Which of the following statements is true of an encrypted file? * The file can be read only by a user with the decryption key The file can be read by the creator and system administrator The file can not be opened again The file can be opened but not read again

Answers

Answer 1

Answer:

The file can be read only by a user with the decryption key

Explanation:

The way encryption works is it scrambles the data in a file following the rules of the encryption algorithm using a certain key to tell it how to scramble everything.

Without the key, the computer doesn't know how to decrypt it.

This is true no matter who has access to the file, be it a system administrator, a hacker, or even a legitimate user who has somehow lost access to the key

Strictly speaking, encryption can be broken, but, especially with modern encryption, that's a matter of centuries, and isn't really feasible

Answer 2

The statement that is true of an encrypted file is that The file can be read only by a user with the decryption key.

What is decryption key?

A decryption key is known to be a key that is given to Customers by a specific Distributor.

This key allows Customers to open and access the Software that they bought. The decryption key is a  mechanism that  permit  that a file can be read only by a user.

Learn more about decryption key from

https://brainly.com/question/9979590


Related Questions


​what are the morals and ethics of computer

Answers

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:

The individual's own personal code.

Any informal code of ethical conduct that exists in the work place.

Exposure to formal codes of ethics.

Explanation:

What will be displayed after the following code executes? mystr = 'yes' yourstr = 'no' mystr += yourstr * 2 print(mystr)

Answers

Answer:

yesnono

Explanation:

mystr = 'yes'

yourstr = 'no'

mystr += yourstr * 2

mystr = "yes"yourstr * 2 = "no"+"no"yes + no+noyesnono

Write a program that reads the input.txt file character by character and writes the content of the input file to output.txt with capitalize each word (it means upper case the first letter of a word and lowercase remaining letters of the word)

Answers

Answer:

def case_convertfile( file_name):

    with open(" new_file","x") as file:

         file.close( )

    with open("file_name", "r") as txt_file:

     while True:

            word = txt_file.readline( )

            word_split= word.split(" ")

            for word in word_split:

                  upper_case = word.uppercase( )

                  file= open("new_file","w+")

                  file= open("new_file","a+")

                  file.write(upper_case)

     txt_file.close( )

     file.close( )

Explanation:

This python function would open an existing file with read privilege and a new file with write and append privileges read and capitalize the content of the old file and store it in the new file.

What is the quick key to highlighting a column?
Ctrl + down arrow
Ctrl + Shift + down arrow
Right-click + down arrow
Ctrl + Windows + down arrow

Answers

The quick key to highlighting a column is the Ctrl + Shift + down arrow. Thus, option (b) is correct.

What is column?

The term column refers to how data is organized vertically from top to bottom. Columns are groups of cells that are arranged vertically and run from top to bottom. A column is a group of cells in a table that are vertically aligned. The column is the used in the excel worksheet.

The quick key for highlighting a column is Ctrl + Shift + down arrow. To select downward, press Ctrl-Shift-Down Arrow. To pick anything, use Ctrl-Shift-Right Arrow, then Ctrl-Shift-Down Arrow. In the Move/Highlight Cells, the was employed. The majority of the time, the excel worksheet was used.

As a result, the quick key to highlighting a column is the Ctrl + Shift + down arrow. Therefore, option (b) is correct.

Learn more about the column, here:

https://brainly.com/question/3642260

#SPJ6

Answer:

its (B) ctrl+shift+down arrow

hope this helps <3

Explanation:

what are three ways to add receipts to quick books on line receipt capture?

Answers

Answer:

1) Forward the receipt by email to a special receipt capture email

2) You can scan, or take a picture of the receipt and upload it using the QuickBooks mobile app.

3) You can also drag and drop the image, or upload it into QuickBooks Online receipt center.

Explanation:

1) Th first process is simply done using the email address

2) On the app, tap the Menu bar with icon ≡.  Next, tap Receipt snap., and then

tap on the Receipt Camera. Yo can then snap a photo of your receipt, and tap on 'Use this photo.' Tap on done.

3) This method can be done by simply navigating on the company's website.

Cloud computing gives you the ability to expand and reduce resources according to your specific service requirement.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, one of the most essential characteristics or advantages of cloud computing is rapid elasticity.

By rapid elasticity, it simply means that cloud computing gives you the ability to expand and reduce resources according to your specific service requirement because resources such as servers can be used to execute a particular task and after completion, these resources can then be released or reduced.

Some of the examples of cloud computing are Google Slides, Google Drive, Dropbox, OneDrive etc.

