Answer: 52
Explanation:
Following the information given in the question, we are informed that a process needs 103 KB of memory in order to run and that the system on which it is to run uses paging with 2KB pages, then the number of frames in memory that are needed will be:
= 103/2
= 51.5
= 52 approximately
Therefore, 52 frames in memory are needed.
Connie works for a medium-sized manufacturing firm. She keeps the operating systems up-to-date, ensures that memory and disk storage are available, and oversees the physical environment of the computer. Connie is employed as a __________. Hardware Engineer Computer Operator Database Administrator Computer Engineer
Answer: Computer operator
Explanation:
Following the information given, we can deduce that Connie is employed as a computer operator. A computer operator is a role in IT whereby the person involved oversees how the computer systems are run and also ensures that the computers and the machines are running properly.
Since Connie keeps the operating systems up-to-date, ensures that memory and disk storage are available, and oversees the physical environment of the computer, then she performs the role of a computer operator.
Create a parent class called Shape with width and height parameters of type double and a function that returns the area of the shape, which simply returns 0. Then define two subclasses, Rectangle, and Triangle, that override the area function to return the actual area (width*height for Rectangle and 1/2*width*height for Triangle).
The code must be in java
Answer:
umm im not sure tbh
Explanation:
Which of the following will cause you to use more data than usual on your smartphone plan each month?
a. make a large number of outbound calls
b. sending large email files while connected to wifi
c. streaming movies from Netflix while not connected to Wi-Fi
d. make a large number of inbound calls
Write a program that will read two floating point numbers (the first read into a variable called first and the second read into a variable called second) and then calls the function swap with the actual parameters first and second. The swap function having formal parameters number1 and number2 should swap the value of the two variables.
Sample Run:
Enter the first number
Then hit enter
80
Enter the second number
Then hit enter
70
You input the numbers as 80 and 70.
After swapping, the first number has the value of 70 which was the value of the
second number
The second number has the value of 80 which was the value of the first number
Answer:
The program in Python is as follows:
def swap(number1,number2):
number1,number2 = number2,number1
return number1, number2
first = int(input("First: "))
second = int(input("Second: "))
print("You input the numbers as ",first,"and",second)
first,second= swap(first,second)
print("After swapping\nFirst: ",first,"\nSecond:",second)
Explanation:
This defines the function
def swap(number1,number2):
This swaps the numbers
number1,number2 = number2,number1
This returns the swapped numbers
return number1, number2
The main begins here
This gets input for first
first = int(input("First: "))
This gets input for second
second = int(input("Second: "))
Print the number before swapping
print("You input the numbers as ",first,"and",second)
This swaps the numbers
first,second= swap(first,second)
This prints the numbers after swapping
print("After swapping\nFirst: ",first,"\nSecond:",second)
Which of the following definitions best describes the principle of separation of duties?
Answer:
A security stance that allows all communications except those prohibited by specific deny exceptions
A plan to restore the mission-critical functions of the organization once they have been interrupted by an adverse event
A security guideline, procedure, or recommendation manua
lAn administrative rule whereby no single individual possesses sufficient rights to perform certain actions
Use Python.
Complete reverse() method that returns a new character array containing all contents in the parameter reversed.
Ex: If the input array is:
['a', 'b', 'c']
then the returned array will be:
['c', 'b', 'a']
import java.util.*;
public class LabProgram {
// This method reverses contents of input argument arr.
public static char[] reverse(char[] arr) {
/* Type your code here. */
}
public static void main(String[] args) {
char [] ch = {'a','b','c'};
System.out.println(reverse(ch)); // Should print cba
}
}
Answer:
Explanation:
The code in the question is written in Java but If you want it in Python then it would be much simpler. The code below is writen in Python and uses list slicing to reverse the array that is passed as an argument to the function. The test case from the question was used and the output can be seen in the attached image below.
def reverse(arr):
reversed_arr = arr[::-1]
return reversed_arr
Computer data that is suitable for text
Answer:
Answer:Data Types. Computer systems work with different types of digital data. In the early days of computing, data consisted primarily of text and ...
