Answer:
series
Explanation:
The Kconfig related tools as well as the source code mainly resides under the scripts or kconfig or in the kernel source. The configuration file is a series of the menu entries, in which every line starts with some keyword.
It is a selection based configuration system that is developed by Linux kernel.
The Kconfic entries should be made in series point after point.
Convert each number into scientific notation.
1. 4,000,000,000
2. 0.000000027
3. 67,760,000
4. 90,500
5. 540,900
6. 0.00904
7. 0.032
8. 512,000,000
Answer:
4 * 10^9
2.7 * 10^-8
6.776 * 10^7
9.05*10^4
5.409*10^5
9.04 * 10^-3
3.2 * 10^-2
5.12 * 10^8
Explanation:
1. 4,000,000,000
4 * 1,000,000,000 = 4 * (10*10*10*10*10*10*10*10*10) = 4 * 10^9
2. 0.000000027
27 * 10^-9 = 2.7 * 10^-8
0.000000027 = 2.7 * 10^-8
3. 67,760,000 = 6776 * 10000
6776 * 10000 = 6776 * 10^4
6776 * 10^4 = 6.776 * 10^3 * 10^4 = 6.776 * 10^7
4. 90,500
905 * 100 = (9.05 * 100) * 100
(9.05*100) * 100 = 9.05 * 10^2 * 10^2 = 9.05*10^4
5. 540,900
5409 * 100 = (5.409 * 1000) * 100
(5.409*1000)*100 = 5.409*10^3 * 10^2
5.409*10^3 * 10^2 = 5.409*10^5
6.) 0.00904
0.00904 = 904 * 10^-5
904 * 10^-5 = 9.04 * 10^-3
7. 0.032
32 * 10^-3 = 3.2 * 10^-2
8. 512,000,000
512 * 1000000
512 * 10^6 = 5.12 * 10^2 * 10^6 = 5.12 * 10^8
Create a method called randomValues that uses a while loop to generate a random number between 1-25 until the value 10 is generated. Therefore, 10 will be the value that stops your loop from generating a random number.
Answer:
The method in Java is as follows:
public static void randomValues(){
Random r = new Random();
int sentinel = 10;
int randNum = r.nextInt(24) + 1;
while(randNum!=sentinel){
System.out.print(randNum+" ");
randNum = r.nextInt(24) + 1;
}
System.out.print(sentinel);
}
Explanation:
This defines the method
public static void randomValues(){
This creates a random object, r
Random r = new Random();
This sets the sentinel value to 0
int sentinel = 10;
This generates a random number
int randNum = r.nextInt(24) + 1;
This loop is repeated until the the random number is 10
while(randNum!=sentinel){
Print the generated number
System.out.print(randNum+" ");
Generated another random number
randNum = r.nextInt(24) + 1; }
Print the sentinel (i.e. 10)
System.out.print(sentinel);
}
a term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
Answer:
Full Record - A screen containing complete or detailed citation information which may include a summary or abstract. Full Text - A term to describe articles that can be displayed in their entirety, as opposed to Abstract and References only.
Explanation:
Explain why Thompson's Construction Algorithm is considered to be a proof by induction. Hint: consider what the inductive steps and base cases are. What does Thompson's Construction Algorithm prove
Answer:
We assume that the NFA for the expression S is theorem by using the expressions given below.
Cases as
NFA for empty-expression is ε NFA for symbol is a NFA for union expression is a|b NFA for concatenation expression is ab NFA for Kleene star expression is a*Thompson's Construction Algorithm proves that any expression can be expressions in the NFA's.
In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.
Answer: Integrity
Explanation:
Refers to the accuracy and completeness of data. Security controls focused on integrity are designed to prevent data from being modified or misused by an unauthorized party.
The device which superimposes information onto a high frequency signal for transmission is called: a modulator a demodulator the carrier the intelligence
Answer:
a modulator
Explanation:
Modulation can be defined as the conversion of digital signals into an analogue signal while transmitting it over a line. Similarly, demodulation is the conversion of analogue signal into a digital signal.
AM is an acronym for Amplitude Modulation and it's refers to a process that is typically used for coding sounds such as voices and music for transmission from one point to another.
