shows the number in reverse order (number should be 412) and in second function, evaluate any expression (e.g 1+2*2) using stack.

Old MathJax webview why security specification are important. justify your answer. (software engineering) why security specification is important. justify your answer in full detail. please i need full detail. subject (software engineering)

Complete the function below: string makePalindrome(string s){ //returns the palindrome of string s } Complete the function and also test the function for sample string “ABC” , Output should be “ABCCBA” C++

Transcribed Image Text: The HEAP-INSERT operation in a priority queue with Size N has running time:
?. ?(N)
O b. O(N?)
O. O(N log N)
O d. O(1)
O e. O(log N)

When is the best time to use inheritence in java and when is a bad time ? Provide an explanantion and an example of good and bad use of inheritance in java.

Explain what autocorrelation indicates . What are the main problems that autocorrelation creates for OLS estimation results ? Give two ways to detect autocorrelation problem and the hypothesis that are tested ?

495. Process of transferring data from main memory to online secondary storage is called a. Swapping from data b. Swapping out of data c. Swapping in of data d. Swapping through data

What is a Digital Signature, and how does it work? When it comes to digital signatures, what is the difference between them and electronic signatures? Give specific instances to support your point.

Transcribed Image Text: Complete the following interactive program to read two integers, without using function.
#include
using namespace std;
main( )
{
int x, y, product = 0;
***using c++ programming

Given two arrays, write a JS program to find the number of elements which are present in both of the given arrays. Assume the array of your choice and test the program.

457. New disk is formatted according to requirements of associated operating system with utility program of a. Disk formatting utility b. Data formatting utility c. Disk compression utility d. Data compression utility

Please use Python to write the code Transcribed Image Text: For the above mentioned class linear, write getRoot method that returns the root of
equation (root = -a/b).
(2 lines of code)

Data structures and algorithms. Transcribed Image Text: Q16 Using Binary Search, find the location of the element d from the given array.
1
2
3.
4
Show all iterations step by stcp.

1Upper limit and lower limit condition can be tested in excel through Select one: a. Countif with count function b. Single if function c. whatif function alone d. If within if function

3. Write code that uses the Python math module to compute and print out the values of a.100! b.the log (base 2) of 1,000,000 c.the greatest common divisor of 63 and 49

Transcribed Image Text: Refer to the CLI output below and write the corresponding configuration commands that will give this result. C
My Midterm is over
User Access Verification
Passvord:
Mid-switch>en
Pasaword:
Mid-Switchel

1-Display the seventh element in a 10 elements vector

Solve:

Code Will be, V(7)

True

False

2-Find the solution for x in: y + y’ = sin(x)/2

Solve:

dsolve(‘y+Dy =sin(x)/2’)

True

False

Compare insertion sort and merge sort on any aspect you can. For the list of numbers given below, which sort algorithm performs better, why? 110 25 40 52 65 73 84 90

Transcribed Image Text: let S: r1(x);r2(x);w1(x):r1(x);w2(x);w1(y). Schedule S is said to be
Select one:
a. no serial and no serializable
b. no serial and serializable
C. serial
d. none of the above

What is indexing in web? Discuss the old and new ways of indexing performed by search engines. Note: No plagarism please! Correct and detailed answer will be Upvoted else downvoted. Thank you!

Please solve Quickly ?++ Transcribed Image Text: Find the output of the given C program.
if((3<2) && (2 == 2)) 3%3D printf('true"); else printf("false"); ?. b. true O C. 1 d. false Transcribed Image Text: What is the output after excuted the following statements: int y=5, x; y=y+2*4; X=–y; if(x) { cout< 10 puts “x is greater than 10” elsif x <= 10 and x!=0 puts "x is 5" else puts "Can't guess the number" end Simplify the following Boolean function F, together with don’t care conditions d and then express the simplified function in sum-of-minterms form. (a) F (x,y,z) = ? (0,1,4,5,6) d (x,y,z) = ? (,2,3,7) In a class there are twenty students and each student undergoes five courses.Write C program to find out the average marks secured by each student and the overall average of the class. PHP language I/O Take input the selling and cost price of a product from user and then print the profit or loss in output with the message “Profit” or “Loss.” In PHP By using NetBeans,write the servlet program with html form to find out the average marks of the student. Take 5 subject marks and calculate the average with photos of output and program. 195. run > outfile command is used to _________ a. direct output to the file outfile b. jump to a file outfile c. enter a file outfile d. edit a file outfile

Correct and detaild Answer will upvote else downvote Sub:-Principles of Programing Langiages In what fundamental way do operational semantics and denotational semantics differ?i.e., VMAP (a n ,s)=v? {,}

31. A _________ sine wave is not useful in data communications; we need to send a _______ signal. a. composite; single-frequency b. single-frequency; composite c. single-frequency; double-frequency d. none of the above

?? Transcribed Image Text: The number of tokens in the following C code
segment is
switch(inputvalue)
{
case 1: b = c* d; break;
default : b = b++; break;
%3D
}

Transcribed Image Text: Which one of the following commands can be used
to view only the IPV6 addressing information on the
host?
a. ping
b. nslookup
? ?. i????nfig
O d. ipv6config

Transcribed Image Text: To encrypt and to secure data traveling between client agent and server agent,
which is of the following can be used
SSH
SMTP
MUA
No option is correct
HTTP

The series of interrelated phases that is used to develop computer software is known as a. Program development b. Software engineering c. System development life cycle d. System analysis e. System design

Transcribed Image Text: Which of the following DAX Functions will allow you to filter the data from a new column created from a summarize table?
O Union
Summarize
O Calculatetables
O Filter

Implement a library/program in a programming language of your choosing to load and validate a configuration file of a TM with two heads and one tape. code in python or c++ please

What are the advantages of distributing objects in a client-server environment? Explain the basic concepts that govern a distributed object model. You may use a diagram to illustrate aspects of the model.

