Answer:
The answer is "disable the program on startup"
Explanation:
The technician simply disables the program on the startup, at this the utilization of the RAM is low. The startup tab is also known as an alternative in the initialization process of the system software, which is automatically started whenever the device boots. There has been an error. If you boot, the more applications you want to load the longer it will take to operate the computer.
Conside following prototype of a function
int minArray(int [], int );
Which of the option is correct way of function CALL assuming following arraydeclaration
int x[5] = {7,4,6,2,3};*
a) minArray(x,5);
b) minArray(x[],10);
c) minArray(x[5],5);
d) minArray(5,x);
Answer:
The answer is "Option a"
Explanation:
Following are the code to this question:
#include <stdio.h>//header file
int minArray(int x[], int n)//defining method minArray that accepts two parameters
{
for(int i=0;i<n;i++)//defining loop for print value
{
printf("%d\n",x[i]);//printf array value
}
}
int main()//defining main method
{
int x[] ={7,4,6,2,3};//defining array that hold values
int n=5;//defining integer variable
minArray(x,5);//calling method minArray
return 0;
}
In this code, a method "minArray" is defined, that accepts two parameters array and an integer variable in its parameter, and in the next step, the for loop is declared, that uses the print method to prints its value.
In the next step, the main method is declared, which declared an array and holds its values and defines an integer variables, and calls the method "minArray".
Which of the following is NOT one of the Internet sources that hackers use to gather information about a company's employees?
1. Blogs
2. Company website
3. Social networking sites
4. Regional Internet registries
Answer:
4. Regional Internet registries
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
With cybersecurity theory, security standards, frameworks and best practices we can guard against cyber attacks and easy-to-guess passwords such as using alphanumeric password with certain composition and strength.
Some examples of the Internet sources that hackers use to gather information about a company's employees includes;
I. Blogs.
II. Company website.
III. Social networking sites.
However, Regional Internet registries cannot be used by hackers to gather information about a company's employees because it is an internet protocol resource organization saddled with the responsibility of allocating and registering internet protocol (IP) addresses.
write a python program to accept a number and check whether it is divisible by 4 or not
Answer:
number = int(input("Enter number: "))
if (number % 4):
print("{} is not divisible by 4".format(number))
else:
print("{} is divisible by 4".format(number))
Explanation:
If the %4 operation returns a non-zero number, there is a remainder and thus the number is not divisable by 4.
Difference between analog and digital computer ??
Answer:
The analogue computer works on a continuous signal. The digital computer works on a discrete signal. The output is a voltage signal, they are not exact values and are in graphical form.
Write a method named numUnique that accepts a sorted array of integers as a parameter and that returns the number of unique values in the array. The array is guaranteed to be in sorted order, which means that duplicates will be grouped together. For example, if a variable called list stores the following values: int[] list
Answer:
The method in Java is as follows:
public static int numUnique(int list[]) {
int unique = 1;
for (int i = 1; i < list.length; i++) {
int j = 0;
for (j = 0; j < i; j++) {
if (list[i] == list[j])
break;
}
if (i == j)
unique++;
}
return unique;
}
Explanation:
This line defines the numUnique method
public static int numUnique(int list[]) {
This initializes the number of unique elements to 1
int unique = 1;
This iterates through the list
for (int i = 1; i < list.length; i++) {
The following iteration checks for unique items
int j = 0;
for (j = 0; j < i; j++) {
if (list[i] == list[j]) If current element is unique, break the iteration
break;
}
if (i == j)
unique++;
}
This returns the number of unique items in the list
return unique;
}
Cathy connected a keyboard, mouse, and printer to her Computer through a Bluetooth connection. What type of network has she created?
Answer:
Cathy has created a Personal Area Network
Explanation:
Let us define a personal area network.
A personal area network is created by connecting multiple devices of a user and it is panned over a very short distance. Mainly used technology is Bluetooth.
Cathy has used Bluetooth to connect keyboard, mouse and printer to her computer, she has formed a Personal Area Network.
Answer: pan
Explanation: got it right edmentum
Adding a paper clip to the vertical stabilizer of your glider will have what effect on its Center of Gravity (CG)?
The CG would move toward the rear.
The CG would stay the same.
The CG would move toward the nose.
O The CG would move lower
Answer:
the CG would move toward the rear.
Explanation:
Adding a paper clip to the vertical stabilizer of your glider will, the CG would move toward the rear. The correct option is A.
What is center of gravity?The place on an item where the force of gravity is thought to act is known as the center of gravity (CG).
The gravitational pull is thought to be focused at the point where an object weighs on average. Depending on the object's size, shape, and mass distribution, the center of gravity will be in one place or another.
