Answer:
11001100 = 204
11111111 = 255
Explanation:
For 11001100:
1*2⁷ + 1*2⁶ + 0*2⁵ + 0*2⁴ + 1*2³ + 1*2² + 0*2¹ + 0*2⁰ = 204
Just replace 1's by 0's in the following calculation to do it for every 8 bit number:
1*2⁷ + 1*2⁶ + 1*2⁵ + 1*2⁴ + 1*2³ + 1*2² + 1*2¹ + 1*2⁰ = 255
If you don't want to do the calculation yourself, you can set the windows calculator in programmer mode, then select binary and key in the number.
The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads may be in the critical section at the same time, and fewer than L threads might fail (by halting) in the critical section. An implementation must satisfy the following conditions:_____.
L-Exclusion: At any time, at most L threads are in the critical section.
L-Starvation-Freedom: As long as fewer than L threads are in the critical section, then some thread that wants to enter the critical section will eventually succeed (even if some threads in the critical section have halted).
Modify the n-process Bakery mutual exclusion algorithm to turn it into an L-exclusion algorithm. Do not consider atomic operations in your answer. You can provide a pseudo-code solution or written solution.
Answer:
The solution is as follows.
class LFilters implements Lock {
int[] lvl;
int[] vic;
public LFilters(int n, int l) {
lvl = new int[max(n-l+1,0)];
vic = new int[max(n-l+1,0)];
for (int i = 0; i < n-l+1; i++) {
lvl[i] = 0;
}
}
public void lock() {
int me = ThreadID.get();
for (int i = 1; i < n-l+1; i++) { // attempt level i
lvl[me] = i;
vic[i] = me;
// rotate while conflicts exist
int above = l+1;
while (above > l && vic[i] == me) {
above = 0;
for (int k = 0; k < n; k++) {
if (lvl[k] >= i) above++;
}
}
}
}
public void unlock() {
int me = ThreadID.get();
lvl[me] = 0;
}
}
Explanation:
The code is presented above in which the a class is formed which has two variables, lvl and vic. It performs the operation of lock as indicated above.
17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?
Answer:
There are two basic operational modes of 8255:
Bit Set/Reset mode (BSR mode).
Input/Output mode (I/O mode).
Features of 8255 Microprocessor:
Mode 0 : Simple Input/Output.
Mode 1 : Input/Output with handshake.
Mode 2 : Bi-directional I/O data transfer.
It has three 8-bit ports : Port A, Port B, and Port C, which are arranged in two groups of 12 pins.
The 8255 can operate in 3 I/O modes : (i) Mode 0, (ii) Mode 1, & (iii) Mode 2.
Write a MIPS assembly language program that prompts for a user to enter a series of floating point numbers and calls read_float to read in numbers and store them in an array only if the same number is not stored in the array yet. Then the program should display the array content on the console window.
Consult the green sheet and the chapter 3 for assembly instructions for floating point numbers. Here is one instruction that you might use:
c.eq.s $f2, $f4
bc1t Label1
Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be:
c.eq.s $f2, $f4
bc1f Label1
To load a single precision floating point number (instead of lw for an integer), you might use:
l.s $f12, 0($t0)
To store a single precision floating point number (instead of sw for an integer), you might use:
s.s $f12, 0($t0)
To assign a constant floating point number (instead of li for an integer), you might use:
li.s $f12, 123.45
To copy a floating point number from one register to another (instead of move for an integer), you might use:
mov.s $f10, $f12
The following shows the syscall numbers needed for this assignment.
System Call System Call System Call
Number Operation Description
2 print_float $v0 = 2, $f12 = float number to be printed
4 print_string $v0 = 4, $a0 = address of beginning of ASCIIZ string
6 read_float $v0 = 6; user types a float number at keyboard; value is store in $f0
8 read_string $v0 = 8; user types string at keybd; addr of beginning of string is store in $a0; len in $a1
------------------------------------------
C program will ask a user to enter numbers and store them in an array
only if the same number is not in the array yet.
Then it prints out the result array content.