The trackpad/touchpad on my laptop is acting unusual. When I click on something or move to an area, it jumps or moves to another area. What would be a good troubleshooting step to try and resolve this issue?
a. Use a mouse instead
b. Remove all possible contact points, and test again while ensuring only a single contact point
c. Refer caller to user guides
d. increase the brightness of the display
Answer:
My best answer would be, "b. Remove all possible contact points, and test again while ensuring only a single contact point"
This is because usually when the cursor jumps around without reason, it's caused by the user accidentally hitting the mouse touchpad on his or her laptop while typing. ... Similarly, know that just because you have an external mouse attached to your laptop, the built-in mousepad is not automatically disabled.
Brainliest?
command create database in oracle database ::((
Answer:
kdkskskiisidiodoosooddodod
LAB: Count characters - methods
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string.
Ex: If the input is
n Monday
the output is
1
Ex: If the input is
Today is Monday
the output is
0
Ex: If the input is
n it's a sunny day
the output is
0
Your program must define and call the following method that returns the number of times the input character appears in the input string public static int countCharacters (char userChar, String userString)
Note: This is a lab from a previous chapter that now requires the use of a method
LabProgram.java
1 import java.util.Scanner
2
3 public class LabProgram
4
5 /* Define your method here */
6
7 public static void main(String[] args) {
8 Type your code here: * >
9 }
10 }
Answer:
i hope understand you
mark me brainlist
Explanation:
using namespace std;
#include <iostream>
#include <string.h>
#include <stdlib.h>
#include <stdio.h>
#define BLANK_CHAR (' ')
int CountCharacters(char userChar, char * userString)
{
int countReturn=0;
int n = strlen(userString);
for (int iLoop=0; iLoop<n; iLoop++)
{
if (userString[iLoop]==userChar)
{
countReturn++;
}
}
return(countReturn);
}
/******************************************
Removes white spaces from passed string; returns pointer
to the string that is stripped of the whitespace chars;
Returns NULL pointer is empty string is passed;
Side Effects:
CALLER MUST FREE THE OUTPUT BUFFER that is returned
**********************************************************/
char * RemoveSpaces(char * userString)
{
char * outbuff = NULL;
if (userString!=NULL)
{
int n = strlen(userString);
outbuff = (char *) malloc(n);
if (outbuff != NULL)
{
memset(outbuff,0,n);
int iIndex=0;
//copies non-blank chars to outbuff
for (int iLoop=0; iLoop<n; iLoop++)
{
if (userString[iLoop]!=BLANK_CHAR)
{
outbuff[iIndex]=userString[iLoop];
iIndex++;
}
} //for
}
}
return(outbuff);
}
int main()
{
char inbuff[255];
cout << " PLEASE INPUT THE STRING OF WHICH YOU WOULD LIKE TO STRIP WHITESPACE CHARS :>";
gets(inbuff);
char * outbuff = RemoveSpaces(inbuff);
if (outbuff !=NULL)
{
cout << ">" << outbuff << "<" << endl;
free(outbuff);
}
memset(inbuff,0,255);
cout << " PLEASE INPUT THE STRING IN WHICH YOU WOULD LIKE TO SEARCH CHAR :>";
gets(inbuff);
char chChar;
cout << "PLEASE INPUT THE CHARCTER YOU SEEK :>";
cin >> chChar;
int iCount = CountCharacters(chChar,inbuff);
cout << " char " << chChar << " appears " << iCount << " time(s) in >" << inbuff << "<" << endl;
}
A new PKI is being built at a company, but the network administrator has concerns about spikes of traffic occurring twice a day due to clients checking the status of the certificates. Which of the following should be implemented to reduce the spikes in traffic?
A. CRL
B. OCSP
C. SAN
D. OID
Answer:
Option A (CRL) is the right answer.
Explanation:
Certificates with respective expiration date canceled mostly by CA generating or providing them, then it would no longer be tolerated, is considered as CRL.CRL verification could be more profitable for a platform that routinely manages several clients, all having pronouncements from a certain CA, because its CRL could be retrieved once per day.Other given choices are not connected to the given scenario. So Option A is the right one.
10 features of the ribbon in microsoft word
Answer:yes
Explanation:
Yup
When computer users have trouble with their machines or software, Roland is the first person they call for help. Roland helps users with their problems, or refers them to a more-experienced IT employee. Roland holds the position of __________ in the organization. Support Analyst Systems Analyst Network Administrator Database Administator
Answer:
The correct answer is A) Support Analyst
Explanation:
From the question, we can see that Roland is familiar with both machines and software. He is familiar with the operations of both parts of a computer to the end that he can attempt a fix. And if he can't he knows who to refer the end-users to. Usually, some IT personnel that is more experienced.
