A storage device that contains some or all of the operating system is often called a(n) _____ because one can use it to start the computer if he or she has problems with the primary hard disk.

Answers

Answer 1

Answer:

Rescue disk

Explanation:

The computer system is an electronic device with a circuitry of interconnected hardware devices like processors, input devices, output devices and storage devices. It's hardware is controlled by a kernel software provided by a system software called the operating system.

The operating system is stored in the storage device (HDD or SSD) and is loaded to run on the system during the boot process.

A common practice is to create a restore point in a partition of the primary storage or in an external storage disk, when a software from an untrusted vendor is to be installed. This partition or storage is called a rescue disk.

A rescue disk is used to recover the normal operation of the computer system software by re-installing the operating system restore point.


Related Questions

Describe the basic features of the relational data model and discuss their importance to the end user and the designer. Describe the Big Data phenomenon.

Answers

Answer:

The answer to this question can be described as follows:

Explanation:

Relational data model:

The use of data tables to organize sets of entities into relationships requires a relational data model. this model work on the assumption, which is a primary key or code, that is included in each table configuration. The symbol for "relational" data links and information is used by other tables.

Model Design:

This model is used for database management, it consists of structure and language consistency. It is design in 1969.

Importance of data model:  

This provides a common standard for processing the potentially sound data in machines, that was usable on almost any one device.  

Big Data:

It moves to locate new and innovative ways to handle large volumes of authentication tokens and to gather business insights when offering high efficiency and usability at an affordable cost at the same time.

Write a program that keeps asking the user for new values to be added to a list until the user enters 'exit' ('exit' should NOT be added to the list). These values entered by the user are added to a list we call 'initial_list'. Then write a function that takes this initial_list as input and returns another list with 3 copies of every value in the initial_list. Finally, inside main(), print out all of the values in the new list. For example: Input: Enter value to be added to list: a Enter value to be added to list: b Enter value to be added to list: c Enter value to be added to list: exit Output: a b c a b c a b

Answers

Answer:

def new_list_function(initial_list):

   new_list = initial_list*3

   return new_list

def main():

   initial_list = []

   while True:

     item = input("Enter value to be added to list: ")

     item = item.rstrip()

     if item.lower() == "exit" and "EXIT" and "Exit":

         break

     initial_list.append(item)

     new_list = new_list_function(initial_list)

   for item in new_list:

     print(item)

main()

Explanation:

Define the function new_list_function(). Compute the new_list and then return the new_list. Define the main() function. Inside the main function, loop to ask users for values.Finally print the new list.

Task 1 (25 points): In database [your Pitt username], create the following entity tables: movies actors locations Each tables logical structure should correspond to the descriptions provided in this assignment. Use CREATE TABLE statement. Task 2 (20 points): In your database, create the following junction tables: movies_actors movies_locations Use CREATE TABLE statement to create junction tables. Task 3 (20 points): For each entity table, insert at least 3 rows using INSERT statement: At least 3 movies in the movies table At least 3 actors in the actors table At least 3 locations in the locations table You can make up your own data for the INSERT statements. Task 4 (10 points): For each junction table, create at least 2 relationships (insert at least two rows of appropriate IDs).

Answers

Answer:

Following is given the detailed solution for each part.

I hope it will help you!

Explanation:

Scripts for business processes: a. are unique b. are always followed exactly c. are often modified d. are invariant e. all have the same fixed number of events

Answers

Answer:

Scripts for businesses are always followed exactly.

Explanation:

A computer script is a list of commands that are executed by a certain program or scripting engine. Scripts may be used to automate processes on a local computer.

Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is collected by crawlers. True False

Answers

Answer:

The correct answer to the following question will be "False".

Explanation:

Web crawlers make copies of google search recovery pages that index the streamed pages to allow subscribers to more effectively search. It collects details of Web pages in an automatically generated or semi-automated form.The code of HTML and Hyperlink can be checked by crawlers. They could be used for scraping of the web.

Therefore, the given statement is false.

