Write a program that reads a file name from the keyboard. The file contains integers, each on a separate line. The first line of the input file will contain the number of integers in the file. You then create a corresponding array and fill the array with integers from the remaining lines. If the input file does not exist, give an appropriate error message and terminate the program. After integers are stored in an array, your program should call the following methods in order, output the intermediate results and count statistics on screen, and at end output even integers and odd integers to two different files called even.out and odd.out.
Implement the following methods in the program:
* public static int[] inputData() – This method will ask user for a file name, create an array, and store the integers read from the file into the array. If input file does not exist, give an appropriate error message and terminate the program.
* public static void printArray(int[] array) – This method will display the content of the array on screen. Print 10 integers per line and use printf method to align columns of numbers.
public static void reverseArray(int[] array) – This method will reverse the elements of the array so that the 1st element becomes the last, the 2nd element becomes the 2nd to the last, and so on.
* public static int sum(int[] array) – This method should compute and return the sum of all elements in the array.
* public static double average(int[] array) – This method should compute and return the average of all elements in the array.
* public static int max(int[] array) – This method should find and return the largest value in the array.
* public static int min(int[] array) – This method should find and return the smallest value in the array.
* public static void ascendingSelectionSortArray(int[] array) – This method will use Selection Sort to sort (in ascending order) the elements of the array so that the 1st element becomes the smallest, the 2nd element becomes the 2nd smallest, and so on.
* public static void desendingBubbleSortArray(int[] array) – This method will Bubble Sort to sort (in descending order) the elements of the array so that the 1st element becomes the largest, the 2nd element becomes the 2nd largest, and so on.
* public static void outputData(int[] array) – This method will create two output files called even.out and odd.out. Scan through the entire array, if an element is even, print it to even.out. If it is odd, print the element to odd.out.
Answer:
Explanation:
import java.util.Scanner;
import java.io.*;
public class ArrayProcessing
{
public static void main(String[] args) throws IOException
{
Scanner kb = new Scanner(System.in);
String fileName;
System.out.print("Enter input filename: ");
fileName = kb.nextLine();
File file = new File(fileName);
if(!file.exists())
{
System.out.println("There is no input file called : " + fileName);
return;
}
int[] numbers = inputData(file);
printArray(numbers);
}
public static int[] inputData(File file) throws IOException
{
Scanner inputFile = new Scanner(file);
int index = 1;
int size = inputFile.nextInt();
int[] values = new int[size];
while(inputFile.hasNextInt() && index < values.length)
{
values[index] = inputFile.nextInt();
index++;
}
inputFile.close();
return values;
}
public static void printArray(int[] array)
{
int count = 1;
for (int ndx = 1; ndx < array.length; ndx++)
{
System.out.printf("%5.f\n", array[ndx]);
count++;
}
if(count == 10)
System.out.println("");
}
}
Write a Java code for the following requirement.
File encryption is the science of writing the contents of a file in a secret code.
The encryption program should work like a filter, reading the contents of one file, modifying the data into code, and then writing the code contents out to a second file. The second file will be a version of the first file, but written in a secret code.
Although there are complex encryption techniques, you should come up with a simple one of your own. For example, you could read the first file one character at a time and add 10 to the character code of each character before it is written to the second file.