What is the bit rate for transmitting uncompressed 800 x 600 pixel colour frames with 8 bits/pixel at 40 frames/second? a. 2.4 Mbps b. 15.36 Mbps c. 153.6 Mbps d. 1536 Mbps

Transcribed Image Text: to
1.
Elements in an array of size n, can be accessed using index ranging from
O A. 0, n
?.
1, n-1
OC.
1, n
OD.
0, n-1

Transcribed Image Text: The physical address:
Select one:
O a. none of the above
O b. assigned to hosts by network ad administrators
O c. used by routers
O d. unique worldwide

Transcribed Image Text: Consider the array that is given below. Provide step by step process to show how the
merge sort would sort the array.
13 11 34 20 17 9
32

37. The priority of a process will ______________ if the scheduler assigns it a static priority. a. change b. remain unchanged c. depends on the operating system d. none of the mentioned

ving add() ,print( b?th these functlnn;are_ functlnns Transcribed Image Text: 1 Make a singly linked list in java
2 from scratch having add() ,print()
3 functions .both these function are necessary
4

A bit stream 1011000 is transmitted using the standard CRC method. The divisor is 1011. What is the actual bit string transmitted? Also find out whether, there is an error or not?

What is the value stored at y, given the statements? int y; y = 6 / static_cast   (4.5 + 6.4); A. None of that B. 0.6 C. 0 D. .275229 E. .3

This kind of data transmission allows data to be transmitted in both directions on a signal carrier at the same time. a. full-duplex b. duplex c. half-duplex d. All of the above

I want the solution very quickly within 15 minutes Transcribed Image Text: * Telemedicine communication protocol compared to normal internet protocol is
Safer
Easier
Faster
All the above
none of the above

Please solve Quickly ?++ Transcribed Image Text: Arrange the text to find the numbers of digits in any
input number
Start
End
No
yes
Read N
i=i+1
N=N/10
N/10==0
print i
N%10

a ) For a two – input NOR gate , Find the standard SOP and POS expressions as a function of input variables .b)Multiply the following BINARY NUMBERS .10001.0011 X 1 10.01

I need the answer as soon as possible Transcribed Image Text: 9. Write a Pseudocode and draw a Flowchart to find and print the sphere volume.
4
Sphere Volume =
3

108_2_A_3 Please help with step by step solution. Transcribed Image Text: If a max heap can be built in linear time, can we sort an array of n numbers
in lincar time?

138. The capacity to alter the database schema at one level without altering any other schema level is classified as a. data mapping b. data independence c. data dependence d. data transformation

What is the correct answer Transcribed Image Text: Choose the instruction that will double the contents of AL register.
O a. SHR AL02H
b. SHR AL,01
c. SHL AL,01H
d. SHL AL,02H

Transcribed Image Text: Which of the following is NOT a service provided by the Operating System?
O Word processing
O File management
O Error management
O Program execution management
O Memory allocation

When a network administrator configures a router to use a certain path between nodes, what type of route is created? a. Trace route b. Static route c. Default route d. Best path

Prompt the user to enter a random integer l, write a program that generates a random string containing only lowercase alphabets of length l. Print the string generated in output. C++ Programming.

Transcribed Image Text: root
For the given binary tree, list the nodes in order of visit when the following traversal algorithms are used.
1. Postorder Traversal
2. Preorder Traversal
3. Inorder Traversal

Machine organization The following operations are performed on a stack: PUSH A, PUSH B, POP, PUSH C, POP,POP,PUSH D, PUSH E, POP, PUSH F. What does the stack contain after each operation?

Need correct answer no plagiarism else will downvote Discuss the steps to be followed when a reference is made to a non local variable in a static scoped languages with nested subprograms.

300-500 words per discussion Discuss the following data types. Provide examples each using c++ codes. Built-in Data Type i. Integers ii. Boolean (true, false) iii. Floating (Decimal numbers) iv. Character and String

9 Transcribed Image Text: The HTML attribute specifies a hint that describes
the expected value of a text entry form field is:
a. selected
O b. placeholder
??.
required
O d. checked

Write a JavaScript program to convert temperatures to and from Celsius, Fahrenheit. [ Formula : c/5 = (f-32)/9 [ where c = temperature in Celsius and f = temperature in Fahrenheit ]

Transcribed Image Text: Which choice represents the expected upper bound for the run time of the contains(value) method
of a self-balancing binary search tree?
O(1)
O O(nlogn)
O O(n)
O(logn)
O O(n?)

Code in Python. Using Newton’s method with Briot-Ruffini, determine the smallest positive real root of the polynomial P(x) = x³ + 8x² ? 4x ? 2 = 0 with e = 0.01

Making the transition from an offline company to an online one is feasible (any industry or area may be chosen). When designing your plan, you should take into account system development methods.