Select the correct statement(s) regarding cellular control and traffic channels. a. When a mobile device in turned on, it connects to the nearest available base station through an available traffic channel b. Control and traffic channels are only allocated when a mobile device begins the process of making a phone call c. When a mobile device is turned on, it connects to the nearest available base station through a control channel d. All statements are correct

Answers

Answer:

c. When a mobile device is turned on, it connects to the nearest available base station through a control channel

Explanation:

A network is the communication and interconnection between Computer devices for sharing of data resources. The connection of these devices could be wireless or wired.

Wired network connection is the use of cables to connect devices, while wireless connection requires no wire.

Wireless communication could be electromagnetic, microwave, cellular etc. Cellular is mainly used for cell phone communication.

The cell phone has a database of cell tower connections and automatically connects to the nearest one through a control channel, when it's turned on.

An internet service provider has three different subscription packages for its customers.  Package A: For $9.95 per month 10 hours of access are provided. Additional hours are $2.00 per hour.  Package B: For $14.95 per month 20 hours of access are provided. Additional hours are $1.00 per hour.  Package C: For $19.95 per month unlimited access is provided. Your task is to write a program that calculates a customer's monthly bill. The program must ask the user which package the customer has purchased and how many hours were used for the current month. It must then display the total amount due. In addition to calculating the monthly bill for the user's current package, your program must do the following: display how much money Package A customers would save if they purchased packages B or C, and how much money Package B customers would save if they purchased Package C. If there would be no savings, no message will be printed for a particular case.

Answers

Answer:

C++.

Explanation:

int main() {

   const float package_A = 9.95;

   const float package_B = 14.95;

   const float package_C = 19.95;

   const int package_A_extra = 2;

   const float package_B = 1;

/////////////////////////////////////////////////////////////////////////////

   int user_package_choice;

   int hours_used;

   cout<<"Your package? Enter option number,"<<endl;

   cout<<"1. Package A"<<endl<<"2. Package B"<<"3. Package C";

   cout<<endl;

   cin<<user_package;

   cout<<endl;

   cout<<"Hours used?: ";

   cin<<hours_used;

/////////////////////////////////////////////////////////////////////////////

   cout<<endl;

   float total_amount;

   if (user_package_choice == 1) {

       total_amount = package_A + ((hours_used - 10) * package_A_extra));

       if (total_amount - (package_B + ((hours_used - 20) * package_B_extra)) > 0)

          cout<<"If you had opted for Package B, you would have saved $"<<total_amount - (package_B + (hours_used * package_B_extra))<<endl;

       if (total_amount - package_C > 0)

           cout<<"If you had opted for Package C, you would have saved $"<<total_amount - package_C;

   }

   else if (user_package_choice == 2) {

       total_amount = package_B + ((hours_used - 20) * package_B_extra);

        if (total_amount - package_C > 0)

           cout<<"If you had opted for Package C, you would have saved $"<<total_amount - package_C;

   }

   else {

       total_amount = package_C;

   }

   return 0;

}

Final answer:

A program is needed to compute a customer's monthly internet bill based on their subscription package and calculate potential savings for switching to other packages.

Explanation:

The task involves writing a program to calculate a customer's monthly bill based on the subscription package for internet access. There are three packages: Package A offers 10 hours for $9.95 with additional hours at $2 each, Package B provides 20 hours for $14.95 with additional hours at $1 each, and Package C offers unlimited access for $19.95. The program will also calculate potential savings for customers of Package A if they switch to Package B or C, and for Package B customers if they switch to Package C, provided switching would result in savings.