Answer:
import java.io.File;
import java.io.FileInputStream;
import java.io.FileNotFoundException;
import java.io.FileOutputStream;
import java.io.IOException;
import java.util.Scanner;
public class EncryptFileData
{
public static void main(String args[]) throws IOException, FileNotFoundException
{
String inputFileName="input.txt";
String outputFileName="EncryptedFile.txt";
String decryptFileName="DecryptedFile.txt";
byte codeValue;
Scanner sc=new Scanner(System.in);
//Accept code value from user
System.out.println("Enter the value of code");
codeValue=sc.nextByte();
//Encrypt the input file
encryptFileContent(inputFileName, codeValue,outputFileName);
//Decrypt the input file
decryptFileContent(outputFileName, codeValue,decryptFileName);
}
//function to encrypt the input file
private static void encryptFileContent(String inputFileName,
byte encodeValue, String outputFileName) throws IOException, FileNotFoundException{
File file = new File(inputFileName);
FileInputStream fin = new FileInputStream(file);
FileOutputStream fout = new FileOutputStream(outputFileName);
try{
while(fin.available() != 0){
int inData = fin.read();
//For every character in input add code value and
//write result to file "EncryptedFile.txt"
fout.write(inData+encodeValue);
}
}finally{
fin.close();
fout.close();
}
}
//function to decrypt the encrypted file
private static void decryptFileContent(String inputFileName,
byte encodeValue, String outputFileName) throws IOException, FileNotFoundException{
File file = new File(inputFileName);
FileInputStream fin = new FileInputStream(file);
FileOutputStream fout = new FileOutputStream(outputFileName);
try{
while(fin.available() != 0){
int inData = fin.read();
//For every character in encrypted file
//subtract the code value from each character and
//write it to file "DecryptedFile.txt"
fout.write(inData-encodeValue);
}
}finally{
fin.close();
fout.close();
}
}
}
Explanation:
Given the following conditions to follow in the question;
=> "The encryption program should work like a filter, reading the contents of one file, modifying the data into code, and then writing the code contents out to a second file. "
=> "The second file will be a version of the first file, but written in a secret code."
Thus, the Java code is given below(one can just copy and run it to give a sample output of: Enter the value of code 1 2.
The Java code is;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileNotFoundException;
import java.io.FileOutputStream;
import java.io.IOException;
import java.util.Scanner;
public class EncryptFileData
{
public static void main(String args[]) throws IOException, FileNotFoundException
{
String inputFileName="input.txt";
String outputFileName="EncryptedFile.txt";
String decryptFileName="DecryptedFile.txt";
byte codeValue;
Scanner sc=new Scanner(System.in);
//Accept code value from user
System.out.println("Enter the value of code");
codeValue=sc.nextByte();
//Encrypt the input file
encryptFileContent(inputFileName, codeValue,outputFileName);
//Decrypt the input file
decryptFileContent(outputFileName, codeValue,decryptFileName);
}
//function to encrypt the input file
private static void encryptFileContent(String inputFileName,
byte encodeValue, String outputFileName) throws IOException, FileNotFoundException{
File file = new File(inputFileName);
FileInputStream fin = new FileInputStream(file);
FileOutputStream fout = new FileOutputStream(outputFileName);
try{
while(fin.available() != 0){
int inData = fin.read();
//For every character in input add code value and
//write result to file "EncryptedFile.txt"
fout.write(inData+encodeValue);
}
}finally{
fin.close();
fout.close();
}
}
//function to decrypt the encrypted file
private static void decryptFileContent(String inputFileName,
byte encodeValue, String outputFileName) throws IOException, FileNotFoundException{
File file = new File(inputFileName);
FileInputStream fin = new FileInputStream(file);
FileOutputStream fout = new FileOutputStream(outputFileName);
try{
while(fin.available() != 0){
int inData = fin.read();
//For every character in encrypted file
//subtract the code value from each character and
//write it to file "DecryptedFile.txt"
fout.write(inData-encodeValue);
}
}finally{
fin.close();
fout.close();
}
}
}
In a TCP connection, the initial sequence number at the client site is 2,171. The client opens the connection, sends only one segment carrying 1,000 bytes of data, and closes the connection. What is the value of the sequence number in each of the following segments sent by the client?
a. The SYN segment?
b. The data segment?
c. The FIN segment?
explain for full credit
Answer:
a. 2171
b. 2172
c .3172
Explanation:
a . As we know that sequence number is 32 bits has a two responsibility
When the SYN flag is set to the value 1 then that is the number of a initial list. That sequence number +1 is then the sequence number of the real initial data bit.When the SYN flag is set to the value 0 then for the current session is equals to the average sequence number of this section's initial data Bit.Initially the sequence number at the client site is 2,171 that is equals to the he SYN segment i.e 2171.
