The penalties for ignoring the requirements for protecting classified information when using social networking services are the same when using other media and methods of dissemination.
The penalties are the same because it does not matter what the medium used, the effect is that classified information and confidential details have been left unguarded and exposed.
When in hold of such information, it is not okay to leave it unguarded or exposed. A person who is found guilty of disclosure of classified materials would face sanctions such as:
They would be given criminal sanctionsThey would face administrative sanctionsThey would also face civil litigationsRead more on https://brainly.com/question/17207229?referrer=searchResults
A direct-mapped cache holds 64KB of useful data (not including tag or control bits). Assuming that the block size is 32-byte and the address is 32-bit, find the number of bits needed for tag, index, and byte select fields of the address.
Answer:
A) Number of bits for byte = 6 bits
B) number of bits for index = 17 bits
C) number of bits for tag = 15 bits
Explanation:
Given data :
cache size = 64 kB
block size = 32 -byte
block address = 32 -bit
number of blocks in cache memory
cache size / block size = 64 kb / 32 b = 2^11 hence the number of blocks in cache memory = 11 bits = block offset
A) Number of bits for byte
[tex]log _{2} (6)^2[/tex] = 6 bits
B) number of bits for index
block offset + byte number
= 11 + 6 = 17 bits
c ) number of bits for tag
= 32 - number of bits for index
= 32 - 17 = 15 bits
what makes''emerging technologies'' happen and what impact will they have on individuals,society,and environment
Answer:
Please refer to the below for answer.
Explanation:
Emerging technology is a term given to the development of new technologies or improvement on existing technologies that are expected to be available in the nearest future.
Examples of emerging technologies includes but not limited to block chain, internet of things, robotics, cognitive science, artificial intelligence (AI) etc.
One of the reasons that makes emerging technology happen is the quest to improving on existing knowledge. People want to further advance their knowledge in terms of coming up with newest technologies that would make task faster and better and also address human issues. For instance, manufacturing companies make use of robotics,design, construction, and machines(robots) that perform simple repetitive tasks which ordinarily should be done by humans.
Other reasons that makes emerging technology happens are economic benefit, consumer demand and human needs, social betterment, the global community and response to social problems.
Impact that emerging technology will have on;
• Individuals. The positive effect of emerging technology is that it will create more free time for individuals in a family. Individuals can now stay connected, capture memories, access information through internet of things.
• Society. Emerging technology will enable people to have access to modern day health care services that would prevent, operate, train and improving medical conditions of people in the society.
• Environment. Before now, there have been global complains on pollution especially on vehicles and emission from industries. However, emerging technology will be addressing this negative impact of pollution from vehicles as cars that are currently being produced does not use petrol which causes pollution.
what makes ''emerging technologies'' happen is the necessity for it, the need for it in the society.
The impact they will have on individuals ,society,and environment is that it will improve areas of life such as communication, Transportation, Agriculture.
What is Emerging technologies?Emerging technologies can be regarded as the technologies in which their development as will as practical applications are not yet realized.
Learn more about Emerging technologies at:
https://brainly.com/question/25110079
UAAR is planning to build in house software similar to Zoom Application. University Authorities contact with you in order to provide best solution with in limited time and limited resources in term of cost.
Describe the roles, Artifacts and activities, keeping in view Scrum process model.
Compare and contract your answer with scrum over XP for development of above mention system. Justify your answer with the help of strong reasons, why you choose scrum model over XP model. How scrum is more productive for project management. Furthermore, highlight the shortcoming of XP model.
Answer:
Following are the answer to this question:
Explanation:
If working to develop Zoom-like house software, its best solution is now in a limited period of time even with effectively reduced assets;
Evaluate all roles in preparation
Create a "Pool Draw"
Choose a singular set of resources.
Utilize Time Recording.
Concentrate on assignments and project objectives.