Create an E-R Diagram for the following:An art museum owns a large volume of artworks. Each artwork is described by an item Id (identifier), title, type, and size; size is further composed of height, width, and weight. A work of art is developed by an artist, but the artist for some works is unknown. An artist is described by an artist ID (identifier), name, date of birth, and date of death (which is null for still living artists). Notice that the name of the artist is a composite attribute, composed of first, last and preferred names and it cannot be empty. The artist DOB is also required). Data about both artists of works currently owned by the museum and artists that have otherwise been featured in the museum are kept in the database. At any point in time, a work of art is either on display at the museum, held in storage, away from the museum as part of a traveling show, or on loan to another gallery. If on display at the museum, a work of art is also described by its location within the museum. A traveling show is described by a show ID (identifier), and the start and end dates of the show. Many of the museum works may be part of a given show, and only active shows with at least one museum work of art need be represented in the database. Every show may be visiting multiple cities and therefore has a schedule associated with it, listing the city visited, the start and end dates and the contact phone number. There may be more than 1 contact phone numbers and all the attributes are required. Notice that there is only one schedule associated with each show but the same schedule can be used more than once for shows that are travelling together. Only schedules that have been used for shows are stored in the database. Finally, another gallery is described by a gallery ID (identifier), name, and city. The museum wants to retain a complete history of loaning a work of art to other galleries, and each time a work is loaned, the museum wants to know the date the work was loaned and the date it was returned. As you develop the ERD for this problem, follow good data naming guidelines.

Answers

Final answer:

An ER Diagram can be created for an art museum scenario, including entities like Artwork, Artist, Show, ShowCity, ShowSchedule, Gallery, and Loan.

Explanation:ER Diagram for Art Museum

The ER Diagram for the given scenario can be created with the following entities:

Artwork (itemId, title, type, height, width, weight)Artist (artistId, firstName, lastName, preferredName, dateOfBirth, dateOfDeath)ArtworkArtist (itemId, artistId)Show (showId, startDate, endDate)ShowCity (showId, city)ShowSchedule (showId, startDate, endDate, contactPhone)Gallery (galleryId, name, city)Loan (itemId, galleryId, loanDate, returnDate)

The relationships between the entities can be represented as follows:

Artwork is developed by Artist (1 to many relationship)Show has Artwork (many to many relationship)Show has ShowCity (1 to many relationship)Show has ShowSchedule (1 to many relationship)Artwork can be on Loan to Gallery (many to many relationship)

Write a program that dynamically allocates an array large enough to hold a user-defined number of test scores. Once all the scores are entered, the array should be passed to a function that sorts them in ascending order. Another function should be called that calculates the average score. The program should display the sorted list of scores and averages with appropriate headings. Use pointer notation rather than array notation whenever possible. Input Validation: Do not accept negative numbers for test scores.

Answers

Answer:

C++ Program

Explanation:

#include <iostream>

#include <iomanip>

using namespace std;

void arrSelectSort(double *, int);

void showArrPtr(double *, int);

void showAverage(double, int);

int main()

{

 //dynamically allocate an array

 //acumulator

 //averge scores

 //number of test scores

 

 double *scores,                        

 total = 0.0;                  

//average;                              

int nScores;                      

 

   //Get how many test scores the users wants to enter.

cout << "How many test scores would you like to process?";

cin >> nScores;

//condition about the scores

scores = new double[nScores];

if (scores == NULL)

 return 0;

//Get the number of each test

cout << "Enter the test scores below.\n";

 

 

 

for (int count = 0; count < nScores; count++)

{

 cout << "Test score #" << (count + 1) << ": ";

 cin >> *(scores + count);

 

}

 

//total score operation

for (int count = 0; count < nScores; count++)

{

 total += *(scores + count);

}

showAverage(total, nScores);

//the array pointers

arrSelectSort(scores, nScores);

cout << "the ascending order is: \n";

showArrPtr(scores, nScores);

 

//free memory.

delete[] scores;

scores = 0;

 

 

return 0;

 

}

// bubble sort  

void arrSelectSort(double *array, int size)

{

int temp;

bool swap;

do

{

 swap = false;

 for (int count = 0; count < (size - 1); count++)

 {

  if (*(array + count) > *(array + count + 1))

  {

   temp = *(array + count);

   *(array + count) = *(array + count + 1);

   *(array + count + 1) = temp;

   swap = true;

  }

 }

} while (swap);

}

// sort function

void showArrPtr(double *array, int size)

{

for (int count = 0; count< size; count++)

 cout << *(array + count) << " ";

cout << endl;

}

// average function

void showAverage(double total, int nScores)

{

double average;

//average operation

average = total / nScores;

 

//Display the results.

cout << fixed << showpoint << setprecision(2);

cout << "Average Score: " << average << endl;

}

Universal containers wants to provide a different view for its users when they access an Account record in Salesforce1 instead of the standard web version. How can this be accomplished

Answers

Answer:

There are four options for this question: A and D are correct.

