Answer:
The answer is below
Explanation:
Elements of Server software that is built-in, in Windows workstations are:
1. Hard drives,
2. RAM (Random Access Memory)
3. Processors
4. Network adapters.
Windows Professional OS is not considered a server due to the following:
1. Windows Professional OS has a limit on the number of client connections it allowed.
2. Unlike Server, Professional OS uses less memory
2. In comparison to Server, Professional OS uses the CPU less efficiently
4. Professional OS is not built to process background tasks, unlike Server that is configured to perform background tasks.
If you implement too many security controls, what portion of the CIA triad (Information Assurance Pyramid) may suffer?
a. Availability
b. Confidentiality
c. Integrity
d. All of the above
Answer:
Option A
Availability
Explanation:
The implementation of too many security protocols will lead to a reduction of the ease at which a piece of information is accessible. Accessing the piece of information will become hard even for legitimate users.
The security protocols used should not be few, however, they should be just adequate to maintain the necessary level of confidentiality and integrity that the piece of information should have, While ensuring that the legitimate users can still access it without much difficulty.
If the data rate is 10 Mbps and the token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle network with 40 stations? (The average number of stations the token must pass through is 40/2 = 20.) Ignore the propagation delay and the gap Ethernet requires between packets.
Answer:
1.024x10^-5
Explanation:
To calculate the transmission delay bytes for the token,
we have the token to be = 64bytes and 10mbps rate.
The transmission delay = 64bytes/10mbps
= 51.2 microseconds
A microsecond is a millionth of a second.
= 5.12 x 10^-5
The question says the average number of stations that the token will pass through is 20. Remember this value is gotten from 40/2
20 x 5.12 x 10^-5
= 0.001024
= 1.024x10^-5
Therefore on an idle network with 40 stations, the average wait is
= 1.024x10^-5
Develop a simple game that teaches kindergartners how to add single-digit numbers. Your function game() will take an integer n as input and then ask n single-digit addition questions. The numbers to be added should be chosen randomly from the range [0, 9] (i.e.,0 to 9 inclusive). The user will enter the answer when prompted. Your function should print 'Correct' for correct answers and 'Incorrect' for incorrect answers. After n questions, your function should print the number of correct answers.
Answer:
2 correct answer out of 3
Consider a bit stuffing framing method where the start of a frame is indicated by 6 consecutive ones, followed by 2 zeroes. What should be the bit stuffing rules at the transmitter? What should be the bit destuffing rules at the receiver? Fill in the blank to show what is the stream after bit stuffingWrite the rule for stuffing:Write the rule for destuffing:Assume the user data stream before bit stuffing is 011111100011111101. What is the stream after bit stuffing?
Answer:
Explanation:
Bit stuffing Framing Method
In the given situation, the beginning casing is shown by 6 sequential ones followed by 2 zeroes.
The beginning casings are generally known as the flags.which are utilized for demonstrating the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the reciever.
Along these lines here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).
To enable us understand how this question plays out, let us understand the rule for Stuffing and De-stuffing .
The standard for stuffing is :
At whatever point there are 5 successive ones supplement one zero in the casing which is an information. The embedded zero piece is known as the stuffed bit.The principle reason behind stuffing somewhat after 5 back to back ones is to evade the distortion of information (data) as flag. If the reciever misconstrues the information as end banner then he would quit recieving the information where the entire information sent by the sender will be left and lost causing an error-prone information.
The rule for destuffing :
The standard/rule for destuffing is only inverse as stuffing. After recieving the bitstuffed information (data), at the reciever's end zero after each 5 continuous ones will be evacuated and the rest of the information will be considered as the genuine information.
In the given situation, the beginning casing is demonstrated by 6 back to back ones followed by 2 zeroes.
the beginning casings are normally known as the flags.which are utilized for showing the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the receiver.
