Answer:
ab2
Explanation:
Describe computer in your own words on three pages
no entendi me explicas porfavor para ayudarte?
Question 1
The decimal number system problem solving question
Statement: Several digits '8' are written and some '+" signs are interested
to get the sum 1000. Figure out how it is done.
Answer:
888 + 88 + 8 + 8 + 8 = 1000
Explanation:
Required
Add up to 1000 using only digit 8
There is no straight way to answer this question; so, we make use of trial by error method to arrive at our solution.
After several trials, I found out that:
888 + 88 + 8 + 8 + 8 = 1000
Need help ASAP!
Which of the following statements is true?
1) A PCAP format is handy because there is no additional tool to read it.
2) Network traffic can be captured using the Tcpdump protocol analyzer.
3) Normally, traffic inside a network is recorded within a capture file.
4) Sniffer is a program to save the network capture to a specific format.
The statement that is true is that Network traffic can be captured using the Tcpdump protocol analyzer.
How is network traffic captured?Network traffic can be taken in using the Tcpdump. This is known to be a kind of packet sniffer that is often used to look and record network traffic on an interface.
An example is when a person capture 1,000 packets through the use of tcpdump. One can then analyze network traffic by using actual network traffic analyzer, which is as Wireshark.
Learn more about Network traffic from
https://brainly.com/question/26199042
what is the meaning of antimonographycationalis
Answer:
Although this word was made up in order to be a contender for the longest word in English, it can be broken down into smaller chunks in order to understand it.
Anti- means that you are against something; monopoly means the exclusive control over something; geographic is related to geography; and the remaining part has to do with nationalism.
So this word means something like 'a nationalistic feeling of being against geographic monopoly,' but you can see that it doesn't have much sense.
(answer copied from Kalahira just to save time)
Functions should contain only the code that performs a single task.
O True
O False
Answer:
false
Explanation:
function should contain more codes
Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector (except the last value) with the last value in the vector subtracted from each value. Output each value on a new line. Ex: If the input is -46 66 76 9 -1, the output is:
-55
57
67
Answer:
The program in C++ is as follows:
#include <iostream>
#include <vector>
using namespace std;
int main(){
vector<int> nums;
int num;
cin>>num;
while(num != -1){
nums.push_back(num);
cin>>num; }
for (auto i = nums.begin(); i != nums.end(); ++i){
cout << *i <<endl; }
return 0;
}
Explanation:
This declares the vector
vector<int> nums;
This declares an integer variable for each input
int num;
This gets the first input
cin>>num;
This loop is repeated until user enters -1
while(num != -1){
Saves user input into the vector
nums.push_back(num);
Get another input from the user
cin>>num; }
The following iteration print the vector elements
for (auto i = nums.begin(); i != nums.end(); ++i){
cout << *i <<endl; }
the grade point average collected from a random sample of 150 students. assume that the population standard deviation is 0.78. find the margin of error if c = 0.98.
Answer:
[tex]E = 14.81\%[/tex]
Explanation:
Given
[tex]n = 150[/tex]
[tex]\sigma = 0.78[/tex]
[tex]c = 0.98[/tex]
Required
The margin of error (E)
This is calculated as:
[tex]E = z * \frac{\sigma}{\sqrt{n}}[/tex]
When confidence level = 0.98 i.e. 98%
The z score is: 2.326
So, we have:
[tex]E = 2.326 * \frac{0.78}{\sqrt{150}}[/tex]
[tex]E = 2.326 * \frac{0.78}{12.247}[/tex]
[tex]E = \frac{2.326 *0.78}{12.247}[/tex]
[tex]E = \frac{1.81428}{12.247}[/tex]
[tex]E = 0.1481[/tex]
Express as percentage
[tex]E = 14.81\%[/tex]
You've decided to build a new gaming computer and are researching which power supply to buy. Which component in a high-end gaming computer is likely to draw the most power
Answer:
Following are the solution to the given question:
Explanation:
In this order, it is typically the GPU and CPU. The most important way to consider is to look at the details of the components to enhance watts. Add up to 100 watts so make sure it was safe and ok. Just buy a PSU with an extra 100 watts of leeway for your system. This is indeed a slight price difference.