What do you call the logic that determines what data is most needed in the future and should be stored in the CPU’s cache? interrupt caching discombobulate logic replacement policy virtual memory

Designing and Deploying 802.11n Wireless Networks . Perform this test on your own wireless network using only your wireless router. How do various data rate settings affect the observed difference in range?

What is the most significant aspect of the transition from serial processing system to batch system? Rationalize your answer. what is the most noteworthy innovation in the evolution of operating systems? Why?

Please solve quickly Transcribed Image Text: How many valid keys are in the following PGP model?
Fully trusted entity
Partiaily trusted entity
Untrusted entity
Xintraduced by Y
N
M
11
12
16

Using java, Create a simple Student Information System. The program must perform the following: Create student information, Retrieve the student information Update and Delete the specific student. note: Use the Java GUI.

Transcribed Image Text: 5 Transcribed Image Text: Li 10 In the following graph imply the Brcadth First scarch algorithm and Find out
* Breadth First Queue? Starting point is 2
2
5

17. It resolves symbolic references between object programs because it makes object programs known to each other. Loader Compiler Linker None of the Choices Give an explanation for the answer. Thank you

write a C++ function that accepts your name (string) as an input and print it in reverse order without using a built-in function. with algorithm and discussion, result and aim and objective

I need the answer quickly Transcribed Image Text: 4- Solving a problem requires running an O(N2) algorithm and then afterwards an O(N)
algorithm. What is the total cost of solving the problem?

dont copy the answer surely dislike Big Data Application & Analysis Link Analysis 1. Compute the PageRank of each page in the figure below, assuming no taxation answer only u r sure

True or False Congestion window (CWND): In TCP, the congestion window is used to determine the number of bytes, which can be remaining at any time. It is maintained by the sender.

Write a C# program that takes in two numbers from the user. The program must make use of a method which takes the two numbers then calculates the square of each number

Suppose that you are responsible for computerizing a gourmet restaurant’s order entry system. What type of input devices do you think would work best for waiters to input orders to the kitchen?

Visit the websites of three big technological companies (Microsoft, Oracle, and Cisco), as well as two more that you select. Look for optimal security procedures on the internet. What do you discover?

Transcribed Image Text: 7
The part of UI can be made reusable by making it as
O a. Fragments
put of
O b. Content Manager
question
O c. Services
O d. Activity

The purpose of using a loop is to Select one: A. Repeat operation(s) many times B. Repeat operation(s) many time and make decision C. make decision D. None of the option mentioned

no plagiarism should unique Transcribed Image Text: When we type a reference, we design a pattern for using the reference. Explain down what a
topics that can be included in a pattern?

Arrange the following function in increasing order of
their asymptotic growth. The domain of the functions
belong to the natural numbers:
2^m, m^4, m^4/5, m^5/6,lg (m!), Ig^6m, m!
Furthermore, justify your answers.

Java Programming:- Prompt the user to enter a string and then check if the string contains two consecutive characters which are same. Sample Input: “abccde” Output: “Yes” Sample Input: “abcde” Output: “No”

if it is correct or incorrect Explain why if it’s false. ” Because Standard Library algorithms treat containers directly, a single algorithm may typically be used to a wide range of containers.”

Assume an int is size 4 bytes on our system.  What is the size in bytes of the following array: int results[3][4]; A.) 12 B.) 3 C.) 4 D.) 48 E.) 24

Transcribed Image Text: Question 8
Consider the array (5, 8, 2, 6, 7}. How many exchanges are required to sort the given array using Bubble sort?
a.
b.7
C.
O d. 5

What are the dangers of having an ubiquitous security infrastructure in place? What are the factors that prevent such infrastructure from being in place? What are the alternatives to the current situation?

Write a C++ program to enter records of students using the class method. The class should contain Student ID. Age and Date of birth members. All members are needed to be private.

Transcribed Image Text: In Android Studio create a layout as shown.
Requirements
1. ImageView without border
2. TextView
3. Button
4. Checkbox
5. RadioButton
6. Switch
TextView
BUTTON
CheckBox
O RadioButton
Switch

Transcribed Image Text: eduction to x
Course Materials
Objective-Based Question Only
labs.px.pearsoned.com/Pegasus/Modules/AssessmentTool/Presentation/frmStudentPresentation.a
Hardware
1) A computer processor is also known as which of the following?
Motherboard
O Memory
O CPU
Submit
Previous

Suggest the most suitable sensor type which should measures distance to target for the identification of an object or should perform presence or absence detection. Please state the reasons for your selection

C++ Program Transcribed Image Text: 4. Write a program that will display the prescribed output below using nested loops.
?
1
1
2
1
1
3
4
1
2
3
1
2

Write “Handle Return” use cases scenarios for each following functionality: (a) Room reservation (b) Changing the properties of a room (for example, from non-smoking to smoking) (c) Customer check-in (d) Customer check-out

If a two-input logic gate produces an output of logic HIGH, only if both inputs are different, then the logic gate IC is IC 7432 O IC 7486 IC 7400 IC 7408

java Transcribed Image Text: Which of the following are valid Java identifiers?
A. $myvariable
B. OReilly_&_Associates C. _score
D. my
E. !digit
F._9Levels
G. interface
H. 9pins
I. main OJ. This_is_an_insanely_long_varia
variable

It’s impossible to keep up with the rate at which technology is changing. The current status of computer progress may be summed up by citing five (5) specific computer or communication advancements.