b The data segment is determined by the following formula
[tex]=sequence \ number\ in\ the\ client site\ +\ 1[/tex]
[tex]=2,171 +1[/tex]
[tex]=2172[/tex]
c As mention in the question there are 1,000 bytes of data,
so FIN segment can be determined by the
[tex]=2171+1000+1[/tex]
[tex]=3172[/tex]
Write a function with this prototype:
#include
void numbers(ostream& outs, const string& prefix, unsigned int levels);
The function prints output to the ostream outs. The output consists of the String prefix followed by "section numbers" of the form 1.1., 1.2., 1.3., and so on. The levels argument determines how many levels the section numbers have. For example, if levels is 2, then the section numbers have the form x.y. If levels is 3, then section numbers have the form x.y.z. The digits permitted in each level are always '1' through '9'. As an example, if prefix is the string "THERBLIG" and levels is 2, then the function would start by printing:
THERBLIG1.1.THERBLIG1.2.THERBLIG1.3.and ends by printing:THERBLIG9.7.THERBLIG9.8.THERBLIG9.9.The stopping case occurs when levels reaches zero (in which case the prefix is printed once by itself followed by nothing else).The string class from has many manipulation functions, but you'll need only the ability to make a new string which consists of prefix followed by another character (such as '1') and a period ('.'). If s is the string that you want to create and c is the digit character (such as '1'), then the following statement will correctly form s:s = (prefix + c) + '.';This new string s can be passed as a parameter to recursive calls of the function.
Answer:
Following are the code to this question:
#include <iostream> //defining header file
using namespace std;
void numbers(ostream &outs, const string& prefix, unsigned int levels); // method declaration
void numbers(ostream &outs, const string& prefix, unsigned int levels) //defining method number
{
string s; //defining string variable
if(levels == 0) //defining condition statement that check levels value is equal to 0
{
outs << prefix << endl; //use value
}
else //define else part
{
for(char c = '1'; c <= '9'; c++) //define loop that calls numbers method
{
s = prefix + c + '.'; // holding value in s variable
numbers(outs, s, levels-1); //call method numbers
}
}
}
int main() //defining main method
{
numbers(cout, "THERBLIG", 2); //call method numbers method that accepts value
return 0;
}
Output:
please find the attachment.
Explanation:
Program description:
In the given program, a method number is declared, that accepts three arguments in its parameter that are "outs, prefix, levels", and all the variable uses the address operator to hold its value. Inside the method a conditional statement is used in which string variable s and a conditional statement is used, in if the block it checks level variable value is equal to 0. if it is false it will go to else block that uses the loop to call method. In the main method we call the number method and pass the value in its parameter.Write short notes on a. Transaction Processing System (TPS)
Answer: A Transaction Processing System (TPS) is a type of information system that collects, stores, modifies and retrieves the data transactions of an enterprise. Rather than allowing the user to run arbitrary programs as time-sharing, transaction processing allows only predefined, structured transactions.
Three cycles: Transaction processing systems generally go through a five-stage cycle of 1) Data entry activities 2) Transaction processing activities 3) File and database processing 4) Document and report generation 5) Inquiry processing activities.
Explanation: hope this helps!
A data warehouse differs from an operational database in which of the following ways?Select one:a. Data in a data warehouse are not stored in tablesb. Data warehouses do not use primary key / foreign key relationshipsc. Data warehouse data are often stored in a dimensional databased. Both b and c are correct
Answer:
The second last point i.e "Data warehouse data are often stored in a dimensional databased " is the correct answer to the given question .
Explanation:
The main objective of the operation applications is implemented and enable the handling of large volumes transactions where as the data warehouses objective of the applications is implemented and enable the handling of large volumes of analytical transactions.
The operational database is deal with the current data where as the data warehouse are deal with the historical data .The operational database is deal with the business of real time where as the data warehouse is deal with analysis processing .All the other options are not correct for the data warehouse difference from the operational database that's why these options are incorrect .It’s pretty much impossible to have a bug-free game upon initial release for anything but the simplest game.