Develop a CPP program to test is an array conforms heap ordered binary tree. This program read data from cin (console) and gives an error if the last item entered violates the heap condition. Use will enter at most 7 numbers. Example runs and comments (after // ) are below. Your program does not print any comments. An output similar to Exp-3 and Exp-4 is expected.
Exp-1:
Enter a number: 65
Enter a number: 56 // this is first item (root,[1]) in the heap three. it does not violate any other item. So, no // this is third [3] number, should be less than or equal to its root ([1])
Enter a number: 45 // this is fourth number, should be less than or equal to its root ([2])
Enter a number: 61 // this is fifth number, should be less than or equal to its root ([2]). It is not, 61 > 55. The 61 violated the heap.
Exp-2:
Enter a number: 100
Enter a number: 95 1/ 95 < 100, OK
Enter a number: 76 // 76 < 100, OK
Enter a number: 58 // 58 < 95, OK
Enter a number: 66 1/ 66 < 95, OK
Enter a number: 58 // 58 < 76, OK
Enter a number: 66 // 66 < 76, OK
Exp-3:
Enter a number: -15
Enter a number: -5
-5 violated the heap.
Exp-4:
Enter a number: 45
Enter a number: 0
Enter a number: 55
55 violated the heap.

Answers

Answer:

Following are the code to this question:

#include<iostream>//import header file

using namespace std;

int main()//defining main method

{

int ar[7];//defining 1_D array that stores value      

int i,x=0,l1=1,j; //defining integer variable

for(i=0;i<7;i++)//defining for loop for input value from user ends  

{

cout<<"Enter a Number: ";//print message

cin>>ar[i];//input value in array

if(l1<=2 && i>0)//using if block that checks the array values  

{

x++;//increment the value of x by 1  

}

if(l1>2 && i>0)//using if block that checks the array values  

{

l1=l1-2;//using l1 variable that decrases the l1 value by 2  

}

j=i-x;//using j variable that holds the index of the root of the subtree

if(i>0 && ar[j]>ar[i])// use if block that checks heap condition  

{

l1++; //increment the value of l1 variable

}

if(i>0 && ar[j]<ar[i])// using the if block that violate the heap rule  

{

cout<<ar[i]<<" "<<"Violate the heap";//print message with value

break;//using break keyword  

}

}

return 0;

}

Output:

1)

Enter a Number: -15

Enter a Number: -5

-5 Violate the heap

2)

Enter a Number: 45

Enter a Number: 0

Enter a Number: 55

55 Violate the heap

Explanation:

In the above-given C++ language code, an array "ar" and other integer variables " i,x,l1, j" is declared, in which "i" variable used in the loop for input values from the user end.In this loop two, if block is defined, that checks the array values and in the first, if the block it will increment the value of x, and in the second if the block, it will decrease the l1 value by 2.In the next step, j variable is used that is the index of the root of the subtree. In the next step, another if block is used, that checks heap condition, that increment the value of l1 variable. In the, if block it violate the heap rule and print its values.

Write a method named coinFlip that accepts as its parameter a string holding a file name, opens that file and reads its contents as a sequence of whitespace-separated tokens. Assume that the input file data represents results of sets of coin flips. A coin flip is either the letter H or T, or the word Heads or Tails, in either upper or lower case, separated by at least one space. You should read the sequence of coin flips and output to the console the number of heads and the percentage of heads in that line, rounded to the nearest whole number. If this percentage is 50% or greater, you should print a "You win!" message; otherwise, print "You lose!". For example, consider the following input file: H T H H T Tails taIlS tAILs TailS heads HEAds hEadS For the input above, your method should produce the following output: 6 heads (50%) You win!

Answers

Answer:

Here is the JAVA program:

import java.io.*;

import java.util.*;

public class Main {

public static void main(String[] args) throws FileNotFoundException{ //the start of main() function body, it throws an exception that indicates a failed  attempt to open the file

Scanner input = new Scanner(new File("file.txt")); //creates a Scanner object and a File object to open and scan through the file.txt    

coinFlip(input);    } //calls coinFlip method

public static void coinFlip(Scanner input) { //coinFlip method that accepts as its parameter a string input holding a file name

while(input.hasNextLine()) { //iterates through the input file checking if there is another line in the input file

Scanner scan = new Scanner(input.nextLine()); //creates a Scanner object

int head = 0; // stores count of number of heads

int count = 0; //stores count of  total number of tokens

while(scan.hasNext()) { //iterates through the sequence checking if there is another sequence in the input file

