Answer:
The answer is " Uninitialized data segment ".
Explanation:
It (memory map) field whenever a C program is locked to run, the kernels must allocate information into 0 or null pointer in this section until the process runs. This variable, that is outside of any function, has been stored in uninitialized data item by the C statement (like, "long amount[1000];").
If we did not declare the data segment, it also called bss, in which all block which begins with the symbol and is called for an old assembly language operator.
A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function
Answer:
"Transport" is the correct answer.
Explanation:
Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.So that the above would be the correct approach.
Identify characteristics of structured programming design. Choose all that apply.
The code is easy to test and debug.
It creates a program made of modules that can be called when needed.
The code is difficult to modify due to the use of modules.
It uses logic flow.
The code is easier to follow.
The code is easier to modify.
Answer:
The correct options are;
The code is easy to test and debug
It creates programs made of modules that can be called when needed
It uses logic flow
The code is easier to follow
The code is easier to modify
Explanation:
The approach of structural programming is one such that the problem is well understood and the solution is economical
Features of structural programming includes;
Error debugging are facilitated by structural programs and as such testing to debugStructural program creates program modules that are reusableStructural programs can be easily modified hence maintainedStructural program emphasizes on logicThe structural program code is easily read and understood, and therefore, it is easier to followAnswer:
A.B.D.E.F.
Explanation:
pretty much everything except C.
:)
You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?
Answer:
Reset the router by holding down the reset button for 30 seconds. The reset button can be located in the back or bottom area of the router. The function of the reset button is to turn restore the wireless router to default factory setting such that customized settings including the DNS, the static IP address setup, stored personal passwords DHCP parameter settings port forwarding and routing settings are erased.
Explanation:
The application layer process that sends mail uses __________. When a client sends email, the client process connects with a server process on well-known port __________. A client retrieves email, however, using one of two application layer protocols: ________ or ________. With ________, mail is downloaded from the server to the client and then deleted on the server. The server starts the __________ service by passively listening on TCP port __________ for client connection requests. However, when a client connects to ta server running __________, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.
Answer:
1. SMTP.
2. 25.
3. POP.
4. IMAP.
5. POP.
6. POP.
7. 110.
8. IMAP-capable server.
Explanation:
The application layer process that sends mail uses Simple Mail Transfer Protocol (SMTP). When a client sends email, the client process connects with a server process on well-known port 25. A client retrieves email, however, using one of two application layer protocols: Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). With POP, mail is downloaded from the server to the client and then deleted on the server. The server starts the POP service by passively listening on TCP port 110 for client connection requests. However, when a client connects to a server running IMAP, copies of the messages are downloaded to the client applications. The original messages are kept on the server until they are manually deleted.
Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.
Answer:
The statement to this question can be defined as follows:
*strike_Counter =*strike_Counter +22;//adds value 22 in *strike_Counter
Explanation:
In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.
In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.
for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.
What are the file extensions of files created with: - Microsoft Office Access - Microsoft Office Publisher
Answer:
The file extensions of files created with Microsoft Office Access is .adb for Access project
The file extension of files created with Microsoft publisher is .pub
Explanation:
The file extensions of files created with Microsoft Office Access are;
.adp = Access project
.adn = Access blank project template
.accdb= Access database for 2007, 2010, 2013, and 2016 versions
Other file extensions include
laccdb, .accdw, .accdc, .accda, .accdr, .accdt, .mdb, .mda, .mdw, .mdf, .mde, .accde, .mam, .mad, .maq, .mar, .mat, .maf
The file extension of files created with Microsoft publisher is the .pub
All of the following are challenges presented by changing technology as it relates to the special events field EXCEPT: A. the ability to manage much of the coordination of an event from a smartphone B. the static nature of technology C. the need to continually master new software programs and applications D. the ease of facilitating events provided by technology
Answer:
The answer is "option C".
Explanation:
The change in technology can be characterized as that of an increase in the production feasible thru the innovations, new technologies, and dispersion procedures at a specified amount of production. This technology concerns the Excluding area of special events, even if it needs the new master software and applications continuously, and the wrong choices can be defined as follows:
In choice A, it is a part of event management that's why it is wrong. In choice B it is wrong because it is used in learning. In choice D, it is wrong because it is used to make progress.All of the options given are challenges to technology except D. the ease of facilitating events provided by technology.
It should be noted that changing technology can be challenging. It can bring about the ability to manage much of the coordination of an event from a smartphone.
It also leads to the static nature of technology and the need to continually master new software programs and applications. The ease of facilitating events provided by technology isn't a challenge.