Write a program in C++ language to find the average age of a group of 11 players, ask the age of each player from user and in output print the average age.

Transcribed Image Text: Use Heun’s method to solve the initial value problem:
y = a? -y with y(0) = 1
Let h = 0.2. Do one Iteration at the corrector steps.
y(0.4)=

Write a complete C program to read a string from the user at the runtime then, change every e or E with the digit 3 and print the result on the screen

58. The memory location’s address where data is to be stored is specified by ___________. a. Memory Buffer Register (MBR) b. Accumulator (AC) c. Instruction Register (IR) d. Memory Address Register (MAR)

Do quickly Transcribed Image Text: A two binary number , write a program in JAVA to do it correctly like Input first
binary number: 10
Input second binary number: 11
Sum =101

127. The goal of some organizations is to develop integrated world wide networks for global electric commerce is a. IT platforms b. data issues c. business/IT strategies d. global IT management applications

During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of? N-tier Wireless Cloud-hosted Local Network Hosted

When a network administrator configures a router to use a certain path between nodes, what type of route is created? a. Trace route b. Static route c. Default route d. Best path

Bradley (2013) defines databases as a collection of data on individuals or organisations, which is structured in a way that allows data to be reorganised to provide meaningful information. Corroborate this definition

In a program, a may fill several consecutive lines. block comment b. square comment c. multiline comment d. machine comment a. block comment b. square comment c. multiline comment d. machine comment

30)
Develop a program that will read the following marks as inputs:

subjectname,quiz1,quiz2,ass1,ass2,midterm,final.

Base on the input value calculate Quizmark,Assignment,Totalmark using

following formula

Quizmark =quiz1+quiz2

Assignment= ass1+ass2

totalmark=Quizmark+Assignmen+midterm+final

Display Quizmark,Assignment,totalmark.

(Python 3)

The operating system (OS) is responsible for a variety of tasks. Is there a connection between the relationship between an operating system, applications, and other software, and the relationship between computer hardware?

31. A _________ sine wave is not useful in data communications; we need to send a _______ signal. a. composite; single-frequency b. single-frequency; composite c. single-frequency; double-frequency d. none of the above

An RS flip-flop has: Two inputs, two outputs and clock input Two inputs, one output and clock input One input, two outputs and clock input One input, one output and clock input

What is the type of a value returned by the method readLine in the class BufferedReader? What is the type of a value returned by the method read in the class BufferedReader?

I need the answer as soon as possible Transcribed Image Text: Contents of file:
hello world hello
hello
Output:
Enter file name: out.txt
Enter letter to be searched:o
Occurrences of the letter:

python programming Write a function find_hypot which, given the length of two sides of a right-angled triangle, returns the length of the hypotenuse. (nt: x ** 0.5 will return the square root.)

We have a poorly-designed hash map where all of the stored values are in one bucket (meaning they’re all in one LinkedList). Explain why this undermines the advantages of a hash map.

Transcribed Image Text: Write a complete Program
Write a complete C program to calculate
and print the summation of the elements
of a primary diagonal of an integer square
* ?5×5 array

Write a program that simulates rolling a pair of dice. The program should answer the question “how many times does it take to roll a 7 with a pair of dice ?”

to see whether a piece of software is hogging system resources and slowing things down The operating system and its stability and functionality must be maintained in order to increase user numbers.

Transcribed Image Text: What is the output after excuted the following statements:
int y=5, x;
y=y+2*4;
X=–y;
if(x)
{
cout<’red’, ‘G’=>’green’, ‘B’=>’blue’]
c. $colors=[‘R’=>’red’, ‘G’=>’green’, ‘B’=>’blue’]
d. $colors=[‘red’, ‘green’, ‘blue’]

If you have limited computer resources, discuss the tradeoffs of various picture representation and with which format would you go? Technical aspects and considerations must be included, while justifications must be excluded

19) The cost of accomplishing a given amount of computing has been falling steadily due primarily to the cost efficiency of boosting the speed of microprocessor hardware. True or False? True False

Transcribed Image Text: write object oriented program find
fact(x)+y if z even else find fact(x)-y
if x in class A , y in class B, z in class C
what’s inheritance’s type

What is a function called when its return value is always the same for the same arguments? 1. Curried function 2. Overloaded function 3. Pure function 4. Polymorphic function 5. Strict function

What is meant by dynamic memory allocation? Why is it needed? What are some important functions provided in the C programming language for supporting dynamic memory allocation? Answer using suitable code snippets.

What is the outcome of the following given that isAwake = true, num1 = 7, num2 = 56, name = “John” and specialSymbol = “o”; !(!isAwake || name.contains(specialSymbol)) Select one: True False

Transcribed Image Text: Design a layout in Android Studio
Requirements:
• 1 ImageView
• 1 textview
• 1 button
• 1 checkbox
• 1 radio button
• 1 switch
• 1 calenderView

While putting a second hard drive in your computer, you notice that the hard disk is not connected to the motherboard through a wire. How do you know which cable to purchase?