You need to write MIPS assembly code based on the following C code.
-------------------------------------------
void main( )
{
int arraysize = 10;
float array[arraysize];
int i, j, alreadyStored;
float num;
i = 0;
while (i < arraysize)
{
printf("Enter a number:\n");
//read an integer from a user input and store it in num1
scanf("%f", &num);
//check if the number is already stored in the array
alreadyStored = 0;
for (j = 0; j < i; j++)
{
if (array[j] == num)
{
alreadyStored = 1;
}
}
//Only if the same number is not in the array yet
if (alreadyStored == 0)
{
array[i] = num;
i++;
}
}
printf("The array contains the following:\n");
i = 0;
while (i < arraysize)
{
printf("%f\n", array[i]);
i++;
}
return;
}
Here are sample outputs (user input is in bold): -- note that you might get some rounding errors
Enter a number:
3
Enter a number:
54.4
Enter a number:
2
Enter a number:
5
Enter a number:
2
Enter a number:
-4
Enter a number:
5
Enter a number:
76
Enter a number:
-23
Enter a number:
43.53
Enter a number:
-43.53
Enter a number:
43.53
Enter a number:
65.43
The array contains the following:
3.00000000
54.40000153
2.00000000
5.00000000
-4.00000000
76.00000000
-23.00000000
43.52999878
-43.52999878
65.43000031
Explanation:
Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be
Sorting Records in a Form
Use the drop-down menus to complete the steps for sorting records in a form.
1. Open the form in the standard form view.
2. Put the cursor in the
to use for sorting.
3. Open the
4. In the Sort & Filter group, click
v tab.
Answer:
1. Open the form in the standard form view.
2. Put the cursor in the field to use for sorting.
3. Open the Home tab
4. In the Sort & Filter group, click ascending or descending
Explanation:
Took the test :)
The complete forum to complete the steps for sorting records in a form is discussed below:
What do you mean by speed records?You can specify the order of the records that are returned for each navigation query by sorting. It can be adjusted either globally or for each query. You can specify the number of characteristics and the ascending or descending order of pairs of values when submitting a simple navigation request.
Launch the default form view by opening the form.
2. Position the cursor within the field you want to sort.
3. Click on the Home tab.
4. Select either ascending or descending in the Sort & Filter group.
Learn more about sorting records here:
https://brainly.com/question/13130958
#SPJ1
what is the best plugin for subscription sites?
Answer:
Explanation:
MemberPress. MemberPress is a popular & well-supported membership plugin. ...
Restrict Content Pro. ...
Paid Memberships Pro. ...
Paid Member Subscriptions. ...
MemberMouse. ...
iThemes Exchange Membership Add-on. ...
Magic Members. ...
s2Member.
Write a C program that right shifts an integer variable 4 bits. The program should print the integer in bits before and after the shift operation. Does your system place 0s or 1s in the vacated bits?
Solution :
#include<[tex]$\text{stdio.h}$[/tex]>
#include<conio.h>
void dec_bin(int number) {
[tex]$\text{int x, y}$[/tex];
x = y = 0;
for(y = 15; y >= 0; y--) {
x = number / (1 << y);
number = number - x * (1 << y);
printf("%d", x);
}
printf("\n");
}
int main()
{
int k;
printf("Enter No u wanted to right shift by 4 : ");
scanf("%d",&k);
dec_bin(k);
k = k>>4; // right shift here.
dec_bin(k);
getch();
return 0;
}
Factory Design Pattern Assignment This assignment will give you practice in using the Factory/Abstract Factory Design Pattern. You are going to create a Terraforming program. What does terraform mean
Answer:
Terraform is an open-source infrastructure as code software tool that enables you to safely and predictably create, change, and improve infrastructure.
calculate the total and average number from 1 to 100
Answer:
Thus, 50.5 is an average of numbers from 1 to 100.
Explanation:
getcalc.com's average calculator to find what is the mean or average of natural numbers upto 100.