In this way here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).
data before bit stuffing is: 011111100011111101the stream after stuffing would be: 01111101000111101101where the bolded/underlined digits represents the stuffed bits
cheers i hope this helps
A user in an apartment building on a wireless network is no longer able to print to the network printer. The user has been able to print to the printer in the past and nothing on the network has changed. A technician notices that the user has a different IP address scheme than what was originally setup and is able to browse the Internet using that IP address scheme. What should he do?
Answer:
The technician should either provide a route from the user's IP scheme to the printer or change the user's IP scheme to be within the same scheme as the printer.
Explanation:
The most likely reason the user is unable to print to the printer is that the user's computer cannot path the current address to the address of the printer. Without the printer being on the same subnet as the user's computer, the computer has no way of being able to tell where the printer is.
The two solutions to this are to either add a route to the user's computer explicitly telling the user's computer where to trace to find the printer or to change the user's computer to match the IP scheme of the printer.
Cheers.
Operations that a given computing agent can perform are called
Answer:
Primitive operation
Explanation:
Operations that a given computing agent can perform are called primitive operations.
These operations are basic arithmetic work done by an algorithm such as assigning a variable, calling a method, returning an array, etc. They are sometimes written in pseudo-code.
How does the teacher know you have completed your assignment in Google Classroom?
Answer:
When students have completed the assignment, they simply click the Mark As Done button to let the teacher know they have finished.
Explanation: Note: The teacher does NOT receive an alert or email notification when work has been turned in, or marked as done.
What is the output of the following Python program? try: fin = open('answer.txt') fin.write('Yes') except: print('No') print('Maybe')
(<ANSWER RETRACTED>)
Write down the complete AJAX code to avoid page caching.
Answer:
AZAX is key sentence for without reloading page.
Explanation:
AJAX is also known as XHR. If some one wants to send the file without reloading then look ahead at the search function and prompt the users by auto saving the documents. This request is sent to the server. The server return the data to your network. Whenever you have seen the file form, some action on the page. You will see some request from AJAX server request on your functional area. AJAX is called a reloading file without page. AZAX is stands for Asynchronous java scripts And XML. AJAX is used to send an email. AZAX is not used in front end, it is used from back end process.
Objects for AJAXJava ScriptWord Press Action.ProtectionError handling processExplain how/where could you change the NIC Card configuration from dynamic DHCP setting to an IP address of 10.254.1.42 with a subnet mask of 255.255.0.0 and a gateway of 10.254.0.1. (hint: we spoke about 2 different methods)
Answer:
Using the terminal in linux OS to configure a static ip address, gateway and subnet mask.
Explanation:
-Enter the terminal in the linux environment and use the ifconfig eth0 or -a to bring up the main network interface and other network interfaces.
- for static network configuration, use;
- ifconfig eth0 10.254.1.42
- ifconfig eth0 netmask 255.255.0.0
- ifconfig eth0 broadcast 10.254.255.255
- and add a default gateway with;
- route add default gw 10.254.0.1 eth0.
- Now verify the settings with the ifconfig eth0 command.
Using virtualization comes with many advantages, one of them being performance. Which of these is NOT another realistic advantage of using virtualization over dedicated hardware?a. There are improvements in security and high availability during outage.b. There are cost benefits.c. Maintenance and updates are simplified or eliminated.d. There are fewer points of failure.
Answer:
a. There are improvements in security and high availability during outage
Explanation:
Virtualization occurs when data that could be in several formats (for example, storage devices) are made to appear real through a software. There are virtualization providers who act as third-party between users and the original manufacturers of the software. While virtualization has received wide popularity in recent times because of the several advantages it offers of which cost-saving is included, it also has some disadvantages. One of them from the options provided is the possibility of a security breach and its uncertain availability.
The security breach arises because of the proliferation of information on the virtual space. This information can be accessed by unauthorized hackers. Also since third-party providers are the usual providers of virtualization services, the availability depends on them because if they shut down, users can no longer access the software.
I have an PC and it has one HMDI port but I need two monitors other problem is I need one monitor to connect to my USB drive work system and one to stay on my regular windows system how can I do this?
Answer:
You'll need dual monitor cables and an adapter.