A. By adding a mobile layout and assigning it to a profile.

B. By adding quick actions in the publisher section

C. By adding actions in the Salesforce1 action bar section.

D. By adding Visualforce page to the mobile cards section.

Explanation:

We can add a different view for the users instead of the standard web, we can use a mobil design and assign a different profile, addition, we can implement the visualforce page to create a new view, with this option we make a better and interesting user interface with interaction with different views.

Describe the benefits of digital technology. Eric reads interesting information about MP3 players and wants to buy one. Which of the following tasks can he perform by using an MP3 playera. Send e-mail messages b. Play music c. Capture movies d. Create graphics

Answers

Answer:

b. Play music

Explanation:

Digital technology helps improve an existing process and makes things better. In this scenario of an MP3 player, digital technology takes care of music. Before a portable MP3 player came into the picture, people had to carry large physical records or multiple CD packs but now, a small device can hold thousands of those same songs in it.

Cipher Block Chaining (CBC) is similar to Electronic Code Book (ECB) but it uses an initialization vector (IV) to add security. True False

Answers

Answer:

The correct answer to the following question will be "True".

Explanation:

The most common heritage authentication mode is the CBC (Common legacy encryption) mode. Implementation around an internal ECB style cipher is simple and easy to understand and marginal.An initial value (IV) must be selected at random, even for the CBC function, but this doesn't have to be hidden.

Therefore, the given statement is true.

2.32 LAB: Input and formatted output: House real estate summary Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly as a floating-point value. Do not store in a variable.). Ex: If the input is: 200000 210000 the output is: This house is $200000. The change is $-10000 since last month. The estimated monthly mortgage is $850.000000. Note: Getting the precise spacing, punctuation, and newlines exactly right is a key point of this assignment. Such precision is an important part of programming.

Answers

Final answer:

To solve the student's problem, input the current and last month's house prices, calculate the price change, compute the estimated mortgage, and correctly format the output presenting the figures.

Explanation:

To create a program that takes the current price and last month's price of a house as inputs, and outputs a summary of the price change and estimated monthly mortgage, follow these instructions:

First, prompt the user to input both the current price and the last month's price of the house.Calculate the difference between the current price and the last month's price.Compute the estimated monthly mortgage using the formula ((currentPrice * 0.051) / 12).Finally, format the output to include the current price, the price change, and the mortgage estimate. Ensure that spaces, punctuation, and newlines match the example precisely.

Here's how the output should look like:

This house is $200000. The change is $-10000 since last month. The estimated monthly mortgage is $850.000000.

Main answer:

```python

current_price, last_month_price = map(int, input().split())

print(f'This house is ${current_price}. The change is ${last_month_price - current_price} since last month. The estimated monthly mortgage is ${(current_price * 0.051) / 12:.6f}.')

```

Explanation:

The program takes two integer inputs, representing the current house price and last month's price. It then uses a formatted string to output a summary, including the current price, the change since last month (calculated by subtracting the current price from last month's price), and the estimated monthly mortgage computed using the given formula. The use of f-strings in Python allows for concise and readable code, embedding expressions directly within the string.

The map function is employed to convert the input values into integers. The program calculates the change in price by subtracting the current price from last month's price. To ensure precise spacing and formatting, the f-string includes the required text and variable values in a structured manner. The estimated monthly mortgage is calculated using the provided formula and formatted as a floating-point value with six decimal places.

The code adheres to the assignment's emphasis on precision in spacing, punctuation, and newlines. By using f-strings and the specified formula, the program produces the required output with clarity and accuracy.