On the other hand, FM is an acronym for frequency modulation used for the propagation and transmission of sound waves.
Basically, these two forms of modulation are used for broadcasting in radio transmission.
In Radio transmission, a modulator is an electronic device that is designed to superimpose a low frequency information onto a high frequency signal for transmission. Also, the high frequency is typically the carrier in the radio transmission process.
Insert XXX to output the student's ID. public class Student { private double myGPA; private int myID; public getID) { return myID; public static void main(String [] args) { Student s = new Studento; XXX System.out.println("Student ID: "); System.out.println("Student ID:" + getID()); System.out.println("Student ID:" + s.getId()); System.out.println("Student ID:" + student.getID()); A static main() _ has direct access to class instance members can declare and create objects can call instance methods without an object O can not be included within a programmer-defined class What is stored in score1, score2, and grade? Integer scorel = 72; int score2 = 85; Character grade = 'C'; obj reference, 85, obj reference 72,85, obj reference, obj reference, obj reference obj reference, obj reference, Which is true? Instances of programmer-defined objects are immutable Contents of a Double instance can be modified after initialization An instance of String stores data rather than an object reference Reference variables store memory locations
Answer:
Explanation:
The question above is missing many details and are actually various questions in one. I will answer each one seperately below...
A. The piece of code to get the ID in this code snippet that needs to replace XXX would be the following ... System.out.println("Student ID: " + s.getID());
B. A static main() can declare and create objects. Once these objects are created their instance methods can then be called.
C. Integer score1 = 72;
int score2 = 85;
Character grade = 'C';
In the above code snippet, the information stored in score1, score2, and grade are the following... obj reference, 85, obj reference. This is becasue both Integer and Character are classes and the values being passed to their variables are referencing that object class, while score2 is a primitive type of int and is therefore simply a number.
D. The statement that is true is ... Contents of a Double instance can be modified after initialization. Objects can be modified by calling its setter methods after initializing it.
Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
I am not able to open the pdf kindly send the jpg form.
Which operation would occur in the equation =C3+D5*C6-B2 in excel.
Answer:
The operation that will occur first is D5*C6 (multiplication).
Explanation:
Excel’s default order of operator precedence mandates that Excel perform multiplication before addition and substraction. If you want the addition or substraction to be performed before multiplication or division, they must be in parentheses.
The order of operations in exel is:
1. Evaluate items in parentheses.
2. Evaluate ranges (:).
3. Evaluate intersections (spaces).
4. Evaluate unions (,).
5. Perform negation (-).
6. Convert percentages (%).
7. Perform exponentiation (^).
8. Perform multiplication (*) and division (/), which are of equal precedence.
9. Perform addition (+) and subtraction (-), which are of equal precedence.
10. Evaluate text operators (&).
11. Perform comparisons (=, <>, <=, >=).
Which company was the first to develop personal computers?
Answer:
A small firm named MITS made the first personal computer, the Altair. This computer, which used Intel Corporation's 8080 microprocessor, was developed in 1974. Though the Altair was popular among computer hobbyists, its commercial appeal was limited.
Explanation:
Which effect is used in this image?
A.
sepia effect
B.
selective focus
C.
zoom effect
D.
soft focus
Answer:
Please show me the image, it is not there
Explanation:
I will wait, don't worry I will help you whenever you want! :)
The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method does not work correctly.public void removeValue(ArrayList a, int val) {int i;for (i = 0; i < a.size(); i++) {if (a.get(i) == val) {a.remove(i);}}}If the a contains 2 3 4 3 3 4 4 5 4 3 2 1 and val is equal to 4, then a should contain 2 3 3 3 5 3 2 1 after removeValue is invoked. What does a actually contain after removeValue is invoked? (2 points)1) 2 3 3 4 4 5 4 3 2 12) 2 3 3 3 4 5 3 2 13) 2 4 3 4 5 4 2 14) 2 3 3 3 5 3 2 15) 2 4 3 4 4 5 3 2 1
Answer:
ArrayList a contains [2, 3, 3, 3, 4, 5, 3, 2, 1]
Explanation:
Given
The removeValue method
Required
The content of ArrayList a, after the method is called
From the question, we understand that arraylist a is:
[tex]a= [2, 3, 4, 3, 3, 4, 4, 5, 4, 3, 2, 1][/tex]
[tex]val =4[/tex]
The function fails when the value to be removed appear consecutively in the list.