String token= scan.next(); // checks and returns the next token

if (token.equalsIgnoreCase("H")||token.equalsIgnoreCase("Heads")) { //compares H or Heads with the tokens in file ignoring lower case and upper case differences

           head++;                } //if a token i.e. any form of heads in file matches with the H or Heads then add 1 to the number of heads

           count++;            } //increment to 1 to compute total number of counts

double result = Percentage(head, count); //calls Percentage method passing number of heads and total counts to compute the percentage of heads

System.out.println(head + " heads " + "(" + result +"%)"); // prints the number of heads

if(result >= 50.00) { //if the percentage is greater or equal to 50

System.out.println("You win!");} //displays this message if above if condition is true

else //if the percentage is less than 50

{System.out.println("You lose!");}  }    } //displays this message if above if condition is false

public static double Percentage(int h, int total) { //method to compute the percentage of heads

double p = (double)h/total* 100; // divide number of heads with the total count and multiply the result by 100 to compute percentage

return p;    } } //returns result

Explanation:

The program is well explained in the comments mentioned with each line of the above code. I will explain how the method coinFlip  works.

Method coinFlip accepts a string holding a file name as its parameter. It opens that file and reads its contents as a sequence of tokens. Then it reads and scans through each token and the if condition statement:

if (token.equalsIgnoreCase("H")||token.equalsIgnoreCase("Heads"))

checks if the each token in the sequence stored in the file is equal to the H or Heads regardless of the case of the token. For example if the first token in the sequence is H then this if condition evaluates to true. Then the head++ statement increments the count of head by 1. After scanning each token in the sequence the variable count is also increased to 1.

If the token of the sequence is HeAds then this if condition evaluates to true because the lower or upper case difference is ignored due to equalsIgnoreCase method. Each time a head is found in the sequence the variable head is incremented to 1.

However if the token in the sequence is Tails then this if condition evaluates to false. Then the value of head variable is not incremented to 1. Next the count variable is incremented to 1 because this variable value is always incremented to 1 each time a token is scanned because count returns the total number of tokens and head returns total number of heads in the tokens.

Percentage method is used to return the percentage of the number of heads in the sequence. It takes head and count as parameters (h and total). Computes the percentage by this formula h/total* 100. If the result of this is greater than or equal to 50 then the message  You win is displayed otherwise message You lose! is displayed in output.

what makes''emerging technologies'' happen and what impact will they have on individuals,society,and environment

Answers

Answer:

Please refer to the below for answer.

Explanation:

Emerging technology is a term given to the development of new technologies or improvement on existing technologies that are expected to be available in the nearest future.

Examples of emerging technologies includes but not limited to block chain, internet of things, robotics, cognitive science, artificial intelligence (AI) etc.

One of the reasons that makes emerging technology happen is the quest to improving on existing knowledge. People want to further advance their knowledge in terms of coming up with newest technologies that would make task faster and better and also address human issues. For instance, manufacturing companies make use of robotics,design, construction, and machines(robots) that perform simple repetitive tasks which ordinarily should be done by humans.

Other reasons that makes emerging technology happens are economic benefit, consumer demand and human needs, social betterment, the global community and response to social problems.

Impact that emerging technology will have on;

• Individuals. The positive effect of emerging technology is that it will create more free time for individuals in a family. Individuals can now stay connected, capture memories, access information through internet of things.

• Society. Emerging technology will enable people to have access to modern day health care services that would prevent, operate, train and improving medical conditions of people in the society.

• Environment. Before now, there have been global complains on pollution especially on vehicles and emission from industries. However, emerging technology will be addressing this negative impact of pollution from vehicles as cars that are currently being produced does not use petrol which causes pollution.

what makes ''emerging technologies'' happen is the necessity for it, the need for it in the society.

The impact they will have on individuals ,society,and environment is that it will improve areas of life such as communication, Transportation, Agriculture.

What is Emerging technologies?

Emerging technologies can be regarded as the technologies in which their development as will as practical applications are not yet realized.

Learn more about Emerging technologies at:

https://brainly.com/question/25110079

CHALLENGE ACTIVITY 3.7.2: Type casting: Reading and adding values.
Assign totalowls with the sum of num_owls A and num_owls_B.
Sample output with inputs: 34
Number of owls: 7
1. total_owls -
2.
3. num_owls A - input
4. num_owls_B - input
5.
6. " Your solution goes here
7.
8. print("Number of owls:', total_owls)

Answers

Answer:

total_owls = 0

num_owls_A = int(input())

num_owls_B = int(input())

total_owls = num_owls_A + num_owls_B

print("Number of owls:", total_owls)

Explanation:

Initialize the  total_owls as 0

Ask the user to enter num_owls_A and num_owls_B, convert the input to int

Sum the num_owls_A and num_owls_B and set it to the total_owls

Print the total_owls

avg_owls=0.0

num_owls_zooA = int(input())

num_owls_zooB = int(input())

num_owls_zooC = int(input())

num_zoos = 3

avg_owls = (num_owls_zooA + num_owls_zooB + num_owls_zooC) / num_zoos

print('Average owls per zoo:', int(avg_owls))

There is a problem while you are trying the calculate the average owls per zoo.