Learn more about technology on:
https://brainly.com/question/8184227
In a batch operating system, three jobs JOBI, JOB2, JOB3 are submitted for ex- ecution. Each job involves an I/O activity, a CPU time, and another 1/0 activity. JOB1 requires a total of 21 ms, with 3 ms CPC time. JOB2 requires 29 ms total time with 5 ms CPU time. JOB3 requires 14 ms total time with 4 is CPU time. 3.1 What will be the CPU utilisation for uniprogramming? Write down all interme diate steps. 3.2 What will be the CPU utilisation for multiprogramming? Write down all inter- mediate steps
Answer:
The answer to this question can be defined as follows:
In option 1, the answer is "18.75%".
In option 2, the answer is "33%".
Explanation:
Given:
JOB 1-Time of the CPU = 3ms, rest = 18ms, sum = 21
JOB 2-Time of the CPU = 5ms, rest = 24ms, sum = 29
JOB 3 -Time of the CPU =4ms, rest = 10ms, sum = 14
In option 1:
whenever the job has also been allocating the system, in the uni-programs system, which looks at the CPU until it is complete.
Formula:
[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]
[tex]=\frac{(3+5+4)}{(21+29+14)}[/tex]
[tex]=\frac{12}{64}\\\\= 0.1875\\\\=18.75%[/tex]
In option 2:
However, if any software is interested in other operations like I / o, it can assign to the CPU Processor to others Systems and other software may be carrying out I / o operations there while the processor is with any other application.
Formula:
[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]
[tex]=\frac{12}{36}\\\\=\frac{1}{3}\\\\=.33\\\\= 33 \%[/tex]
Complete the body of the format_name function. This function receives the first_name and last_name parameters and then returns a properly formatted string. Specifically: If both the last_name and the first_name parameters are supplied, the function should return like so:
Answer:
Here is the Python program:
def format_name(first_name, last_name): #function definition of format_name that takes first_name and last_name as parameters
if first_name != '' and last_name != '': #checks if first_name and last_name both are not equal to " "
return ("Name: " + last_name + ", " + first_name) #returns first name and last_name in format: "Name: last_name, first_name"
elif first_name != '' or last_name != '': #checks if either of the first_name or last_name is not equal to " "
return ("Name: " + last_name + first_name) #returns first name and last_name in format: "Name: last_name" or "Name: first_name"
else: #if both names are blank
return '' #return ""
Explanation:
The working of the above function can be checked by using the following statements:
print(format_name("Ernest", "Hemingway"))
print(format_name("Voltaire", ""))
print(format_name("", "Madonna"))
print(format_name("", ""))
The program has a function format_name which takes two strings i.e. the first_name and last_name as parameters and returns the formatted string.
The first if condition checks if both the first_name and last_name are blank. For example if first_name = "Ernest" and last_name= "Hemingway" this means both the first_name and last_name are not blank or empty. So If this condition evaluates to true then the following statement is returned:
return ("Name: " + last_name + ", " + first_name)
This returns the last_name string first followed by a comma in between and then first_name string in the last. For the above example the string is printed in the following format:
Name: Hemingway, Ernest
The elif condition checks if either of the first_name or last_name is blank. For example if first_name = "Voltaire" and last_name= "" this means last_name is blank or empty. So if this condition evaluates to true then the following statement is returned:
return ("Name: " + last_name + first_name)
This returns the last_name string. For the above example the string is printed in the following format:
Name: Voltaire
IF none of the above condition is true and both the first_name and last_name are blank then the following statement is returned
return ''
This will just print and blank space in output.
The program and its output is attached.
Why is access to equipment so important to the education of an A/V technician? (Select all that apply).
A. A/V technicians have to learn how to use many different types of devices.
B. A/V technicians must become familiar with many different software programs.
C. A/V technicians for large companies often have to buy their own equipment.
D. A/V technicians are not always provided the equipment they need by their employers.
Answer:
The correct option is;
A. A/V technicians have to learn how to use many different types of devices
Explanation:
Sound recording, mixing boards, video monitors, projectors, speakers, and microphone equipment are set up and operated by audiovisual (A/V) technicians during concerts, live sport games, business meetings and conventions, TV and radio outdoors shoots and for on location assignments as well as equipment maintenance for universities and other organization. As such A/V it is essential for A/V technicians to develop manual dexterity on a wide variety of audiovisual equipment.
Answer:
For this one it is A: A/V Technicians have to learn how to use many different types of devices
but it may be worded differently, and if so its:
D:They need to learn how to use a wide variety of different types of equipment.
Explanation:
edg2021
Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer demand B. rates of unemployment and inflation C. consumer behavior and preferences D. national income and its sourcesics?
Answer:
The correct answer is C. Consumer behavior and preferences.
Explanation:
hope it will help :)
Answer: the answer is C consumers behavior and preferences.