4 appears in index 5 and 6 of the list. Only one of the 4's will be removed
So, the updated list will be: [2, 3, 3, 3, 4, 5, 3, 2, 1]
Suppose your training examples are sentences (sequences of words). Which of the following refers to the j^th word in the i^th training example?
We index into the ith row first to get ith the training example (represented by parentheses), then the column to get jth the word (represented by the brackets).
a. x^(j)
b. x^(j)
c. x^(i)
Answer:
a. x^<i>(j)
Explanation:
The solution has been explained in the question; however, I will provide further explanation.
The sequence to access a word is:
Training example --> Word
In other words, you first access the training example, before you gain access to the word being searched for.
Rewrite the following:
Training example --> Word
as:
ith training example --> jth word
Hence, the representation is:
[tex]x^{(i)<j>[/tex]
You are working on a graphical app, which includes multiple different shapes. The given code declares a base Shape class with an abstract area() method and a width attribute. You need to create two Shape subclasses, Square and Circle, which initialize the width attribute using their constructor, and define their area() methods. The area() for the Square class should output the area of the square (the square of the width), while for the Circle, it should output the area of the given circle (PI*width*width). The code in main creates two objects with the given user input and calls the area() methods.
Sample Input:
5
2
Sample Output:
25
12.566370614359172
The area of the square is 5*5=25, while the area of the circle is PI*2*2=12.566370614359172
A class can have multiple subclasses, where each of the subclasses function independently. The extend keyword will be used to pass attributes from the Shape class to the Square and Circle subclasses
To answer this question, I will make the following assumptions
The Shape class is already definedThe area() method of the Shape class is also definedLines that begin with // are comments, and these lines will be used to explain the code segment
//This creates the Square class
class Square extends Shape {
//The creates a constructor for width variable
Square(int length) { this.width = length; }
//This defines the area() method from the Square class
void area() {
//This calculates and prints the area of the square
System.out.print(Math.pow(width,2)); } }
//This creates the Circle class
class Circle extends Shape {
//The creates a constructor for width variable
Circle(int radius){ this.width = radius; }
//This defines the area() method from the Square class
void area(){
//This calculates and prints the area of the circle
System.out.println(Math.PI*Math.pow(width,2));
} }
Read more about abstract class at:
https://brainly.com/question/20261938
PYTHON PROGRAMMING
The manager of the Super Supermarket would like to be able to compare the unit price for products sold there. To do this, the program should input the name and price of an item per pound and its weights in pounds and ounces. Then it should determine and display the unit price (the price per ounce) of that item and the total cost of the amount purchased. You will need the following variables:
ItemName PoundPrice Pounds
TotalPrice Ounces UnitPrice
You will need the following formulas:
UnitPrice = PoundPrice/16
TotalPrice = PoundPrice * (Pounds + Ounces/16)
Answer:
ItemName=input("Enter the name of the item purchased: ")
PoundPrice=input("Enter the price of an item per pound: ")
Pound=input("Enter the weight in pound: ")
Ounce=input("Enter the weight in ounce: ")
UnitPrice=int(PoundPrice)/16
TotalPrice=int(PoundPrice)*(int(Pound)+int(Ounce)/16)
print("The unit price is: "+UnitPrice)
print("The total price is: "+TotalPrice)
If this is what you needed:/
Question 1 (10 points)
Saved
A variable's
indicates the type of data that the variable will hold.
a) name
b) data type
c) scope
d) value
The 8086 to enable the most significant data bus bits (D15-D8) during a read or a write operation using -------- A- RD, WR pin
B- BHE pin
C- S3 / S6 status bus pin. D - 10 / M
Answer:
The correct option for the given question is an option (B) BHE pin.
Explanation:
BHE stands for Bus High Enable. It is available at pin 34 and used to indicate the transfer of data using data bus D8-D15. This signal is low during the first clock cycle, thereafter it is active. It is available at pin 32 and is used to read signals for Read operation.
This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by user specified arrow base height, arrow base width, and arrow head width.