You will be given a string, containing both uppercase and lowercase alphabets(numbers are not allowed).

You have to print all permutations of string with the added constraint that you can’t change the uppercase alphabets positions.


Example: (puNeeTgUlia)

Answers

Answer:

The Java code is given below with appropriate comments

Explanation:

import java.util.*;

class Main {

   static Set<String> set = new HashSet();

   static void printPerms(char ch[], int ind){

       //If end of string is reached, add it to set

       if(ind==ch.length){

           set.add(new String(ch));

           return;

       }

       for(int i=ind;i<ch.length;i++){

           //Only swap if lower case

           if((ch[i]>='a' && ch[i]<='z')&&((ch[ind]>='a' && ch[ind]<='z'))){

               char t  = ch[i];

               ch[i] = ch[ind];

               ch[ind] = t;

           }

           printPerms(ch,ind+1);

           if((ch[i]>='a' && ch[i]<='z')&&((ch[ind]>='a' && ch[ind]<='z'))){

               char t  = ch[i];

               ch[i] = ch[ind];

               ch[ind] = t;

           }

       }

   }

   public static void main(String[] args) {

       printPerms("aBbCc".toCharArray(),0);

       System.out.println(set);

   }

}

Final answer:

The question involves creating an algorithm to generate permutations of a given string without altering the positions of uppercase alphabets, a problem suitable for Computers and Technology at the college level.

Explanation:

The task requires generating all permutations of a given string while maintaining the original positions of the uppercase alphabets. This is typically a problem that can be approached algorithmically, falling under the category of Computers and Technology. To solve it, you would need to find permutations of the lowercase letters only and then insert them back into the string at the positions not occupied by uppercase letters.

One way to achieve this is to extract all lowercase letters and use a permutation algorithm, such as Heap's algorithm, to generate all permutations while the uppercase letters act as anchors, holding their respective positions fixed. As each permutation of the lowercase letters is generated, it's interlaced with the uppercase ones to construct a full-string permutation that meets the condition. This process is repeated until all permutations of the lowercase characters are exhausted.

Write code that prints: Ready! firstNumber ... 2 1 Run! Your code should contain a for loop. Print a newline after each number and after each line of text Ex: firstNumber = 3 outputs:

Answers

Final answer:

The task requires a Python code using a for loop to count down from a specified starting number, printing 'Ready!', each number on a new line, and 'Run!' at the end.

Explanation:

To write code that counts down from a given number and prints 'Ready!', followed by each number, and ending with 'Run!', we can use a for loop. Here is a sample Python code snippet that accomplishes this:

firstNumber = 3
print('Ready!')
for num in range(firstNumber, 0, -1):
   print(num)
   print('\n')
print('Run!')

This code starts by printing 'Ready!', then it enters a for loop that counts down from firstNumber to 1, printing each number followed by a newline. Finally, it prints 'Run!' after exiting the loop. Remember to replace firstNumber with the actual starting number you wish to count down from.

According to a study by Merrill Lynch and Gartner, what percentage of all corporate data is captured and stored in some sort of unstructured form?

Answers

Answer:

85 %

Explanation:

Historically, data warehouses had been formed using structured repetitive data that was filtered before entering the data warehouse. However, in recent years, the data warehouse has evolved due to contextual information that can now be attached to unstructured data and that can also be stored.

Those first structured relational data could not be mixed and matched for analytical subjects with unstructured textual data. But with the advent of contextualization, these types of analyzes can now be done naturally and easily.

Classic analytical processing of transaction-based data is performed in the data warehouse as it has always been done. Nothing has changed there. But now you can become analytical about contextualized data, and that form of analysis is new. Most organizations, until now, did not have to base their decision making on unstructured textual data. And now there is a new way of analysis possible in a Data Warehouse: the possibility of mixing analysis. The combined analysis is performed by a combination of structured transactional data and unstructured contextual data.

According to a research by Merrill Lynch indicates that 85 % of all coporate date is stored in some sort of unstructured form like data warehouse.