An object, in which by-product of the development in the software. It's created for the development of even a software program. It could include database schemas, illustrations, configuration screenplays-the list just goes on.
All development activities of Scrum are composed with one or several groups from a lineout, each containing four ruck roles:
Holder of the drug
ScrumMaster and Master
Equipment for development.
Owner of the drug
It is the motivating core of the product marketing idea, that Keeps transparent the vision about what the team member is trying to seek so that to accomplish as well as interacts to all of the other members, the project manager is responsible for the success of the way to solve being formed or retained.
ScrumMaster It operates as a mentor and providing guidance throughout the development phase, it takes a leadership position in the abolishment with impediments that also impact employee productivity and therefore have no ability to control the team, but the roles of both the project team or program manager are not quite the same thing. It works as a leader instead of the management team.
Equipe for development
The Scrum characterizes the design team as a diverse, multi-functional community of individuals who design, construct as well as evaluate the application of those who want.
In this usually 5 to 9 individuals; one's representatives should be able to make quality responsive applications collaboratively.
It is a framework that operates along with teams. It is often seen as agile project management as well as explains a set of conferences, techniques, and roles that also assist individuals to organize as well as complete their employees together. The multidisciplinary team from Scrum means that a person should take a feature from idea to completion.Scrum and XP differences:
Its team members in Scrum usually operate in the various weeks with one month-long incarnation. The XP teams generally work in incarnations which are either one two weeklong. Scrum doesn't write a prescription the certain project management; XP seems to do. Scrum may not make access to other their sprints. XP teams are far more receptive to intervention inside of their repetitions.What will be assigned to the variable s_string after the following code executes? special = '1357 Country Ln.' s_string = special[ :4] Group of answer choices
Answer:
s_string = 1357
Explanation:
character: index
1: 0
3: 1
5: 2
7: 3
: 4
C: 5
o: 6
u: 7
n: 8
t: 9
r: 10
y: 11
: 12
L: 13
n: 14
. : 15
s_tring = special[:4]
s_tring = special[0] + special[1] + special[2] + special[3]
s_string = 1357
Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
a True
b. False
Answer:
A. True
Explanation:
In FMS service routines, access controls are enforced automatically
and they that access and manipulate files and directories. Files and directories are usually accessed via access controls in most of the FMSs.
Additional processing overhead are usually imposed by FMS. Also, the FMS tend to restrict and hinder one from accessing secondary storage.
A ………….. is a basic memory element in digital circuits and can be used to store 1 bit of information.
Answer:
A memory cellExplanation: Research has proven that ;
The memory cell is also known as the fundamental building block of computer memory.
It stores one bit of binary information and it must be set to store a logic 1 (high voltage level) and reset to store a logic 0 (low voltage level).
Write a method named coinFlip that accepts as its parameter a string holding a file name, opens that file and reads its contents as a sequence of whitespace-separated tokens. Assume that the input file data represents results of sets of coin flips. A coin flip is either the letter H or T, or the word Heads or Tails, in either upper or lower case, separated by at least one space. You should read the sequence of coin flips and output to the console the number of heads and the percentage of heads in that line, rounded to the nearest whole number. If this percentage is 50% or greater, you should print a "You win!" message; otherwise, print "You lose!". For example, consider the following input file: H T H H T Tails taIlS tAILs TailS heads HEAds hEadS For the input above, your method should produce the following output: 6 heads (50%) You win!