(1) Modify the given program to use a loop to output an arrow base of height arrowBaseHeight. (1 pt)
(2) Modify the given program to use a loop to output an arrow base of width arrowBaseWidth. Use a nested loop in which the inner loop draws the *’s, and the outer loop iterates a number of times equal to the height of the arrow base. (1 pt)
(3) Modify the given program to use a loop to output an arrow head of width arrowHeadWidth. Use a nested loop in which the inner loop draws the *’s, and the outer loop iterates a number of times equal to the height of the arrow head. (2 pts)
(4) Modify the given program to only accept an arrow head width that is larger than the arrow base width. Use a loop to continue prompting the user for an arrow head width until the value is larger than the arrow base width. (1 pt)
while (arrowHeadWidth <= arrowBaseWidth) {
// Prompt user for a valid arrow head value
}
Example output for arrowBaseHeight = 5, arrowBaseWidth = 2, and arrowHeadWidth = 4:
Enter arrow base height:
5
Enter arrow base width:
2
Enter arrow head width:
4
**
**
**
**
**
****
***
**
*
This is what I have:
import java.util.Scanner;
public class DrawHalfArrow
{
public static void main(String[] args)
{
Scanner scnr = new Scanner(System.in);
int arrowBaseHeight = 0;
int arrowBaseWidth = 0;
int arrowHeadWidth = 0;
System.out.println("Enter arrow base height:");
arrowBaseHeight = scnr.nextInt();
System.out.println("Enter arrow base width:");
arrowBaseWidth = scnr.nextInt();
while (arrowHeadWidth >= arrowBaseWidth)
{
System.out.println("Enter arrow head width:");
arrowHeadWidth = scnr.nextInt();
}
// Draw arrow base (height = 3, width = 2)
for(int i=0; i < arrowBaseHeight; ++i)
{
for(int j=0; j < arrowBaseWidth; ++j)
{
System.out.print("*");
}
System.out.println();
}
// Draw arrow head (width = 4)
for(int i=0; i < arrowHeadWidth; ++i)
{
for(int j=0; j < arrowHeadWidth-i; ++j)
{
System.out.print("*");
}
System.out.println();
}
return;
}
}
Answer:
The modified program in Java is as follows:
import java.util.*;
public class Main{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int arrowHeadWidth, arrowBaseWidth, arrowBaseHeight;
System.out.print("Head Width: "); arrowHeadWidth = input.nextInt();
System.out.print("Base Width: "); arrowBaseWidth = input.nextInt();
System.out.print("Base Height: "); arrowBaseHeight = input.nextInt();
while (arrowHeadWidth <= arrowBaseWidth) {
System.out.print("Head Width: "); arrowHeadWidth = input.nextInt();
System.out.print("Base Width: "); arrowBaseWidth = input.nextInt(); }
for(int i = 0; i<arrowBaseHeight; i++){
for(int j = 0; j<arrowBaseWidth;j++){
System.out.print("*"); }
System.out.println(); }
for(int i = arrowHeadWidth; i>0;i--){
for(int j = 0; j<i;j++){
System.out.print("*"); }
System.out.println(); }
}
}
Explanation:
This declares the arrow dimensions
int arrowHeadWidth, arrowBaseWidth, arrowBaseHeight;
This get input for the head width
System.out.print("Head Width: "); arrowHeadWidth = input.nextInt();
This get input for the base width
System.out.print("Base Width: "); arrowBaseWidth = input.nextInt();
This get input for the base height
System.out.print("Base Height: "); arrowBaseHeight = input.nextInt();
This loop is repeated until the head width is greater than the base width
while (arrowHeadWidth <= arrowBaseWidth) {
System.out.print("Head Width: "); arrowHeadWidth = input.nextInt();
System.out.print("Base Width: "); arrowBaseWidth = input.nextInt(); }
This iterates through the base height
for(int i = 0; i<arrowBaseHeight; i++){
This iterates through the base width
for(int j = 0; j<arrowBaseWidth;j++){
This fills the base
System.out.print("*"); }
This prints a new line
System.out.println(); }
These iterate through the arrow head
for(int i = arrowHeadWidth; i>0;i--){
for(int j = 0; j<i;j++){
This fills the arrow head
System.out.print("*"); }
This prints a new line
System.out.println(); }
Another name for computer
programs
Answer:
popo gggggggghhhhhhhghghgggggggggggghhhhhhhhhhhhhh
1. Briefly explain some examples of convergence in the wireless market.
Answer:
Some examples of convergence in the wireless market include mobile phones, data communication, radio device etc.
Explanation:
Some examples of convergence in the wireless market are as follows –
a) Using feature of radio device on phone which is nothing but a default application on the mobile device in the wireless market
b) Data communication is a mode to share data in wireless mode through the internet
c) Mobile phones – Mobile phones are best example of devices operating in the wireless market. It is basically used to call to one or many at a time through network service provider without using an internet
Explain why the network administrator uses the hexadecimal
Answer:
The main reason why we use hexadecimal numbers is because it provides a more human-friendly representation and is much easier to express binary number representations in hex than it is in any other base number system. Computers do not actually work in hex. Lets take an example, using a byte.
Hope this answer is right!!
the nth term of the given sequence is n(n+1)÷2.calculate the number of dots in the 8th term
Answer:
the 8th term of the given series =n( n+1)÷2= 8(8+1)÷2 = (8×9)/2 = 72÷2 = 36
Write a program that does the following: - Ask user to input lengths of three sides. - Classify it into one of the following: o Equilateral triangle o Isosceles right triangle o Isosceles triangle that is not a right triangle o A triangle that is not an isosceles and not an equilateral For example, an execution could look like
Answer:
You did not specify which programming language you use, but you can use if statements to check each using the sides.
- A triangle is equilateral when all the 3 sides are equal. (a = b = c)
- A triangle is isoscles when two of the sides are equal (a = b or b = c or c = a)
- A triangle is right when square of side C is equal to the sum of the squares of the other two sides. (c^2 = a^2 + b^2)
- For the last classification you can use "else"
If you noticed, the condition to have an isosceles triangle is repeated for two of the tasks so we can use the same if statement to check if the triangle is isosceles right or just isoscles with two built-in if statements (if and else)- if it's right then it's isosceles right else it's just isosceles.
And else statement for the last task.
Example code structure:
If triangle is Equilateral then
- Equilateral Triangle
end
If triangle is Isoscles then
if triangle is right then
- Isoscles Right Triangle
end
else (the triangle is not right)
- Isoscles Triangle
end
end
else (the triangle is not Equilateral nor Isoscles)
- Triangle that is not isoscles nor equilateral.
end
Explanation:
Here is a code example with java, I hope it helps, although it might not be the programming language you use:
import java.util.Scanner;
public class Triangle {
public static void main(String[] args) {
Scanner input = new
Scanner(System.in);
System.out.print("side a = ");
int a = input.nextInt();
System.out.print("side b = ");
int b = input.nextInt();
System.out.print("side c = ");
int c = input.nextInt();
if (a == b && b == c)
{
System.out.println("Equilateral Triangle);
}
else if (a == b || b == c || a == c) {
if ( (int) math.pow(c, 2) == (int) (math.pow(a, 2) + math.pow(b, 2)))
{
System.out.println("Isoscles Right Triangle");
}
else {
System.out.println("Isoscles triangle that is not a right triangle");
}
}
else {
System.out.println("Triangle that is not Isoscles nor Equilateral");
}
}
}
Let me know if you have any questions.
Assume that x is a char variable that has been declared and already given a value. Write an expression whose value is true if and only if x is a decimal digit (0-9).
Answer:
The expression in python is: x.isdigit()
Explanation:
Given
Character variable x
Required
Expression that evaluates if x is decimal or not
The expression in python is: x.isdigit()
If x is digit 0 - 9, x.isdigit() will equal True
Otherwise, it will equal False
Computer applications
Answer:
please tell the question clearly
g Which of the following factors primarily determines how the Internet is used in different countries? A. local attitude to information privacy B. local connection speeds C. extent of intercultural communication systems D. availability of personal computer parlors
Answer: A. local attitude to information privacy.
Explanation:
The factor that primarily determines how the Internet is used in different countries is the local attitude to information privacy.
