Answer:
programmers who are competent in data structures and algorithms can easily perform the tasks related to data processing ,automated reasoning ,or calculations . data structure and algorithms is significant for developers as it shows their problems solving abilities amongst the prospective employers .
Which terms means device that converts one voltage to another ?
Answer:
I believe it is an adapter
Explanation:
An adapter or adaptor is a device that converts attributes of one electrical device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another.
Write an algorithm for a vending machine that sells just one product. The machine flashes a yellow light when the quantity inside is below 40% of capacity
Answer:
The algorithm is as follows:
1. Start
2. Capacity = 100%
3. Input Status (True/False)
4. While Status == True
4.1. Read Quantity (%)
4.2. Capacity = Capacity - Quantity
4.3. If Capacity < 40%
4.3.1 Display Yellow Flash
4.4. Input Status (True/False)
5. Stop
Explanation:
This starts the algorithm
1. Start
The capacity of the machine is initialized to 100%
2. Capacity = 100%
This gets the status of the sales
3. Input Status (True/False)
The following iteration is repeated until the status is false
4. While Status == True
Read current sales quantity from the user
4.1. Read Quantity (%)
Remove the quantity from the capacity
4.2. Capacity = Capacity - Quantity
Check is capacity is below 40%
4.3. If Capacity < 40%
If yes, display yellow flashes
4.3.1 Display Yellow Flash
This gets the status of the sales
4.4. Input Status (True/False)
End algorithm
5. Stop
You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue.
a. False
b. True
Changing the resolution should work, it’s most likely true. :)
You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue is the true statement.
What is meant by resolution?In order to cover the cost of the pixels on the horizontal and vertical axes, resolution is the total number of pixels individual points of colour on a display monitor.
The size of the monitor and its resolution affect how sharp an image appears on a display.
Thus, the statement is true.
For more details about resolution, click here:
https://brainly.com/question/14307212
#SPJ2
Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.
a. True
b. False
1011 0110 10102 = ?16
Answer:
B6A
Explanation:
I think you want to convert binary to hex.
Hexadecimal or "hex" is a numbering system which uses 16 different numerals. We saw that decimal used ten numerals from 0 to 9. Hex expands on this by adding six more, the capital letters A, B, C, D, E and F.
0...1...2...3...4...5...6...7...8...9...A...B...C...D...E...F
Steps to Convert Binary to Hex
1. Start from the least significant bit (LSB) at the right of the binary number and divide it up into groups of 4 digits. (4 digital bits is called a "nibble").
2.Convert each group of 4 binary digits to its equivalent
hex value .
3.Concatenate the results together, giving the total hex number.
What will be the pseudo code for this
Answer:
Now, it has been a while since I have written any sort of pseudocode. So please take this answer with a grain of salt. Essentially pseudocode is a methodology used by programmers to represent the implementation of an algorithm.
create a variable(userInput) that stores the input value.
create a variable(celsius) that takes userInput and applies the Fahrenheit to Celsius formula to it
Fahrenheit to Celsius algorithm is (userInput - 32) * (5/9)
Actual python code:
def main():
userInput = int(input("Fahrenheit to Celsius: "))
celsius = (userInput - 32) * (5/9)
print(str(celsius))
main()
Explanation:
I hope this helped :) If it didn't tell me what went wrong so I can make sure not to make that mistake again on any question.
Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
Answer:
gzvzvzvzbxbxbxb
Explanation:
hshzhszgxgxggdxgvdvsvzvzv
In C, for variables of type int we use %i as the format specifier in printf and scanf statements. What do we use as the format specifier for variables of type float, if we want to output the floating point value, showing 3 decimal places?
Answer:
variable with a leading sign, three fractioned digits after the decimal point
An engineer is writing above the HTML page that currently displays a title message in large text at the top of the page . The engineer wants to add a subtitle directly underneath that is smaller than the title but still longer than most of the text on page
<!DOCTYPE html>
<html>
<body>
<h1>Heading or Title</h1>
<h2>Sub heading or sub title</h2>
</body>
</html>
This will be the html code for the given problem.
Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web research and develop a one-page description of the five most important things about HCI of mobile computing that the IT manager should know.
Answer:
phone grows everyday 82 percent
Explanation:
Which of the following will cause you to use more data than usual on your smartphone plan each month?
a. make a large number of outbound calls
b. sending large email files while connected to wifi
c. streaming movies from Netflix while not connected to Wi-Fi
d. make a large number of inbound calls
Where does change management play a major role in transforming a client
business into a data-driven, intelligent enterprise?
To manage a modern IT environment characterized by hybrid complexity and exponential data growth — and to make that same IT a driver of growth and innovation for the business — you need to build intelligence into every layer of your infrastructure.
Change management plays a major role in transforming a client business into a data-driven, intelligent enterprise in: data culture and literacy.
Data culture and literacy refer to all the processes involved in analyzing and understanding data within the framework of an organization.
The employees within such organizations are trained to read and understand data. It becomes a part of the organization's culture.
So data culture and literacy should be used when trying to transform a client business into a data-driven, intelligent enterprise.
Learn more about data culture here:
https://brainly.com/question/21810261
1. Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the letters that make up the word can be arranged.
2. Convert the pseudocode in question one to JavaScript and test your program.
Answer:
1)Pseudocode:-
Prompt user to enter string
Pass it to combination function which can calculate the entire combination and can return it in an array
In combination method -
Check if the string is length 2 size ie of 0 or 1 length then return string itself
Else iterate through string user entered
Get the present character within the variable and check if the variable is already used then skip
Create a string from 0 to i the index + (concatenate) i+1 to length and recursive call combination function and pass this string and store end in subpermutation array
For each recursive call push character + sub permutation in total arrangement array.
2)Code -
function combinations(userStr) {
/* when string length is less than 2 then simply return string */
if (userStr.length < 2) return userStr;
/* this array will store number of arrangement that word can be stored */
var totalArrangements = [];
/* iterate through string user enter */
for (var i = 0; i < userStr.length; i++) {
/* get the current character */
var character = userStr[i];
/*check if character is already used than skip */
if (userStr.indexOf(character) != i)
continue;
/* create a string and concanete it form 0 to i index and i+1 to length of array */
var str = userStr.slice(0, i) + userStr.slice(i + 1, userStr.length);
/* push it to totalArrangments */
for (var subPermutation of combinations(str))
totalArrangements.push(character + subPermutation)
}
/* return the total arrangements */
return totalArrangements;
}
/* ask user to prompt string */
var userStr = prompt("Enter a string: ");
/* count to count the total number of combinations */
let count = 0;
/* call function the return tolal number of arrangement in array */
totalArrangements = combinations(userStr);
/* print the combination in console */
for (permutation of totalArrangements) {
console.log(permutation)
}
/* total combination will be totalArrangements.length */
count = totalArrangements.length;
/*print it to console */
console.log("Total combination " + count)
Output:-
Which of the following expressions would you use to test if a char variable named choice is equal to "y" or "Y"? a. choice.tolower = "y" || "Y" b. choice.tolower = "y" c. tolower(choice) = "y" d. tolower(choice) = "y" || "Y"
Answer:
choice.tolower == "y"
Explanation:
The tolower method is a string method in c# that converts all characters in a string to lowercase characters(if they are not already lowercase letters) except special symbols which remain the same example "#" symbol.
The tolower method does not take any arguments, therefore to use it, we simply chain it to our string variable(dot notation) and use a comparison operator "==" that evaluates to true or false based on whether the values returned on both sides are equal.
5. When you send your email to a bad address it may come back as a:
spam email
server email
bounced email
hypertext email
SAVE & E
Answer:
The answer is a bounced email
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
what is the python ?
Answer:
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.
This is my Opinion.
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.
Hope this helps you :)
e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}
Explanation:
double e-d/5.6;is wrong it should return to c
How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50
Answer:
Create boxes with the following content
Initialize sum to 0, product to 1 and number to 1Check if number is a prime. If yes, update sum += number and product *= numberIncrease number by 1If number is <= 50, go back to "check" block.The check block has a diamond shape.