True
False
Answer:
True
Explanation:
There are usually thousands of line of code and the programmers have to account for serveral different things. For that reason, most complex games will have at least some bugs.
Stephi owns a footwear store She wants to create a graph of the number of sneakers sold, brandShe copies the Sneaker Sales query results from the database What should be her next step?
ANSWER: A) pasting the query results into a spreadsheet
If Stephi owns a footwear store and she wants to create a graph of the number of sneakers sold, and she copies the Sneaker Sales query results from the database, her next step will be: pasting the query results into a spreadsheet.
How to create the graphSpreadsheets are known for their automatic graph-producing features. This means that if you have a result from a table that is obtained from a query, you can plot the result in any kind of graph if the table is transferred to a spreadsheet.
So, for Stephi to plot the graph, she should copy and paste the result into a spreadsheet.
Learn more about spreadsheets here:
https://brainly.com/question/4965119
#SPJ4
A vice president at Alexander Rocco Corporation says he received a hostile e-mail message from an employee in the Maui office. Human Resources has informed him that the message contents are grounds for termination, but the vice president wonders whether the employee actually sent the message. When confronted, the employee claims he didn't send the message and doesn’t understand why the message shows his return address.
Required:
Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it appear to come from another employee’s account. Be sure to include some SMTP commands the culprit might have used.
Answer:
=> E-mail is sent using SMTP server by using command such as;
telnet smpt.server.name 25.
(Where 25 = port and telnet smpt.server.name = name of the server).
Explanation:
Date: June 2, 2020.
To: The vice president.
From: Codedmog101
SUBJECT: E-mail Forging.
Due to the recent issue going on in the company concerning an employee sending a message to you, I saddled with the responsibility of writting to you the steps an employee might have taken to create an e-mail message and make it appear to come from another employee’s account.
(1). The SMTP servers can be configured in such a way that it can be used by spammers to send message to another person(recipient) and it will look like it is not the spammer that sent it.
(2). The person spamming another person will use an unsecured SMTP servers with command such as the one given below;
telnet smpt.server.name 25.
(3). Once (2) has been connected, the spammer can then input the e-mail of the person he or she is spamming.
(4). The recipient address will be type in by the spammer too
(5). The subject, date and the body then enter.
(5). After (5) above the message will be sent to the recipient from the spammer but it will indicate another person.
These are the steps taken to create an e-mail message and make it appear to come from another employee’s account.
Best regards,
Codedmog101
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. As the security consultant, the company needs you to add security measures to the following systems:
a. An external website permitting users to browse and purchase widgets
b. An internal intranet website for employees to use
c. Secure remote access for engineering employees
d. Reasonable, basic firewall rules
e. Wireless coverage in the office
f. Reasonably secure configurations for laptops
Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices. Engineers will require access to internal websites, along with remote, command line access to their workstations.
Answer:
Explanation:
It is very important for the organisation to implement maximum security to the infrastructure. The main data totally belongs to the customers which mainly has customers' personal information and bank details. So, here are few things that needs to be look at as a security expert:
Encryption: the implementation of encryption tool to encrypt the data especially passwords and card details of the customer will be help in securing the infrastructure. Encryption makes it hard for anyone to be able decrypt the actual data.
Firewall: This is the beginning stage of implementing security to an infrastructure. Firewall will help greatly in blocking traffic that are unwanted from entering into the infrastructure. This also blocks untrusted traffic to the application server too.
SSL certificate: Implementation of SSL certificate to the website or the application will help greatly in securing and protecting the application for you against online hackers.
Every device belongs to your system must be implemented with anti-malware softwares that can able to detect malware present in the system.
Days of Each Month Design a program that displays the number of days in each month. The program’s output should be similar to this: January has 31 days. February has 28 days. March has 31 days. April has 30 days. May has 31 days. June has 30 days. July has 31 days. August has 31 days. September has 30 days. October has 31 days. November has 30 days. December has 31 days. Psuedocode
Answer:
A python script:
months = ["January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December"]
numbers = [31,28,31,30,31,30,31,31,30,31,30,31]
counter = 0
numbers_length=len(numbers)-1
while counter <= numbers_length:
month=months[counter]
number=numbers[counter]
print (month + " has " + str(number) + " days")
counter = counter+1
Explanation:
The Python script above will generate this output:
January has 31 days.
