Answer and Explanation:
The program using Assembly language to calculate maximum value in array is given as below:
.data
space: .asciiz " "
X: .word 31, 17, 92, 46, 172, 208, 13, 93, 65, 112
N: .word 10
.text
main: la $a0, X #$a0=load address of array X
lw $a1, N #$a1=10 --number elements
jal readArray #call readArray
li $v0, 10 #exit program
syscall
readArray:
li $t0, 0 #$t0=0
li $t1, 0 #$t1=0
buc: bge $t0, $a1, final #if $t0 >= $a1 then goto final
lw $a0, X($t1) #$a0 = X(i)
li $v0, 1 #Print integer
syscall
la $a0, space #load a space: " "
li $v0, 4 #print string
syscall
addi $t1, $t1, 4 #Every 4 bytes there is an integer in the array
addi $t0, $t0, 1 #$t0=$t0+1
b buc #goto buc
final:
jr $ra #return
The algorithm which are the steps used above is:
Declares array of integers
Calls declared array
Reads declared array and compares integer values stored with if statements to make swap
prints array
Exits
Queues can be represented using linear arrays and have the variable REAR that point to the position from where insertions can be done. Suppose the size of the array is 20, REAR=5. What is the value of the REAR after adding three elements to the queue?
Answer:
8
Explanation:
Queues can be implemented using linear arrays; such that when items are added or removed from the queue, the queue repositions its front and rear elements.
The value of the REAR after adding 3 elements is 5
Given that:
[tex]REAR = 5[/tex] --- the rear value
[tex]n = 20[/tex] --- size of array
[tex]Elements = 3[/tex] --- number of elements to be added
When 3 elements are added, the position of the REAR element will move 3 elements backward.
However, the value of the REAR element will remain unchanged because the new elements that are added will only change the positioning of the REAR element and not the value of the REAR element.
Read more about queues at:
https://brainly.com/question/13150995
Write a recursive function called DrawTriangle() that outputs lines of '*' to form a right side up isosceles triangle. Function DrawTriangle() has one parameter, an integer representing the base length of the triangle. Assume the base length is always odd and less than 20. Output 9 spaces before the first '*' on the first line for correct formatting.
Answer:
Code:-
# function to print the pattern
def draw_triangle(n, num):
# base case
if (n == 0):
return;
print_space(n - 1);
print_asterisk(num - n + 1);
print("");
# recursively calling pattern()
pattern(n - 1, num);
# function to print spaces
def print_space(space):
# base case
if (space == 0):
return;
print(" ", end = "");
# recursively calling print_space()
print_space(space - 1);
# function to print asterisks
def print_asterisk(asterisk):
# base case
if(asterisk == 0):
return;
print("* ", end = "");
# recursively calling asterisk()
print_asterisk(asterisk - 1);
# Driver Code
n = 19;
draw_triangle(n, n);
Output:-
# Driver Code n = 19;| draw_triangle(n, n);
In securing the client/server environment of an information system, a principal disadvantage of using a single level sign-on
password is the danger of creating a(n)
A
administrative bottleneck
B
trap door entry point
С
lock-out of valid users
D
Single point of failure
Answer:
C
Explanation:
PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demilitarized zone (DMZ) and provides name resolution for the domain for Internet hosts.
i. True
ii. False
Answer:
i. True
Explanation:
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.
PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.
Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.
In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).
A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.
Which of the given assertion methods will return true for the code given below? Student student1 = new Student(); Student student2 = new Student(); Student student3 = student1;
The Student class is as follows.
public class Student{
private String name;
}
a. assertEquals(student1, student2);
b. assertEquals(student1, student3);
c. assertSame(student 1, student3);
d. assertSame(student1, student2);
Answer:
The true statements are :
A. assertEquals(student1,student2)
C. assertSame(student1,student3)
Explanation:
AssertEquals() asserts that the objects are equal, but assertSame() asserts that the passed two objects refer to the same object or not, if found same they return true, else return false.
Methods are collections of named code segments that are executed when evoked
The assertion method that will return true for the given code is: assertEquals(student1,student2)
The code segment is given as:
Student student1 = new Student();
Student student2 = new Student();
Student student3 = student1;
In Java, the assertEquals() method returns true if two objects have equal values.