The impact of adding a paper clip to your glider's vertical stabilizer is to shift the center of gravity (CG) to the back of the glider.
This is due to the fact that the paper clip adds weight to the glider's rear, moving the center of mass there and, as a result, the center of gravity.
Thus, the correct option is A.
For more details regarding center of gravity, visit:
https://brainly.com/question/20662119
#SPJ6
Why are object-oriented languages very popular?
They can use flowcharts.
They can use pseudocode.
They are powerful, clear, and efficient.
They don't use binary.
Answer:
Explanation:
Other advantages of object-oriented programming languages are you can use it to kinds of web applications for thorough data analysis, less development time, accurate coding, easy testing, reusability, debugging, less data corruption, and maintenance.
Write a program that takes a first name as the input, and outputs a welcome message to that name.
Ex: If the input is Pat the output is:
Hello Pat and welcome to cs Online
Input Welcome message
1 user_name = input 2 3
Type your code here
Answer:
The program in Python is as follows:
user_name = input("Name: ")
print("Hello "+user_name+" and welcome to cs Online")
Explanation:
The program is written in Python, and it uses basic input and output function to execute the instruction in the question.
First: Prompt the user for username
This is done in the following line
user_name = input("Input your name: ")
Next, the print function is used to output the welcome message
print("Hello "+user_name+" and welcome to cs Online")
The program that takes first name as the input, and outputs a welcome message to that name is represented below:
user_input = str(input("please type your first name: "))
print(f" Hello {user_input} !! Welcome to CS online ")
The code is written in python.
The variable user_input is used to store the user's input. It ask the user for his/her first name and store it.
Then we print the welcome statement using the f string.
F-string are use to combine strings and variables.
learn more on python program; https://brainly.com/question/14644566?referrer=searchResults
6. Pattern Displays
Use for loops to construct a program that displays a triangle of Xs on the screen. The
triangle should look like this
X XXXXX
XX XXXX
XXX XXX
XXXX XX
XXXXX X
please give me answer of this question
Answer:
public static void displayPattern()
{
for (int x = 1; x <= 5; x++)
{
for (int i = 0; i <= 6; i++)
{
if (x == i)
{
System.out.print(" ");
} else {
System.out.print("X");
}
}
System.out.println("");
}
}
Which function in spreadsheet software can be used to predict future sales or inventory needs?
Answer:forecast
Explanation:
Are chairs and tables considered technology?
A) true
B) false
Answer:true
Explanation:
By definition technology is the skills methods and processes used to achieve goals
Chairs and tables are considered technology. The given statement is True.
A comfortable ergonomic office chair lessens the chronic back, hip, and leg pain brought on by prolonged sitting. Employees are able to operate more effectively and productively as a result. Another advantage is a decrease in medical costs associated with poor posture brought on by uncomfortable workplace chairs.
How does technology make your life comfortable?
They can perform their tasks more easily and independently thanks to technology. They feel more empowered, certain, and positive as a result. Many people can benefit greatly from technology. It goes beyond simply being "cool." The most recent technologies can also simplify life.
Among other major technologies, 3D modeling, virtual reality, augmented reality, and touch commerce has an impact on the design and production of furniture. Before actual furniture is built on the ground, it is possible to virtually create it using 3D or three-dimensional modeling.
Thus, Technology includes things like chairs and tables. The assertion is accurate.
Learn more about technology here:
https://brainly.com/question/9171028
#SPJ2
An algorithm requires numbers.
O True
O
False
Answer:
It is true
Explanation:
can you answer this question?
Answer:
To do this you'll need to use malloc to assign memory to the pointers used. You'll also need to use free to unassign that memory at the end of the program using the free. Both of these are in stdlib.h.
#include <stdlib.h>
#include <stdio.h>
#define SIZE_X 3
#define SIZE_Y 4
int main(void){
int **matrix, i, j;
// allocate the memory
matrix = (int**)malloc(SIZE_X * sizeof(int*));
for(i = 0; i < SIZE_X; i++){
matrix[i] = (int *)malloc(SIZE_Y * sizeof(int));
}
// assign the values
for(i = 0; i < SIZE_X; i++){
for(j = 0; j < SIZE_Y; j++){
matrix[i][j] = SIZE_Y * i + j + 1;
}
}
// print it out
for(i = 0; i < SIZE_X; i++){
for(j = 0; j < SIZE_X; j++){
printf("%d, %d: %d\n", i, j, matrix[i][j]);
}
}
// free the memory
for(i = 0; i < SIZE_X; i++){
free(matrix[i]);
}
free(matrix);
return 0;
}
At Moore High, 456 students attended the prom. This is 65 more students than
the previous year.
To the nearest percent, what is the percent of increase from last year to this
year?