February has 28 days.
March has 31 days.
April has 30 days.
May has 31 days.
June has 30 days.
July has 31 days.
August has 31 days.
September has 30 days.
October has 31 days.
November has 30 days.
December has 31 days.
What must be done to translate a posttest loop expressed in the form
repeat:
(. . . )
until (. . . )
into an equivalent posttest loop expressed in the form
do:
(. . . )
while (. . . )
Answer:
num = 0
while (num < 50):
if (num is Odd)
print(num is Odd)
num = num + 1
num = 0
repeat:
if (num is Odd)
print(num is Odd)
num = num + 1
until (num>=50)
Write the method scrambleWord, which takes a given word and returns a string that contains a scrambled version of the word according to the following rules.
a. The scrambling process begins at the first letter of the word and continues from left to right.
b. If two consecutive letters consist of an "A" followed by a letter that is not an "A", then the two letters are swapped in the resulting string.
c. Once the letters in two adjacent positions have been swapped, neither of those two positions can be involved in a future swap.
The following table shows several examples of words and their scrambled versions.
word Result returned by scrambleWord(word)
"TAN" "TNA"
"ABRACADABRA" "BARCADABARA"
"WHOA" "WHOA"
"AARDVARK" "ARADVRAK"
"EGGS" "EGGS"
"A" "A"
"" ""
Answer:
Let's implement the program using JAVA code.
import java.util.*;
import java.util.ArrayList;
import java.io.*;
public class ScrambledStrings
{
/** Scrambles a given word.
* atparam word the word to be scrambled
* atreturn the scrambled word (possibly equal to word)
* Precondition: word is either an empty string or contains only uppercase letters.
* Postcondition: the string returned was created from word as follows:
* - the word was scrambled, beginning at the first letter and continuing from left to right
* - two consecutive letters consisting of "A" followed by a letter that was not "A" were swapped
* - letters were swapped at most once
*/
public static String scrambleWord(String word)
{
// iterating through each character
for(int i=0;i<word.length()-1;)
{
//if the condition matches
if(word.charAt(i)=='A' && word.charAt(i+1)!='A'){
//swapping the characters
word=word.substring(0,i)+word.charAt(i+1)+word.charAt(i)+word.substring(i+2);
//skipping the letter
i+=1;
}
//skipping the letter
i+=1;
}
return word;
}
Explanation:
Note: Please replace the "at" on the third and fourth line with at symbol that is shift 2.
quick topic
if i make severs out of Ps4's, and Xbox'es which server would be more likly to crash ?
explain give an example
Answer: Xbox because ps4 has more people on it.
Explanation: for example if I had 2 computer and 1 computer it will be easier to make servers on the one computer
A basketball game has four quarters. Write a program to do the following. Use a for loop to input scores of team A and team B in each of the four quarters. Every time a score is entered, update and display the current total score of that team. After all four quarters, compare the total scores of the two teams and display the outcome of the game (“Team A has won”, “Team B has won” or “It is a tie”)
Enter team A score in this quarter: 22
Team A score so far: 22
Enter team B score in this quarter: 24
Team B score so far: 24
Enter team A score in this quarter: 19
Team A score so far: 41
Enter team B score in this quarter: 26
Team B score so far: 50
Enter team A score in this quarter: 25
Team A score so far: 66
Enter team B score in this quarter: 22
Team B score so far: 72
Enter team A score in this quarter: 21
Team A score so far: 87
Enter team B score in this quarter: 20
Team B score so far: 92
Team B has won
Enter team A score in this quarter: 22
Team A score so far: 22
Enter team B score in this quarter: 20
Team B score so far: 20
Enter team A score in this quarter: 26
Team A score so far: 48
Enter team B score in this quarter: 21
Team B score so far: 41
Enter team A score in this quarter: 19
Team A score so far: 67
Enter team B score in this quarter: 28
Team B score so far: 69
Enter team A score in this quarter: 25
Team A score so far: 92
Enter team B score in this quarter: 23
Team B score so far: 92
It is a tie
Answer:
The program in cpp for the given scenario is shown.