Assume student1 and student2 have equal values, the statement assertEquals(student1,student2) will return true
Read more about java methods at:
https://brainly.com/question/15969952
Pls help me Pls help me
Answer:
20 10
Explanation:
please mark me as brainlyest
I wanna learn python but I don't know any websites that I can learn it online. Thanks for attention!
Answer:
https://www.codecademy.com/
Write a program that accepts a list of integers and split them into negatives and non-negatives. The numbers in the stack should be rearranged so that all the negatives appear on the bottom of the stack and all the non-negatives appear on the top.
Answer:
The program is as follows:
n = int(input("List elements: "))
mylist = []; myList2 = []
for i in range(n):
num = int(input(": "))
mylist.append(num)
for i in mylist:
if i >= 0:
myList2.append(i)
for i in mylist:
if i < 0:
myList2.append(i)
print(myList2)
Explanation:
This gets the number of list elements from the user
n = int(input("List elements: "))
This initializes two lists; one of input and the other for output
mylist = []; myList2 = []
This is repeated for every input
for i in range(n):
Get input from the user
num = int(input(": "))
Append input to list
mylist.append(num)
This iterates through the input lists
for i in mylist:
If list element is non-negative
if i >= 0:
Append element to the output list
myList2.append(i)
This iterates through the input lists, again
for i in mylist:
If list element is negative
if i < 0:
Append element to the output list
myList2.append(i)
Print output list
print(myList2)
Which of the following are examples of third party software that banks use? (Select all that apply.)
A -compliance reporting
B -unencrypted Microsoft Suite
C -accounting software
D -customer relationship management
Answer:
c , it is a correct answer for the question
Consider the relational schema below: Students(sid: integer, sname: string, major: string) Courses(cid: integer, cname: string, hours: integer) Enrollment(sid: integer, cid: integer, grade: real) Write a relational algebra expression that satisfies this query? Find the distinct names of all students that take at least three courses and major in "Philosophy".
Solution :
Here, we need to perform JOIN operation of the students and registration.
Use NATURAL JOIN operator [tex]\Join[/tex] and so no need to specify Join condition.
Also we need to selection operator tp select only those course whose major in "philosophy".
Finally we projection operator π to project only distinct students name who took at least three courses.
[tex]$\pi [\sigma_{\text{student's nam}e} [ \sigma(\text{three courses}) \Join \text{"Philosophy"}]]$[/tex]
Analyzing the role of elements in audio editing and Video
+ analyzing the role of the visual element in Video + analyzing the role of text factor
+ analyzing the role of the audio factor
+ analyzing the role of the transfer scene
+ analysing the role of the audio visual effects
Answer:
Analyzing the role of elements in audio editing and Video
+ analyzing the role of the visual element in Video + analyzing the role of text factor
+ analyzing the role of the audio factor
+ analyzing the role of the transfer scene
+ analysing the role of the audio visual effect
Algorithm
Read marks and print letter grade according to that.
Answer:
OKAYYYY
Explanation:
BIJJJJJJJSGJSKWOWJWNWHWHEHIWJAJWJHWHS SJSJBEJEJEJEJE SJEJBEBE
how do you get The special and extended ending in final fight 2 snes
John downloaded the manual for his TV, called manual-of-tv.pdf, from the manufacturer's website. After he clicked twice on the document he was informed by Windows that the file could not be opened. Which software must John install to solve the problem?
Jhon must download third party pdf viewer softwares to open the .pdf file.
For example
Adobe Acrobat Reader
Must click thanks and mark brainliest
Phân tích vai trò của các yếu tố trong biên tập Audio và Video
Answer:
Answer to the following question is as follows;
Explanation:
A visual language may go a long way without even text or narrative. Introductory angles, action shots, and tracker shots may all be utilised to build a narrative, but you must be mindful of the storey being conveyed at all times. When it comes to video editing, it's often best to be as cautious as possible.
Microsoft created Adobe Photoshop? TRUE FALSE
Answer:
false the creator of adobe photoshop was microsoft adobe photoshop is a popular photo editing software which was developed by a company named as adobe inc.
Answer:
Photoshop is created by Adobe, and Adobe is an independent company started by Jhon Warnockand.
