The goal of this challenge is to design a cash register program. You will be given two decimal numbers. The first is the purchase price (PP) of the item. The second is the cash
(CH)
given by the customer. Your register currently has the following bills/coins within it: 'PENNY': 01, 'NICKEL': .05, 'DIME': .10, 'QUARTER': .25, 'HALF DOLLAR': .50, 'ONE': 1.00, 'TWO': 2.00, 'FIVE': 5.00, 'TEN': 10.00, 'TWENTY': 20.00, 'FIFTY': 50.00, 'ONE HUNDRED':
100.00
The aim of the program is to calculate the change that has to be returned to the customer. Each input string contains two numbers which are separated by a semicolon. The first is the Purchase price (PP) and the second is the cash(CH) given by the customer. For each line of input return single line string is the change to be returned to the customer. In case the
CH , return "ERROR". If
CH==PP
, return "ZERO". For all other cases return a comma separated string with the amount that needs to be returned, in terms of the currency values provided. The output should be alphabetically sorted. # # Complete the 'MakeChange' function below. # # The function is expected to return a STRING. # The function accepts STRING purchaseInfo as parameter. # def MakeChange(purchaseInfo): # Write your code here n if

Answers

Answer 1

Using the knowledge of computational language in python it is possible to write a code that given two decimal numbers and The first is the purchase price (PP) of the item.

Writting the code:

def MakeChange(purchaseInfo):

a = []

k = purchaseInfo.split(';')

for i in k:

a.append(float(i))

price = a[0]

cash = a[1]

if (cash < price):

return "ERROR"

if (cash == price):

return "ZERO"

cashBack = cash - price;

change =[]

while (cashBack > 0.01):

if (cashBack >= 100.0):

change.append("ONE HUNDRED")

cashBack -= 100.0

elif (cashBack >= 50.0):

change.append("FIFTY")

cashBack -= 50.0

elif (cashBack >= 20.0):

change.append("TWENTY")

cashBack -= 20.0

elif (cashBack >= 10.0):

change.append("TEN");

cashBack -= 10.0;

elif (cashBack >= 5.0):

change.append("FIVE")

cashBack -= 5.0

elif (cashBack >= 2.0):

change.append("TWO");

cashBack -= 2.0;

elif (cashBack >= 1.0):

change.append("ONE")

cashBack -= 1.0

elif (cashBack >= 0.5):

change.append("HALF DOLLAR")

cashBack -= 0.5

elif (cashBack >= 0.25):

change.append("QUARTER")

cashBack -= 0.25

elif (cashBack >= 0.1):

change.append("DIME");

cashBack -= 0.1;

elif (cashBack >= 0.05):

change.append("NICKEL")

cashBack -= 0.05

else:

change.append("PENNY");

cashBack -= 0.01;

See more about python at brainly.com/question/18502436

#SPJ1

The Goal Of This Challenge Is To Design A Cash Register Program. You Will Be Given Two Decimal Numbers.

Related Questions

How are augmented reality and game design related? Explain how augmented reality is, essentially, an extension of 3D games, developmentally speaking.

Answers

Answer: Augmented reality is revolutionizing visual data through holographic optical technology. Its main aim is to make the world more sophisticated and interactive

Explanation:

Even in game development, it has the power to turn 3D models and videos into a reality.

Answer:

Explanation:How are augmented reality and game design related?

Augmented reality is revolutionizing visual data through holographic optical technology. Its main aim is to make the world more sophisticated and interactive. Even in the game development, it has the power to turn 3D models and videos into a reality.

Which of the following applications would be a viable reason to use write-only memory in a computer?

Question 20 options:

Using a linked list that can remove elements from the head as well as the tail


Acquiring user input from the keyboard


Preparing geometric shapes for use on a graphics card


None of the above

Answers

Note that of the following applications the one that would be a viable reason to use write-only memory in a computer is: "None of the above" (Option D)

What is write-only memory?

Write-only memory, the inverse of read-only memory, started as a joking allusion to a memory device that could be recorded to but not read, as there appeared to be no practical purpose for a memory circuit that could not be retrieved.

ROM stores the instructions required for communication among various hardware components. As previously stated, it is required for the storage and functioning of the BIOS, but it may also be used for basic data management, to store software for basic utility tasks, and to read and write to embedded systems.

Learn more about write-only memory:
https://brainly.com/question/15302096?
#SPJ1

A clique of size k is a subgraph that consists of k vertices that are all connected to each via an edge, i.e., all k(k−1)/2 edges exists. In class we proved that the problem of finding whether a graph contains a k -elique is NP-complete. Consider a similar problem: a k -clique with spikes consists of 2k vertices such that the first k elements form a clique and the rest k vertices are connected via an edge a different vertex of the clique. onsider a similar problem: Given a graph G and a number k find whether a k -clique with spikes exists. Show that the problem is NP-conplete.

Answers

A k-clique is a relaxed clique in social network analysis, i.e. a quasi-complete sub-graph.In a graph, a k-clique is a subgraph where the distance between any two vertices is less than k.

What exactly is a K-clique subgraph? A k-clique is a relaxed clique in social network analysis, i.e. a quasi-complete sub-graph.In a graph, a k-clique is a subgraph where the distance between any two vertices is less than k.A graph can readily display a limited number of vertices.A clique of size k in a graph G is a clique of graph G with k vertices, which means that the degree of each vertex in that clique is k-1.So, if there is a subset of k vertices in the graph G that are related to each other, we say that graph has a k-clique.A clique is a subgraph of a graph that has all of its vertices linked. The k-clique problem is concerned with determining the biggest complete subgraph of size k on a network, and it has numerous applications in Social Network Analysis (SNA), coding theory, geometry, and so on.

To learn more about A clique refer

https://brainly.com/question/1474689

#SPJ4

Which of the following activities is least likely to result in a segmentation fault?

Question 19 options:

Removing an element from the middle of a linked list without fixing the pointers afterwards


Growing the stack too large, such as with an unbounded recursive function


Trying to write into protected space, such as modifying the code segment of the program


Accessing a memory address outside its boundaries

Answers

From the following activities, the one that is least likely to result in a segmentation fault is: "Removing an element from the middle of a linked list without fixing the pointers afterwards" (Option A)

What is a segmentation fault?

A segmentation fault or accessibility violation is a fault, or failure condition, reported by memory-protected hardware that alerts an operating system that software has attempted to access a restricted portion of memory. This is a type of generic protection fault on ordinary x86 machines.

Check whether your compiler or library can be made to check limits on I at least in debug mode, to remedy a segmentation error. Buffer overruns that write trash over excellent pointers can trigger segmentation faults. These actions will significantly minimize the chance of segmentation faults and other memory issues.

Learn more about Segmentation Fault:
https://brainly.com/question/15412053
#SPJ1

T F a) Void Functions can use reference parameters.

Answers

Void Functions can use reference parameters is a false statement

Can void functions take arguments?

Except that they do not return a value when the function executes, void functions are constructed and used just like value-returning functions. The term "void" is used by void functions in place of a data type. A void function executes a task before returning control to the caller; nevertheless, it does not return a value.

Therefore, one can say that Void indicates that a function takes no parameters when it is used in the parameter list. Void indicates that a pointer is "universal" when it is used in its declaration.

Learn more about Void Functions from

https://brainly.com/question/24321511

#SPJ1

Two .o files have been linked together with the command line ld -o p main.o weight_sum.o. Consider the following statements:
(i) There are no more undefined symbols.
(ii) The file must be dynamically linked
(iii) The file is a relocatable object file.
(iv) The file is an executable object file.
(v) There might be one undefined symbol.
(vi) The .bss section consumes no file space.
Which of these statements are correct?
Select one:
a. Only (i) and (iv) are correct (this is not correct)
b. Only (i), (iv) and (vi) are correct (updating on my own -- this is the correct answer)
c. Only (ii) is correct
d. Only (i) and (iii) are correct
e. Only (ii) and (v) are correct
f. None of the above is correct

Answers

Only (i), (iv) and (vi) are correct, since all files are given and are connected with executables.

What is executable files?

An executable file is a file that can be used by a computer to carry out different tasks or operations. An executable file, in contrast to a data file, has been compiled and cannot be read. .BAT,.COM,.EXE, and.BIN are examples of common executable files on an IBM compatible computer.

The.DMG and.APP files can be executed on Apple Mac computers running macOS. Other executable files might also exist, depending on the operating system and its configuration.

You can run our download.exe file on your computer as an example test executable. Congratulations! You've successfully downloaded an executable programme file from the Computer Hope website, says the executable file that displays this message.

Learn more about executable files

https://brainly.com/question/28943328

#SPJ4

Different approaches towards congestion control. Use the pulldown menu to match a congestion control approach to how the sender detects congestion- The sender infers segment loss from the absence of an ACK from A. end-end the receiver. B. network-assisted C. delay-based - Bits are set at a congested router in a sender-to-receiver datagram, and bits are in the returned to the sender in a receiver- to sender ACK, to indicate congestion to the sender. - The sender measures RTTs and uses the current RTT measurement to infer the level of congestion.