#include <iostream>
using namespace std;
int main()
{
//variables declared to hold individual and total scores
int score_a=0, a;
int score_b=0, b;
//user input taken for score
for(int i=0; i<4; i++)
{
std::cout << "Enter team A score in quarter " <<(i+1)<<" : ";
cin>>a;
score_a = score_a+a;
std::cout << "Team A score so far: "<< score_a <<std::endl;
std::cout << "Enter team B score in quarter " <<(i+1)<<" : ";
cin>>b;
score_b = score_b+b;
std::cout << "Team B score so far: "<< score_b <<std::endl;
}
//winner team decided by comparing scores
if(score_a>score_b)
std::cout << "Team A has won" << std::endl;
if(score_a==score_b)
std::cout << "It is a tie." << std::endl;
if(score_a<score_b)
std::cout << "Team B has won" << std::endl;
//program ends
return 0;
}
Explanation:
1. The integer variables are declared to hold both individual scores and the total score for both the teams.
int score_a=0, a;
int score_b=0, b;
2. The variables to hold total scores are initialized to 0.
3. Inside for loop, scores for both teams for all 4 quarters are taken from the user.
4. Inside the same for loop, a running total for the score of each team is computed and displayed.
score_a = score_a+a;
score_b = score_b+b;
5. Outside the loop, the total scores of both the teams are compared and the winner team is displayed. This is done using multiple if statements.
if(score_a>score_b)
std::cout << "Team A has won" << std::endl;
if(score_a==score_b)
std::cout << "It is a tie." << std::endl;
if(score_a<score_b)
std::cout << "Team B has won" << std::endl;
6. After each message is displayed, a new line is inserted at the end using keyword, endl.
7. The program ends with a return statement.
8. The whole code is written inside main(). In cpp, it is not mandatory to write the code inside a class since cpp is not a purely object-oriented language.
9. The output is attached in an image.
what is the basic similarities and difference between the three project life cycles model?
Answer:
Project life cycle is the time taken to complete a project, from start to finish.
The three project life cycles model include the following:
PredictiveIterative and IncrementalAdaptiveExplanation:
Predictive project life cycles model: In this stage, the three major constraints of the project which are the scope, time and cost are analyzed ahead of time and this analysis is well detailed and the detailed scope of the project is done right from the start of the project.
Iterative and Incremental life cycles model: In this iterative and incremental model, the project is again split into stages that can be sequential or overlapping and at the first iteration of the project, the scope is determined ahead of time.
Adaptive life cycles model: Also in this stage, the project is split up into phases but because these phases are more rapid and ever changing unlike the other models, the processes within the scope can work in parallel.
Similarities
They make use of high level planning.They are sequential and overlapping.They make use of high level scope.Differences
The predictive life cycle model makes use of a detailed scope at the beginning of a project while the other models make use of detailed scope only for each phase.In predictive life cycle model, the product is well understood, in other models, the projects are complex and not easily understood.There is periodic customer involvement in predictive and interative life cycle model while the customer involvement in the adaptive model, the customer model is continuous.
Answer:
similarities : They all are brought in to the world somehow.
They all have difreant stages to become an adult.
Difreances: They have difreant number of stages till they become an adult.
they all have difreant lypes of growing their bodies do.
Explanation:
A manager does not know how to program code. What could he use communicate his programming ideas effectively to his team?
ANSWER: B) pseudocode
Answer:
pseudocode
Explanation:
it says the answer in the question
Answer:
B: pseudocode
Explanation:
Which of the following groups is NOT located on the Home tab?
Which of the following groups is NOT located on the Home tab?