12%
15%
17%
19%
Answer:
B-15%
Explanation:
Any1??
Write the names of atleast 22 high-level programming languages
Answer:
1 Array languages
2 Assembly languages
3 Authoring languages
4 Constraint programming languages
5 Command line interface languages
6 Compiled languages
7 Concurrent languages
8 Curly-bracket languages
9 Dataflow languages
10 Data-oriented languages
11 Decision table languages
12 Declarative languages
13 Embeddable languages
13.1 In source code
13.1.1 Server side
13.1.2 Client side
13.2 In object code
14 Educational languages
15 Esoteric languages
16 Extension languages
17 Fourth-generation languages
18 Functional languages
18.1 Pure
18.2 Impure
19 Hardware description languages
19.1 HDLs for analog circuit design
19.2 HDLs for digital circuit design
20 Imperative languages
21 Interactive mode languages
22 Interpreted languages
23 Iterative languages
Explanation:
Tyrell is required to find current information on the effects of global warming. Which website could he potentially cite as a credible source? Select four options.
a blog by an unknown person that accuses certain companies of contributing to pollution
a nonprofit website that provides information on how to clean up the environment
a recent newspaper article on global warming from a reputable news organization
a government website providing information on national efforts to investigate global warming
a magazine article about climate change in a respected scientific journal
Answer:
2345
Explanation:
Answer:
✔ a nonprofit website that provides information on how to clean up the environment
✔ a recent newspaper article on global warming from a reputable news organization
✔ a government website providing information on national efforts to investigate global warming
✔ a magazine article about climate change in a respected scientific journal
Explanation:
simplified version: 2345
var nums = [1,1, 2, 3, 5, 8, 13, 21];
var copyNums = [1,1, 2, 3, 5, 8, 13, 21];
for(var i=0; i < copyNums.length; i++){
if(copyNums[i] == 1){
insertItem(copyNums,i,"hello");
}
}
This code will create an infinite loop. Why does it create an infinite loop?
Answer:
Explanation:
This code creates an infinite loop because it is detecting that the first value of copyNums is 1, therefore it runs the insertItem code. This code then adds the value "hello" to the array in position i which would be 0. Then moves to the next value of the array, but since the element "hello" pushed the value 1 to the next index then the code just repeats itself with the same value of 1. This continues to happen because every time the value "hello" is added it simply pushes the 1 to the next index and repeats the same code.
Answer:
[tex]var nums = [1,1, 2, 3, 5, 8, 13, 21];
var copyNums = [1,1, 2, 3, 5, 8, 13, 21];
for(var i=0; i < copyNums.length; i++){
if(copyNums[i] == 1){
insertItem(copyNums,i,"hello");
}
}[/tex]
If an ISP assigned you a /28 IPv6 address block, how many computers could be as- signed an address from the block?
Answer:
I think 14 hosts (computer)
Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would write the value of the salary variable to the file
A) cout <
B) ofstream
C) dataFile << salary;
D) payroll.dat <
Answer:
dataFile << salary;
Explanation:
To write salary to a file (payroll.dat) using ofstream, you make use of the following instruction:
ofstream dataFile;
myfile.open ("payroll.dat");
myfile <<salary;
myfile.close();
This line creates an instance of ofstream
ofstream dataFile;
This line opens the file payroll.dat
myfile.open ("payroll.dat");
This is where the exact instruction in the question is done. This writes the value of salary to payroll.dat
myfile <<salary;
This closes the opened file
myfile.close();
can you answer this question?
Answer:
The SIZE constant is not definedThe variable i should be defined at the start of the function, not within the condition of the while loopThe main function returns no value. Generally they should return a zero on success.The printf text "%d" should actually be "%f". %d treats the variable as though it's an integer.
DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/pythons = "Administrator"The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment. Options may be used once or not at all.Select and Place:
Answer:
The output is to the given question is:
nist
nsrt
imdA
strat
Explanation:
The missing code can be defined as follows:
code:
s = "Administrator" #defining a variable that hold string value
print(s[4:8])#using slicing with the print method
print(s[4: 12:2])#using slicing with the print method
print(s[3::-1])#using slicing with the print method
print(s[-7:-2])#using slicing with the print method
In the above code, a string variable s is declared, that holds a string value, and use the multiple print method to print its slicing calculated value.
what is the significance of the following terms A A L U control unit in the CPU
Answer:
Explanation:
The function of ALU is to perform arithmetic operations(add,subtract, multiply,division) as well as logical operations(compare values).
The function of CU is to control and coordinate the activities of the computer.
Write a constructor for BaseballPlayer. The constructor takes three int parameters: numHits, numRuns, and numRBIs storing the values within the class' ArrayList field named playerStats.