Explanation:
First Step
Position your monitors on your desk or workspace. Make sure the systems are off.
Second Step
Make sure your power strip is close by. Then plug your power strip and connect the first monitor to your PC via your HDMI
Use an adapter to do the same for the second monitor.
Turn the entire system on
Third Step
On your PC, right click on a blank place in your home screen and click on Display Settings.
If you want to have two separate displays showing the same thing, select Duplicate, but if you want to have the two displays independent of each other, select Extend Display.
Apply the settings and select Done.
You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step should you take next
Answer:
The answer is "check the worksheet is not read only"
Explanation:
The read only mode is used for read the file data, and it doesn't allows the user to update the file, and for updating the worksheet we should check iut does not open in the read-only mode.
If it is open, then we close it and for close we goto the office button and click on the tools option after that goto general setting, in this there is a check box for turn off the read-only mode.
By using ____, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names.
Answer:
Polymorphism
Explanation:
If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.
The information regarding the polymorphism is as follows:
The person has various attributes at the same timeFor example, a man could be a father, a husband, an entrepreneur at the same time.In this, the similar person has different types of behavior in different situations.Therefore we can conclude that If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.
Learn more about the behavior here: brainly.com/question/9152289
Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp = {90, 92, 94, 95}, print:
90, 92, 94, 95
Note that the last element is not followed by a comma, space, or newline.
#include
using namespace std;
int main() {
const int NUM_VALS = 4;
int hourlyTemp[NUM_VALS];
int i = 0;
hourlyTemp[0] = 90;
hourlyTemp[1] = 92;
hourlyTemp[2] = 94;
hourlyTemp[3] = 95;
/* Your solution goes here */
cout << endl;
return 0;
}
Answer:
string sep = "";
for (i = 0; i < NUM_VALS; i++) {
cout << sep << hourlyTemp[i];
sep = ", ";
}
Explanation:
Insert the snippet at the commented location.
With the absence of a join() method as found in other languages, it is always a hassle to suppress that separator comma from appearing at the beginning or the end of your output. This solution is nice since it doesn't require any magic flags to keep track of wether the first element was printed.
what are the 21St century competencies or skills required in the information society?
Answer:
Communication
Collaboration
ICT literacy
Explanation:
These are some of the skills that are needed in the 21st century to compete and thrive in the information society.
To remain progressive, one needs to have good communication skills. These communication skills can include Active Listening and Passive Listening.
Collaboration is important because you'll have to work with other people as no man is an island, we need someone else so the skill of collaboration is necessary to compete and stay relevant in the information society in the 21st century.
IT literacy is also very important because one needs to have basic computer knowledge such as programming, computer essentials and applications, etc.
Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of evaluating the expression Z-y + 2 * x. 2 /* Your solution poes here */ 4 solveEquation(2, 4, 5.5); // Code will be tested once with values 2, 4, 5.5 and again with values -5, 3, 8
Answer:
The programming language is not stated;
However, the program written in Python is as follows
def solveEquation(x,y,z):
result = z - y + 2 * x
print(result)
x = float(input("x = "))
y = float(input("y = "))
z = float(input("z = "))
print(solveEquation(x,y,z))
Explanation:
This line defines the function solveEquation
def solveEquation(x,y,z):
This line calculates the expression in the question
result = z - y + 2 * x
This line returns the result of the above expression
print(result)
The next three lines prompts user for x, y and z
x = float(input("x = "))
y = float(input("y = "))
z = float(input("z = "))
This line prints the result of the expression
print(solveEquation(x,y,z))
After a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. Which of the following ports would need to be opened on the firewall to allow the users to obtain an IP address? (Select TWO).
A. UDP 53
B. UDP 67
C. UDP 68
D. TCP 53
E. TCP 67
F. TCP 68
Answer:
B. UDP 67
C. UDP 68
Explanation:
In this scenario, after a new firewall is installed, users report that they do not have connectivity to the Internet. The output of the ipconfig command shows an IP address of 169.254.0.101. The ports that would need to be opened on the firewall to allow the users to obtain an IP address are both the UDP 67 and UDP 68. UDP is an acronym for user datagram protocol in computer networking and it is part of the transmission control protocol/internet protocol (TCP/IP) suite.
Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.
Also, the UDP 67 and 68 ports is responsible for the connectionless framework which is typically being used by the dynamic host configuration protocol (DHCP) that is used to assign IP addresses to various computer users and manage their leases.
UDP 67 is the destination port for a DHCP server while the UDP 68 is the port number for the computer user (client).
Hence, for the users to have access to the internet or internet connectivity both UDP 67 and 68 must be opened on the firewall.
Can Anyone put my name in binary code using these images? Bentley is my name
Answer:
10010100001001010100101101010100000000000000000010100101010101111010001001010010100101001
Explanation:
While it might be considered "old-school," which action should you take if you are unsure how a page will print, even after looking at Page Break Preview?a) Slide the solid blue line.b) Slide the dotted line.c) Print the first page.d) Eliminate page breaks.
Answer:
The correct answer is D
In the case of printing pages when you are not sure of the number of the page the printer will print you should leave some gaps or margins or leave space between the two pages.
The old-school way to do this is by Printing the first page. Hence the option C is correct.Learn more bout the might be considered "old-school,".
brainly.com/question/26057812.
Where can you find detailed information about your registration, classes, finances, and other personal details? This is also the portal where you can check your class schedule, pay your bill, view available courses, check your final grades, easily order books, etc. A. UC ONE Self-Service Center B. Webmail C. UC Box Account D. ILearn
Answer:
A. UC ONE Self-Service Center
Explanation:
The UC ONE Self-Service Center is an online platform where one can get detailed information about registration, classes, finances, and other personal details. This is also the portal where one can check class schedule, bill payment, viewing available courses, checking final grades, book ordering, etc.
it gives students all the convenience required for effective learning experience.
The UC ONE platform is a platform found in the portal of University of the Cumberland.
Write a SELECT statement that selects all of the columns for the catalog view that returns information about foreign keys. How many foreign keys are defined in the AP database?
Answer:
SELECT COUNT (DISTICT constraint_name)
FROM apd_schema.constraint_column_usage
RUN
Explanation:
General syntax to return a catalog view of information about foreign keys.
SELECT DISTINCT PARENT_TABLE =
RIGHT(Replace(DC.constraint_name, 'fkeys_', ''),
Len(Replace(DC.constraint_name, 'fkeys_', '')) - Charindex('_', Replace(DC.constraint_name, 'fkeys_', ''))),
CHILD_TABLE = DC.table_name,
CCU.column_name,
DC.constraint_name,
DC.constraint_type
FROM apd_schema.table_constraints DC
INNER JOIN apd_schema.constraint_column_usage CCU
ON DC.constraint_name = CCU.constraint_name
WHERE DC.constraint_type LIKE '%foreign'
OR DC.constraint_type LIKE '%foreign%'
OR DC.constraint_type LIKE 'foreign%'
RUN
Consider two different processors P1 and P2 executing the same instruction set. P1 has a 3 GHz clock rate and a CPI of 1.5. P2 has a 3 GHz clock rate and a CPI of 1.0. Which processor has the highest performance expressed in instructions per second
Answer:
Processor P2 has the highest performance expressed in instructions per second.