Animations
Select the correct statement regarding channelized T-1.
a. Each T-1 frame supports 24 DSOs, therefore, the frame rate must be 64 frames per second
b. Channelized and unchannelized T-1 frames must support 24 DSOS
c. Each channelized T-1 frame contains 193 bits
d. Each T-1 frame supports 24 64kbps channels. Therefore, each frame length is 24 x 64,000 = 1,536,000 bits long.
Answer:
The answer is "Option c".
Explanation:
The Embedded T1 also known as channelized T1, it is a digital modulation system in which a T1 channel is split into 24 channels, in which each has the maximum connection speeds of 64,000 bits per second (Kbps) each of capable of supporting a specific application, which can run simultaneously to, but separately of, other programs on various channels, in this channelized T-1 the frame length is 193 bits long, and wrong choices can be described as follows:
In option a, It supports only 1 bit per second. In option b, only channelized T-1 frames support 24 DSOS. In option d, It length is 8000 frame per second.how does making a phone differ when using public phone box and cell phone
Answer:
The public phone box transmit electronic signals through cable while cell phones transmit electromagnetic signals wirelessly.
Explanation:
Public phone boxes are reserved booth for making calls. It uses dial tone frequency to tap to a receiver's frequency. They use a dedicated cable line to transmit electronic signals to a central automatic switch that relays the signal to the recipient's line.
A cell phone has antennas that transmits the electromagnetic wave signal to a cell tower, which in turn transmit to other towers to locate the receiver. The receiver's antenna receives the signal and connection is made.
If many programs are kept in main memory, then there is almostalways another program ready to run on the CPU when a page faultoccurs. Thus, CPU utilization is kept high. If, however, we allocate alarge amount of physical memory to just a few of the programs, theneach program produces a smaller number of page faults. Thus, CPUutilization is kept high among the programs in memory. What would the working set algorithm try to accomplish, and why?(Hint: These two cases represent extremes that could lead toproblematic behavior.)
Answer:
With the analysis of the case, we can infer that regarding the model or algorithm of the work set, we want to reduce page faults in each individual process, guaranteeing that the set of pages are included before executing the process.
There are things that should not change, such as the set of pages used in the process or the working set as they are called, they could only change if a program moves to a different phase of execution. In this way the most suitable and profitable approach is proposed for the use of time in the processor, by avoiding bringing oagines from the hard disk and instead of this the process is executed, because otherwise it would take a long time what was observed in decreased performance.
Regarding what was mentioned in the question, it follows that 2 extremes lead to a problematic behavior, to define the first as a page fault and the second refers to a small number of processes executed.
Why would you not restore a Domain Controller that was last backed up twelve months ago
Answer:
All the data and information that was updated or added since then will be lost so it is useless to restore a Domain Controller that was backedup twelve months ago.
Explanation:
A domain conttoller back-up must be prepared on regular basis else if DC breaks, restoration of most recent database will be impossible.
What are examples of common computer software problems? Check all that apply
Pages with fading ink come out of a printer.
Programs suddenly quit or stop working.
O Documents close without warning.
O A video file stops playing unexpectedly.
A program updates to the latest version.
A computer crashes and stops working.
Answer:
its A C E
Explanation:
The data structure used for file directory is called
Select one
a. process table
b. mount table
C. hash table
d file table
what is the percentage of 20?
Hi!
I'm Happy to help you today!
The answer to this would be 20%!
The reason why is because percents are simple to make! Like theres always an end percent! But its always gonna end at 100% Let me show you some examples to help you understand!
So were gonna have the end percent at 100%
Lets turn 2 into a percent!
2 = 2% because its under 100%
Now lets go into a Higher number like 1000%
So lets turn 33 into a percent!
33 = 3.3% 30 turns into 3% because of the max percent of 1000% and then 3 turns into .3% because of the max of 1000%
I hope this helps!
-LimitedLegxnd
-If you enjoyed my answer make sure to hit that Heart! Also Rate me to show others how well i did! You can do that by clicking the stars!
-Question asker mark me brainliest if you really enjoyed my answer!
Which can be used to enter and manipulate information in a database?