Marketing có phải là bán hàng hay không? Giải thích?
Answer:
Sự khác biệt giữa bán hàng và tiếp thị là bán hàng tập trung vào làm việc trực tiếp với khách hàng tiềm năng để khiến họ chuyển đổi, trong khi tiếp thị tập trung vào việc khơi dậy sự quan tâm đến sản phẩm của bạn.
Answer:
Marketing không phải là bán hàngg
Explanation:
Nó là công cụ hỗ trợ cho việc bán hàng
multimedia is an effective tool used in different fields such as business and education true or false
Answer:
True
Explanation:
Multimedia is used in many fields. It is basically the ability to express something in many different ways. This allows you to more easily demonstrate a product, idea, or even a theory. Since this can be through art, video, presentation, text, live, etc. It allows you to find the best format for the specific product or idea that you are trying to present to a group of viewers. That is why it is an effective tool for various fields since it can just as easily help a company sell a product as well as help a teacher express a mathematical concept.
The input to the function/method consists of two arguments.
a. True
b. False
Answer:
See Explanation
Explanation:
The function is not given. So, I will provide general explanation.
A function is defined as:
return-type function-name(argument-lists)
For instance, an int function that has 1 argument is:
int Myfunc(int num)
num is the argument of the function Myfunc
So, an example of a function with two arguments is:
int Myfunc(int num, string name)
So, examine the function in the complete question; then count the number of arguments to determine if the answer is true or false.
Design traffic lights at an intersection of a city. North and South (up and down) are going to be a main highway, East and West (right and left) will be a smaller cross street. There will be no turn signals and no cross walks. You only need to build/code one set of lights for each street (one set of green, yellow, and red for the highway, and another set for the cross street). You do not need to build actual traffic lights or an intersection.
Answer:
Explanation:
The following code is written in Java. In order to code this efficiently, I created a class for the trafficLights. The class contains the currentLight, and the streetType as variables and contains a constructore, getter and setter methods, and a method to turn to the next light in the sequence. Then I created 4 objects of TrafficLights for the highways and the streets.
class Brainly {
public static void main(String[] args) {
TrafficLights highwaySouth = new TrafficLights("Highway", "green");
TrafficLights highwayNorth = new TrafficLights("Highway", "green");
TrafficLights streetEast = new TrafficLights("Street", "yellow");
TrafficLights streetWest = new TrafficLights("Street", "red");
}
}
class TrafficLights {
String streetType, currentLight;
public TrafficLights(String streetType, String currentLight) {
this.streetType = streetType;
this.currentLight = currentLight;
}
public void nextLight() {
if (this.currentLight == "green") {
this.currentLight = "yellow";
} else if (this.currentLight == "yellow") {
this.currentLight = "red";
} else {
this.currentLight = "green";
}
}
public String getStreetType() {
return streetType;
}
public void setStreetType(String streetType) {
this.streetType = streetType;
}
public String getCurrentLight() {
return currentLight;
}
public void setCurrentLight(String currentLight) {
this.currentLight = currentLight;
}
}
create slider in wordpress
Answer:
Adding a WordPress Slider in Posts/Page
Open the post editor, select the location where you want to add the slider, and click on the Add Slider button next to the media uploader. You will see boxes for each slider you have created. Choose the slider you want to insert and then click Insert Slider button.
Which of the following substances increases in quantity during repititive muscle contraction during oxygen deficti ?
Lactic acid
Answer:
Lactic acid
Explanation:
Lactic acid builds up during strenuous exercise with limited amounts of oxygen.