At the "yes" branch of the check block, you can create separate blocks for updating the sum and the product.
Connect the blocks using arrows.
Indicate the start and the end of the flow using the appropriate symbols.
The block to check if a number is a prime you could further decompose into the steps needed to do such a check.
Write a program that generates an array filled up with random positive integer
number ranging from 15 to 20, and display it on the screen.
After the creation and displaying of the array , the program displays the following:
[P]osition [R]everse, [A]verage, [S]earch, [Q]uit
Please select an option:
Then, if the user selects:
-P (lowercase or uppercase): the program displays the array elements position and
value pairs for all member elements of the array.
-R (lowercase or uppercase): the program displays the reversed version of the
array
-A (lowercase or uppercase): the program calculates and displays the average of the
array elements
-S (lowercase or uppercase ): the program asks the user to insert an integer number
and look for it in the array, returning the message wheher the number is found and
its position ( including multiple occurences), or is not found.
-Q (lowercase or uppercase): the program quits.
NOTE: Until the last option (‘q’ or ‘Q’) is selected, the main program comes back at
the beginning, asking the user to insert a new integer number.
Answer:
#include <iostream>
#include <cstdlib>
using namespace std;
const int MIN_VALUE = 15;
const int MAX_VALUE = 20;
void fillArray(int arr[], int n) {
// fill up the array with random values
for (int i = 0; i < n; i++) {
arr[i] = rand() % (MAX_VALUE - MIN_VALUE + 1) + MIN_VALUE;
}
}
void displayArray(int arr[], int n) {
for (int i = 0; i < n; i++) {
cout << i << ": " << arr[i] << endl;
}
}
void main()
{
int myArray[10];
int nrElements = sizeof(myArray) / sizeof(myArray[0]);
fillArray(myArray, nrElements);
displayArray(myArray, nrElements);
char choice;
do {
cout << "[P]osition [R]everse, [A]verage, [S]earch, [Q]uit ";
cin >> choice;
choice = toupper(choice);
switch (choice) {
case 'P':
displayArray(myArray, nrElements);
break;
}
} while (choice != 'Q');
}
Explanation:
Here's a start. Now can you do the rest? ;-)
discribe two ways to zoom in and out from an image
Option 1: Spread your fingers on your laptop's trackpad.
Option 2: Press Command (or control) and the + sign.
Hope this helps!
Have a wonderful day!
The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion
Answer:
B. data at rest, data in transit
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.
Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.
what is IBM 1401 used for? Write your opinion.
Explanation:
The 1401 was a “stored program computer,” allowing programmers to write (and share) applications loaded into the machine from punched cards or magnetic tape, all without the need to physically reconfigure the machine for each task.
In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a) user status. b) loyalty status. c) usage rate. d) demographics
Answer: demographics
Explanation:
Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.
The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.
It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.
Discuss the DMA process
Answer:
Direct memory access (DMA) is a process that allows an input/output (I/O) device to send or receive data directly to or from the main memory, bypassing the CPU to speed up memory operations and this process is managed by a chip known as a DMA controller (DMAC).
Explanation:
A defined portion of memory is used to send data directly from a peripheral to the motherboard without involving the microprocessor, so that the process does not interfere with overall computer operation.
In older computers, four DMA channels were numbered 0, 1, 2 and 3. When the 16-bit industry standard architecture (ISA) expansion bus was introduced, channels 5, 6 and 7 were added.
ISA was a computer bus standard for IBM-compatible computers, allowing a device to initiate transactions (bus mastering) at a quicker speed. The ISA DMA controller has 8 DMA channels, each one of which associated with a 16-bit address and count registers.
ISA has since been replaced by accelerated graphics port (AGP) and peripheral component interconnect (PCI) expansion cards, which are much faster. Each DMA transfers approximately 2 MB of data per second.