50.5 is an average of numbers from 1 to 100 mentioned in the below table, by substituting the total sum and count of numbers in the below formula. The corresponding formulas, chart, examples & workout may help students, teachers or professionals to learn, teach or practice the average of natural numbers upto 100.
Address the formula, input parameters & values.
Formula: Average = Total Sum of Numbers / Total Count of Numbers
Input parameters & values:
The numbers from 1 to 100 are
1, 2, 3, 4, . . . . , 98, 99, 100
Total Count of Numbers = 100
step 2 Find the sum of numbers from 1 to 100.
sum = 1 + 2 + 3 + . . . . + 99 + 100
= 5050
step 3 Divide the sum by 100 Average = 5050/100 = 50.5
Thus, 50.5 is an average of numbers from 1 to 100.
-1
Draw a flowchart to input two
numbers in variables M and N and
print the multiplication table from 1*1
to M*N
Answer:A flowchart is a diagram that depicts the steps involved in solving a problem. The following flowchart shows how to output the multiplication table ( n * 1 to m * 1) of a number, n and m:
What’s unique about windows 8 compared to earlier windows
answer any one: write a computer program:
Answer:
hope this helps you look it once
What is the hamming distance between the following bits? Sent
bits: 101100111, Received bits: 100111001
Select one: 5. Or 3 or 6 or4
I think
the hamming distance between the following bits its 5
A line beginning with a # will be transmitted to the programmer’s social media feed.
A.
True
B.
False
Answer:
True?
Explanation:
Answer:
The answer is false.
Explanation:
A “#” doesn’t do that in Python.
How many types of video
compressions__
a. 4
b. 2.
• c. 3
d. 6
Which of the following is not the disadvantage of closed
network model?
Select one:
O Flexibility
O Public network connection
O Support
O External access
Answer:
public network connection
Answer:
public network connection
Page Setup options are important for printing a PowerPoint presentation a certain way. The button for the Page Setup dialog box is found in the
File tab.
Home tab.
Design tab.
Slide Show tab.
Answer: Design tab
Explanation:
The page setup simply refers to the parameters which are defined by a particular user which is vital in knowing how a printed page will appear. It allows user to customize the page layout. The parameters include size, page orientation, quality of print,margin etc.
It should be noted that page setup options are vital for printing a PowerPoint presentation in a certain way and the button for the Page Setup dialog box can be found in the design tab.
what connect webpages?
Answer:
"Hypertext links are those words that take you from one web page to another when you click them with your mouse. Although the same HTML tag you study in this hour is also used to make graphical images into clickable links, graphical links aren't explicitly discussed here" I got this from https://www.informit.com/articles/article.aspx?p=440289 sorry I couldnt take the time myself here to help :(
Explanation:
a) Why is eavesdropping done in a network?
b) Solve the following using checksum and check the data at the
receiver:
01001101
00101000
Answer:
An eavesdropping attack is the theft of information from a smartphone or other device while the user is sending or receiving data over a network.
Missing: checksum 01001101 00101000
the first page of a website is what?
Answer:
index.html
Explanation:
The name of the html file for the homepage of a website is usually "index.html"
A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well as to communicate electronically with one another? Explain.
Which line of code will use the overloaded multiplication operation?
class num:
def __init__(self,a):
self.number = a
def __add__(self,b):
return self.number + 2 * b.number
def __mul__(self, b):
return self.number + b.number
def __pow__(self, b):
return self.number + b.number
# main program
numA = num(5)
numB = num(10)
Which line of code will use the overloaded multiplication operation?
class num:
def __init__(self,a):
self.number = a
def __add__(self,b):
return self.number + 2 * b.number
def __mul__(self, b):
return self.number + b.number
def __pow__(self, b):
return self.number + b.number
# main program
numA = num(5)
numB = num(10)
a) product = numA * numB
b) product = numA.multiply(numB)
c) product = numA.mul(numB
For multiplication one: product = numA * numB
For the addition: result = numA + numB
got 100 on this ez
(searched all over internet and no one had the answer lul hope this helps!)
Answer: First option: product = numA * numB
second option-numA + numB
Explanation:
LAB: Contact list A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Assume that the list will always contain less than 20 word pairs. Ex: If the input is: 3 Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309
Answer:
The program in Python is as follows:
n = int(input(""))
numList = []
for i in range(n):
word_pair = input("")
numList.append(word_pair)
name = input("")
for i in range(n):
if name.lower() in numList[i].lower():
phone = numList[i].split(" ")
print(phone[1])
Explanation:
This gets the number of the list, n
n = int(input(""))
This initializes list
numList = []
This iterates through n
for i in range(n):
This gets each word pair
word_pair = input("")
This appends each word pair to the list
numList.append(word_pair)
This gets a name to search from the user
name = input("")
This iterates through n
for i in range(n):
If the name exists in the list
if name.lower() in numList[i].lower():
This gets the phone number associated to that name
phone = numList[i].split(" ")
This prints the phone number
print(phone[1])
is used for finding out about objects, properties and methods
Answer:
science
Explanation:
This program exercise #4 wants the user to write a program in python that contains a list of movies titles, years and movie rating. You will need to display a menu option that allows the user to list all of the movies, add a movie, delete a movie and exit out of the program. This will be done using lists and the functions to add an element to a list and how to delete an element to a list. The program should be written utilizing functions in python for the main function, the display_menu function, the delete function, the add function and the list movie function. You can place this all in one python file or include them in various python files that include them into the main program. Let me know if you have any questions with this exercise. Output Screen: COMMAND MENU list - List all movies add - Add a movie del - Delete a movie exit - Exit program Command List: list 1. Monty Python and the Holy Grail, 1979, R 2. On the Waterfront, 1954, PG 3. Cat on a Hot Tim Roof, 1958, R Command: add Name: Gone with the Wind Year: 1939 Rating: PG Gone with the Wind was added.
Answer:
The program in Python is as follows:
def display_menu(titles,years,ratings):
for i in range(len(titles)):
print(str(i+1)+". "+titles[i]+", "+str(years[i])+", "+str(ratings[i]))
def delete(titles,years,ratings):
del_item = input("Movie: ")
if del_item in titles:
print(del_item,"was deleted")
index = titles.index(del_item)
titles.pop(index)
years.pop(index)
ratings.pop(index)
return(titles,years,ratings)
def add(titles,years,ratings):
title = input("Title: ")
year = int(input("Year: "))
rating = int(input("Ratings: "))
print(title,"was added")
titles.append(title)
years.append(year)
ratings.append(rating)
return(titles,years,ratings)
titles = []
years = []
ratings = []
print("COMMAND MENU list\nlist - List movies\nadd - Add movie del\ndel - Delete movie exit\nexit - Exit program")
menu = (input("Command List: "))
while(menu.lower() == "list" or menu.lower() == "add" or menu.lower() == "del"):
if menu.lower() == "list":
display_menu(titles,years,ratings)
elif menu.lower() == "add":
titles, years, ratings = add(titles,years,ratings)
elif menu.lower() == "del":
titles, years, ratings = delete(titles,years,ratings)
menu = (input("Command List: "))
elif menu.lower() == "exit":
break
print("Exited!!!")
Explanation:
See attachment for complete program where comments are used to explain some lines of the program
write the C program
The function turn_to_letter decides on the letter grade of the student according to the table below from the visa and final grades sent into it and returns it, write it together with a main function which the turn_to_letter function is called and prints the letter equivalent on the screen. -Success score = 40% of midterm + 60% of final,
-F for the success score below 50, D for between 50 and 59, C for between 60 and 69, B for between 70 and 79, A for 80 and above.