In this recitation assignment, will write a complete C program that accepts as input any two integers from the user and swaps both integers using bitwise operators only without a third variable. E

Answers

Answer:

#include<iostream>

using namespace std;

int main()

{int num1,num2;

cout<<"enter 2 numbers:"<<endl;

cinn>>num1;

cinn>>num2;

cout<<("value without swapping of num1",num1);

cout<<("value without swapping of num2",num2);

 num1 ^= num2;

   num2 ^= num1;

   num1 ^= num2;

cout<<("num1 after swapping",num1);

cout<<("num2 after swapping,num2);

return 0;

}

Discuss what technologies you might see in use at an enterprise. For example, where would you most likely see fiber-optic Ethernet technologies? Or where might wireless technologies be deployed?

Answers

There are various connectivity technologies that we use to connect. They are Ethernet, Internet (Wireless Connection), Bluetooth, Wi-Fi and Cellular.

Explanation:

Ethernet is the direct connection among the devices that are located close to each other in a building. This is used for small scale enterprises.Wi-Fi lets wireless connections among multiple devices without any physical connection. And it is most extensively used in most of the corporate companies.Bluetooth is used to transfer the data from one device to the other when they are near.Cellular is used to connect people across the globe. And it is used widely in every enterprises.

Final answer:

In an enterprise, fiber-optic Ethernet is used for its high bandwidth and long-distance capabilities, typically in the network backbone, while wireless technologies like Wi-Fi are deployed for their convenience and mobility in offices and meeting spaces. The use and impact of technology can vary across different contexts, and strategic decisions must be made when developing IT infrastructures to ensure efficiency and security.

Explanation:

In an enterprise, you might see a range of technologies in use, each tailored to specific needs and applications. Fiber-optic Ethernet technologies, for instance, are often found in the backbone of an enterprise’s network infrastructure where high bandwidth and long-distance communication are essential.

They might be used to connect data centers, mainframes, or to handle high-speed internet connections for the entire organization.

Wireless technologies, on the other hand, are typically deployed in areas where mobility is important or where it is impractical to run physical cabling.

This includes offices for Wi-Fi connections to laptops and smartphones, warehouses for barcode scanning devices, and meetings or conference rooms to facilitate presentations and collaborative work without the need for physical connections.

Wi-Fi is an example of a wireless service that has become indispensable in both professional and personal contexts, offering convenience and mobility.

When considering the integration of technology, it's important to assess the impact it has on communication across various contexts, such as academic, professional, and personal.

Engagement with technology can vary greatly; for example, the use of sophisticated online platforms may be prevalent in professional settings, while personal communication might still favor traditional methods like phone calls or face-to-face interactions in certain contexts.

Additionally, the development of efficient and secure physical IT infrastructures to facilitate public e-services requires a strategic approach, weighing options such as outsourcing versus in-house development based on criteria like security and transmission capacity.

In this exercise we examine in detail how an instruction is executed in a single-cycle datapath. Problems in this exercise refer to a clock cycle in which the processor fetches the following instruction word:

10101100100001010000000000010100

Assume that the data memory is all zeros and that the processor’s registers have the following values at the beginning of the cycle in which the above instruction word is fetched:

R0 R1 R2 R3 R4 R5 R6 R8 R12 R31
0 1 -2 3 -4 5 -6 -8 -12 31

a, What are the outputs of the sign-extend and the jump "Shift-Left-2" (near the top of Figure 4.24) for this instruction word?

b, What are the values of ALU control unit’s inputs (ALUOp and Instruction operation) for this instruction?

c, What is the new PC address after this instruction is executed? Highlight the path through which this value is determined.

d, For the ALU and the two add units, what are their data input values?
e, What are the values of all inputs for the "Registers" unit?

Answers

Following are the responses to the given question:

Given instruction:

[tex]10101100100001010000000000010100[/tex]

For point A)

Sign extend and leap "shift left 2": The sign extend can be determined by taking the LSB 16 bits and expanding it to 32 bits.