As you may know, in order to calculate the average, you need to get the total number of owls in all the zoos, then divide it to the number of zoos. That is why you need to sum num_owls_zooA + num_owls_zooB + num_owls_zooC and divide the result by num_zoos

Be aware that the average is printed as integer value. That is why you need to cast the avg_owls to an int as int(avg_owls)

Learn more about integer value on:

https://brainly.com/question/31945383

#SPJ6

Suppose there are 4 nodes sharing a broadcast channel using TDMA protocol. Suppose at time t=0: • Node 1 has 6 frames to transmit, • Node 2 has 4 frames to transmit, • Node 3 has 8 frames to transmit, • Node 4 has 3 frames to transmit. Maximum number of frames which can be transmitted by a node in a time slot = 3 The time required to transmit one frame = 1 Second Explain how TDMA protocol works to complete this task? How much time will it take to transmit all frames?

Answers

Answer:

Following are the description of the given nodes:

Explanation:

The Multiple Access frequency - division facilitates control by granting every node a fixed time slot. Also, every slot seems to be identical in width. Its whole channel bandwidth is often used in every channel node. Compared to FDMA it takes more time.  

Time slot=3 frames for all the above scenario

In the first point, It is reserved the node 1, and as well as 3 frames were also transmitted 1.  In the second point, It is reserved the node 2, and as well as 3 frames are transmitted. In the third point, It is reserved 3 nodes, and as well as 3 frames were transmitted.  In the fourth point, It is reserved 4 slots and the transmit 3 frames.  In the fifth point, It stores the slot 1 and the transmit 3 frames.  In the sixth point, It stores the slot 2 and the transmit 1 frame.  In the seventh point, It stores the slot 3  and the transmit 3 frames.  In the Eight points, It stores the slot 3 and the transmit 2 frames.  

Time interval = number of frames in first slot Time to send 1 frame number of images  

                      [tex]= 8 \times 3 \times 1 \\\\ = 8 \times 3 \\\\= 24 \ seconds[/tex]

A direct-mapped cache holds 64KB of useful data (not including tag or control bits). Assuming that the block size is 32-byte and the address is 32-bit, find the number of bits needed for tag, index, and byte select fields of the address.

Answers

Answer:

A) Number of bits for byte = 6 bits

B) number of bits for index = 17 bits

C) number of bits for tag = 15 bits

Explanation:

Given data :

cache size = 64 kB

block size = 32 -byte

block address = 32 -bit

number of blocks in cache memory  

cache size / block size = 64 kb / 32 b = 2^11 hence the number of blocks in cache memory = 11 bits = block offset

A) Number of bits for byte

[tex]log _{2} (6)^2[/tex] = 6  bits

B) number of bits for index

block offset + byte number

= 11 + 6 = 17 bits

c ) number of bits for tag

= 32 - number of bits for index

= 32 - 17 = 15 bits

The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease speed when approaching and crossing an intersection. True or false

Answers

Explanation:

the answer is false ........

The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease speed when approaching and crossing an intersection is not true.

What is intersection in the traffic rules?

An intersection serves as the point where many lanes cross on the road which is a point where driver is required to follow the traffic rules.

However, the above statement is not true because , a driver can decide not  decrease speed when approaching and crossing an intersection, even though it is a punishable offense in traffic rules.

Read more on traffic rules here: https://brainly.com/question/1071840

#SPJ2

Write an INSERT statement that adds this row to the Categories table:

CategoryName: Brass
Code the INSERT statement so SQL Server automatically generates the value for the CategoryID column.