Write a pseudocode method swap(aList, i, j) that interchanges the items currently in positions i and j of a list. Define the method in terms of the operations of the ADT list, so that it is independent of any particular implementation of the list. Assume that the list, in fact, has items at positions i and j. What impact does this assumption have on your solution
Answer:
Explanation:
The following pseudocode for this method using operations of the ADT list would be the following
swap(aList, indexI, indexJ) {
initialize temp_variable = Retrieve(indexI, aList)
Insert(Retrieve(indexJ, aList), indexI, aList)
Insert(Retrieve(indexI, aList), temp_variable, aList)
}
This code basically saves the aList index of i , into a temporary Variable. Then it sets the aList index of i to the value of the element in index of j. Then it does the same for the index of j with the tem_variable. If we assume that the indexes of i and j exist, then it can crash our entire program if those indexes are missing from the list when we try to access them.
WILL MARK BRAINLIEST
Write a function called quotient that takes as its parameters two decimal values, numer and denom, to divide. Remember that division by 0 is not allowed. If division by 0 occurs, display the message "NaN" to the console, otherwise display the result of the division and its remainder.
(C++ coding)
https://docs.microsoft.com/en-us/dotnet/api/system.dividebyzeroexception?view=net-5.0#remarks
click in link
i need an introduction of apple and microsoft
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: 0 z's Ex: If the input is: n It's a sunny day the output is: 2 n's Case matters. Ex: If the input is: n Nobody the output is: 0 n's n is different than N.
Answer:
The program in Python is as follows:
char = input("Character: ")[0]
string = input("String: ")
kount = string.count(char)
print(kount,char,end="")
if kount!=1:
print("'s")
Explanation:
This gets character input
char = input("Character: ")[0]
This gets string input
string = input("String: ")
This counts the occurrence of char in string
kount = string.count(char)
This prints the number of occurrence and the character
print(kount,char,end="")
This prints 's, if kount is other than 1
if kount!=1:
print("'s")
Write a program that randomly chooses among three different colors for displaying text on the screen. Use a loop to display 20 lines of text, each with a randomly chosen color. The probabilities for each color are to be as follows: white 30%, blue 10%, green 60%. Suggestion: Generate a random integer between 0 and 9. If the resulting integer falls in the range 0 to 2 (inclusive), choose white. If the integer equals to 3, choose blue. If the integer falls in the range 4 to 9 (inclusive), choose green. Test your program by running it ten times, each time observing whether the distribution of line colors appears to match the required probabilities.
INCLUDE Irvine32.inc
.data
msgIntro byte "This is Your Name's fourth assembly extra credit program. Will randomly",0dh,0ah
byte "choose between three different colors for displaying twenty lines of text,",0dh,0ah
byte "each with a randomly chosen color. The color probabilities are as follows:",0dh,0ah
byte "White=30%,Blue=10%,Green=60%.",0dh,0ah,0
msgOutput byte "Text printed with one of 3 randomly chosen colors",0
.code
main PROC
;
//Intro Message
mov edx,OFFSET msgIntro ;intro message into edx
call WriteString ;display msgIntro
call Crlf ;endl
call WaitMsg ;pause message
call Clrscr ;clear screen
call Randomize ;seed the random number generator
mov edx, OFFSET msgOutput;line of text
mov ecx, 20 ;counter (lines of text)
L1:;//(Loop - Display Text 20 Times)
call setRanColor ;calls random color procedure
call SetTextColor ;calls the SetTextColor from library
call WriteString ;display line of text
call Crlf ;endl
loop L1
exit
main ENDP
;--
setRanColor PROC
;
; Selects a color with the following probabilities:
; White = 30%, Blue = 10%, Green = 60%.
; Receives: nothing
; Returns: EAX = color chosen
;--
mov eax, 10 ;range of random numbers (0-9)
call RandomRange ;EAX = Random Number
.IF eax >= 4 ;if number is 4-9 (60%)
mov eax, green ;set text green
.ELSEIF eax == 3 ;if number is 3 (10%)
mov eax, blue ;set text blue
.ELSE ;number is 0-2 (30%)
mov eax, white ;set text white
.ENDIF ;end statement
ret
setRanColor ENDP
What are some 5 constraints in using multimedia in teaching
Answer:
Explanation:
Technological resources, both hardware and software
Technological skills, for both the students and teacher
Time required to plan, design, develop, and evaluate multimedia activities
Production of multimedia is more expensive than others because it is made up of more than one medium.
Production of multimedia requires an electronic device, which may be relatively expensive.
Multimedia requires electricity to run, which adds to the cost of its use
There are constraints in using multimedia in teaching; The Technological resources, both hardware and software Also, Technological skills, for both the students and teacher
What is a characteristic of multimedia?
A Multimedia system has four characteristics and they are use to deliver the content as well as the functionality.
The Multimedia system should be be computer controlled. The interface is interactive for their presentation and lastly the information should be in digital.
There are constraints in using multimedia in teaching;
The Technological resources, both hardware and software
Also, Technological skills, for both the students and teacher
Since Time required to plan, design, develop, and evaluate multimedia activities
The Production of multimedia is more expensive than others because it is made up of more than one medium.
The Production of multimedia requires an electronic device, which may be relatively expensive.
The Multimedia requires electricity to run, which adds to the cost of its use.
Learn more about multimedia here;
https://brainly.com/question/9774236
#SPJ2
Why is it useful for students to practice the MLA and APA citation methods?
Answer:
Citing or documenting the sources used in your research serves three purposes:
It gives proper credit to the authors of the words or ideas that you incorporated into your paper.
It allows those who are reading your work to locate your sources, in order to learn more about the ideas that you include in your paper.
Write a program that reads in an integer, and breaks it into a sequence of individual digits. Display each digit on a separate line. For example, the input 16384 is displayed as 1 6 3 8 4 You may assume that the input has no more than five digits and is not negative.
Answer:
The program in Python is as follows:
num = int(input())
for i in str(num):
print(int(i))
Explanation:
This gets input for the number
num = int(input())
This converts the number to string and iterates through each element of the string
for i in str(num):
This prints individual digits
print(int(i))
what is programming language?
Answer:
A programming language is a formal language comprising a set of strings that produce various kinds of machine code output. Programming languages are one kind of computer language, and are used in computer programming to implement algorithms. Most programming languages consist of instructions for computers
Answer:
The artificial languages that are used to develop computer programs are called programming language . hope this help!
Code Example 17-1 class PayCalculator { private: int wages; public: PayCalculator& calculate_wages(double hours, double wages) { this->wages = hours * wages; return *this; } double get_wages() { return wages; } }; (Refer to Code Example 17-1.) What coding technique is illustrated by the following code? PayCalculator calc; double pay = calc.calculate_wages(40, 20.5).get_wages(); a. self-referencing b. function chaining c. dereferencing d. class chaining
Answer:
The answer is "Option b".
Explanation:
Function chaining is shown by this code, as the functions are called one after the other with one statement. Whenever you want to call a series of methods through an object, that technique is beneficial. Just because of that, you may give the same effect with less code and have a single given value only at top of the leash of operations.
write a program that keeps taking integers until the user enters in python
int main {
//variables
unsigned long num = 0;
std::string phrase = " Please enter your name for confirmation: " ;
std::string name;
//codes
std::cout << phrase;
std::cin>> name;
while ( serial.available() == 0 ) {
num++;
};
if ( serial.avaliable() > 0 ) {
std::cout << " Thank you for your confirmation ";
};
};
What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initialization list to the first two elements but leaves the other elements with the values currently in memory. b. It assigns the two values in the initialization list to the first and second elements, third and fourth elements, and fifth and sixth elements. c. This statement is invalid. d. It assigns the two values in the initialization list to the first two elements and default values to the other elements.
Answer:
It assigns the two values in the initialization list to the first two elements and default values to the other elements.
Explanation:
Given
The array initialization
Required
Interpret the statement
double gallons[6] implies that the length/size of the array gallons is 6.
In other words, the array will hold 6 elements
{12.75, 14.87} implies that only the first two elements of the array are initialized ; the remain 4 elements will be set to default 0.
How should you mark the query if it is a valid one?
A) Gibberish or Vague
B) Profane
C) Foreign Language
D) Valid
E) None
Answer:
None
HOPE IT WILL HELP YOU.
MARK THE ANSWER BRAINLIST
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
Answer:
keylogger.
Explanation:
A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.
Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.
In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.
An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.
In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.