Transcribed Image Text: As a security expert, which amongst the following is not a basic
pillar of Information Security?
O a. Big Data
O b. Availability
O c. Integrity
O d. Confidentiality

ving add() ,print( b?th these functlnn;are_ functlnns Transcribed Image Text: 1 Make a singly linked list in java
2 from scratch having add() ,print()
3 functions .both these function are necessary
4

71. In windows XP, disk property which can’t view with disk management is a. volume label b. whether the drive should be indexed c. used and available disk space d. disk status

If the 16550 is to generate a serial signal at a baud rate of 2400 baud and the baud rate divisor is programmed for 16, what is the frequency of the signal?

149. All the information about usage standards, decision of designs, user information and description of application programs is stored in a. data repository b. data utility c. data compiler d. data host

Transcribed Image Text: In computers, the decimal numbers (-90.+90) are represented using 8 bits as
(1101 0000, 1001 0000)
B (0101 1010, 1010 0110)
(1010 0101, 0101 1010)
(1010 0110, 0101 1010)

Considering that an ASCII file contains just letters and numbers, how much space might be saved by reducing the size of the file? What methods would you use to accomplish this reduction?

In Matlab, when a and b are both matrix but different, which of the following performs the same function as below? a*inv(b) 1. inv(a)*b 2. a\b 3. None of these 4. a/b

20. For a computer to deliver continuous media it must guarantee the specific rate and timing requirements, also known as : a. deadline b. quality of service c. period d. burst time

I need the answer as soon as possible Transcribed Image Text: Write a MATLAB command to create
a matrix X with three rows and four
columns with all zero elements.
Your answer

Bus arbitration type of control pins are needed in a microprocessor to regulate traffic on the bus, in order to prevent two devices from trying to use it at the same time?

Asap Transcribed Image Text: JavaScript program to to pass arguments
to a function.
Create a function which check how many
parameter is passed on this calling this
function and print those number

88. In Manchester and differential Manchester encoding, the transition at the middle of the bit is used for __________. a. bit transfer b. baud transfer c. synchronization d. none of the above

Transcribed Image Text: Ahmed uses Salim’s credit card without his permission to purchase a gun. Ahmed’s behavior is:
O Man in the middle attack
O Snooping
O Identity Thief
DoS
Jump to…

Explain the distinction between reference semantics and value semantics in the context of function calls and their implications. When should you pick one over the other? What are the benefits of each?

Using a writing speed of 700 Mbits/s, how long would it take to store a 40 GB raw video file on a blue ray disk (express your answer in minutes)? (6 marks)

Organization has recently introduced MS Access for managing data. Raj have been given responsibility to develop ‘Customer Feedback form’ in MS Access. Please enumerate steps that  will follow to complete this task.

Write a c++ program in which user enters an integer num in the form of a string and the program prints whether the number is a positive integer or a negative integer.

Attempts are made by operating systems to store successive blocks of a file on subsequent disk blocks as much as possible. What is it about magnetic disks that makes this so critical?

Program to register a new student in a text file with a student list in java and find out who it belongs to when we enter the student number from that list.

Transcribed Image Text: Demonstrate how to access individual port
pins. Perform the following functions.
(i) Read port pin P1.2 and send same on
P2.5 continuously.
(ii) Toggle P2.2 continuously after some
delay.

Transcribed Image Text: cout<<"5+6"; prints 5+6 on screen Select one: O True O False Transcribed Image Text: The variable num1 is the same as Num1 in c++ Select one: O True O False Please do fast Transcribed Image Text: Write a program in scala Programming language two check two given integers and return true if one of them is 100 and if their sum is 100. Transcribed Image Text: The circuit of the given figure realizes the function (with figure*) A C -Y E Select one: O a. AB+C+DE b. AB+C. (D+E) O c. (A’+B’).C+ (DE) o d. A’+B’+C’+D’+E’ mobile programing,android studio,java Transcribed Image Text: RecycleView is required to inherent from class as O class nameofclass extends RecycleView.adapter
Abstract class nameofclass RecycleView.adapter<>
O class nameofclass extends RecycleView.adapter
O Abstract class nameofclass RecycleView.adapter

Transcribed Image Text: Write a C++ Program to demonstrate friend function and friend class. Please describe the code in
details by which l can understand it well and add screenshot of the output.

Express the complement of the following functions in sum of min-terms: (a) F(A, B, C, D) = P(0, 2, 6, 11, 13, 14) (b) F(x, y, z) = Q (0, 3, 6, 7)

None Transcribed Image Text: Q.1- Make the right choice for the followings:
1. 8086 processor could be interfaced with
memory locations.
a) 1 M
c) 20 M
b) 1 K
d) 256 K

phyton Transcribed Image Text: Objects that “see” the data in other objects, rather than having their own copies of the data are called objects.
a. subordinate
b. scene
C. view
O d. aspect

A C++ program that asks the user to input three integers and outputs the smallest and biggest numbers.

Note: Use function. Use min() to find the smallest and max() to find the biggest.

Write SQL Code in Script for the following two tables Order ( oid ( PK), oname , date_of_order, pid ( fk) ) Product (pid (pk) , pname , price_per_unit) also explain each step

Describe and Explain  the main features of (2) smartphone apps that developers have created to help under-represented groups such as people with disabilities, for example, users with hearing loss or other physical disabilities,

In what ways are authentication and authorisation different from one another? Is it possible for a system to allow authorization without authentication? What is the reason for this or why is it not?