Answers

Answer:

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

Explanation:

The SQL refers to the Structured Query Language in which the data is to be designed and maintained that occurred in the relational database management system i.e it is to be used for maintaining and query the database

Now the INSERT statement should be written as follows

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

Write a program that reads in your question #2 Python source code file and counts the occurrence of each keyword in the file. Your program should prompt the user to enter the Python source code filename

Answers

Answer:

Here is the Python program:

import keyword  #module that contains list of keywords of python

filename = input("Enter Python source code filename: ") # prompts user to enter the filename of a source code

code = open(filename, "r") # opens the file in read mode

keywords = keyword.kwlist #extract list of all keywords of Python and stored it into keywords

dictionary = dict() #creates a dictionary to store each keyword and its number of occurrence in source code

for statement in code: # iterates through each line of the source code in the file

   statement = statement.strip() # removes the spaces in the statement of source code  

   words = statement.split(" ") #break each statement of the source code into a list of words by empty space separator

   for word in words:# iterates through each word/item of the words list  

       if word in keywords:#checks if word in the code is present in the keywords list of Python  

           if word in dictionary: #checks if word is already present in the dictionary

               dictionary[word] = dictionary[word] + 1 #if word is present in dictionary add one to the count of the existing word

           else: #if word is not already present in the dictionary  

               dictionary[word] = 1 #add the word to the dictionary and set the count of word to 1

for key in list(dictionary.keys()): #iterates through each word in the list of all keys in dictionary  

   print(key, ":", dictionary[key])# prints keyword: occurrences in key:value format of dict

Explanation:

The program is well explained in the comments attached with each line of the program.  

The program prompts the user to enter the name of the file that contains the Python source code. Then the file is opened in read mode using open() method.

Then the keyword.kwlist statement contains the list of all keywords of Python. These are stored in keywords.

Then a dictionary is created which is used to store the words from the source code that are the keywords along with their number of occurrences in the file.

Then source code is split into the lines (statements) and the first for loop iterates through each line and removes the spaces in the statement of source code .

Then the lines are split into a list of words using split() method. The second for loop is used to iterate through each word in the list of words of the source code. Now each word is matched with the list of keywords of Python that is stored in keywords. If a word in the source code of the file is present in the keywords then that word is added to the dictionary and the count of that word is set to 1. If the word is already present in the dictionary. For example if there are 3 "import" keywords in the source code and if 1 of the import keywords is already in the dictionary. So when the second import keyword is found, then the count of that keyword is increased by 1 so that becomes 2.

Then the last loop is used to print each word of the Python that is a keyword along with its number of occurrences in the file.

The program and its output is attached in a screenshot. I have used this program as source code file.

how do you run a function in python?

Answers

You can call a Python function like so: function(parameters).

Example:

Define function add:
def add(x,y):
return x+y

Call function:
add(3,7) -> 10

What will be assigned to the variable s_string after the following code executes? special = '1357 Country Ln.' s_string = special[ :4] Group of answer choices

Answers

Answer:

s_string = 1357

Explanation:

character: index

1: 0

3: 1

5: 2

7: 3

 : 4

C: 5

o: 6

u: 7

n: 8

t: 9

r: 10

y: 11

 : 12

L: 13

n: 14

. : 15

s_tring  = special[:4]

s_tring = special[0] + special[1] + special[2] + special[3]

s_string = 1357

When you start your computer then which component works first?

Answers

Bios is normally the first software, which is used to initiate connections to the hardware and perform testing and configuration. Then the OS is detected and the whole kernel is handed off to load the OS itself.

Ann, a user, reports that she is no longer able to access any network resources. Upon further investigation, a technician notices that her PC is receiving an IP address that is not part of the DHCP scope. Which of the following explains the type of address being assigned?

A. Unicast address
​B. IPV6
​C. DHCP6
D. APIPA

Answers

Answer: APIPA

Explanation:

Automatic Private IP Addressing (APIPA) is a Windows based operating systems feature that allows a computer to assign itself automatically to an IP address even though there is DHCP server to perform the function.

From the information that has been provided in the question, we can see that the type of address that is used is APIPA.

(Process scores in a text file) Suppose that a text file contains an unspecified number of scores. Write a program that reads the scores from the file and displays their total and average. Scores are separated by blanks. Your program should prompt the user to enter a filename. Here is a sample run:

Answers

Answer:

Here is the Python program:

def scores(file):  # method scores that takes a file name as parameter and returns the sum and average of scores in a file

   with open(file, 'r') as infile:  # open the file in read mode

       lines = [score.split() for score in infile]  # split the scores into a list

       print("The scores are:",lines)  #print the scores

       for line in lines:  # loops through each score

           total= sum(int(score) for score in line)  # adds the scores

           average =total/len(line) # computes average by taking sum of scores and dividing by number of scores in file

       print("The sum is:", total)  #prints the sum of scores

       print("The average is:", "{:.2f}".format(average))   #prints the average

filename = input("Enter name of the file: ")  #prompts user to enter name of file

scores(filename) #calls scores method by passing the file name to it in order to compute sum and average of file contents i.e. scores

Explanation:

It is assumed that the scores in the file are separated by a blank space.