Explanation:
Given:
Processors:
P1
P2
Clock rate of P1 = 3 GHz
Clock rate of P2 = 3 GHz
Cycles per instruction = CPI of P1 = 1.5
Cycles per instruction = CPI of P2 = 1.0
To find:
which processor has the highest performance in instructions per second (IPS)
Solution:
Compute CPU time:
CPU time = (Number of instructions * cycles per instruction) / clock rate
CPU time = (I * CPI) / R
We are given the CPI and clock rate. So
CPU time = (I * CPI) / R
I / CPU time = R/CPI
Since
Instructions per second = Number of instructions (I) / execution time
IPS = I / CPU time
So
Instructions Per Second = clock rate / cycles per instruction
IPS = R/CPI
Putting the values in above formula:
Instructions Per Second for P1 = IPS (P1)
= clock rate P1 / CPI (P1)
= 3 GHz / 1.5
IPS (P1) = 2
As 1 GHz = 10⁹ Hz
IPS (P1) = 2x10⁹
Instructions Per Second for P2 = IPS (P2)
= clock rate P2 / CPI (P2)
= 3 / 1.0
IPS (P2) = 3
As 1 GHz = 10⁹ Hz
IPS (P2) = 3x10⁹
Hence processor P2 has the highest performance expressed in instructions per second i.e. 3x10⁹
Generating a signature with RSA alone on a long message would be too slow (presumably using cipher block chaining). Suppose we could do division quickly. Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals (taking the message as a big integer), mod n, and signing that?
Answer:
Following are the algorithm to this question:
Explanation:
In the RSA algorithm can be defined as follows:
In this algorithm, we select two separate prime numbers that are the "P and Q", To protection purposes, both p and q combines are supposed to become dynamically chosen but must be similar in scale but 'unique in length' so render it easier to influence. Its value can be found by the main analysis effectively.
Computing N = PQ.
In this, N can be used for key pair, that is public and private together as the unit and the Length was its key length, normally is spoken bits. Measure,
[tex]\lambda (N) = \ lcm( \lambda (P), \lambda (Q)) = \ lcm(P- 1, Q - 1)[/tex] where [tex]\lambda[/tex] is the total function of Carmichaels. It is a privately held value. Selecting the integer E to be relatively prime from [tex]1<E < \lambda (N)[/tex]and [tex]gcd(E, \lambda (N) ) = 1;[/tex] that is [tex]E \ \ and \ \ \lambda (N)[/tex]. D was its complex number equivalent to E (modulo [tex]\lambda (N)[/tex] ); that is d was its design multiplicative equivalent of E-1.
It's more evident as a fix for d provided of DE ≡ 1 (modulo [tex]\lambda (N)[/tex] ).E with an automatic warning latitude or little mass of bigging contribute most frequently to 216 + 1 = 65,537 more qualified encrypted data.
In some situations it's was shown that far lower E values (such as 3) are less stable.
E is eligible as a supporter of the public key.
D is retained as the personal supporter of its key.
Its digital signature was its module N and the assistance for the community (or authentication). Its secret key includes that modulus N and coded (or decoding) sponsor D, that must be kept private. P, Q, and [tex]\lambda (N)[/tex] will also be confined as they can be used in measuring D. The Euler totient operates [tex]\varphi (N) = (P-1)(Q - 1)[/tex] however, could even, as mentioned throughout the initial RSA paper, have been used to compute the private exponent D rather than λ(N).
It applies because [tex]\varphi (N)[/tex], which can always be split into [tex]\lambda (N)[/tex], and thus any D satisfying DE ≡ 1, it can also satisfy (mod [tex]\lambda (N)[/tex]). It works because [tex]\varphi (N)[/tex], will always be divided by [tex]\varphi (N)[/tex],. That d issue, in this case, measurement provides a result which is larger than necessary (i.e. D > [tex]\lambda (N)[/tex] ) for time - to - time). Many RSA frameworks assume notation are generated either by methodology, however, some concepts like fips, 186-4, may demand that D< [tex]\lambda (N)[/tex]. if they use a private follower D, rather than by streamlined decoding method mostly based on a china rest theorem. Every sensitive "over-sized" exponential which does not cooperate may always be reduced to a shorter corresponding exponential by modulo [tex]\lambda (N)[/tex].
As there are common threads (P− 1) and (Q – 1) which are present throughout the [tex]N-1 = PQ-1 = (P -1)(Q - 1)+ (P-1) + (Q- 1))[/tex], it's also possible, if there are any, for all the common factors [tex](P -1) \ \ \ and \ \ (Q - 1)[/tex]to become very small, if necessary.