Questions to ask people on how corona has affected the religion sectors
Answer:
bcoz of corona all churches and temples are closed and pilgrimage are cancelled
16. A 6-cylinder engine has a bore of 4 inches and a stroke of 3.5 inches. What's the total piston displacement?
A. 260
B. 263.76
C. 253.76
D. 250
Answer:
b i just guessed
Explanation:
Saved In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity? Select all that apply. There must be a maximum of one attribute instance. There must be many instances of the attribute There must be at most one entity instance that each attribute instance describes. There must be at least one instance of the attribute. There must be zero or more instances of the attribute. Question 2 (2 points) True or false: A singular attribute is also known as a unique attribute. True False Question 3 (3 points) Saved Relationship names and types of relationship maxima or minima that each could have are listed below. Match each relationship in the list below to the type of relationship maxima or minima. Instructions: Choose your responses from the drop-down menus below. Response options cannot be used more than once. Minima is One-Zero 1 Person-Assigned Social SecurityNumber 4 Minima is Zero Zero 2 CubicleNumber-Assigned-to- Employee per shift 2 Maxima is One-Many 3. Birthdate-Recorded-for-a Person 1 Maxima is One One 4. Women-Bearing-Children Question 4 (2 points) Saved A ride-sharing app's discount system for riders is configured such that a ride discount is triggered only if at least two RiderlDs book a ride in the same Card at the same time. Which of the following is true of the relationship Ride Discount-is-Applicable?
The relationship minimum is Many-One.
The relationship minimum is Two-One.
The relationship maximum is One-Two.
The relationship minimum is One-Two.
Answer:
Saved In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity:
There must be a maximum of one attribute instance.
There must be many instances of the attribute.
There must be at most one entity instance that each attribute instance describes.
There must be at least one instance of the attribute.
A singular attribute is also known as a unique attribute. True
Saved Relationship names and types of relationship maxima or minima that each could have are listed below. True
Explanation:
While saving a document to her hard drive, Connie's computer screen suddenly changed to display an error message on a blue background. The error code indicated that there was a problem with her computer's RAM. Connie's computer is affected by a(n) __________.
Answer:
The right answer is "Hardware crash".
Explanation:
According to the runtime error message, this same RAM on your machine was problematic. This excludes file interoperability or compliance problems as well as program error possibilities.Assuming implementation performance problems exist, the timeframe that would save the information would be typically longer, but there's still a lower possibility that the adequacy and effectiveness color will become blue but instead demonstrate warning would appear.Thus the above is the right solution.
In a paragraph, describe in detail a practical real-world example of where you would implement a singly-linked list and why a singly-linked list is best for this use. Do not list the properties of a singly-linked list....
Rather identify a real-world example or application. If you identify this through research, cite your source.
Answer:
travel
Explanation:
One real world example of a singly-linked list would be travel. Imagine that you want to take a trip to your nearest neighbor state. To do so you would need to take a 2 buses and a train, but you can't just take any or in any order you wish. You first need to take the first bus at your current location, get off at the train station, take that train to the final stop, get off and take the bus to the final destination. Meaning there is a sequence of connected events that you must follow in order to get to your destination and the same opposite sequence of events to get back. This is exactly like a singly-linked list.
Can you help me in this question
Answer:
6 2 and 0
Explanation:
This algorithm doesn't work if the list is not ordered ascending.
In this example it is not, and indeed the item "1" is never found.
first cycle: first=0, last=12 so midpoint=6
second cycle: first=0, last=5 so midpoint=2
last cycle: first=0, last=1 so midpoint=0
then last is assigned -1 so the while statement is no longer true.
full form of computer
Answer:
COMPUTER: Common Operating Machine Purposely used for Technological and Educational research.
Explanation:
By the way, a computer is not an acronym and is the name of an electronic device.
A computer is a simple machine that we can program for a lot of logical and arithmetic functions, and it executes our work according to our instructions.
in simple words, a computer is an electronic device that makes our work easy, and any computer that has been programmed for some set of works, it performs that task or works quickly and correctly.
After performing addition operation such as AX=18, BX=19 which Flags will be
affected
Answer:
Carry Flag (CF) - this flag is set to 1 when there is an unsigned overflow. ...
Zero Flag (ZF) - set to 1 when result is zero. ...
Sign Flag (SF) - set to 1 when result is negative. ...
Overflow Flag (OF) - set to 1 when there is a signed overflow.
¿Cuál es la diferencia de un ciudadano digital entre la vida real y la vida en línea?
Given the following tree, use the hill climbing procedure to climb up the tree. Use your suggested solutions to problems if encountered. K is the goal state and numbers written on each node is the estimate of remaining distance to the goal.
Identify the hardware components in your own computer. If you don't have a computer, use a friend's, or one at work or in an NVCC lab. The following list shows the components you should identify and how to find the information on a Windows computer. Describe model computer: type (laptop, desktop, notebook, tablet, etc.) Indicate your manufacturer (HP, Apple: iPad, MacBook Air, etc., Lenovo, Dell, etc.) of the computer. Input devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Output devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Storage devices (include internal and external devices, and how much data each can hold) - Open Windows Explorer and right click on a drive name to open its properties. Amount of RAM - Open System Properties in the Windows Control Panel. Type and speed of CPU - Open System Properties in the Windows Control Panel. Ports (number and type) - Look for jacks into which a connector can be plugged on the front, back and sides of the machine. Compare the jacks to pictures in your textbook.
Solution :
A friend of mine have an old version of computer PC having the following components :
Input devices
Model name of the keyboard -- PUNTA , model number -- P-KB515
Model name of the mouse -- PUNTA, model number -- P-KB515
Output devices
Speaker : COMPAQ
Monitor : ACER, Model Number --- EB192Q
Storage : 500 MB capacity hard disk
RAM : 2 GB
Processor : Intel Pentium dual E1260 at the rate 1.80 GHz
It is provided with audio jacks
Given two regular expressions r1 and r2, construct a decision procedure to determine whether the language of r1 is contained in the language r2; that is, the language of r1 is a subset of the language of r2.
Answer:
Test if L(M1-2) is empty.
Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).
COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.
Test if L(M2-1) is empty.
Answer yes if and only if both answers were yes.
Explanation:
An algorithm must be guaranteed to halt after a finite number of steps.
Each step of the algorithm must be well specified (deterministic rather than non-deterministic).
Three basic problems:
Given an FA M and an input x, does M accept x?
Is x in L(M)
Given an FA M, is there a string that it accepts?
Is L(M) the empty set?
Given an FA M, is L(M) finite?
Algorithm for determining if M accepts x.
Simply execute M on x.
Output yes if we end up at an accepting state.
This algorithm clearly halts after a finite number of steps, and it is well specified.
This algorithm is also clearly correct.
Testing if L(M) is empty.
Incorrect "Algorithm"
Simulate M on all strings x.
Output yes if and only if all strings are rejected.
The "algorithm" is well specified, and it is also clearly correct.
However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.
COMMENT: Note we use the algorithm for the first problem as a subroutine; you must think in this fashion to solve the problems we will ask.
Correct Algorithm
Simulate M on all strings of length between 0 and n-1 where M has n states.
Output no if and only if all strings are rejected.
Otherwise output yes.
This algorithm clearly halts after a finite number of steps, and it is well specified.
The correctness of the algorithm follows from the fact that if M accepts any strings, it must accept one of length at most n-1.
Suppose this is not true; that is, L(M) is not empty but the shortest string accepted by M has a length of at least n.
Let x be the shortest string accepted by M where |x| > n-1.
Using the Pumping Lemma, we know that there must be a "loop" in x which can be pumped 0 times to create a shorter string in L.
This is a contradiction and the result follows.
COMMENT: There are more efficient algorithms, but we won't get into that.
Testing if L(M) is finite
Incorrect "Algorithm"
Simulate M on all strings x.
Output yes if and only if there are a finite number of yes answers.
This "algorithm" is well specified and correct.
However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.
COMMENT: Note we again use the algorithm for the first problem as a subroutine.
Correct Algorithm
Simulate M on all strings of length between n and 2n-1 where M has n states.
Output yes if and only if no string is accepted.
Otherwise output no.
This algorithm clearly halts after a finite number of steps, and it is well specified.
The correctness of the algorithm follows from the fact that if M accepts an infinite number of strings, it must accept one of length between n and 2n-1.
This builds on the idea that if M accepts an infinite number of strings, there must be a "loop" that can be pumped.
This loop must have length at most n.
When we pump it 0 times, we have a string of length less than n.
When we pump it once, we increase the length of the string by at most n so we cannot exceed 2n-1. The problem is we might not exceed n-1 yet.
The key is we can keep pumping it and at some point, its length must exceed n-1, and in the step it does, it cannot jump past 2n-1 since the size of the loop is at most n.
This proof is not totally correct, but it captures the key idea.
COMMENT: There again are more efficient algorithms, but we won't get into that.
Other problems we can solve using these basic algorithms (and other algorithms we've seen earlier this chapter) as subroutines.
COMMENT: many of these algorithms depend on your understanding of basic set operations such as set complement, set difference, set union, etc.
Given a regular expression r, is Lr finite?
Convert r to an equivalent FA M.
COMMENT: note we use the two algorithms for converting a regular expression to an NFA and then an NFA to an FA.
Test if L(M) is finite.
Output the answer to the above test.
Given two FAs M1 and M2, is L(M1) = L(M2)?
Construct FA M1-2 from M1 and M2 which recognizes the language L(>M1) - L(>M2).
COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.
Test if L(M1-2) is empty.
Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).
COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.
Test if L(M2-1) is empty.
Answer yes if and only if both answers were yes.
What type of editor is used to edit HTML code?What type of editor is used to edit HTML code?
For learning HTML we recommend a simple text editor like Notepad (PC) or TextEdit (Mac).
mark me brainliestt :))
Answer:
If you want to use HTML editor in windows, you can use notepad. And if you want to use HTML editor on your phone than you need to install any editor on your phone.
Explanation:
If you want to use another app than notepad in pc, laptop, mac, OS or Linux, you can download a editor known as Visual Studio Code. If you want to do another language you can also do it in it. You can do all programming languages in it.
What is the third rule to normalize a database?
All primary keys must be based on filtered values.
All fields in the table must be included in the primary key.
Each primary key must be based on multiple fields in the table.
Each nonkey field must relate to the entire single-field primary key.
Answer is 4
Each nonkey field must relate to the entire single-field primary key
Answer:
4th option as u told
oook
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent network analyzers from being able to read data in flight. What are considered as secure network protocols?
Answer:
SSH, HTTPS and SMTP
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
Hence, SSH, HTTPS and SMTP are considered as secure network protocols.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).
SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.
what is a network computer that processes requests from a client server
Answer:
computer processing unit
computer processing unit is a network computer that processes requests from a client server.
What is a computer processing unit?The main element and "control center" of a computer is the Central Processing Unit (CPU). The CPU, sometimes known as the "central" or "main" processor, is a sophisticated collection of electronic circuitry that manages the device's software and operating system.
A central processing unit, sometimes known as a CPU, is a piece of electronic equipment that executes commands from software, enabling a computer or other device to carry out its functions.
Computers use a brain to process information, much like people do. The brain is the central processing unit for a computer (CPU). The CPU is the component that carries out all of the computer's instructions. It connects with all the other hardware parts of the computer while being on the motherboard.
Thus, computer processing unit.
For more information about computer processing unit, click here:
https://brainly.com/question/29775379
#SPJ6