The scores() method takes a file name as parameter. Then it opens that input file in read mode using object infile.

split() method is used to split the scores in a file into a list. Suppose the scores are 1 2 3 4 5 6 . So after the split, they become ['1', '2', '3', '4', '5', '6']  

The loop iterates through each score in the file, splits them into a list and stores this list in lines. The next print statement prints these scores in a list.

The second loop for line in lines iterates through each score of the list and the statements: total= sum(int(score) for score in line)  and average =total/len(line) computes the total and average of scores.

total= sum(int(score) for score in line)  statement works as follows:

for loop iterates through each element of list i.e. each score

int() converts that string element into integer.

sum() method adds the integers to compute their total.

So if we have  ['1', '2', '3', '4', '5', '6']  each element i.e. 1,2,3,4,5,6 is converted to integer by int() and then added together by sum method. So this becomes 1+2+3+4+5+6 = 21. This result is stored in total. Hence

total = 21.

average = total/len(line) works as follows:

The computed sum of scores stored in total is divided by the number of scores. The number of scores is computed by using len() method which returns the length of the line list. So len() returns 6. Hence

average = total/len(line)

              = 21 / 6

average = 3.5

The next two print statement prints the value of sum and average and "{:.2f}".format(average)) prints the value of average up to 2 decimal places.

The screenshot of the program along with its output is attached.

Consider the following calling sequences and assuming that dynamic scoping is used, what variables are visible during execution of the last function called? Include with each visible variable the name of the function in which it was defined.a. Main calls fun1; fun1 calls fun2; fun2 calls fun3b. Main calls fun1; fun1 calls fun3c. Main calls fun2; fun2 calls fun3; fun3 calls fun1d. Main calls fun3; fun3 calls fun1e. Main calls fun1; fun1 calls fun3; fun3 calls fun2f. Main calls fun3; fun3 calls fun2; fun2 calls fun1void fun1(void);void fun2(void);void fun3(void);void main() {Int a,b,c;…}void fun1(void){Int b,c,d;…}void fun2(void){Int c,d,e;…}void fun3(void){Int d,e,f;…}

Answers

Answer:

In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.

Explanation:

In main() function three integer type variables are declared: a,b,c

In fun1() three int type variables are declared/defined: b,c,d

In fun2() three int type variables are declared/defined: c,d,e

In fun3() three int type variables are declared/defined: d,e,f

a. Main calls fun1; fun1 calls fun2; fun2 calls fun3

Here the main() calls fun1() which calls fun2() and fun2() calls func3() . This means first the func3() executes, then fun2(), then fun1() and last main()

Visible Variable:  d, e, f        Defined in: fun3

Visible Variable: c                 Defined in: fun2 (the variables d and e of fun2  

                                                                                                     are not visible)

Visible Variable: b                  Defined in: fun1 ( c and d of func1 are hidden)

Visible Variable: a                 Defined in: main (b,c are hidden)

b. Main calls fun1; fun1 calls fun3

Here the main() calls fun1, fun1 calls fun3. This means the body of fun3 executes first, then of fun1 and then in last, of main()

Visible Variable: d, e, f           Defined in: fun3

Visible Variable:  b, c              Defined in: fun1 (d not visible)

Visible Variable:  a                  Defined in: main ( b and c not visible)

c. Main calls fun2; fun2 calls fun3; fun3 calls fun1

Here the main() calls fun2, fun2 calls fun3 and fun3 calls fun1. This means the body of fun1 executes first, then of fun3, then fun2 and in last, of main()

Visible Variable:  b, c, d        Defined in: fun1

Visible Variable:  e, f             Defined in: fun3 ( d not visible)

Visible Variable:  a                Defined in: main ( b and c not visible)

Here variables c, d and e of fun2 are not visible

d. Main calls fun3; fun3 calls fun1

Here the main() calls fun3, fun3 calls fun1. This means the body of fun1 executes first, then of fun3 and then in last, of main()

Visible Variable: b, c, d     Defined in: fun1  

Visible Variable:   e, f        Defined in:  fun3   ( d not visible )

Visible Variable:    a          Defined in: main (b and c not visible)

e. Main calls fun1; fun1 calls fun3; fun3 calls fun2

Here the main() calls fun1, fun1 calls fun3 and fun3 calls fun2. This means the body of fun2 executes first, then of fun3, then of fun1 and then in last, of main()

Visible Variable: c, d, e        Defined in: fun2

Visible Variable:  f               Defined in: fun3 ( d and e not visible)

Visible Variable:  b               Defined in:  fun1 ( c and d not visible)

Visible Variable: a                Defined in: main ( b and c not visible)

f. Main calls fun3; fun3 calls fun2; fun2 calls fun1

Here the main() calls fun3, fun3 calls fun2 and fun2 calls fun1. This means the body of fun1 executes first, then of fun2, then of fun3 and then in last, of main()

Visible Variable: b, c, d       Defined in: fun1  

Visible Variable: e               Defined in: fun2  

Visible Variable: f                Defined in: fun3  

Visible Variable: a               Defined in: main


Your car must have two red stoplights, seen from ______ feet in the daytime, that must come on when the foot brake is pressed.
A. 100
B. 200
C. 300
D. 400

Answers

Answer:

the answer is 300 feet in the daytime

UAAR is planning to build in house software similar to Zoom Application. University Authorities contact with you in order to provide best solution with in limited time and limited resources in term of cost.
Describe the roles, Artifacts and activities, keeping in view Scrum process model.
Compare and contract your answer with scrum over XP for development of above mention system. Justify your answer with the help of strong reasons, why you choose scrum model over XP model. How scrum is more productive for project management. Furthermore, highlight the shortcoming of XP model.

Answers

Answer:

Following are the answer to this question:

Explanation:

If working to develop Zoom-like house software, its best solution is now in a limited period of time even with effectively reduced assets;  

Evaluate all roles in preparation  

Create a "Pool Draw"  

Choose a singular set of resources.  

Utilize Time Recording.  

Concentrate on assignments and project objectives.  

An object, in which by-product of the development in the software. It's created for the development of even a software program. It could include database schemas, illustrations, configuration screenplays-the list just goes on.  

All development activities of Scrum are composed with one or several groups from a lineout, each containing four ruck roles:  

Holder of the drug  

ScrumMaster and Master  

Equipment for development.  

Owner of the drug

It is the motivating core of the product marketing idea, that Keeps transparent the vision about what the team member is trying to seek so that to accomplish as well as interacts to all of the other members, the project manager is responsible for the success of the way to solve being formed or retained.  

ScrumMaster   It operates as a mentor and providing guidance throughout the development phase, it takes a leadership position in the abolishment with impediments that also impact employee productivity and therefore have no ability to control the team, but the roles of both the project team or program manager are not quite the same thing. It works as a leader instead of the management team.  

Equipe for development

The Scrum characterizes the design team as a diverse, multi-functional community of individuals who design, construct as well as evaluate the application of those who want.  

In this usually 5 to 9 individuals; one's representatives should be able to make quality responsive applications collaboratively.  

It is a framework that operates along with teams. It is often seen as agile project management as well as explains a set of conferences, techniques, and roles that also assist individuals to organize as well as complete their employees together.  The multidisciplinary team from Scrum means that a person should take a feature from idea to completion.

Scrum and XP differences:  

Its team members in Scrum usually operate in the various weeks with one month-long incarnation. The XP teams generally work in incarnations which are either one two weeklong.  Scrum doesn't write a prescription the certain project management; XP seems to do.  Scrum may not make access to other their sprints. XP teams are far more receptive to intervention inside of their repetitions.

Consider the following Stack operations:

push(d), push(h), pop(), push(f), push(s), pop(), pop(), push(m).

Assume the stack is initially empty, what is the sequence of popped values, and what is the final state of the stack? (Identify which end is the top of the stack.)

Answers

Answer:

Sequence of popped values: h,s,f.

State of stack (from top to bottom): m, d

Explanation:

Assuming that stack is  initially empty. Suppose that p contains the popped values. The state of the stack is where the top and bottom are pointing to in the stack. The top of the stack is that end of the stack where the new value is entered and existing values is removed. The sequence works as following:

push(d) -> enters d to the Stack

Stack:  

d ->top

push(h) -> enters h to the Stack

Stack:

h ->top

d ->bottom

pop() -> removes h from the Stack:

Stack:

d ->top

p: Suppose p contains popped values so first popped value entered to p is h

p = h

push(f) -> enters f to the Stack

Stack:

f ->top

d ->bottom

push(s) -> enters s to the Stack

Stack:

s ->top

f

d ->bottom

pop() -> removes s from the Stack:

Stack:

f ->top

d -> bottom

p = h, s

pop() -> removes f from the Stack:

Stack:

d ->top

p = h, s, f

push(m) -> enters m to the Stack:

Stack:

m ->top

d ->bottom

So looking at p the sequence of popped values is:

h, s, f

the final state of the stack:

m, d

end that is the top of the stack:

m

3. How many bytes of storage space would be required to store a 400-page novel in which each page contains 3500 characters if ASCII were used? How many bytes would be required if Unicode were used? Represent the answer in MB

Answers

Answer:

A total of 79.3mb will be needed

By using ____, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names.