Indication: Its original writers of RSA articles conduct their main age range by choosing E as a modular D-reverse (module [tex]\varphi (N)[/tex]) multiplying. Because a low value (e.g. 65,537) is beneficial for E to improve the testing purpose, existing RSA implementation, such as PKCS#1, rather use E and compute D.
As an ICT student teacher using convincing and cogent reasons explain why you think operating system is pivotal in teaching and learning
Answer:
An operating system (OS) is a software which is responsible for the management of computer hardware, software, and also provides common services for computer programs.
Operating System is pivotal in teaching and learning because:
1. It enables computer programs to run smoothly on various computer devices.
2. The Operating System gives teachers the opportunity to install learning apps on their devices for ease of teaching.
3. It enables students to download and install learning applications, download and upload assignments, etc.
4. The Operating System makes video conferencing for online tuition easy and smooth.
5. It makes computer users to interact with other applications and softwares within a device.
Operating systems are found on many computer devices e.g: mobile phones, video games, PCs, supercomputers, etc.
#Below is a class representing a person. You'll see the
#Person class has three instance variables: name, age,
#and GTID. The constructor currently sets these values
#via a calls to the setters.
#
#Create a new function called same_person. same_person
#should take two instances of Person as arguments, and
#returns True if they are the same Person, False otherwise.
#Two instances of Person are considered to be the same if
#and only if they have the same GTID. It does not matter
#if their names or ages differ as long as they have the
#same GTID.
#
#You should not need to modify the Person class.
class Person:
def __init__(self, name, age, GTID):
self.set_name(name)
self.set_age(age)
self.set_GTID(GTID)
def set_name(self, name):
self.name = name
def set_age(self, age):
self.age = age
def set_GTID(self, GTID):
self.GTID = GTID
def get_name(self):
return self.name
def get_age(self):
return self.age
def get_GTID(self):
return self.GTID
#Add your code below!
#Below are some lines of code that will test your function.
#You can change the value of the variable(s) to test your
#function with different inputs.
#
#If your function works correctly, this will originally
#print: True, then False.
person1 = Person("David Joyner", 30, 901234567)
person2 = Person("D. Joyner", 29, 901234567)
person3 = Person("David Joyner", 30, 903987654)
print(same_person(person1, person2))
print(same_person(person1, person3))
Answer:
Here is the function same_person that takes two instances of Person as arguments i.e. p1 and p2 and returns True if they are the same Person, False otherwise.
def same_person(p1, p2): #definition of function same_person that takes two parameters p1 and p2
if p1.GTID==p2.GTID: # if the two instances of Person have same GTID
return True #returns true if above condition evaluates to true
else: #if the two instances of Person do not have same GTID
return False #returns false when two persons have different GTID
Explanation:
person1 = Person("David Joyner", 30, 901234567) #first instance of Person
person2 = Person("D. Joyner", 29, 901234567) #second instance of Person
person3 = Person("David Joyner", 30, 903987654) #third instance of Person
print(same_person(person1, person2)) #calls same_person method by passing person1 and person2 instance of Person to check if they are same
print(same_person(person1, person3)) #calls same_person method by passing person1 and person3 instance of Person to check if they are same
The function works as follows:
For function call print(same_person(person1, person2))
The GTID of person1 is 901234567 and that of person2 is 901234567
If condition if p1.GTID==p2.GTID in the function same_person checks if the GTID of person1 is equal to the GTID of person2. This condition evaluates to true because GTID of person1 = 901234567 and GTID of person2 = 901234567
So the output is:
True
For function call print(same_person(person1, person3))
The GTID of person1 is 901234567 and that of person3 is 903987654
If condition if p1.GTID==p2.GTID in the function same_person checks if the GTID of person1 is equal to the GTID of person3. This condition evaluates to false because GTID of person1 = 901234567 and GTID of person2 = 903987654 and they are not equal
So the output is:
False
The complete program along with its output is attached in a screenshot.