Answer only if you are 100% sure . Correct and detailed answer will be Upvoted else downvoted. Thank you! Q) Explain the criteria used to evaluate the performance of algorithms for mutual exclusion.

Transcribed Image Text: Which of the following can be used to truncate a regular file?
open(2)
O creat(2)
standard output redirection operator >>
O both open(2) and creat(2)
O both open(2) and >>

23. The files stored on a secondary stage device are composed of a hierarchy of data. What does a record in a file contain? a. Bits b. Characters c. Data field d. Schema

CREATE A C++ PROGRAM THAT THE USER WILL INPUT 2 NUMBERS (A & B) AND THE OUTPUT IS TO GET THE REMAINDER OF A/B WITHOUT USING A MODULO (%) AND DIVISION (/) OPERATOR.

Ten signals, each requiring 3000 hz, are multiplexed onto a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel? Assume that the guard bands are 300 Hz wide.

Give an example of the internet of things. What’s the difference between the industrial internet of things and the consumer internet of things? What does it have in common with the conventional network?

Transcribed Image Text: Which shortcut command is used to open a new document?
O a. Control N
O b. Alt N
O c. Alt O
O d. Control O
The picture style is:

Would you expect all the devices listed in BIOS setup to also be listed in Device Manager? Would you expect all devices listed in Device Manager to also be listed in BIOS setup?

16 The SCD Model has four generic strategies: Select one: a. Multilateral cross-service channel expansion b. Lateral-channel service penetration c. All other answers are correct. d. Single-channel service penetration e. Single-channel service diversification

Consider the following grammar: X -> (Y) | b Y -> Y, X | X List LR(0) items for this grammar construct the DFA of these LR(0) items construct the SLR(1) parsing table

15. For a memory system, the cycle time is a. Same as the access time b. Longer than the access time c. Shorter than the access time d. multiple of the access time

Do not copy paste from Internet I will downvote if u will do thatHow to redirect a page to another page, use of RequiredFieldValidator and importance of Server.UrlEncode() in asp.net.Explain with proper coding

Transcribed Image Text: Select the decimal value equivalent to the Double Precision Floating Point Number represented by
Hexadecimal value “OXCO 08 00 00 00 00 00 00”.
+11
O -11
O -1.1
-3

I need the answer as soon as possible Transcribed Image Text: Given that name=”Python Programming”, which one of the following codes returns
“PYTHON PROGRAMMING”?
O name.capitalize()
O upper(name)
O name.isupper()
O isupper(name)
name.upper()

In terms of services, compare Razor Technology with DRaaS: Disaster Recovery as a Service. How might Razor Technology and DRaaS (Disaster Recovery as a Service) assist small businesses in recovering from a disaster?

Transcribed Image Text: Question Completion Status:
O The programs compiles and runs fine.
The switch control variable cannot be double.
QUESTION 8
Math.sqrt (25) returns
O 5.0
6.0
2.5
O 4.0
QUESTION 9

Transcribed Image Text: If we have a subnet address as 212.10.22.0/24, how many hosts could we have in this subnet at most?
(5.05)
A,
512
B,
1024
C.
256
D,
128
A (Ctrl)

A process requires 5 seconds service time when usinga single processor. New processors are arriving at the rate of 20 processes per minute. Determine the fraction of time for which CPU is busy?

Write a function named Quotient with 2 Integer parameters (originally from text boxes) and a Double return type. The function should calculate the first parameter divided by the second and return the result

Discuss the key metrics for static testing and Path testing and demonstrate how static testing and Path testing saves project managers costs by justifying this in the light of savings to cost ratio?

write a fortran 90 program Transcribed Image Text: Q.1/ Write a FORTRAN 90 program to print the square root of numbers from 100 to 1200 and
calculate the sum of the resulting values.

Describe (in words as well as graphically) the interaction framework introduced in Human Computer Interaction. Show how it can be used to explain problems in the dialog between a user and a computer.

Explain in detail the three major components specified by the National Institute of Standards and Technology (NIST) Cyber Security Framework, as well as how they may be utilized to minimize cybercrime in general.

Cse ( b logic) Transcribed Image Text: Using K-map method determine of the following
switching function.
F(w, ?, ?, z) %3DZm (0, 1, 4, 5, 6, 7, 9, 11, 15) +Zd
(10, 14).

The telephone network, which is the oldest and most well-known kind of (wired) communications network, operates on the packet switching concept. It is the most widely used mode of communication today. True \False

I need an explanation of how to create a matlab GUI that allows the user to perform either matrix manipulation or array operations. please, an explanation with the GUI matlab code is required.

Suppose a form contains two sets of radio buttons. Why is it essential for the sets to be contained in separate group boxes? Do the same concerns apply to sets of check boxes?

DO NOT COPY FROM OTHER WEBSITES Correct and detailed answer will be Upvoted else downvoted. Thank you! Transcribed Image Text: (b)
Find the Hamming code of the following bitstream using even
parity.
11011111010111010101110111000010

Transcribed Image Text: I. Which commands would output 19 if use on the following 2D array?
int[][] i = new int[7][19];
a) i[O].size()
b) i[O].length()
c) i.size()
d) i[O].length
e) i.length()
f) i.length

Think of a certain problem that you want to solve at home or in your community. how you think you can solve that problem with the use ROBOTS. JUST SIMPLE WORDS. NOT ESSAY

Write a function named Quotient with 2 Integer parameters (originally from text boxes) and a Double return type. The function should calculate the first parameter divided by the second and return the result

Transcribed Image Text: 1/3
Let W = [(a, b, c, d)| 5a – b=0 ) be a subspace of R’. Then a basis for W is
O {(1,5,0,0)}
O {(1,5,0,0),(0,0,0,1)}
O {(1,5,0,0),(0,0,1,0),(0,0,0,1)}
{(5,1,0,0),(0,0,1,0),(0,0,0,1)}

Draw a flowchart that takes 20 numbers from the user and returns the count of numbers that can be divided by 5 and the count of numbers that can be divided by 3.

Use the Regular language pumping lemma to prove that the following language is NOT regular. L = { 0 N 1 M 0 P |  N == M  OR  N == P }

MongoDB is an open-source document database and leading NoSQL database. MongoDB is written in C++.MongoDB concepts needed to create and deploy a highly scalable and performance-oriented database. How is Mongodb different from mysql?

Construct a single Python expression which evaluates to the following values, and incorporates the specified operations in each case (executed in any order). (a) Output value: ‘eeezy’ Required operations: 1. string indexing *

Transcribed Image Text: Domain Constraints means violations in size only
Select one:
O True
O False
Key constraint means violation when the primary key value is repeated
Select one:
O True
O False

Transcribed Image Text: Write a C++ program that will compute
and print the following:
The value of y on this expression: y=
X^3+2x^2+8x- 4 ; given that x=2
NB: make use mathematical functions.

Eliminate useless variables and symbols. Afterwards, convert to Chomsky Normal Form. (Start variable S)
S -> ABBC | BA
A-> abB | aa
B -> bB | Aa
C -> Cb | aC

Take input a Char input from user and find whether that char is an digit, lowercase or uppercase Alphabet. Print the result obtained.In any other case print “Might be an special character.”.In C++

Look at the following array definition String[] Students= {“St1”, “St222”, “St3333”}; what will be returned by Students.length what will be returned by Students[1].length() how many total elements can be saved in this array

Transcribed Image Text: DQR 1.3
Fill in the blank: Evaluate the following expressions as Java would:
24 5/2 22
23/5-2 2
24 (5/2.0) 0.8 0.0
48 % 5 3
48 % 8.0 0.0

Transcribed Image Text: When a stack segment is initialized then
SS and SP are initialized O
only SS is initialized O
only SP is initialized
SS and SP need not be initialized )

When building a classification model, which of the following is a good measure of the model’s performance on new observations?

Testing set AUC

Testing set ASE

Training set AUC

Training set ASE

check_circle

Describe briefly the subsumption architecture for reactive agents. Explain what conflict resolution strategy should be adopted in a production system that is generated from the conversion of a reactive agent with subsumption architecture.

c++ program. use for loop for the pattern below Transcribed Image Text: 1 2 3 4 5 5 4 3 2 1
123 4
1 2 3
4321
321
12
21
1
1

A soft link, which is also known as a symbolic link, may be seen by using the ls -l command and looking for a @ sign in the filename. So, is it correct?

Read IT’s About Business 9.3, Sprinklr, Section 9.4, p. 287 Explain how each of the following concepts could relate to Nike’s use of Sprinklr. (i) Master data (ii) Transaction data (iii) Data governance

79. To use a cable network for data transmission, we need two key devices: a ______ and a _________. a. CM; CMS b. CT; CMTS c. CM; CMTS d. none of the above

Let : P:      Birds can fly. Q:      2+1=4. R:      x is an integer. S:      ? is a rational number. CONSTRUCT THE SENTENCE OF THE FOLLOWING LOGICAL PROPOSITIONS. 1.       ((p?q) ? ~s) ? q

What does it mean that the style sheets are cascading? What is the order of priority of CSS? List 5 things you can do with CSS, which cannot be done easily in HTML.

Transcribed Image Text: What type of recursion is used in the following function? int f(int n){ if (n==1) return 1; else return n+f(n-1); }
O Tail recursion
Multiple recursion
Indirect recursion
Non-tail recursion

In cryptography the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message (spaces are omitted during encryption) WELCOME TO NETWORK SECURITY! a. WMEKREETSILTWETCOOCYONRU! b. EETSICOOCYWMEKRONRU!LTWET c. LTWETONRU!WMEKRCOOCYEETSI d. ONRU!COOCYLTWETEETSIWMEKR

C++ program to Convert Roman Number to Integer Number. Given a number in Roman format and we have to convert it into integer/decimal format. Example: Input: XIV Output: 14 Input: XI Output: 11

Explanation of what a challenge–response system for authentication is and how it works are required. It is not immediately apparent what makes it more secure than a traditional password-based method, but it does.

TCP is a lightweight Transport-layer protocol that is used to communicate between applications. It lacks many of the same characteristics as UDP, such as dependability and flow control. is it true or false

Using a loop create a matrix in R of 10 rolls all consisting of 5 dice in each roll. Then, rewrite your code in R to avoid using a loop. Annotate your code.

24 Transcribed Image Text: Explain and compare the two types of Sliding window ARQ protocols with suitable diagrams diagrar.
(Answer the question in separate sheet, scan and upload along with other descriptive answers)

Assume that there are three objects named Student,Course and Teacher. A relationship that exists in the given three objects is called as__________ a. Unary Relationship b. Binary Relationship c. Association d. Ternary Relationship

A restoring division algorithm is implemented using the sequential logic circuit.  The unsigned division of 1100 by 0011 is to be performed. At the end of the third cycle, register A contains ______.