Answers

Answer:

Polymorphism

Explanation:

If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

The information regarding the polymorphism is as follows:

The person has various attributes at the same timeFor example,  a man could be a father, a husband, an entrepreneur at the same time.In this, the similar person has different types of behavior in different situations.

Therefore we can conclude that If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

Learn more about the behavior here: brainly.com/question/9152289

the part of the computer that contains the brain , or central processing unit , is also known the what ?

Answers

Answer:

system unit

Explanation:

A system unit is the part of a computer that contains the brain or central processing unit. The primary device such as central processing unit as contained in the system unit perform operations hence produces result for complex calculations.

The system unit also house other main components of a computer system like hard drive , CPU, motherboard and RAM. The major work that a computer is required to do or performed is carried out by the system unit. Other peripheral devices are the keyboard, monitor and mouse.

A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially filled to capacity at 3MB. How long can the machine transmit at the full 10 Mbps capacity

Answers

2+4= this gbhfchgcjdxbhdch is correct

Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer CPU

Answers

Answer:

mouse printer CPU touch screen

Explanation:

on a tablet computer hope this helps you :)

What are the constraints for designing small and large files and how these are resolved in different file system

Answers

Answer:

space management and buffering speed.

Explanation:

There are different types of file management systems in a computer system, examples of which are NTFS, FAT, WAFL, etc, and are governed by protocols like NFS, TFTP, FTP, etc.

These file systems are used in storages like the hard disk drive, CD and DVD, solid-state drive, etc, to organize or manage the files from boot setup, device drivers to permission-seasoned user files.

Files in storage range from small to large files, for which the schema of the file system must adjust to manage and allocate free space to other files in the future. The file system is also able to index the location of a file for retrieval to a cache memory, making buffering faster.

Other Questions
Proteins in the cell membrane have many functions. Which type of protein would be used for cell recognition and as a receptor? A. Pore proteins B. Endoplasmic proteins C. Glycoproteins D. Integral proteins Which sentence in this excerpt from Ernest Hemingway's "In Another Country uses parallelism?In the fall the war was always there, but we did not go to it any more. It was cold in the fall in Milan and the dark came very early. Then theelectric lights came on, and it was pleasant along the streets looking in the windows. There was much game hanging outside the shops, and thesnow powdered in the fur of the foxes and the wind blew their tails. The deer hung stiff and heavy and empty, and small birds blew in the windand the wind turned their feathers. It was a cold fall and the wind came down from the mountains. hii guys ..help What does a text need for it to become a novel? What is the mass number of an element 3(q7)=27 need help plzz 1st peep gets brainlest Suppose we want to test the color distribution claim on the M&Ms website that a bag of plain M&Ms is made up of 10% blue, 10% orange, 10% green, 20% red, 20% yellow, and 30% brown. We select a sample of 400 plain M&Ms and found the following: Color Blue Orange Green Red Yellow Brown Frequency 30 48 55 66 70 131 Is there evidence to doubt the color distribution claimed by the website? Use =0.05 URGENT PLZ HELP THANK YOU! 5 men working 6 hours a day can dig a trench 180m long in 4 days. How many days would 8 men working 3 hrs a day take to dig a trench 220m long Open space arrangements in workstations increase communication and potentially decrease noise, distractions, and loss of privacy.a. trueb. false What is resource management in Wireless Communication? Explain its advantages What is the thinnest soap film (excluding the case of zero thickness) that appears black when illuminated with light with a wavelength of 580 nm Whats is the greatest common factor of 100x^2 - 250xy + 75x Fill in the blanks in the following sentences with the appropriate indirect object pronouns. 4. A ti ___________ moliesta mucho que yo cante en la ducha. If one pound is the same as 454 grams, then convert the mass of 78 grams to pounds. You're conducting an experiment on another planet. You drop a rock from a height of 1 m and it hits the ground 0.4 seconds later. What is acceleration due to gravity on the planet ? Find the value of x in the givenright triangle.Enter your answer as a decimal rounded to thenearest tenth. The head of a computer science department is interested in estimating the proportion of students entering the department who will choose the new computer engineering option. Suppose there is not information about the proportion of students who might choose the option. What size sample should the department head take if he wants to be 95% confident that the estimate is within 0.10 of the true proportion i need help on figuring this out and the answer plz!! How much of the contract price should Maya allocate to the machine, installation, and training, respectively? historical outline map 7 ancient greece map answer key. (50 points)