Explanation: just took the test please add thanks and brainliest
Discuss three ways in which errors can arise in developing and executing linear optimization models in business situations, and indicate some of the business consequences of such errors. Explain how analytics professionals can help to prevent such errors.
Answer:
The following are the three-way, in which errors arise and, the process to solve them.
Explanation:
The mistake is something you did, that could not be incorrect. It may consider errors when creating and implementing simulation models in business situations because of some procedure problems. It is not because of bemusement and a few of the other error types were also acceptable even though the correction is affordable.
Type 1 error: This type of error arises due to limited accuracy issues, in this the gadgets or devices used for the simulation study, quantitative measurements. These errors Often simplified in expectations. It is a concept for analysis, in which experts firstly understand this kind of mistake. Type 2 error: These errors may occur due to inaccuracy. If another analytic method behaves differently for two analysts. It tends to cause errors, that are unrecognized by no pre-defined methods for fixing those errors. Type 3 error: These issues can be reduced by the improper selection of software, and in the implementation period, it can consider this sort of error due to the failure of system integration tools.if your computer is gliching what do you do to stop it and some times it turnes off what do you do
Answer:
You can take it to the shop to fix it since it happens often ig
Explanation:
I Hope This Helps bro
What are the parts to an
email?
A)Recipient, Greeting, Body, Closing
B)Recipient, Subject, Body, Signature
C)Recipient, Subject, Greeting, Body, Closing, Signature
D)None of the above
Answer:
B) recipient subject body signature
write a python program to calculate the compound interest
Answer:
initialPrincipal = float(input("Please enter your initial principal:"))
interestRate = float(input("Please enter your interest rate:"))
timePeriod = float(input("Please enter your number of times interest applied per time period:"))
elapsedPeriod = float(input("Please enter your number of time period elapsed:"))
finalAmount = initialPrincipal*(1 + interestRate/timePeriod)^(timePeriod*elapsedPeriod)
print("Your final amount would be:", finalAmount)
Your computer science teacher asks you to sample a black and white image that is 4" x 6". How would you sample the image to provide a good digital approximation using the pixelation widget? What sample size would you use? How would your decision affect the digital representation?
Answer:
The largest dimensions we can make of an image with the pixelation widget is 255*255.
When an image is resized, the number of pixels in the image may be reduced or increased, which causes the image to be resampled. Resampling changes the file size.
Explanation: This is all I could find. I hope its helps Sorry.
The sample size that would provide a good digital approx. will be 255 x 255
When resizing images using the pixelation widget, the pixels of the image will either reduce or increase and the reduction/increase in the pixels will have an effect ( blurry effect ) on the image when viewed by the user. also
when an image is resized the size of original size is either larger or smaller than the resampled image.
Hence to provide a good digital approx. using the pixelation widget from an image 4" x 6" is by using a sample size of 255 x 255
Note : A picture showing the effect of pixelation is attached below
learn more : https://brainly.com/question/19038576
in object oriented programming what is a constructor?
a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object
Answer:
The answer is A.
Answer:
A. the attributes that allow a programmer to imagine a new object
Explanation:
Got the answer right on the test!
You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules will you most likely need for this motherboard? A. DIP B. SIMM C. DIMM D. SODIMM
Answer:
The answer is "Option C"
Explanation:
The term DIMM stands for the Dual In-Line Memory Module, which is a kind of memory, that is used in computers. It is a small board of flash memory that uses the 64-bit memory bus because the SIMM has only a 32-bit path. It enables DIMMs to simultaneously transfer more information, and the wrong choices can be defined as follows:
In choice A, It is used in sockets, that's why it is wrong. In choice B, It is wrong because it is used in 32 bits only. In choice D, It is wrong because it is used in the expansion of memory.Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for writing programming code. They are usually strong problem-solvers. They spend most of their work hours running experiments in a laboratory. They must hold advanced degrees in computer science.
Answer:
First two statements: yes. Last two: not so much.
But many of the better ones do have advanced degrees, but some don't.
The laboratory statement is silly; they sit behind a set of screens figuring out stuff and writing code.
It should be noted that statements are true about software engineers are;
They are responsible for writing programming code. They are usually strong problem-solvers.Software engineering can be regarded as branch of computer science which is responsible for the development as well as the building of computer softwares, these could be applications software or system software.
The engineers that carry out this process is referred to as software engineers and they are responsible for responsible for writing programming code.
We can conclude that software engineers are strong problem-solvers.
Learn more about software engineer at:https://brainly.com/question/25757629
"What is the longest time (with extensions) a developer can have to file a final map after receiving tentative map approval?"
Answer:
The answer is "Five years (Two years)".