A computer's system resource tools are used for communication between hardware and software. The four types of system resources are:
I/O addresses Memory addresses. Interrupt request numbers (IRQ). Direct memory access (DMA) channels.DMA channels are used to communicate data between the peripheral device and the system memory. All four system resources rely on certain lines on a bus. Some lines on the bus are used for IRQs, some for addresses (the I/O addresses and the memory address) and some for DMA channels.
A DMA channel enables a device to transfer data without exposing the CPU to a work overload. Without the DMA channels, the CPU copies every piece of data using a peripheral bus from the I/O device. Using a peripheral bus occupies the CPU during the read/write process and does not allow other work to be performed until the operation is completed.
With DMA, the CPU can process other tasks while data transfer is being performed. The transfer of data is first initiated by the CPU. The data block can be transferred to and from memory by the DMAC in three ways.
In burst mode, the system bus is released only after the data transfer is completed. In cycle stealing mode, during the transfer of data between the DMA channel and I/O device, the system bus is relinquished for a few clock cycles so that the CPU can perform other tasks. When the data transfer is complete, the CPU receives an interrupt request from the DMA controller. In transparent mode, the DMAC can take charge of the system bus only when it is not required by the processor.
However, using a DMA controller might cause cache coherency problems. The data stored in RAM accessed by the DMA controller may not be updated with the correct cache data if the CPU is using external memory.
Solutions include flushing cache lines before starting outgoing DMA transfers, or performing a cache invalidation on incoming DMA transfers when external writes are signaled to the cache controller.
Answer:
See explanation
Explanation:
DMA [tex]\to[/tex] Direct Memory Access.
The peripherals of a computer system are always in need to communicate with the main memory; it is the duty of the DMA to allow these peripherals to transfer data to and from the memory.
The first step is that the processor starts the DMA controller, then the peripheral is prepared to send or receive the data; lastly, the DMA sends signal when the peripheral is ready to carry out its operation.
Describe the purpose of shell scripts. Provide one example to reflect the use of variables, constructs, or functions.
Answer:
Kindly check explanation
Explanation:
Shell scripts are used for writing codes which may involve writing together a complete set of task in a single script. These set if codes or instructions could be run at once without having to run this program one after the other on a command line. This way it avoid having to repeat a particular task each time such task is required. As it already combines a sequence of command which would or should have been typed one after the other into a compiled single script which could be run at once.
A shell script could be written for a control flow construct :
if [expression]
then (command 1)
else (command 2)
.....
What is hacking? Why is hacking a concern for law enforcement?
Answer:
hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.
hi, please help me, please help me.
Give one example of where augmented reality is used
Answer
Medical Training
From operating MRI equipment to performing complex surgeries, AR tech holds the potential to boost the depth and effectiveness of medical training in many areas. Students at the Cleveland Clinic at Case Western Reserve University, for example, will now learn anatomy utilizing an AR headset allowing them to delve into the human body in an interactive 3D format.
it is also use in retail ,. Repair & Maintenance,Design & Modeling,Business Logistics etc
Let a be an int array and let i and j be two valid indices of a, a pair (i,j) with i a[j]. Design a method that counts the different pairs of indices of a in disarray. For example, the array <1,0,3,2> has two pairs in disarray.
Answer:
Code:-
#include <iostream>
using namespace std;
int main()
{
// take array size from user
int n;
cout << "Enter array size:";
cin >> n;
// Declare array size with user given input
int a[n];
// take array elements from user & store it in array
cout << "Enter array elements:";
for(int i=0 ; i < n ; i++){
cin >> a[i];
}
/* ----- Solution Starts ----- */
// i & j for checking disarray & count is for counting no. of disarray's
int i=1, j=0, count=0;
for(int k=0; k < n ; k++){
if(a[i] > a[j]){
// if disarray found then increament count by 1
count++;
}
// increament i & j also to check for further disarray's
i++;
j++;
}
// Print the disarray count
cout << "Pairs of disarray in given array:" << count;
/* ----- Solution Ends ----- */
return 0;
}
Output:-