From the above points, we can safely say that Roland is an IT Support Analyst. He cannot be the Systems analyst because Systems Analysts are usually at the top of the Pyramid. They take on problems that are referred upwards to them from support analysts.
Cheers
The valid call to the function installApplication is
void main( )
{
// call the function installApplication
}
void installApplication(char appInitial, int appVersion)
{
// rest of function not important
}
Answer:
B. installApplication(‘A’, 1);
Explanation:
Given
The above code segment
Required
The correct call to installApplication
The function installApplication is declared as void, meaning that it is not expected to return anything.
Also, it receives a character and an integer argument.
So, the call to this function must include a character and an integer argument, in that order.
Option D is incorrect because both arguments are integer
Option C is incorrect because it passes no argument to the function.
Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).
Option B is correct
uuhdcnkhbbbbhbnbbbbnnnnnnnnnfddjkjfs
Answer:
The answer is "Option c"
Explanation:
In PHP to remove all the session variables, we use the session_destroy() function. It doesn't take any argument is required and then all sessions variables could be destroyed by a single call. If a particular clinical variable is now to be destroyed, the unset() function can be applied to unset a session variable. Its session doesn't unset or unset the session cookie by either of the local variables associated with it.
When rating ads, I should only consider my personal feelings on the ad.
Answer:
yes when rating ads you should only consider your personal feelings on the ad
A blogger writes that the new "U-Phone" is superior to any other on the market. Before buying the U-Phone based on this review, a savvy consumer should (5 points)
consider if the blogger has been paid by U-Phone
assume the blogger probably knows a lot about U-Phones
examine multiple U-Phone advertisements
speak to a U-Phone representative for an unbiased opinion
Answer:
Speak to a U-Phone representative.
Explanation:
A representative will tell you the necessary details about the U-phone without any biases whatsoever, as they´re the closest to the company when it comes to detail about their products.
When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choices begin with the main idea. put the bad news first. send the message via e-mail, text message, or IM. explain all background information first.
Answer:
explain all background information first.
Explanation:
Now if you are to deliver a message and you have suspicions that the person who is to read it might be uninterested, unwilling, hostile or displeased, you should put the main idea later in the message. That is, it should come after you have provided details given explanations or evidence.
It is not right to start with bad news. As a matter of fact bad news should not be shared through mails, IM or texts.
Write a program using integers user_num and x as input, and output user_num divided by x three times.Ex: If the input is:20002Then the output is:1000 500 250Note: In Python 3, integer division discards fractions. Ex: 6 // 4 is 1 (the 0.5 is discarded).LAB ACTIVITY2.29.1: LAB: Divide by x0 / 10main.pyLoad default template...12''' Type your code here. '''
Answer:
Following are the code to the given question:
user_num = int(input())#defining a variable user_num that takes input from user-end
x = int(input())#defining a variable x that takes input from user-end
for j in range(3):#defining for loop that divides the value three times
user_num = user_num // x#dividing the value and store integer part
print(user_num)#print value
Output:
2000
2
1000
500
250
Explanation:
In the above-given program code two-variable "user_num and x" is declared that inputs the value from the user-end and define a for loop that uses the "j" variable with the range method.
In the loop, it divides the "user_num" value with the "x" value and holds the integer part in the "user_num" variable, and prints its value.
A desktop computer is a type of mobile device.
a. true
b. false
A desktop computer is a type of mobile device: B. False.
What is a desktop computer?A desktop computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output that's usable by an end user.
Generally, desktop computers are fitted with a power supply unit (PSU) and designed to be used with an external display screen (monitor) unlike mobile device.
In conclusion, a desktop computer is not a type of mobile device.
Learn more about desktop computer here: brainly.com/question/959479
#SPJ9
Need help coding a sql probelm (not that hard im just confused)
Answer:
random answer
Explanation:
point = selct dnsggg
If you lose yellow from your printer, what would happen to the picture?
Answer:
The picture would be green.
let's have a class named Distance having two private data members such as feet(integer), inches(float), one input function to input values to the data members, one Display function to show the distance. The distance 5 feet and 6.4 inches should be displayed as 5’- 6.4”. Then add the two objects of Distance class and then display the result (the + operator should be overloaded). You should also take care of inches if it's more than 12 then the inches should be decremented by 12 and feet to be incremented by 1.