Answer:
Following are the code to the given question:
public class BaseballPlayer//defining a class BaseballPlayer
{
BaseballPlayer(int numHits, int numRuns, int numRBIs)//defining a parameterized cons
{
}
}
Explanation:
Some of the data is missing, which is why the solution can be represented as follows:
In this code, a class BaseballPlayer is defined, and inside the class a parameterized constructor is defined that holds three integer variable "numHits, numRuns, and numRBIs".
Write a class called Person that has two data members - the person's name and age. It should have an init method that takes two values and uses them to initialize the data members.Write a separate function (not part of the Person class) called std_dev that takes as a parameter a list of Person objects (only one parameter: person_list) and returns the standard deviation of all their ages (the population standard deviation that uses a denominator of N, not the sample standard deviation, which uses a different denominator).
Answer:
class Person(object):
def __init__(self, name, age):
self.name = name
self.age = age
def std_dev(person_list):
average = 0
for person in person_list:
average += person.age
average /= len(person_list)
total = 0
for person in person_list:
total += (person.age - average) ** 2
return (total / (len(person_list) )) ** 0.5
Explanation:
The class "Person" is a python program class defined to hold data of a person (name and age). The std_dev function accepts a list of Person class instances as an argument and returns the calculated standard deviation of the population.
How do we use game maker?
Answer:
The easy to use powerful game engine that is the best for 2D games
A drink costs 2 dollars. A taco costs 3 dollars. Given the number of each, compute total cost and assign totalCost with the result. Ex: 4 drinks and 6 tacos yields totalCost of 26.
*/
int main() {
int numDrinks = 0;
int numTacos = 0;
int totalCost = 0;
numDrinks = 4;
numTacos = 6;
/* Your solution goes here */
totalCost = (2 * numDrinks) + (3 * numTacos);
cout << "Total cost: " << totalCost << endl;
return 0;
}
Answer:
See Explanation
Explanation:
The question has been answered; however, the program is not dynamic enough because the output will always be 26.
To make it dynamic, replace the following lines of code:
numDrinks = 4;
numTacos = 6;
with:
cout<<"Number of drinks: ";
cin>>numDrinks;
cout<<"Number of Tacos: ";
cin>>numTacos;
The above lines of code will let the user input different values for numDrinks and numTacos each time the program is executed.
Computing the total cost using code can be represented as follows:
def total_cost(no_of_drinks, no_of_talcos):
totalCost = 2*no_of_drinks + 3*no_of_talcos
return totalCost
print(total_cost(4, 6))
Python code explanation:A function named total_cost is declared and it accept the parameters no_of_drinks and no_of_talcos.
The totalCost is used to store the result of the cost of the total drinks and tacos bought in dollars.
Then, we return the totalCost.
Finally, we use the print statement to call the function with its required parameters.
learn more on python code:https://brainly.com/question/14479908?referrer=searchResults
1. If you have the following device like a laptop, PC and mobile phone. Choose one device
and write down the specification according to?
*Operating System
*Storage capacity
*Memory Capacity
*Wi-Fi connectivity
*Installed application
Answer:
For this i will use my own PC.
OS - Windows 10
Storage Capacity - 512 GBs
Memory - 16 GB
Wi-Fi - Ethernet
Installed Application - FireFox
Explanation:
An OS is the interface your computer uses.
Storage capacity is the space of your hard drive.
Memory is how much RAM (Random Access Memory) you have
Wi-Fi connectivity is for how your computer connects the the internet.
An installed application is any installed application on your computer.
A technician who is managing a secure B2B connection noticed the connection broke last night. All networking equipment and media are functioning as expected, which leads the technician to question certain PKI components. Which of the following should the technician use to validate this assumption? (Choose two)
a. PEM
b. CER
c. SCEP
d. CRL
e. OCSP
f. PFX
Answer:
d. CRL
e. OCSP
Explanation:
Note, the term PKI stands for Public Key Infrastructure.
Among all the PKI components, the CRL (CERTIFICATE REVOCATION LISTS), which contains a list of issued certificates that were later revoked by a given Certification Authority, and the PFX format used for storing server certificates should be examined by the technician use to validate his assumption.
What is the next line? >>> tupleB = (5, 7, 5, 10, 2, 7) >>> tupleB.count(7) 1 0 5 2
Answer:
The right answer is option 4: 2
Explanation:
Lists are used in Python to store elements of same or different data types.
Different functions are used in Python on List. One of them is count.
Count is used to count how many times a specific value occurs in a list.
The syntax for count is:
listname.count(value)
In the given code,
The output will be 2
Hence,
The right answer is option 4: 2
Answer:
The answer is 2!!!!
Explanation:
Good luck!