Answer:
The program in C is as follows:
#include <stdio.h>
char turn_to_letter(double score){
char lettergrade = 'A';
if(score>=80){ lettergrade = 'A'; }
else if(score>=70){ lettergrade = 'B'; }
else if(score>=60){ lettergrade = 'C'; }
else if(score>=50){ lettergrade = 'D'; }
else{lettergrade = 'F';}
return lettergrade;
}
int main(){
int midterm, final;
double score;
printf("Midterm: "); scanf("%d", &midterm);
printf("Final: "); scanf("%d", &final);
score = 0.4 * midterm + 0.6 * final;
printf("Score: %lf\n", score);
printf("Letter Grade: %c",turn_to_letter(score));
return 0;
}
Explanation:
The function begins here
char turn_to_letter(double score){
This initializes lettergrade to A
char lettergrade = 'A';
For scores above or equal to 80, grade is A
if(score>=80){ lettergrade = 'A'; }
For scores above or equal to 70, grade is B
else if(score>=70){ lettergrade = 'B'; }
For scores above or equal to 60, grade is C
else if(score>=60){ lettergrade = 'C'; }
For scores above or equal to 50, grade is D
else if(score>=50){ lettergrade = 'D'; }
Grade is F for other scores
else{lettergrade = 'F';}
This returns the letter grade
return lettergrade;
}
The main begins here
int main(){
This declares the midterm and final scores as integer
int midterm, final;
This declares the total score as double
double score;
These get input for midterm score
printf("Midterm: "); scanf("%d", &midterm);
These get input for final score
printf("Final: "); scanf("%d", &final);
This calculates the total score
score = 0.4 * midterm + 0.6 * final;
This prints the calculated total score
printf("Score: %lf\n", score);
This calls the turn_to_letter function and prints the returned letter grade
printf("Letter Grade: %c",turn_to_letter(score));
return 0;
}
You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100 devices. Which cable should you use?
A.
RG-6
B.
RG-8
C.
RG-58U
D.
RG-59
Answer: C
Explanation:
You have been given an encrypted copy of the Final exam study guide here, but how do you decrypt and read it???
Along with the encrypted copy, some mysterious person has also given you the following documents:
helloworld.txt -- Maybe this file decrypts to say "Hello world!". Hmmm.
hints.txt -- Seems important.
In a file called pa11.py write a method called decode(inputfile,outputfile). Decode should take two parameters - both of which are strings. The first should be the name of an encoded file (either helloworld.txt or superdupertopsecretstudyguide.txt or yet another file that I might use to test your code). The second should be the name of a file that you will use as an output file. For example:
decode("superDuperTopSecretStudyGuide.txt" , "translatedguide.txt")
Your method should read in the contents of the inputfile and, using the scheme described in the hints.txt file above, decode the hidden message, writing to the outputfile as it goes (or all at once when it is done depending on what you decide to use).
Hint: The penny math lecture is here.
Another hint: Don't forget about while loops...
Answer:
Explanation:
Which of the following best explains how an analog audio signal is typically represented by a computer?
a. An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.
b. An analog audio signal is measured as a sequence of operations that describe how the sound can be reproduced. The operations are represented at the lowest level as programming instructions.
c. An analog audio signal is measured as input parameters to a program or procedure. The inputs are represented at the lowest level as a collection of variables.
d. An analog audio signal is measured as text that describes the attributes of the sound. The text is represented at the lowest level as a string.
Answer:
A. An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.
Explanation:
I took the test
A new school is being built in the local school district.It will have three computer labs with 28 computers each. There will be 58 classrooms with 2 computers each that need to be on one sub-subnet.The office staff and administrators will need 7 computers. The guidance and attendance office will have 5 computers. The school has been given the address 223.145.75.0/24. Subnets are assigned from largest to smallest. Everything is based on the number of usable hosts.
Complete the information required below.
Subnet Subnet Mask (/X) Subnet First Usable Last Usable Broadcast
Address Host Host Address
1
2
3
4
5
6
7
Answer:
Following are the responses to the given question:
Explanation:
The subnet mask /25 could be the host 128 hosts.
The subnet mask /26 could be the host 64 hosts.
The subnet mask /27 could be the host 32hosts.
The subnet mask /28 could be the host 16 hosts.
The subnet mask /29 could be the host 8 hosts.
The subnet mask /30 could be the host 4 hosts.
It is based on the requirement in which I have been using /25,/27,/28,/29 subnet masks on the basis of the usable slots.
3.4 code practice question 2 edhesive