ANSWER: C) a form
Answer:
a form
Explanation:
it says the answer already in the question
2 point) Express this problem formally with input and output conditions.2.(2 points) Describe a simple algorithm to compute the upper median. How manyoperations does it take asymptotically in the worst case?3.(7 points) Show how you can use the (upper) medians of the two lists to reduce thisproblem to its subproblems. State a precise self-reduction for your problem.4. (7 points) State a recursive algorithm that solves the problem based on your reduction.5.(2 point) State a tight asymptotic bound on the number of operations used by youralgorithm in the worst case.
Answer:
See attached images
As citizens online or in real life, how, or why, do the choices we make, almost always seems to have an effect (positive or negative) on others?
Answer:
The choices we make as citizens online or in real life have both positive and negative effects on others because we are social beings, who live in an interconnected world. Every choice has some consequences on the decision maker or on others. We make the choices, but the consequences follow natural laws, which we cannot control. When Adam and Eve chose to disobey God, human beings down the ages lost their innocence and freedom. When the Nazis chose to purify their race of European Jews, there was the Holocaust between 1941 and 1945. When the Minneapolis police officer chose to slaughter George Floyd in cold blood, violent protests erupted throughout the U.S.
Another current example to buttress this is the ravaging coronavirus pandemic, which originated in Wuhan - China. When the Chinese Communist government chose to suppress the information about the virus as it usually does, the aftermath is the thousands of dead humans all over the world, the economic downturn, loss of jobs, virus infections with other public health side effects, plus many other untold consequences.
Had the Chinese government made a different choice, the virus could not have spread worldwide as it had. Similarly, some citizens online choose to circulate unverifiable ("fake news") information. Many people have been misled by their antics, some have lost their lives, while many others live in perpetual bigotry and hatred. All these are because of individual choices.
Explanation:
Choice is a concept in decision making. It is the judging of the merits of multiple options so that one or some of the options are selected. When a voter votes for one candidate against others, she has made a choice (decision). Of course, choices have consequences, which we must live with. Choices also define our present and our future.
You are responsible for managing Windows updates on 80 Windows 10 Enterprise computers at the office. You currently receive alert notifications when a new critical or security update is available for approval. Once you approve the updates, they are eventually installed. You would like these updates to apply automatically for the Windows 10 computers, and ensure that they are applied within 1 day of approval. How can this be accomplished with Intune
Answer:
Intune is a software that helps windows patching and upgrades. once the computer is connected to the internet/network. Intune will download updates to a particular computer that is targeted.
Explanation:
Solution
Intune is software that provides windows patching by discovering the PC’s connected to the network, pushing latest upgrades to the PC’s and detecting their current patch level.
Intune will make the updates download in the PC targeted when the PC’s are connected to the internet. Once they are downloaded it will wait until the PC gets restarted. If not it will give a popup that updates needs to be downloaded and will provide a timeline like two hours after which the PC by itself will auto restart.
All these can automatically be managed or done by the software. only it is required to be configured in a way that the PC’s should will be updated within 1 day, and Intune will use its algorithm to calculate the restart time and do the rest work on it's own.
Write a code for the following requirement.
The program must prompt for a name, and then tell the user how many letters are in the name, what the first letter of the name is, and what the last letter of the name is. It should then end with a goodbye message. A sample transcript of what your program should do is below - user input is in bold:
Enter your name: Jeremy
Hello Jeremy!
Your name is 6 letters long.
Your name starts with a J.
Your name ends with a y.
Goodbye!
Answer:
// This program is written in C++
// Comments are used for explanatory purposes
// Program starts here
#include<iostream>
using namespace std;
int main()
{
// Declare Variable name
string name;
// Prompt user for input
cout<<"Enter your name: ";
cin>>name;
// Print name
cout<<"Hello, "<<name<<"!\n";
// Print length of name
cout<<"Your name is "<<name.length()<<" letters long\n";
// Print first character
cout<<"Your name starts with a "<<name.at(0)<<"\n";
// Print last character
cout<<"Your name end with a "<<name.at(name.length()-1)<<"\n";
cout<<"Goodbye!";
return 0;
}