Answer:
Here is the JAVA program:
import java.io.*;
import java.util.*;
public class Main {
public static void main(String[] args) throws FileNotFoundException{ //the start of main() function body, it throws an exception that indicates a failed attempt to open the file
Scanner input = new Scanner(new File("file.txt")); //creates a Scanner object and a File object to open and scan through the file.txt
coinFlip(input); } //calls coinFlip method
public static void coinFlip(Scanner input) { //coinFlip method that accepts as its parameter a string input holding a file name
while(input.hasNextLine()) { //iterates through the input file checking if there is another line in the input file
Scanner scan = new Scanner(input.nextLine()); //creates a Scanner object
int head = 0; // stores count of number of heads
int count = 0; //stores count of total number of tokens
while(scan.hasNext()) { //iterates through the sequence checking if there is another sequence in the input file
String token= scan.next(); // checks and returns the next token
if (token.equalsIgnoreCase("H")||token.equalsIgnoreCase("Heads")) { //compares H or Heads with the tokens in file ignoring lower case and upper case differences
head++; } //if a token i.e. any form of heads in file matches with the H or Heads then add 1 to the number of heads
count++; } //increment to 1 to compute total number of counts
double result = Percentage(head, count); //calls Percentage method passing number of heads and total counts to compute the percentage of heads
System.out.println(head + " heads " + "(" + result +"%)"); // prints the number of heads
if(result >= 50.00) { //if the percentage is greater or equal to 50
System.out.println("You win!");} //displays this message if above if condition is true
else //if the percentage is less than 50
{System.out.println("You lose!");} } } //displays this message if above if condition is false
public static double Percentage(int h, int total) { //method to compute the percentage of heads
double p = (double)h/total* 100; // divide number of heads with the total count and multiply the result by 100 to compute percentage
return p; } } //returns result
Explanation:
The program is well explained in the comments mentioned with each line of the above code. I will explain how the method coinFlip works.
Method coinFlip accepts a string holding a file name as its parameter. It opens that file and reads its contents as a sequence of tokens. Then it reads and scans through each token and the if condition statement:
if (token.equalsIgnoreCase("H")||token.equalsIgnoreCase("Heads"))
checks if the each token in the sequence stored in the file is equal to the H or Heads regardless of the case of the token. For example if the first token in the sequence is H then this if condition evaluates to true. Then the head++ statement increments the count of head by 1. After scanning each token in the sequence the variable count is also increased to 1.
If the token of the sequence is HeAds then this if condition evaluates to true because the lower or upper case difference is ignored due to equalsIgnoreCase method. Each time a head is found in the sequence the variable head is incremented to 1.
However if the token in the sequence is Tails then this if condition evaluates to false. Then the value of head variable is not incremented to 1. Next the count variable is incremented to 1 because this variable value is always incremented to 1 each time a token is scanned because count returns the total number of tokens and head returns total number of heads in the tokens.
Percentage method is used to return the percentage of the number of heads in the sequence. It takes head and count as parameters (h and total). Computes the percentage by this formula h/total* 100. If the result of this is greater than or equal to 50 then the message You win is displayed otherwise message You lose! is displayed in output.
Suppose there are 4 nodes sharing a broadcast channel using TDMA protocol. Suppose at time t=0: • Node 1 has 6 frames to transmit, • Node 2 has 4 frames to transmit, • Node 3 has 8 frames to transmit, • Node 4 has 3 frames to transmit. Maximum number of frames which can be transmitted by a node in a time slot = 3 The time required to transmit one frame = 1 Second Explain how TDMA protocol works to complete this task? How much time will it take to transmit all frames?
Answer:
Following are the description of the given nodes:
Explanation:
The Multiple Access frequency - division facilitates control by granting every node a fixed time slot. Also, every slot seems to be identical in width. Its whole channel bandwidth is often used in every channel node. Compared to FDMA it takes more time.
Time slot=3 frames for all the above scenario
In the first point, It is reserved the node 1, and as well as 3 frames were also transmitted 1. In the second point, It is reserved the node 2, and as well as 3 frames are transmitted. In the third point, It is reserved 3 nodes, and as well as 3 frames were transmitted. In the fourth point, It is reserved 4 slots and the transmit 3 frames. In the fifth point, It stores the slot 1 and the transmit 3 frames. In the sixth point, It stores the slot 2 and the transmit 1 frame. In the seventh point, It stores the slot 3 and the transmit 3 frames. In the Eight points, It stores the slot 3 and the transmit 2 frames.Time interval = number of frames in first slot Time to send 1 frame number of images
[tex]= 8 \times 3 \times 1 \\\\ = 8 \times 3 \\\\= 24 \ seconds[/tex]
Maintaining public libraries is a waste of money since computer technology can replace their functions. Do you agree or disagree?