The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server. a. limited b. vast c. distributed d. none of the above

Evaluate the following program according to a) lazy substitution b) eager substitution {with {z {+ 2 3}} {with {x {+ z 5}} {with {y {+ x 2}} {with {z 4} {+ y z}}}}}

191. h command gives ___________ a. A list of all the commands starting from h b. Describes all the commands c. Displays a short description of the command d. Displays all the programs

Write the sql query to create given table. Transcribed Image Text: users
user_id action
start
cancel
date
1
1-1-20
1-2-20
1
start
1-3-20
publish
start
1-4-20
1-5-20
cancel
1-6-20
4
start
1-7-20
N233

Do fast Transcribed Image Text: Write a Program in clojure programming
language to print the given string in reverse
order and also print the AA string after
assuming the given string is A

Is this true or false? a) Overloading and overriding are the same thing in terms of functionality. b) A LinkedList can only contain one kind of item (which is between the angle brackets).

Write a c++ program to Take 20 integer inputs from user (all dynamically) and print the following: number of positive numbers number of negative numbers number of odd numbers number of even numbers

Transcribed Image Text: 1.3 The transport layer major protocols are TCP and UDP. Give a justification of why an application would
be designed to use TCP instead of UDP.
Provide (2) two examples.

The telephone network, which is the oldest and most well-known kind of (wired) communications network, operates on the packet switching concept. It is the most widely used mode of communication today. True \False

Develop an Algorithm for the Pop operation to the Stack data structure which is implemented by Linked list. Input / Stack Definition Logic Pop Logic Showing Logic by diagram Data structures and algorithm

Transcribed Image Text: The correct notation for f( n) = 5″; g(n) = 10n100 + 5!
f(n)
(g(n ))
??. ????? ?
O b. Big-O
c. Theta O
O d. None of them

Identify two to three (2-3) privacy-invading information technology tools. Next, examine the most common ways that the tools you’ve found could be used to commit computer crimes. Give a justification for your response.

131. The process of suppression of details regarding storage and data type to highlight important features for better understanding is called a. data abstraction b. structural abstraction c. client abstraction d. server abstraction

dont copy from google Transcribed Image Text: PROVE that ifX is in P and X is NP-Complete then P = NP. Use the table below
Step
STATEM?NT
REASON WHY IT IS TRUE
No

I need the answer as soon as possible Transcribed Image Text: What is the representation of (124.2)8 in decimal?
O 39.4
O 52.33
O 41.5
O 84.25
O None of the other options

1.2 Using a laptop computer with a wireless connection into the company’s local area network, you download a Web page from the Internet. List all the different network connections involved in this operation.

Transcribed Image Text: User push 1 element in the stack having already five elements and having stack size as 5 then stack
becomes
a. Overflow
b. Underflow
c. Userflow
d. Crash
Follow Us

Transcribed Image Text: ADC to UART
Program the PIC24HJ microcontroller so that the UART displays:
• integer ADC 12 bit value acquired from AN5,
• the approximate voltage that is applied to AN5,

Transcribed Image Text: Correct the error in the given program to print product
of two numbers.
al= input (“Enter First num: “)
a2= input (“Enter Second num: ”
p=a1 a2
print(“Product is: %d”%d)

Java Question 15: Transcribed Image Text: The property of an algorithm that says that the algorithm must terminate
after a number of steps is
O output
O verifiable
O clefiniteness
O finiteness
effectiveness

Utilizing a formula similar to the following, determine how many of the cube’s connections may be severed while still ensuring that there will be a single link connecting every node in the n-cube.

I need the answer as soon as possible Transcribed Image Text: Given that name%=D”Python Programming”, which one of the following codes returns
“Python”?
O name[0:5]
O name[:6]
O name[:]
O name[1:5]
O name[1:6]

Build total language tree for the following CFG: S ? bX ? aY ? bab ? aba X ? aY ? aaa ? bbb Y ? bba ? baa ? aab ? abb

Briefly explain, the main difference between how to connect to a new office computer in the shss to the internet, and how to connect a stand-alone computer in your house to the internet.

With the help of examples, discuss under what circumstances would you prefer using each of the following machine learning models. (a) K nearest neighbor (k-NN) (b) k-mean clustering (c) Regression (d) Deep learning

Ten signals, each requiring 3000 hz, are multiplexed onto a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel? Assume that the guard bands are 300 Hz wide.

Don’t copy Create a script in python to generate a comparison report that reads at least 3 text files and then create a new folder with each of the differences listed in it.

Construct the LR (0) parsing for the given grammar and parse string (a) abaabba E ? E – T | T T ? T / F | F F ? (E) | id

Transcribed Image Text: 4. The phrase
concept.
refers to a composition, while
refers to inheritance in OOP
A. has-a, is-a
B. is-a, has-a
C. many to many, one to many
D. multiple, single

Discussion: Sensors and the industry Among all the discussed type of sensors, investigate and analyze which among of these is frequently used in the industry? Why? Cite some example to support your claim.

Decimal to Binary

1. 150
2. 399
3. 234
4. 88

Please give me a complete solution or a step by step process so that I can deeply understand the topic thank you!