Explanation:
It supplies with proactive maps of approved modifications beyond the limits of plan may be expanded by the submission of final maps, reflecting the stages of the initial proactive plan, up to ten years with both the chief administrator.
Its provisional submission of a map, that will include the request forms or other resources provided at the request of the city administrator and the office. It also allows the phasing for the current map, that has been accepted.IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Neighbor Discovery Protocol (NDP) to discover the first portion of the IPv6 address (network prefix) from local routers, and the host can create its own host ID. What standard is commonly used by an IPv6 host to generate its own 64-bit host ID
Answer:
Following are the answer to this question.
Explanation:
It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.
As an IT technician, you are responsible for maintaining your company's laser printers. Recently, you read that laser printers have a cleaning phase. Another IT technician explains that you do not need to clean a laser printer because of this phase. However, you do not agree. What actually occurs during this phase
Answer:
When the drums revolution is completed, the toner still remaining on the photoreceptor drum is cleaned by a plastic blade that is made of soft electrically neutral material which then deposits waste toner into a toner reservoir in the printer. The drum is then charged to become uniformly negatively charge by a rolling charger to prepare the drum for the beam from the laser.
Explanation:
what is network and also how many types of network are there as well
Answer:
Summary:
Type of computer networks can categorize according to their size as well as their purpose
PAN is a computer network which generally consists of a computer, mobile, or personal digital assistant
LAN ( local area network) is a group of computer and peripheral devices which are connected in a limited area
WAN (Wide Area Network) is another important computer network that which is spread across a large geographical area
A metropolitan area network or MAN is consisting of a computer network across an entire city, college campus, or a small region
WLAN is a wireless local area network that helps you to link single or multiple devices using. It uses wireless communication within a limited area like home, school, or office building.
SAN is a storage area network is a type of network which allows consolidated, block-level data storage
System area network offers high-speed connection in server-to-server applications, storage area networks, and processor-to-processor applications
POLAN is a networking technology which helps you to integrate into structured cabling
Home network (HAN) is a always built using two or more interconnected computers to form a local area network (LAN) within the home
Enterprise private network (EPN) networks are build and owned by businesses that want to securely connect various locations
Campus area network (CAN) is made up of an interconnection of LANs in a specific geographical area
A VPN is a private network which uses a public network to connect remote sites or users together
Explanation:
Answer: Network is what is making you ask these questions.
Explanation: There are many different types of networks, like wifi, something like Verizon or Sprint, stuff like that. There are so many types of networks
You work in a customer call center. Martin is on the phone asking about the difference between solid-state drives (SSDs), hybrids, and magnetic hard drives for his laptop. He is going to use for web surfing, emailing, and creating documents. Which hard drive would provide the best performance and reliability
Answer:
the hybrids will be better
15 points please help!!!!
David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive platforms can David use for this presentation?
David can use an interactive or a for his presentation.
Answer:
Powerpoint presentation
Explanation:
Powerpoint presentation is a part of Microsoft office that is established by Microsoft. PowerPoint. It is used to present the company visions, missions, key points in a short and in an attractive way by using the various designs, pictures, audio clips, etc
Here David wants to create an interactive presentation so he should use the powerpoint presentations so that he could present the company visions, objectives, etc
What do you mean by Bandwidth? Pls give full explanation
Answer:
In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.
Explanation:
What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders
What are responsibilities of employees? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders.
Answer:
The correct options are;
1) To own businesses
To be responsible to employees
2) To work for companies
To be responsible to stakeholders
Explanation:
The entrepreneur is responsible for setting up and managing the establishment as well as provision of motivation for the employees. The entrepreneur gives direction and vision to the business which the employees follow, and as such the entrepreneur is responsible for being laudable and dependable and consistent
The employees are responsible for the work they do for the companies is done in a safety and healthful to them
The employees are responsible for the health and safety of other stakeholders for their actions and in-actions and to cooperate with the safety efforts of the employer
Answer:
to own business, to be responsible for employees, to work for companies.
Explanation:
You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge
Answer:
The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".
Explanation:
The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.
In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.Display all the natural numbers from 1 to 100 that are exactly divisible by 3 and 7 using FOR … NEXT. Without using Mod
Answer:
FOR i% = 1 TO 100
IF ((i%\3) = i%/3) AND ((i%\7) = i%/7) THEN
PRINT i%
END IF
NEXT i%
Explanation:
Of course using MOD would be cleaner, but another way to check if a number is integer divisable is to compare the outcome of an integer division to the outcome of a floating-point division. If they are equal, the division is an integer division.
The program outputs:
21
42
63
84
What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom
Answer:
The correct option is;
D.) Zoom
Explanation:
The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera
The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.
Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.