Answer:
I totally do not agree that maintaining public library is a waste of moneyExplanation:
Most library are now advancing in terms of service delivery and public
libraries are no exception as libraries are now incorporating E- platforms/E- libraries, Audio visuals, where anyone can learn or borrow materials electronically.
Furthermore, not everyone can own a computer set to so that public libraries are even relevant to the majorities who can afford a computer set.
Also a library especially the public library is a place where people can meet and socialize to the end we even make friends at the public library more effectively than the online library can make(if they can).
In summary the pros of physical public libraries can not be over emphasized.
Write an INSERT statement that adds this row to the Categories table:
CategoryName: Brass
Code the INSERT statement so SQL Server automatically generates the value for the CategoryID column.
Answer:
INSERT INTO categories (CategoryName)
VALUES ('Brass Code');
Explanation:
The SQL refers to the Structured Query Language in which the data is to be designed and maintained that occurred in the relational database management system i.e it is to be used for maintaining and query the database
Now the INSERT statement should be written as follows
INSERT INTO categories (CategoryName)
VALUES ('Brass Code');
In Antivirus Software, Heuristic detection looks for things like anomalies, Signature based detection uses content matches.a. Trueb. False
Answer:
true
Explanation:
When you start your computer then which component works first?
You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step should you take next
Answer:
The answer is "check the worksheet is not read only"
Explanation:
The read only mode is used for read the file data, and it doesn't allows the user to update the file, and for updating the worksheet we should check iut does not open in the read-only mode.
If it is open, then we close it and for close we goto the office button and click on the tools option after that goto general setting, in this there is a check box for turn off the read-only mode.
1)What is Big Data?
2) What is machine learning?
3) Give one advantage of Big data analytics.
4) Give any one application of Big Data Analytics. 5) What are the features of Big Data Analytics?
Answer:
Big data is defined as the extremely large data set that may be analysed computationally to reveal pattern,trends and associations, related to human behaviour and interaction.
Machine learning is a sub area of artifical intelligence where by the terms refers to the ability of IT system to independently find the solution to problem by reconnaissance pattern in databases.
The one advantage of bigdata is
To ensure hire the right employees.
The application of bigdata data is
to communicate media application nd entertainment
Windows workstations all have elements of server software built-in. What are these elements, and why is the Windows Professional OS not considered a server?
Answer:
The answer is below
Explanation:
Elements of Server software that is built-in, in Windows workstations are:
1. Hard drives,
2. RAM (Random Access Memory)
3. Processors
4. Network adapters.
Windows Professional OS is not considered a server due to the following:
1. Windows Professional OS has a limit on the number of client connections it allowed.
2. Unlike Server, Professional OS uses less memory
2. In comparison to Server, Professional OS uses the CPU less efficiently
4. Professional OS is not built to process background tasks, unlike Server that is configured to perform background tasks.
Question 16
Which of the following may not be used when securing a wireless connection? (select multiple answers where appropriate)
WEP
VPN tunnelling
Open Access Point
WPA2
WPA2
Nahan nah
Answer:
wpa2 wep
Explanation:
wpa2 wep multiple choices
A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially filled to capacity at 3MB. How long can the machine transmit at the full 10 Mbps capacity
Write a function called "equals" that accepts 2 arguments The two arguments will be of type list The function should return one string, either "Equals" or "Not Equals" For the lists to be equal, they need to: Have the same number of elements Have all the elements be of the same type Have the order fo the elements be the same DO NOT USE "
Answer:
import numpy as np
def equals(list1, list2 ):
compare = np.all( list1, list2)
if ( compare == True):
print ( "Equals")
else :
print(" Not Equals")
Explanation:
This python function utilizes the numpy package to compare two list items passed as its argument. It prints out "equals" for a true result and "not equal" for a false result.
What is the quick key to highlighting a column?
Ctrl + down arrow
Ctrl + Shift + down arrow
Right-click + down arrow
Ctrl + Windows + down arrow
The quick key to highlighting a column is the Ctrl + Shift + down arrow. Thus, option (b) is correct.
What is column?The term column refers to how data is organized vertically from top to bottom. Columns are groups of cells that are arranged vertically and run from top to bottom. A column is a group of cells in a table that are vertically aligned. The column is the used in the excel worksheet.
The quick key for highlighting a column is Ctrl + Shift + down arrow. To select downward, press Ctrl-Shift-Down Arrow. To pick anything, use Ctrl-Shift-Right Arrow, then Ctrl-Shift-Down Arrow. In the Move/Highlight Cells, the was employed. The majority of the time, the excel worksheet was used.
As a result, the quick key to highlighting a column is the Ctrl + Shift + down arrow. Therefore, option (b) is correct.
Learn more about the column, here:
https://brainly.com/question/3642260
#SPJ6
Answer:
its (B) ctrl+shift+down arrow
hope this helps <3
Explanation:
For this lab, imagine you are an IT Specialist at a medium-sized company. The Human Resources Department at your company wants you to find out how many people are in each department. You need to write a Python script that reads a CSV file containing a list of the employees in the organization, counts how many people are in each department, and then generates a report using this information. The output of this script will be a plain text file.
Answer:
import csv
import sys
file_csv = argv
with open( "file_csv", "rb" ) as file:
rowlist= csv.DictReader( file )
dict_count={ }
for row in rowlist:
dict_count[ row[ 'department' ] ] = dict_count.get( row[ 'department' ], 0 ) + 1
print( " The count of employees per department are", dict_count )
Explanation:
The python script in the solution above is able to accept user input csv files via command prompt and get an output of the number of employees for each department.
why is operating system pivotal in teaching and learning
Answer:
Kindly see explanation
Explanation: The operating system is a huge part of a computer system which plays a an invaluable role in the working of computer programs, hardwares and influences the overall experience of the user. It operating system serves as the interface between the computer hardware itself and the user who may wish to perform different tasks using a computer. In other to teach and learn, it is necessary to input and also obtain output, store our files and process and most essentially one may need to install application programs or softwares, all these functions are made possible with the help of an operating system. In essence, a system without an operating system can perform very little to no function at all. So basically teaching and learning becomes difficult. Teaching and Learning tools such as video, writing and other application softwares cannot be installed without an operating system and thus teaching or learning becomes impossible in it's absence.
Consider the following calling sequences and assuming that dynamic scoping is used, what variables are visible during execution of the last function called? Include with each visible variable the name of the function in which it was defined.a. Main calls fun1; fun1 calls fun2; fun2 calls fun3b. Main calls fun1; fun1 calls fun3c. Main calls fun2; fun2 calls fun3; fun3 calls fun1d. Main calls fun3; fun3 calls fun1e. Main calls fun1; fun1 calls fun3; fun3 calls fun2f. Main calls fun3; fun3 calls fun2; fun2 calls fun1void fun1(void);void fun2(void);void fun3(void);void main() {Int a,b,c;…}void fun1(void){Int b,c,d;…}void fun2(void){Int c,d,e;…}void fun3(void){Int d,e,f;…}
Answer:
In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.
Explanation:
In main() function three integer type variables are declared: a,b,c
In fun1() three int type variables are declared/defined: b,c,d
In fun2() three int type variables are declared/defined: c,d,e
In fun3() three int type variables are declared/defined: d,e,f
a. Main calls fun1; fun1 calls fun2; fun2 calls fun3
Here the main() calls fun1() which calls fun2() and fun2() calls func3() . This means first the func3() executes, then fun2(), then fun1() and last main()
Visible Variable: d, e, f Defined in: fun3
Visible Variable: c Defined in: fun2 (the variables d and e of fun2
are not visible)
Visible Variable: b Defined in: fun1 ( c and d of func1 are hidden)
Visible Variable: a Defined in: main (b,c are hidden)
b. Main calls fun1; fun1 calls fun3
Here the main() calls fun1, fun1 calls fun3. This means the body of fun3 executes first, then of fun1 and then in last, of main()
Visible Variable: d, e, f Defined in: fun3
Visible Variable: b, c Defined in: fun1 (d not visible)
Visible Variable: a Defined in: main ( b and c not visible)
c. Main calls fun2; fun2 calls fun3; fun3 calls fun1
Here the main() calls fun2, fun2 calls fun3 and fun3 calls fun1. This means the body of fun1 executes first, then of fun3, then fun2 and in last, of main()
Visible Variable: b, c, d Defined in: fun1
Visible Variable: e, f Defined in: fun3 ( d not visible)
Visible Variable: a Defined in: main ( b and c not visible)
Here variables c, d and e of fun2 are not visible
d. Main calls fun3; fun3 calls fun1
Here the main() calls fun3, fun3 calls fun1. This means the body of fun1 executes first, then of fun3 and then in last, of main()
Visible Variable: b, c, d Defined in: fun1
Visible Variable: e, f Defined in: fun3 ( d not visible )
Visible Variable: a Defined in: main (b and c not visible)
e. Main calls fun1; fun1 calls fun3; fun3 calls fun2
Here the main() calls fun1, fun1 calls fun3 and fun3 calls fun2. This means the body of fun2 executes first, then of fun3, then of fun1 and then in last, of main()
Visible Variable: c, d, e Defined in: fun2
Visible Variable: f Defined in: fun3 ( d and e not visible)
Visible Variable: b Defined in: fun1 ( c and d not visible)
Visible Variable: a Defined in: main ( b and c not visible)
f. Main calls fun3; fun3 calls fun2; fun2 calls fun1
Here the main() calls fun3, fun3 calls fun2 and fun2 calls fun1. This means the body of fun1 executes first, then of fun2, then of fun3 and then in last, of main()
Visible Variable: b, c, d Defined in: fun1
Visible Variable: e Defined in: fun2
Visible Variable: f Defined in: fun3
Visible Variable: a Defined in: main
1a) Skills are increasingly the key variable of the entire process of access and information inequality in the information society. Discuss the 21st century competencies or skills required in the information society and four ways (4) you can apply it during Supported Teaching on Schools.
Answer:
Explanation:
Skill acquisition improves quality, competence and competitiveness of an individual, It boost the chances of success and ability to make an impact. Access to information plays a verybhuge role in the society as it enables hearers to get updated while those who aren't informed are left behind. Some of the key competences or skills required in the information society include:
Critical thinking : Problem identification and ways to solve them.
Information sourcing and gathering : knowing where to get vital informations and facts
Effective communication, creativity, leadership, social, media and technological skills and so on.
The skills could be can be applied on schools in the form of :
Creating clubs such as the writing and debate clubs where students are given a research topic to write and present, this improves their research ability and communication skill.
Group project or assignment improves collaboration between members.
Assignments or projects requiring technology : Students may be given problems to solve with the use of computers moutwr programs and technology, this will help mad improve productivity.
Reward for innovation: Students should be paused mad encouraged for being creative, this will improve such individual and push others as well.
Given the following code: public class Test { public static void main(String[] args) { Map map = new HashMap(); map.put("123", "John Smith"); map.put("111", "George Smith"); map.put("123", "Steve Yao"); map.put("222", "Steve Yao"); } } Which statement is correct?
Answer:
There are no statements in the question, so I explained the whole code.
Explanation:
A map consists of key - value pairs. The put method allows you to insert values in the map. The first parameter in the put method is the key, and the second one is the value. Also, the keys must be unique.
For example, map.put("123", "John Smith"); -> key = 123, value = John Smith
Even though the key 123 is set to John Smith at the beginning, it will have the updated value Steve Yao at the end. That is because the keys are unique.
Note that the key 222 also has Steve Yao for the value, that is totally acceptable.
Which of the factors below is NOT a cause of online disinhibition?
O Anonymity
O Lack of nonverbal cues
Lack of tone of voice
Smartphones
Answer:
Lack of tone of voice
Explanation:
Remember, online disinhibition refers to the tendency of people to feel open in communication via the internet than on face to face conversations.
A lack of tone voice isn't categorized as a direct cause of online disinhibition because an individual can actually express himself using his tone of voice online. However, online disinhibition is caused by people's desire to be anonymous; their use of smartphones, and a lack of nonverbal cues.
Develop a CPP program to test is an array conforms heap ordered binary tree. This program read data from cin (console) and gives an error if the last item entered violates the heap condition. Use will enter at most 7 numbers. Example runs and comments (after // ) are below. Your program does not print any comments. An output similar to Exp-3 and Exp-4 is expected.
Exp-1:
Enter a number: 65
Enter a number: 56 // this is first item (root,[1]) in the heap three. it does not violate any other item. So, no // this is third [3] number, should be less than or equal to its root ([1])
Enter a number: 45 // this is fourth number, should be less than or equal to its root ([2])
Enter a number: 61 // this is fifth number, should be less than or equal to its root ([2]). It is not, 61 > 55. The 61 violated the heap.
Exp-2:
Enter a number: 100
Enter a number: 95 1/ 95 < 100, OK
Enter a number: 76 // 76 < 100, OK
Enter a number: 58 // 58 < 95, OK
Enter a number: 66 1/ 66 < 95, OK
Enter a number: 58 // 58 < 76, OK
Enter a number: 66 // 66 < 76, OK
Exp-3:
Enter a number: -15
Enter a number: -5
-5 violated the heap.
Exp-4:
Enter a number: 45
Enter a number: 0
Enter a number: 55
55 violated the heap.
Answer:
Following are the code to this question:
#include<iostream>//import header file
using namespace std;
int main()//defining main method
{
int ar[7];//defining 1_D array that stores value
int i,x=0,l1=1,j; //defining integer variable
for(i=0;i<7;i++)//defining for loop for input value from user ends
{
cout<<"Enter a Number: ";//print message
cin>>ar[i];//input value in array
if(l1<=2 && i>0)//using if block that checks the array values
{
x++;//increment the value of x by 1
}
if(l1>2 && i>0)//using if block that checks the array values
{
l1=l1-2;//using l1 variable that decrases the l1 value by 2
}
j=i-x;//using j variable that holds the index of the root of the subtree
if(i>0 && ar[j]>ar[i])// use if block that checks heap condition
{
l1++; //increment the value of l1 variable
}
if(i>0 && ar[j]<ar[i])// using the if block that violate the heap rule
{
cout<<ar[i]<<" "<<"Violate the heap";//print message with value
break;//using break keyword
}
}
return 0;
}
Output:
1)
Enter a Number: -15
Enter a Number: -5
-5 Violate the heap
2)
Enter a Number: 45
Enter a Number: 0
Enter a Number: 55
55 Violate the heap
Explanation:
In the above-given C++ language code, an array "ar" and other integer variables " i,x,l1, j" is declared, in which "i" variable used in the loop for input values from the user end.In this loop two, if block is defined, that checks the array values and in the first, if the block it will increment the value of x, and in the second if the block, it will decrease the l1 value by 2.In the next step, j variable is used that is the index of the root of the subtree. In the next step, another if block is used, that checks heap condition, that increment the value of l1 variable. In the, if block it violate the heap rule and print its values.Write a script named dif.py. This script should prompt the user for the names of two text files and compare the contents of the two files to see if they are the same. If they are, the script should simply output "Yes". If they are not, the script should output "No", followed by the first lines of each file that differ from each other. The input loop should read and compare lines from each file, including whitespace and punctuation. The loop should break as soon as a pair of different lines is found.