Answers

In order to make better use of a shared network infrastructure and prevent congestive collapse, a process called congestion management regulates the entry of data packets into the network. At the TCP layer, congestive-avoidance algorithms (CAA) are used as a preventative measure against network collapse.

How do TCP flow and congestion control differ from one another?

The communication between a sender and a receiver is managed by flow control, an end-to-end technique. Data link layer and transport layer flow control are both present. A network employs congestion management to manage traffic on the network.

What issues does congestion cause?

Individuals, organizations, and the economy as a whole are all impacted by congestion in terms of additional costs and time as well as stress.

To know more about congestion control visit :-

https://brainly.com/question/28945932

#SPJ4

True or False: Modern managers need both financial and nonfinancial information that traditional GAAP-based accounting systems are incapable of providing.

Answers

Answer:True

Explanation:

Managerial accounting focuses on internal users, including executives, product managers, sales managers, and any other personnel in the organization who use accounting information for decision-making. focuses on internal users—executives, product managers, sales managers, and any other personnel within the organization who use accounting information to make important decisions. Managerial accounting information need not conform with U.S. GAAP. In fact, conformance with U.S. GAAP may be a deterrent to getting useful information for internal decision-making purposes. For example, when establishing an inventory cost for one or more units of product (each jersey or hat produced at Sportswear Company), U.S. GAAP requires that production overhead costs, such as factory rent and factory utility costs, be included. However, for internal decision-making purposes, it might make more sense to include nonproduction costs that are directly linked to the product, such as sales commissions or administrative costs.

Suppose that move is a member function of the class vehicleType. Which of the following statements declare move to be a pure virtual function.
(i) virtual void move(double a, double b) const = 0;
(ii) virtual void move(double a, double b) 0 = const;
A) Only (ii) B) Only (i) C) Both (i) and (ii) D) None of these.

Answers

Let's assume that move is a function of the vehicleType class. virtual void move(double a, double b) const = 0.

What accomplishes a class method?

A class method is a method that is tied to the class itself, not to its objects. Because the class parameter refers to the class rather than the object instance, they have access to the class's state. It can alter a class state so that it would affect every instance of the class.

What are the features and functions of a class?

It is used to describe and comprehend objects in more detail than just their label through the usage of feature, function, and class.

To know more about vehicleType visit :-

https://brainly.com/question/14567843

#SPJ4

drakee is in a meeting where enterprise systems on the cloud are being discussed, along with the advantages and disadvantages of leveraging cloud infrastructure. of the following, which is not true as it relates to cloud providers and enterprise systems? choose the best answer from the options that are available.

Answers

More storage, which is untrue in terms of corporate systems and cloud providers.

What is a trademark of Enterprise?

Enterprise is now the major supplier of mobility solutions because to our extensive network. Along with automobile sales and car sharing, we also rent out trucks and cars. We have more than 8,000 sites globally, so we are always available. Due to a coronavirus epidemic and the chip scarcity, there is a strong demand for rental cars but a limited supply.

Is Hertz or Enterprise less expensive?

We compared many quotes and, on the whole, discovered that Enterprise was more pricey than Hertz. Prices for prepaid and cash at pickup choices ranged from $70 to as much as $200.

To know more about Enterprise visit:

https://brainly.com/question/29645753

#SPJ4

The complete question is-

Drakee is in a meeting where enterprise systems on the cloud are being discussed, along with the advantages and disadvantages of leveraging cloud infrastructure. Of the following, which is not true as it relates to cloud providers and enterprise systems? Choose the best answer from the options that are available.

Group of answer choices

Increased storage

Automation of updates

Increased mobility

Flexibility with customization

the policies, procedures, and awareness layer of the security model includes which of the following? (select two.)

Answers

The policies, practices, and understanding element of the security model is comprised of boarding and user education.

What makes security crucial?

They keep discipline in huge gatherings and reduce the possibility of riots, mob fighting, or inebriated and disorderly behavior. Security can facilitate the organization and management of circumstances like big crowds at events, job terminations, or to foster a general atmosphere of safety and order in commercial facilities. A security, in its most basic form, is a store of wealth or instrument with value that may be purchased, sold, or exchanged.

Briefing:

The Guidelines, Methods, and Consciousness layer also includes steps for employee onboarding and offboarding.

Computer cages, accelerometers, and environmental rules are all part of the physical layer.

To know more about Security visit:

https://brainly.com/question/17493537

#SPJ4

one drawback to the sequential search is that it cannot be used with an array that contains string elements. T/F

Answers

The sequential search has the limitation that it cannot be utilized with arrays containing string elements.Thus, it is false.

What sequential search, an array contains string elements?

Searching linearly over an array of strings for the supplied string is an easy fix. Performing a modified binary search is a better solution.

Get the list of arrays. Get each element of the Array List object using the for-each loop. Make sure the array list's elements all contain the necessary string. Print the elements if applicable.

We compare the given string with the middle string, just like in a standard binary search. If the middle string is empty, we linearly search on both sides for the nearest non-empty string x.

Therefore, it is false that one drawback to the sequential search is that it cannot be used with an array that contains string elements.

Learn more about string here:

https://brainly.com/question/17330147

#SPJ1

when examining the permissions on a file in linux, how many bits are used to display this information

Answers

These permissions are represented by the characters "rwxrwxrwx," which are defined by nine bits in the i-node information. The world is described by the final three characters, the group by the middle three, and the user by the first three.

In Linux, how can I check a file's permissions?

Make advantage of the ls tool and the -la arguments to see the permissions for all files in a directory. Add additional parameters as desired; see List the files in a directory in Unix for assistance. If an object is listed in the output sample above, the first character on each line specifies whether it is a file or a directory.

What are Linux's three permissions?

The following permission types are employed: r - Read w - Write x - Execute.

To know more about linux visit :-

https://brainly.com/question/15122141

#SPJ1

Answer:When examining the permissions on a file in Linux, how many bits are used to display this information?

Explanation:These permissions are represented by the characters "rwxrwxrwx," which are defined by nine bits in the i-node information. The world is described by the final three characters, the group by the middle three, and the user by the first three.

In Linux, how can I check a file's permissions?

Make advantage of the ls tool and the -la arguments to see the permissions for all files in a directory. Add additional parameters as desired; see List the files in a directory in Unix for assistance. If an object is listed in the output sample above, the first character on each line specifies whether it is a file or a directory.

What are Linux's three permissions?

The following permission types are employed: r - Read w - Write x - Execute.

design a 32 bit counter that adds 4 at each clock edge the counter has reset and clock inputs upon reset the counter output is all 0

Answers

The counter is a digital sequencer, here a 4-bit counter. This simply means that you can count from 0 to 15 or vice versa depending on the counting direction (up/down).

The counter value (“count”) is evaluated on each positive (rising) edge of the clock cycle (“clk”).

If the "reset" input is logic high, the counter is set to zero.

If the "load" signal is logic high, the counter is loaded with the "data" input. Otherwise, count up or count down. If the "up_down" signal is logic high, the counter counts up, otherwise it counts down.

What are counters and their types

A counter is a sequential circuit. A well-known counter is a digital circuit used for counting pulses. Counters are the widest use of flip-flops. There are two types of counters. Asynchronous or ripple counter.

What are counters used for?

Counters are used not only to count, but also to measure frequency and time. increase memory address

To know more about counter visit;

https://brainly.com/question/29131973

#SPJ4

In the optimistic approach, during the phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values.
a. read b. validation
c. write d. shared

Answers

The correct answer for this problem is a. read

Why does it uses read phase?

In the optimistic approach to concurrency control in database systems, during the read phase, a transaction scans the database and reads the values it needs in order to execute the necessary computations.

This is often referred to as the "read" phase.

If the values have been modified by another transaction, the current transaction may need to abort and retry the process from the beginning. This ensures that transactions are able to execute without conflicting with one another and helps to maintain the integrity of the database.

To Know More About database, Check Out

https://brainly.com/question/29774533

#SPJ4

One of the first computer aided design programs ever developed was also among the first to be integrated into ERP systems. This popular program isO Corel DrawO CADdieO AutoCADO MotoCAD

Answers

AutoCAD is one of the first computer-aided design programs that was also one of the first to be integrated into ERP systems.

What is AutoCAD?To put it simply, AutoCAD is a type of CAD software that focuses on drawing and modeling in 2D and 3D. It allows for the creation and modification of geometric models with nearly infinite potential for creating various structures and objects.Because of its versatility, AutoCAD has expanded beyond its traditional use in architecture and engineering to enter the worlds of graphic and interior design.It is a required key in AutoCAD that ensures the execution of a command and can change the function of other keys.The Area command in AutoCAD is a very useful command that can be used to calculate the area and perimeter of a closed region drawn with a polyline.

To learn more about AutoCAD refer to :

https://brainly.com/question/25642085

#SPJ4

A technician assist Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.Which of the following security practices was violated?

Answers

The following security procedures were broken in accordance with the assertion made above on the principle of least privilege.

Giving an example, what is a database?

A collection is a planned gathering of data. They enable the manipulation and storage of data electronically. Data administration is made simple by databases. Let's use a database as an example. A database is used to hold information on people, their mobile numbers, or other contact information in an online telephone directory.

What purposes serve databases?

Any set of data or information that has been properly structured for quick searching and retrieval by a machine is referred to as a database, often known as an electronic database. Databases are designed to make it easy to save, retrieve, edit, and delete data while carrying out various data-processing tasks.

To know more about Database visit:

https://brainly.com/question/6447559

#SPJ4

Digital ______ includes music, photos, and videos. a. animation b. multiplex c. media d. playables

Answers

Digital media includes music, photos, and videos.

What is digital media?

Any communication tool that utilises one or more machine-readable data formats that are encoded is considered digital media. On a digital electronics device, digital media can be produced, seen, heard, distributed, changed, and preserved.

Media refers to ways of broadcasting or communicating this information. Digital is defined as any data represented by a sequence of digits.

Collectively, the term "digital media" refers to information delivery channels that use speakers and/or screens to broadcast digital information. Text, music, video, and photos that are sent over the internet and used for online viewing or listening are also included in this.

Learn more about digital media

https://brainly.com/question/25356502

#SPJ4

THE SCENARIO You are a junior IT professional at a small startup company. You have been asked by your manager to prepare the marketing director's iPad and notebook computer for an upcoming conference she is attending. While working on the notebook computer, you noticed that the integrated Wi-Fi adapter is not working. 18 Click to view Windows 10 BACKGROUND It's not easy to find a definition of mobile device that everyone agrees on. However, many would agree on the following. They are Lightweight, usually less than two pounds, Small, designed to move with you in your hand or pocket), Touch or stylus interface; no keyboard or mouse. Sealed unit lacking any user-replaceable parts, Non-desktop Os; mobile devices that use special mobile operating systems and Device variants. Most modern mobile devices fall into one of a few categories: • Smartphones • Tablets Phablets Wearable technology Other mobile devices are purpose-built to be better at some task such as an e-reader.

Answers

As a junior IT professional, you have been asked to prepare the marketing director's iPad and notebook computer for an upcoming conference she is attending. In this scenario, it is important to ensure that both devices are in good working condition and that all necessary software and applications are installed and updated.

To troubleshoot the issue with the integrated Wi-Fi adapter on the notebook computer, you can try the following steps:

Check the device's Wi-Fi settings and ensure that the Wi-Fi adapter is turned on and the device is connected to the correct network.

Restart the device and try connecting to the Wi-Fi network again.

Check the device's Wi-Fi drivers and ensure that they are up to date. You can update the drivers through the device's manufacturer's website or by using a driver update tool.

If the above steps do not resolve the issue, try resetting the device's network settings. This can be done through the device's settings menu.

If the issue persists, you may need to contact the manufacturer or a professional repair service for further assistance.

It is also important to ensure that the marketing director's iPad is fully charged and has all necessary applications and documents installed and updated for the conference. You should also make sure that the iPad is backed up to ensure that no important data is lost in case of any issues.

To know more about softwares, visit: https://brainly.com/question/28266453

#SPJ4

which of the following statements are true? local variables do not have default values. data fields have default values. a variable of a primitive type holds a value of the primitive type. all of the above

Answers

True local variables do not all have default values. Data fields come with default options. A primitive type's value is stored in a variable of that type.

Exist default values for data fields?

Data fields come with default options. - No default values exist for local variables. A value of a primitive type is stored in a primitive type variable.

Which of the above techniques can be used to set up many variables with the same value at the beginning?

By using = back-to-back, you can give many variables the same value. This is helpful, for instance, when setting numerous variables to the same value at the beginning. After assigning a value, it is also possible to assign a different value.

To know more about primitive type's visit :-

https://brainly.com/question/16996584

#SPJ4

with the workshop type summary query design view, group the records by workshop type, count the lastname field values, and run the query

Answers

the design view query The query results are shown in a datasheet by Access.

In Access, how can I sort a last name query?

Click on the "Sort" row of the field in the QBE grid by which you want to order the results of a query in Access' query design view. Then choose "Ascending" or "Descending" order using the drop-down that appears.

How can you find a record in a database table by looking for particular information there?

Click the field you wish to search in after opening the table or form. Click Find or press CTRL+F in the Find group on the Home tab. The Find tab is selected, and the Find and Replace dialog box displays.

To know more about query visit:-

https://brainly.com/question/29575174

#SPJ4

with my android phone synced to my crv, if using assistant drive mode, will the map play through cars screen

Answers

It depends on the specific make and model of your car and phone, as well as the settings and capabilities of the specific applications you are using.

Explanation in Detail:

In general, if you have an Android phone and you are using Assistant Drive mode, you may be able to use your car's display screen to view maps and navigation information. However, this will depend on whether your car's display screen is compatible with your phone and whether the navigation app you are using is compatible with your car's display screen.

For example, some newer models of cars have built-in Android Auto functionality, which allows you to use your car's display screen to access certain apps and features on your Android phone. If your car has this capability and you are using an Android Auto-compatible navigation app, you may be able to view maps and navigation information on your car's display screen.

Similarly, if you are using a navigation app that is compatible with Ap*ple CarPlay (such as Go*ogle Maps or Waze), you may be able to view maps and navigation information on your car's display screen if your car has Apple CarPlay functionality.

It is also worth noting that some cars have their own built-in navigation systems that can be used independently of your phone. In this case, you may not need to use your phone's navigation app at all.

To determine whether you can view maps and navigation information on your car's display screen, you will need to check the specific capabilities of your car and phone, as well as the settings and requirements of the navigation app you are using.

To know more about Android Auto, visit: https://brainly.com/question/29891282

#SPJ4

True or False: A performance baseline is helpful in troubleshooting because it contains a backup of system critical data.
a. True
b. False

Answers

To make an effective backup plan, the very first step is to determine and identify the critical data. Hence the statement is true.

What is backup of system critical data?Organizations, individuals, and professionals mostly take backup regularly to avoid the risk of data loss.A backup plan is a plan that is created by the organizations or professionals to ensure that have backed up their essential and critical data if there is any risk of data loss. If data get loss then the organization may suffer. Because data is crucial for the organization or for professionals. If data get loss then the organization may need to minimize the downtime as much as possible. When organizations have their data backed up, then they would be in a position to restore the data that guaranty the ongoing business operations.Identify the critical data and determine the data importance: it is very first to identify the critical data for backup. In this step, data importance is determined, and the critical data are identified.

To learn more about System Critical refer to:

https://brainly.com/question/27332238

#SPJ4

Discuss which of the following systems allow module designers to enforce the need-to-know principle. a. The MULTICS ring-protection scheme b. Hydra’s capabilities c. JVM's stack-inspection scheme

Answers

Many contemporary systems have fewer rings than the original Multics system, which had eight.

What is meant by MULTICS ring-protection scheme?

A layered supervisor may be present in each process's virtual memory thanks to the ring protection scheme. In Multics, ring O is where the lowest-level supervisor procedures, such as those that implement access control, I/O, memory multiplexing, and processor multiplexing, are executed.

Many contemporary systems have fewer rings than the original Multics system, which had eight. Through the use of a unique machine register, the hardware constantly remains aware of the current ring of the active instruction thread.

Your company is protected by three different rings, and in order to be successful, each ring must be addressed. Let's go over the three rings and how to fasten them.

Therefore, the correct answer is option a. The MULTICS ring-protection scheme.

To learn more about MULTICS ring-protection scheme refer to:

https://brainly.com/question/15020986

#SPJ4

Virtual memory layout [20] You have a 64-bit machine and you bought 8GB of physical memory. Pages are 256KB. For all calculations, you must show your work to receive full credit. (a) [1] How many virtual pages do you have per process? (b) [1] How many bits are needed for the Virtual Page Number (VPN)? (Hint: use part (a)) (c) [1] How many physical pages do you have? (d) [1] How many bits are needed for the Physical Page Number (PPN)? (Hint: use part (c)) (e) [1] How big in bytes does a page table entry (PTE) need to be to hold a single PPN plus a valid bit? (f) [1] How big would a flat page table be for a single process, assuming PTEs are the size computed in part (e)? (g) [10] Why does the answer above suggest that a "flat page table" isn't going to work for a 64-bit system like this? Research the concept of a multi-level page table, and briefly define it here. Why could such a data structure be much smaller than a flat page table? (h) [4] Does a TLB miss always lead to a page fault? Why or why not?

Answers

We have 2^48 pages per person. The number of physical pages is 2^16.. 48 bits of VPN are mapped to 16 bits of PPN. The PTE size is 2B. The page table size is 2^49 B.

What are the steps to calculate pages per person, physical pages, VPN ,PTE size and the table size?

We know that;

Virtual Address = 64bits

Virtual Address Space = 2^Virtual Address = 2^64B

Physical Address Space = 4GB  = 4 X 2^30 B = 2^32 B

Physical Address = log_2(Physical Address Space )  = log_2(2^32)

                             = 32 * log_2(2) = 32 bits.

Page size = 64KB =2^16 B

a) No of Virtual Pages = Virutal Address Space/PageSize

                                      =  2^64B / 2^16 B = 2^48

b) NoOfPhysicalPages = PhysicalAddressSpace/PageSize

                                      =  2^32 B / 2^16 B = 2^16

c) VPN (in Bits) = log_2(NoOfVirtual Pages)   = log_2(2^48) = 48

    PPN(inBits)=log_2(NoOfPhysicalPages)=  log_2(2^16) = 16

Thus 48 bits of VPN are mapped to 16 bits of PPN.

d) PTE( Page Table Entry) holds the Physical Page Number of given Virtual Page along with many information about the page.

PTEsize = PPN(inBits) = 16 bits = 2B

e) Flat page table is single level page table. A page table contains the Physical Page number for a given page number. It helps in the translation of Vitual Address to Physical Address.

PageTableSize = NoOfVirtualPages*PTEsize = 2^{48}*2B = 2^49

To know moe about  pages refer:

https://brainly.com/question/1362653

#SPJ4

when formatting pivot tables (choose the incorrect statement)double click the column headings to change the content. right click a number and choose the number formatting option you wish. always select all the numbers in a column and then format them manually. use the design tab to select from pivottable styles.

Answers

You could want to improve the report layout and format after establishing a PivotTable and adding the fields you want to analyze in order to make the data simpler to read and scan for specifics. A PivotTable's form, fields, columns, rows, subtotals, and empty cells can all be changed to alter the layout of the table.

How can I modify the values in a field of a pivot table?

You can alter the computations by selecting Show Values As from the context menu when you right-click on a value in one of the many columns.

How can I change the Excel number format?

Select your preferred format by selecting Number Format from the Value Field Settings dialog box.

To know more PivotTable  visit :-

https://brainly.com/question/19787691

#SPJ4

___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan.
a. Panicking
b. Multiplexing
c. Multitasking
d. Firefighting
e. Fireflying

Answers

Instead of carrying out activities in accordance with a well-thought-out strategy, network administrators engage in "firefighting," where they address urgent issues and network outages.

What exactly does "network" mean?

A number of computers connected together to share data (such printers and CDs), online cloud, or enable electronic conversations make up a network. A network's connections to its computers can be made through cables, phone lines, radio frequencies, spacecraft, or infrared laser beams.

Why is a network crucial?

Simply simply, networking entails establishing relationships with other business people. Always consider the benefits to both sides when networking. A important good, higher exposure, a larger support network, enhanced company growth, and far more meaningful relationships are a few benefits of networking.

To know more about Network visit:

https://brainly.com/question/13102717

#SPJ4

Ruudy is analyzing a piece of malware discovered in a pentest. He has taken a snapshot of the test system and will run the malware. He will take a snapshot afterwards and monitor different components such as ports, processes, event logs, and more for any changes. Which of the following processes is he using?

Answers

Ruudy is using the process called Host integrity monitoring.

What is Host integrity ?Host Integrity makes ensuring that client PCs are secure and adhere to the security guidelines established by your business. Enterprise networks and data are secured using Host Integrity policies to specify, enforce, and restore client security. In order to make sure that client PCs are secure and adhere to a company's security standards, Host Integrity (HI), a function of Symantec Endpoint Protection (SEP), can be employed. Host Integrity policies can be used to specify, enforce, and correct client security as specified by the policy. A Microsoft patch or set of patches, for instance, may be checked to see if they are installed on a client using an HI policy. Clients can be isolated from particular network access if they don't match the requirements until they do.

To learn more about  network, refer:

https://brainly.com/question/1167985

#SPJ4

Consider the following incomplete code segment, which is intended to print the sum of the digits in num. For example, when num is 12345, the code segment should print 15, which represents the sum 1 + 2 + 3 + 4 + 5. int num = 12345;int sum = 0;/ missing loop header /{sum += num % 10;num /= 10;}System.out.println(sum);Which of the following should replace / missing loop header / so that the code segment will work as intended?

Answers

The term  that should replace / missing loop header / so that the code segment will work as intended is option A: while (num > 0).

What is the header about?

The body of the code is executed once for each iteration, and the header specifies the iteration.

The body of a for loop, which is executed once each iteration, and the header, which specifies the iteration, are both components. A loop counter or loop variable is frequently declared explicitly in the header.

Therefore, the module and division action inside the loop must be our main attention in order to comprehend why. The crucial thing to remember is that we are adding the numbers in reverse order and that we must repeat this process until we reach the initial number (1%10 = 1). As a result, num must equal one in order to compute the final operation.

Learn more about loop header from

https://brainly.com/question/14675112
#SPJ1

See options below

Which of the following should replace /* missing loop header */ so that the code segment will work as intended?

while (num > 0)

A

while (num >= 0)

B

while (num > 1)

C

while (num > 2)

D

while (num > sum)

E

in this lab, your task is to discover whether arp poisoning is taking place as follows: use wireshark to capture packets on the enp2s0 interface for five seconds. analyze the wireshark packets to determine whether arp poisoning is taking place. use the 192.168.0.2 ip address to help make your determination. answer the questions.

Answers

Open Wireshark and choose enp2so from the Capture menu. To start the capture, select Blue fin. Choose the red box to stop after 5 seconds. Enter arp to display those packets in the Apply a display filter box. Look for lines in the Info column that contain the IP 192.168.0.2.

What is meant by which of the following when an attacker sends phony packets to link their MAC address?

An attack known as ARP spoofing involves a malicious actor sending forged ARP (Address Resolution Protocol) packets across a local area network.

To find duplicate IP address traffic, which of the following wireshark filters is used?

For Wireshark to only show duplicate IP information frames, use the arp. duplicate-address-frame filter.

To know more about Wireshark visit :-

https://brainly.com/question/13127538

#SPJ4

Other Questions
The ________ system of timber harvesting involves leaving small numbers of mature trees in place to provide shelter for seedlings as they grow. based on the concentration ratio, which industry is the most competitive? a. industry b b. industry d c. industry a d. industry c The signal that tells soluble proteins to be sent forward to the lysosome is ________ assume that great britain and the united states can both produce wheat (w) and cloth (c). the amount of wheat and cloth that each nation can produce in one day is presented in the table below. comparative advantage wheat cloth great britain 40 70 united states 150 90 instructions: round your answers to two decimal places. a. use the information above to compute the opportunity cost of producing 1 unit of wheat in each country. for great britain, the opportunity cost of producing 1 unit of wheat is unit(s) of cloth. for the united states, the opportunity cost of producing 1 unit of wheat is unit(s) of cloth. b. which country has the comparative advantage in producing wheat? (click to select) c. use the information above to compute the opportunity cost of producing 1 unit of cloth in each country. for great britain, the opportunity cost of producing 1 unit of cloth is unit(s) of wheat. for the united states, the opportunity cost of producing 1 unit of cloth is unit(s) of wheat. d. which country has the comparative advantage in producing cloth? (click to select) a philosophy professor assigns letter grades on a test according to the following scheme. a: top 12 % of scores b: scores below the top 12 % and above the bottom 63 % c: scores below the top 37 % and above the bottom 22 % d: scores below the top 78 % and above the bottom 7 % f: bottom 7 % of scores scores on the test are normally distributed with a mean of 72 and a standard deviation of 8.1. find the numerical limits for a b grade. round your answers to the nearest whole number, if necessary. Write one or two paragraphs evaluating the policies of the United States to remain neutral while still supporting the Allies. Be sure to use the information from the introduction and from the Chamberlain and Roosevelt excerpts to support your thinking. Remember that in order to evaluate, you will need to summarize the information and also make a decision about the policies, using facts to justify your decision.must use Chamberlain & Roosevelt excerpts. 12ptWrite one or two paragraphs evaluating the policies of the United States to remain neutral while still supporting the Allies. Be sure to use the information from the introduction and from the Chamberlain and Roosevelt excerpts to support your thinking. Remember that in order to evaluate, you will need to summarize the information and also make a decision about the policies, using facts to justify your decision.12pt Youssef est..... au Canada [Parti-Partie- Partis]. which one is the correct answer a school nurse is caring for a child who fell on the playground. upon examination of the child, the nurse notes multiple bruises in various stages of healing. what is the nurse's initial intervention? The answers please I need answers as in the case of merit pay, performance bonuses for rewarding individual performance are rolled into an employee'ss base pay. t/f aggregate information as part of an analytics package may include the total number of visits but not the total revenue the total revenue but not the total number of visits the total number of visits and the total revenue none of the above True or False: messages sent over some shared communication lines are divided into fixed-size, numbered pieces called packets. The people living in a deep foret hot and cold deert and motion of 10 12 the permanent ettlement i it true or fale imagine that you are tasked with storing digital files for a feature length movie that is in production. suggest and defend a solution that meets the needs of large data files (500 t) that can be easily accessed for editing and stored safely. The variety of good and ervice offered limitedne inky by the type of people and organization that join plagioclase feldspar has the chemical formula, caal2si2o8. is plagioclase feldspar a mafic or felsic silicate mineral? what reasons does Hoar give against annexing the Philippines? On Thursday the Meat King Market sold 210 pounds of ground beef. On Friday they sold twicethat amount. On Saturday they only sold 130 pounds. How much more meat did they sell onFriday than Saturday? discribe about the posibile impact of respecting cultural gambr reliogion and political equality multc nation states like PLEASE HURRYGiven:1 = 42 = 3Prove:AB = CDWhich of the following triangle congruence theorems would be used in this proof?ASAAASSSS