Write a program that reads in your question #2 Python source code file and counts the occurrence of each keyword in the file. Your program should prompt the user to enter the Python source code filename
Answer:
Here is the Python program:
import keyword #module that contains list of keywords of python
filename = input("Enter Python source code filename: ") # prompts user to enter the filename of a source code
code = open(filename, "r") # opens the file in read mode
keywords = keyword.kwlist #extract list of all keywords of Python and stored it into keywords
dictionary = dict() #creates a dictionary to store each keyword and its number of occurrence in source code
for statement in code: # iterates through each line of the source code in the file
statement = statement.strip() # removes the spaces in the statement of source code
words = statement.split(" ") #break each statement of the source code into a list of words by empty space separator
for word in words:# iterates through each word/item of the words list
if word in keywords:#checks if word in the code is present in the keywords list of Python
if word in dictionary: #checks if word is already present in the dictionary
dictionary[word] = dictionary[word] + 1 #if word is present in dictionary add one to the count of the existing word
else: #if word is not already present in the dictionary
dictionary[word] = 1 #add the word to the dictionary and set the count of word to 1
for key in list(dictionary.keys()): #iterates through each word in the list of all keys in dictionary
print(key, ":", dictionary[key])# prints keyword: occurrences in key:value format of dict
Explanation:
The program is well explained in the comments attached with each line of the program.
The program prompts the user to enter the name of the file that contains the Python source code. Then the file is opened in read mode using open() method.
Then the keyword.kwlist statement contains the list of all keywords of Python. These are stored in keywords.
Then a dictionary is created which is used to store the words from the source code that are the keywords along with their number of occurrences in the file.
Then source code is split into the lines (statements) and the first for loop iterates through each line and removes the spaces in the statement of source code .
Then the lines are split into a list of words using split() method. The second for loop is used to iterate through each word in the list of words of the source code. Now each word is matched with the list of keywords of Python that is stored in keywords. If a word in the source code of the file is present in the keywords then that word is added to the dictionary and the count of that word is set to 1. If the word is already present in the dictionary. For example if there are 3 "import" keywords in the source code and if 1 of the import keywords is already in the dictionary. So when the second import keyword is found, then the count of that keyword is increased by 1 so that becomes 2.
Then the last loop is used to print each word of the Python that is a keyword along with its number of occurrences in the file.
The program and its output is attached in a screenshot. I have used this program as source code file.
Give five types of hardware resource and five types of data or software resource that can usefully be shared. Give examples of their sharing as it occurs in practice in distributed systems.
Answer:
Answered below
Explanation:
Hardware resources that can be usefully shared and also examples of their sharing include;
A) CPU servers, which carry out computations for clients.
B) Network capacity transmission of data or packet transmission is done using the same circuit, meaning many communication channels share the same circuit.
C) Screen networks windows systems which enable processes in remote computers to update the contents of their local server.
D) Memory cache server.
E) Disk file server, virtual disk server.
Softwares include;
A) Web-page web servers which allow client programs to have read-only access to page contents.
B) Database whose contents can be usefully shared.
C) File servers enable multiple users access to files .
D) Objects can be shared in distributed systems example shared ticket booking, whiteboard etc.
E) Exclusive lock which enables the coordination of accessing a special resource.
what makes''emerging technologies'' happen and what impact will they have on individuals,society,and environment
Answer:
Are characterized by radical novelty
Explanation:
Example, intelligent enterprises are reimaging and reinventing the way they do bussines
What is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps? a. Automatic vehicle locationb. Geographic information systemc. Cartographyd. Edge matching
Answer:
c. Cartography.
Explanation:
Cartography is the science and art of making an illustrated map or chart. Geographic information system (GIS) allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.
Basically, cartography is the science and art of depicting a geographical area graphically, mostly on flat surfaces or media like maps or charts. It is an ancient art that was peculiar to the fishing and hunting geographical regions. Geographic information system is an improved and technological form of cartography used for performing a whole lot of activities or functions on data generated from different locations of the Earth.
Answer:
C. Cartography
Explanation: