Answer:
Memory-mapped I/O and port-mapped I/O are two complementary methods of performing input/output between the central processing unit and peripheral devices in a computer. An alternative approach is using dedicated I/O processors, commonly known as channels on mainframe computers, which execute their own instructions.
Create and configure databases in oracle database management system operation administration
Answer:
You typically create a database during Oracle Database software installation. However, you can also create a database after installation.
Reasons to create a database after installation are as follows:
You used Oracle Universal Installer (OUI) to install software only, and did not create a database. You want to create another database (and database instance) on the same host computer as an existing Oracle database. In this case, this chapter assumes that the new database uses the same Oracle home as the existing database. You can also create the database in a new Oracle home by running OUI again. You want to make a copy of (clone) a database.
mention two strategies of collecting data
When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.
Answer:
Parameter
Explanation:
q: When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.
a: Parameter
This means that the surface area is composed of the base area (i.e., the area of bottom square) plus the side area (i.e., the sum of the areas of all four triangles). You are given the following incomplete code to calculate and print out the total surface area of a square pyramid: linclude > h: base azea- calcBasekrea (a) : cout << "Base auxface area of the squaze pyzamid is" << base area << "square feet."< endi: // add your funetion call to calculate the side ares and assign // the zesult to side area, and then print the result //hdd your function call to print the total surface area return 0F float calcBaseArea (float a) return pou (a, 2) /I add your function definicion for calcSideärea here // add your function definition tor prntSurfârea here This code prompts for, and reads in the side length of the base (a) and height of a square pyramid (h) in feet, and then calculates the surface area. The function prototype (i.e. function declaration), function definition, and function call to calculate and print the base area has already been completed for you. In the above program, a and h are declared in the main function and are local to main. Since a is a local variable, notice how the length a must be passed to calcBaseArea to make this calculation. One of your tasks is to add a new function called calesidearea that computes and returns the side area of the square pyramid. Given that the formula uses both the length a and height h of the square pyramid, you must pass these two local variables to this function. You will assign the returned value of this function to side area and then print the value to the terminal. Refer to what was done for calcBaseArea when adding your code. Your other task is to add a new function called prntsprfArea that accepts the base area and side area values (i.e, these are the parameters) and prints out the total surface area of the square pyramid inside this function. Since this function does not return a value to the calling function, the return type of this function should be void Now, modify the above program, referring to the comments included in the code. Complete the requested changes, and then save the file as Lab7A. opp, making sure it compiles and works as expected. Note that you will submit this file to Canvas
Answer:-
CODE:
#include <iostream>
#include<cmath>
using namespace std;
float calcBaseArea(float a);
float calcSideArea(float s,float l);
void prntSprfArea(float base_area,float side_area);
int main()
{
float h;
float a;
float base_area
float side_area;
cout<<"Enter the side length of the base of the square pyramid in feet : ";
cin>>a;
cout<<"Enter the height of the square pyramid in feet : ";
cin>>h;
base_area=calcBaseArea(a);
side_area=calcSideArea(a,h);
cout<<"Base surface area of the square pyramid is "<<base_area<<" square feet. "<<endl;
cout<<"Side area of the square pyramid is "<<side_area<<" square feet."<<endl;
prntSprfArea(base_area,side_area);
return 0;
}
float calcBaseArea(float a)
{
return pow(a,2);
}
float calcSideArea(float s,float l)
{
float area=(s*l)/2;
return 4*area;
}
void prntSprfArea(float base_area,float side_area)
{
cout<<"Total surface area of the pyramid is "<<base_area+side_area<<" square feet.";
OUTPUT:
Compute change
A cashier distributes change using the maximum number of five dollar bills, followed by one dollar bills. For example, 19 yields 3 fives and 4 ones. Write a single statement that assigns the number of one dollar bills to variable numOnes, given amountToChange. Hint: Use the % operator.
import java.util.Scanner;
public class ComputingChange {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int amountToChange;
int numFives;
int numOnes;
amountToChange = scnr.nextInt();
numFives = amountToChange / 5;
/* Your solution goes here */
System.out.print("numFives: ");
System.out.println(numFives);
System.out.print("numOnes: ");
System.out.println(numOnes);
}
}
Answer:
Explanation:
The following code is written in Java and modified to do as requested. It asks the user to enter a number that is saved to the amountToChange and then uses the % operator to calculate the number of 5 dollar bills and the number of 1 dollar bills to give back. A test case has been provided and the output can be seen in the attached image below.
import java.util.Scanner;
class ComputingChange {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int amountToChange;
int numFives;
int numOnes;
amountToChange = scnr.nextInt();
numFives = amountToChange / 5;
/* Your solution goes here */
numOnes = amountToChange % 5;
System.out.print("numFives: ");
System.out.println(numFives);
System.out.print("numOnes: ");
System.out.println(numOnes);
}
}
Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent.
Answer: data warehouse
Explanation:
Data-mining agents work with a Data warehouse which helps in detecting trends and discovering new information.
A data warehouse refers to the large collection of business data that is used by organizations to make decisions. It has to do with the collection and the management of data from different sources which are used in providing meaningful business insights.
The correct order to follow for a technology awareness strategy is ____________________. Group of answer choices
Answer:
a. Determine your needs
b. make the Assessments of the resources available to you,
c. do a ranking of the resources in order of their usefulness to you,
d. create or allow the time to make use of the resources.
Explanation:
technology strategy is a concept that gives the important elements of a department and how these elements can interact with each other in order to get the continuous value.
The correct order is to first determine what your needs are, then you carry out an assessment of all the resources that you have at your disposal, then you rank these resources from the most useful to the least and the last is for you to create the time that you would have to use these resources.
what is the answer to the question asked in the picture attached below
Answer:
option - b
Explanation:
i think this is the right answer..
In this technique, each attribute is associated with a specific feature of a face, and the attribute value is used to determinethe way a facial feature is expressed. This technique is called._______________
Answer:
Chernoff faces.
Explanation:
Chernoff faces is a data visualization technique that was developed by a statistician named Herman Chernoff. He introduced this data visualization technique to the world in 1973 to represent multivariate or multidimensional data containing at least eighteen (18) variables.
In Chernoff faces, each attribute is associated with a specific feature of a face (nose, eyes, ears, hair, mouth, and eyebrows), and the attribute value with respect to size, shape, orientation, colour and placement is used to determine the way a facial feature is expressed.
The Chernoff face is a technique designed and developed to help detect similarities between different items and discern subtle changes in facial expressions from the perspective of an observer.
How did the military in the early 1900s move resources?
engines.
In the early 1900s, military moved their resources to distant locations with the help of
Answer:
In the early 1900s, military moved their resources to distant locations with the help of trains, ships, and, to a lesser extent, horse-drawn wagons. This was so because at that time airplanes did not yet exist, capable of transporting inputs to any part of the world in a very short period of time. Therefore, inputs and resources were brought by sea and, if impossible, through land, using railways or highways.
The purpose of the five-entity minimum, six-entity maximum is to establish a relatively small baseline for you to keep the scope of your database project constrained.
a. True
b. False
Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?
Answer:
Denial of service attack.
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, DOS attack, etc.
A denial of service (DOS) attack is a form of cyber attack that involves either the exploitation of a software flaw or overwhelmingly floods a computer system in a network with traffic in order to prevent authorized users from performing legitimate activities or transactions.
Some of the ways to prevent vulnerability or cyber attacks in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
Resize vector countDown to have newSize elements. Populate the vector with integers {newSize, newSize - 1, ..., 1}. Ex: If newSize = 3, then countDown = {3, 2, 1}, and the sample program outputs:
#include
#include
using namespace std;
int main() {
vector countDown(0);
int newSize = 0;
int i = 0;
newSize = 3;
STUDENT CODE
for (i = 0; i < newSize; ++i) {
cout << countDown.at(i) << " ";
}
cout << "Go!" << endl;
return 0;
}
Answer:
Following are the code to the given question:
#include <iostream>//defining header file
#include <vector>//defining header file
#include <numeric>//defining header file
using namespace std;
int main()//main method
{
vector<int> countDown(0);//defing an integer array variable countDown
int newSize = 0;//defing an integer variable newSize that holds a value 0
int i = 0;//defing an integer variable i that initialize with 0
newSize = 3;// //use newSize to hold a value
countDown.resize(newSize,0);// calling the resize method that accepts two parameters
for (i = 0; i < newSize; ++i)//defining a loop that reverse the integer value
{
countDown[i] = newSize -i;//reverse the value and store it into countDown array
cout << countDown.at(i) << " ";//print reverse array value
}
cout << "Go!" << endl;//print message
return 0;
}
Output:
3 2 1 Go!
Explanation:
In the given code inside the main method an integer array "countDown" and two integer variables "newSize and i" is declared that initializes a value that is 0.
In the next step, an array is used that calls the resize method that accepts two parameters, and define a for a loop.
In this loop, the array is used to reverse the value and print its value with the message.
While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?
Answer:
Bro this is my area the answer is WPA2 and AES
Explanation:
its because AES is a more secure encryption protocol introduced with WPA2. AES isn't some creaky standard developed specifically for Wi-Fi networks, either. It's a serious worldwide encryption standard that's even been adopted by the US government.
There are many possible variations in wireless network design depending on the surroundings.
What is wireless network?Even in a complicated single site, different wireless networks running on the same hardware as part of the broader wireless LAN environment can have different network configuration fundamentals needed for a successful deployment.
At the same time, a number of essential network configuration activities are part of any successful wireless project's typical chores. Let's look at the broad and specific procedures that wireless experts should take while setting up enterprise-grade Wi-Fi networks.
Therefore, There are many possible variations in wireless network design depending on the surroundings.
To learn more about wifi, refer to the link:
https://brainly.com/question/6145118
#SPJ5
3. Most widely used structure for recording database modifications is called
A. Scheduling
B. Buffering
C. Log
D. Blocking
Answer:
C. log
Explanation:
The log is a sequence of log records, recording all the update activities in the database
hope this helps
Answer:
C. Log is the
answer
Explanation:
a sequence of log records recording all update activity in database
12. How many different documents can
you have open at one time?
Answer:
10 documents ^_^
Explanation:
I can open it at the same time on my laptop ●~●
A security administrator currently spends a large amount of time on common security tasks, such aa report generation, phishing investigations, and user provisioning and deprovisioning This prevents the administrator from spending time on other security projects. The business does not have the budget to add more staff members.
Which of the following should the administrator implement?
A. DAC
B. ABAC
C. SCAP
D. SOAR
Answer: SOAR
Explanation:
SOAR (security orchestration, automation and response) refers to compatible software programs wfuvg allows an organization to collect data that has to do with security threats and also enables them respond to security events without the needs of a human assistance.
Since the administrator doesn't have time on other security projects, the SOAR will be vital in this regard.
write a program that assigns values to
three variables, assigns the sum (adds
the three values to a variable called
total and prints total.
Explanation:
10:A program that assigns the sum 20,30,40
20: input 20,30,40
30:sum input
40: print total
End
Switched Ethernet, similar to shared Ethernet, must incorporate CSMA/CD to handle data collisions. True False
Answer:
False
Explanation:
The Carrier-sense multiple access with collision detection (CSMA/CD) technology was used in pioneer Ethernet to allow for local area networking. Carrier-sensing aids transmission while the collision detection feature recognizes interfering transmissions from other stations and signals a jam. This means that transmission of the frame must temporarily stop until the interfering signal is abated.
The advent of Ethernet Switches resulted in a displacement of the CSMA/CD functionality.
Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the print member function and a separate cout statement to output courseStudents's data. End with a newline. Sample output from the given program:
#include
#include
using namespace std;
class PersonData {
public:
void SetName(string userName) {
lastName = userName;
};
void SetAge(int numYears) {
ageYears = numYears;
};
// Other parts omitted
void PrintAll() {
cout << "Name: " << lastName;
cout << ", Age: " << ageYears;
};
private:
int ageYears;
string lastName;
};
class StudentData: public PersonData {
public:
void SetID(int studentId) {
idNum = studentId;
};
int GetID() {
return idNum;
};
private:
int idNum;
};
int main() {
StudentData courseStudent;
/* Your solution goes here */
return 0;
}
Answer:
Replace /* Your solution goes here */
with the following:
courseStudent.SetName("Smith");
courseStudent.SetAge(20);
courseStudent.SetID(9999);
courseStudent.PrintAll();
cout <<courseStudent.GetID();
Explanation:
From the given code segment, we have the following methods defined under the StudentData class;
SetName -> It receives name from the main
SetAge -> It receives age from the main
SetID --> It receives ID from the main and passes it to GetID method
printID --> Prints all the required output.
So, we have:
Pass name to setName
courseStudent.SetName("Smith");
Pass age to setAge
courseStudent.SetAge(20);
Pass ID to setID
courseStudent.SetID(9999);
Print all necessary outputs
courseStudent.PrintAll();
Manually print the student ID
cout <<courseStudent.GetID();
A browser is a program that allow
A. users transfer messages and files through internet.
B. users search for relevant information on the WWW.
C. users to access and view web pages on the internet.
D. users exchange real-time messages or files with another online user
C. users to access and view web pages on the internet.
True or false, an implicitly unwrapped optional variable must have an exclamation mark affixed after it every time it is used. 答案选项组
Answer:
False.
Explanation:
Implicit unwrapped optional variables are those which are at option and they might be nil. It is not necessary that all implicit unwrapped optional variables should have an exclamation mark. Swift may eliminate the need for unwrapping.
If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page _____ the last word on a page ______ (recall: 1 word is 4 bytes)
Answer:
Explanation:
If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page the last word on a page.
Use NAND operator to write; P or Q, and P -Q make an everyday implication sentence using only NAND
Answer:
Hence the answer is given as follows,
Explanation:
By using the NAND operator:-
P or Q and P -Q make an everyday implication sentence using the only NAND is given as,
The message signal m(t) = 10cos(1000t) frequency modulates the carrier c(t) = 10cos(2fct). The modulation index is 10.
1) Write an expression for the modulated signal u(t).
2) What is the power of the modulated signal.
3) Find the bandwidth of the modulated signal.
Answer:
1) 10cos ( 2πfct + 10sin 2πfmt )
2) 50 watts
3) 1000 Hz
Explanation:
m(t) = 10cos(1000πt)
c(t) = 10cos(2πfct )
modulation index ( = 10
1) expression for modulated signal ( u(t) )
u(t) = Ac(cos 2πfct ) + A (cos 2πfct m(t) ) Am cos2πf mt
= 10cos 2πfct + 100 cos 2πfct cos2π500t
= 10cos ( 2πfct + 10sin 2πfmt )
2) power of modulated signal
power of modulated signal μ^2 / 2 ]
= 10^2/2 ]
= 50 watts
3) Bandwidth
B = 2fm = 2 * 500 = 1000 Hz
hub stake should always be provided with a lath stake so that the information about what the hub represents can be written on the lath stake True False
Answer:
True
Explanation:
To protect them from becoming disturbed by construction operations, hub stakes are placed on both sides of a roadway at a certain distance outside the work zone. The final stakes are connected to the hub stakes, which are used to write the essential information.
As a result, hub stakes are always accompanied with stakes.
Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices A compilation error will occur. A run time error will occur. An inheritance error will occur. No problem will occur at all.
Answer:
A compilation error will occur.
Explanation:
The % operator does not accept a float as its right-hand operand.
Which control program flow options runs to the end of the code block and resumes the break mode at the statement that follows?
Answer:
Step Out
Explanation:
In the field of computer science, the control flow or the flow of control is defined as the order where the individual statements, [tex]\text{function calls}[/tex] or instructions of a program are [tex]\text{evaluated or executed. }[/tex]
The Step Out control flow program runs to the [tex]\text{end of the code block}[/tex] and it resumes the [tex]\text{break mode}[/tex] at the statement that it follows.
Carl is planning for a large advertising campaign his company will unveil. He is concerned that his current e-commerce server farm hosted in a public cloud will be overwhelmed and suffer performance problems. He is researching options to dynamically add capacity to the web server farm to handle the anticipated additional workload. You are brought in to consult with him on his options. What can you recommend as possible solutions
Answer:
Cloud Bursting
Explanation:
One of the best possible solutions for this scenario would be Cloud Bursting. This is a solution of using Cloud Server services to handle the server farm workload. The difference is that Cloud Bursting allows the company to use the Cloud services only when their own personal web server farms hit peak demand and can no longer handle the incoming demand. The excess demand is outsourced to the Cloud Server and lets them handle it dynamically without the company having to add any additional hardware to their server farm.
Eureka! Is a telephone and Internet-based concierge service that specializes in obtaining things that are hard to find (e.g., Super Bowl tickets, first-edition books from the 1500s, Faberge eggs). It currently employs 60 staff members who work 24 hours per day (over three shifts). Staff answer the phone and respond to requests entered on the Eureka! Web Site. Much of their work is spent on the phone and on computers searching on the Internet. What type of connections should Eureka! consider from it’s offices to the outside world, in terms of phone and Internet? Outline the pros and cons of each alternative below and make a recommendation. The company has four alternatives:
1. Should it use traditional analog services, with standard voice lines, and use modems to dial into its ISP ($40 per month for each voice line plus $20 per month for each Internet access line)?
2. Should the company use standard voice lines but use DSL for its data ($40 per month per line for both services)?
3. Should the company separate its voice and data needs, using standard analog services for voice but finding some advanced digital transmission services for data ($40 per month for each voice line and $300 per month for a circuit with 1.5 Mbps for data)?
4. Should the company search for all digital services for both voice and data ($60 per month for an all-digital circuit that provides two PCM phone lines that can be used for two voice calls, one voice call and one data call at 64 Kbps, or one data call at 128 Kbps)?
5. Should the company invest in a modern-day fiber optic 10Mb/s flex? Research price.
NOTE: PLEASE PROVIDE DETAIL ANSWER OF THIS QUESTION.
Explanation:
Should the company separate its voice and data needs, using standard analog services for voice but finding some advanced digital transmission services for data ($40 per month for each voice line and $300 per month for a circuit with 1.5 Mbps for data)?