Answer:
Following are the code to this question:
f1=input('Input first file name: ')#defining f1 variable that input file 1
f2=input('Input second file name: ')#defining f2 variable that input file 2
file1=open(f1,'r')#defining file1 variable that opens first files by using open method
file2=open(f2,'r')#defining file1 variable that opens second files by using open method
d1=file1.readlines()#defining d1 variable that use readlines method to read first file data
d2=file2.readlines()#defining d2 variable that use readlines method to read second file data
if d1==d2:#defining if block that check file data
print('Yes')#when value is matched it will print message yes
exit# use exit keyword for exit from if block
for j in range(0,min(len(d1),len(d2))):#defining for loop that stores the length of the file
if (d1[j]!=d2[j]):#defining if block that check value is not matched
print('No')#print the message "NO"
print("mismatch values: ",d1[j]," ",d2[j])#print file values
Output:
please find the attached file.
Explanation:
code description:
In the above code, the "f1 and f2" variable is used for input value from the user end, in which it stores the file names. In the next step, the "file1 and file2" variable is declared that uses the open method to open the file. In the next line, the"d1 and d2" variable is declared for reads file by using the "readlines" method. Then, if block is used that uses the "d1 and d2" variable to match the file value if it matches it will print "yes", otherwise a for loop is declared, that prints files mismatch values.Answer:
first = input("enter first file name: ")
second = input("enter second file name: ")
file_one = open(first, 'r')
file_two = open(second, 'r')
if file_one.read() == file_two.read():
print("Both files are the same")
else:
print("Different files")
file_one.close()
file_two.close()
In the design phase of the systems development life cycle (SDLC), the _____ design is an overview of the system and does not include hardware or software choices. Group of answer choices
Answer:
"Conceptual" is the correct answer.
Explanation:
SDLC would be a particular implementation of a software administration that defines the processes responsible for the creation of such an organization or project, through preliminary feasibility studies to accomplished program activities.The conceptual design seems to be the very first phase of the cycle of brand management, using designs as well as other diagrams or models. It offers an implementation of the study product as a result of a collection of interconnected values and principles about what it will do, function, and look in a user-friendly way.Explain data hazard and structural hazard. Then, explain how we can prevent each type of hazard. Provide two examples to support your explanations
Answer:
Answered below
Explanation:
Data hazards happen when instructions exhibiting data dependence modify data in the different stages of a pipeline. Potential data hazards when not attended to, can result in race hazards or race conditions. Examples of situations where data hazards can occur is read after write, write after read, write after write. To resolve data hazards we can insert a pipeline whenever a read after write, dependence is encountered, use out-of-order execution or use operand forwarding.
Structural hazards happen when multiple instructions which are already in pipeline new the same resource. Example is a situation which many instructions are ready to execute an there is a single Arithmetic Logic Unit. Methods for preventing this hazard include pipeline break an pipeline flushing.
what are three ways to add receipts to quick books on line receipt capture?
Answer:
1) Forward the receipt by email to a special receipt capture email
2) You can scan, or take a picture of the receipt and upload it using the QuickBooks mobile app.
3) You can also drag and drop the image, or upload it into QuickBooks Online receipt center.
Explanation:
1) Th first process is simply done using the email address
2) On the app, tap the Menu bar with icon ≡. Next, tap Receipt snap., and then
tap on the Receipt Camera. Yo can then snap a photo of your receipt, and tap on 'Use this photo.' Tap on done.
3) This method can be done by simply navigating on the company's website.