Information privacy simply means the relationship which exist between his data is collected and shared as week as the legal and political issues surrounding them.
It is used in different countries through a sim card in the trip, a mobile hotspot, or Wi-Fi for internet access.
define computer system and four basic operation
Answer:
A computer along with additional hardware and software together is called a computer system.There are four main basic operations or functions of a computer system:
□Input,
□ Processing,
□ Storage,
□ Output,etc
13./ Write a java program to input an integer N and compute its factorial. Print the number and the factorial.
The factorial is calculated by multiplying all the integers from the number upto 1. For example: factorial of
4 (4!) is : 4 x 3 x 2 x 1 = 24 or 4! = 1 x 2 x 3 x 4 =24.
[tex]write \: a \: java \: program[/tex]
Answer:
Código Java de forma recursiva que nos ayuda a calcular el factorial de ... El factorial de un número es la multiplicación de los número que van del ... Para expresar el factorial se suele utilizar la notación n! ... mayo 5, 2010 - 4:13 am ... un programa q de un numero dado en arabigo o romano lo imprima ya
Explanation:
Espero te sirva!!
Write a program that will: 1. Call a function to input temperatures for consecutive days in an array. The temperatures are to be integer numbers. 2. The user will input the number of temperatures. There will be no more than 10 temperatures. 3. Call a function to sort the array by ascending order. You can use any sorting algorithm you wish as long as you can explain it. 4. Call a function that will return the average of the temperatures. The average should be displayed to two decimal places.
Answer:
Following are the program to the given question:
#include<iostream>//defining header file
using namespace std;
float temperatures()//defining a method temperatures
{
int a[10],i,j,n,min,max,sum=0,temp;//defining integer variable
float avg;//defining floating point variable
cout<<"Please input the number of temperatures to be read: ";//print message
cin>>n;//input integer value
if(i>10)//use if to check array length greater than 10
return -1;//return integer value -1
for(j=0;j<n;j++)//defining loop to input value
{
cout<<"Input temperature: "<<endl;//print message
cin>>a[j];//holding value in loop
}
for(i=0;i<n-1;i++)//defining loop to compare array value
{
for(j=i+1;j<n-1;j++)//defining loop to compare array value
{
if(a[i]>a[j])//use if to compare array values
{
//swapping
temp=a[j];//holding array value in temp
a[j]=a[i];//holding value in first index of array
a[i]=temp;//holding temp value
}
}
}
max=min=a[0];//holding max value
for (i = 0; i < n; i++)//defining loop to compare array value
{
if (a[i] > max)//use if to compare max array value
{
max = a[i];//holding max array value
}
else if (a[i] < min)//use else if to compare min array value
{
min = a[i];//holding min array value
}
}
for(i=0;i<n;i++)//use loop to add array value
sum=sum+a[i];//adding array value
avg=(float) sum/n;//calculating avg of the array
std::cout.setf(std::ios::fixed);//using namespace
std::cout.precision(2);//using precision method
cout<<"The average temperature is: "<<avg<<endl;//print avg value with message
cout<<"The highest temperature is: "<<max<<endl;//print max value with message
cout<<"The lowest temperature is: "<<min<<endl;//print min value with message
return avg;//return avg value
}
int main()//defining main method
{
float k;//defining float variable
k=temperatures();//calling method
}
Output:
Please find the attached file.
Explanation:
In this code, a method "temperatures" is declared that defines the integer and float variable in which "n, array" is used to store the array value and inside the method min and max variable is declared that use the conditional statement to store its value.
Outside the main method, a floating-point variable "k" is declared that calls the method and stores its value.
Martha works as a systems administrator in a multinational corporation. One of her colleagues is going on a sabbatical for six months. Martha must ensure that no one uses the colleague's user account until he returns. Which of the following actions can she take to ensure this?
a. Lock out the account
b. Disable the account
c. Change the account's password
d. Delete the account
Answer: Change the account's password
Explanation:
Since Martha wants to ensure that no one uses the colleague's user account until he returns, the best thing for her to do is to change the account's password.
If she changes the accounts password, then she can be the one that will have access to the account and then ensure its safety. It should be noted that the colleague's account can contain vital data and information, therefore it's vital to keep it safe.