Answer:
Humildade
Ser justo (Fair Play)
Vencer independente
Using simplified language and numbers, using large font type with more spacing between questions, and having students record answers directly on their tests are all examples of _____. Group of answer choices universal design analytic scoring cheating deterrents guidelines to assemble tests
Answer:
universal design
Explanation:
Using simplified language and numbers, using large font type with more spacing between questions, and having students record answers directly on their tests are all examples of universal design.
Universal Design can be regarded as design that allows the a system, set up , program or lab and others to be
accessible by many users, this design allows broad range of abilities, reading levels as well as learning styles and ages and others to have access to particular set up or program.
it gives encouragment to the development of ICTS which can be
usable as well as accessible to the widest range of people.
Which of the following was one reason why electronic (computer-based) information sharing was challenging in the not too distant past?
a. Individuals and/or members of organizations did not speak the same language.
b. Hardware and software applications on either end could not talk to one another.
c. The most powerful computers were owned by large companies.
d. Organizations needed to protect information for competitive advantage.
Answer:
B. Hardware and software applications on either end could not talk to one another.
Explanation:
The answer to this question is that making connection to the internet used to be very slow, it's operation was difficult and so was its maintenance. Therefore they could be said to be unreliable at the time making electronic information sharing difficult as well as challenging. From this explanation the right answer to this question is answer option b.
Thank you.
Describe how keyboard software works and which problems does keyboard software
need to handle?
Answer:
The target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location.
No physical sensation of pressing a button results in misfires. Lack of physical divisions between keys makes touch typing impossible. Smaller key spacing results in typos.
RecursionexerciseCOP 3502; Summer2021We have gone through many examples in the class and those examples are available in the slides and uploaded codes. Try to test those codes and modify as you wish for getting more clarification.In additiontry the following:---------------------------------------------------------------------------------------------------------------------------------------1.What would be the output of the following recursive function if we call rec2(5)
Answer:
The output is:
1 2 3 4 5
Explanation:
Given
See attachment for code segment
Required
The output of rec2(5)
From the attached code segment, we have the following:
The base case: if (x==0){ return;}
The above implies that, the recursion ends when the value of x gets reduced to 0
The recursion:
rec2(x-1); ---- This continually reduces x by 1 and passes the value to the function
printf("%d ", x); This prints the passed value of x
Hence, the output of rec2(5) is: 1 2 3 4 5
You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface element that accepts user input. This user interface will be reused across several other applications in the organization. None of the controls in the Visual Studio toolbox meets your requirements; you need to develop all your code in house.
Required:
What actions should you take?
Answer:
The answer is "Developing the custom control for the user interface"
Explanation:
The major difference between customized control & user control would be that it inherit throughout the inheritance tree at different levels. Usually, a custom power comes from the system. Windows. UserControl is a system inheritance.
Using accuracy up is the major reason for designing a custom UI control. Developers must know how to use the API alone without reading the code for your component. All public methods and features of a custom control will be included in your API.
The ____ contains app buttons that allow you to quickly run the File Explorer or Microsoft Edge apps.
Explanation:
The taskbar contains app buttons that allow you to quickly run the File Explorer or Microsoft Edge apps.
Hope this helps
Write a C program to input a character, then check if the input
character is digit, letter, or other character.
Answer:
// CPP program to find type of input character
#include <iostream>
using namespace std;
void charCheck(char input_char)
{
// CHECKING FOR ALPHABET
if ((input_char >= 65 && input_char <= 90)
|| (input_char >= 97 && input_char <= 122))
cout << " Alphabet ";
// CHECKING FOR DIGITS
else if (input_char >= 48 && input_char <= 57)
cout << " Digit ";
// OTHERWISE SPECIAL CHARACTER
else
cout << " Special Character ";
}
// Driver Code
int main()
{
char input_char = '$';
charCheck(input_char);
return 0;
}
Explanation:
// CPP program to find type of input character
#include <iostream>
using namespace std;
void charCheck(char input_char)
{
// CHECKING FOR ALPHABET
if ((input_char >= 65 && input_char <= 90)
|| (input_char >= 97 && input_char <= 122))
cout << " Alphabet ";
// CHECKING FOR DIGITS
else if (input_char >= 48 && input_char <= 57)
cout << " Digit ";
// OTHERWISE SPECIAL CHARACTER
else
cout << " Special Character ";
}
// Driver Code
int main()
{
char input_char = '$';
charCheck(input_char);
return 0;
}