Sign Extend

[tex]00000000000000000000000000010100[/tex]

A jump command "shift left 2" can be discovered by extracting the LSB 26 bit and shifting left by 2 bits.

Jump Shift Left 2

[tex]0010000101000000000001010000[/tex]

For point B)

ALU control units' inputs are as follows:

Its ALUop has two LSBs.

[tex]ALUop\\\\00[/tex]

The instructions are a 6 bit LSB instruction.

Instruction

[tex]010100[/tex]

For point C)

New PC address:

[tex]New PC Address \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ Path \\\\ PC+4 \ \ \ \ \ \ \ \ PC \to Add (PC +4) \to Branch MUX \to Jump MUX \to PC[/tex]

For point D)

Input values:

[tex]ALU \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ Add (PC+4) \ \ \ \ \ \ \ \ \ \ \ Add (Branch)[/tex]

[tex]In put \#1 \ \ \ In put \# 2 \ \ \ \ In put \# 1 \ \ \ In put \# 2 \ \ \ \ In put \# 1 \ \ \ In put \# 2\\\\[/tex]

[tex]-4 \ \ \ \ 20 \ \ \ \ \ \ PC \ \ \ \ 4 \ \ \ \ \ \ PC+4 \ \ \ \ 20*4[/tex]

For point E)

Calculating the inputs into the "Registers" units:

[tex]\text{Bits\ 25-21 specify the Read Reg#1} \\\\\text{Bits\ 20-16 specify the Read Reg#2}[/tex]

[tex]Read \ \ \ \ \ \ Read \\\\Reg\#1 \ \ \ \ \ \ Reg\#2 \ \ \ \ \ \ WriteReg \ \ \ \ \ \ WriteData\ \ \ \ \ \ RegWrite[/tex]

[tex]4 \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5 \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ X \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ X \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 0[/tex]

Learn more:

brainly.com/question/25222612

_____ verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test.

Answers

Answer:

Certification                  

Explanation:

Certification verifies that a person has appropriate experience and skills to carry out their task or job.

This is achieved through some test or examination, through some professional training or by gaining some work experience.

This provides with the credentials required to perform their jobs efficiently with proficient skills that can be trusted by companies and customers.

For example having an IT certification means having necessary skills to perform IT related tasks. IT field is a vast field which keeps evolving with time so being an IT certified refers to having updated knowledge about dynamic computer and information technologies.

Calculate the shear stress (lbf/in^2) for a given normal stress (lbf/in^2) that is applied to a material with a given cohesion (lbf/in^2) and angle of internal friction (degrees). (See MohrCoulomb failure criterion

Answers

MOHR-COULOMB FAILURE CRITERIA:

In 1900, MOHR-COULOMB states Theory of Rupture in Materials which defines as “A material fails due to because of a critical combination of normal and shear stress, not from maximum normal or shear stress”. Failure Envelope is approached by a linear relationship.

If you can not understand the below symbols see the attachment below

 f   f ()  

Where:      f = Shear Stress on Failure Plane  

       ´= Normal Stress on Failure Plane

 See the graph in the attachment

For calculating the shear stress, when Normal stress, cohesion and angle of internal friction are given. Use this formula:   shear stress =  f  c   tan 

Where,  

• f  is Shear Stress on Failure Plane

• c  is Cohesion

•  is Normal Total Stress on Failure Plane

•  is Friction Angle

You are the manager of a midsized company that assembles personal computers. You purchase most components—such as random access memory (RAM)—in a competitive market. Based on your marketing research, consumers earning over $80,000 purchase 1.5 times more RAM than consumers with lower incomes. One morning, you pick up a copy of The Wall Street Journal and read an article indicating that input components for RAM are expected to rise in price, forcing manufacturers to produce RAM at a higher unit cost. Based on this information, what can you expect to happen to the price you pay for random access memory? Would your answer change if, in addition to this change in RAM input prices, the article indicated that consumer incomes are expected to fall over the next two years as the economy dips into recession? Explain.

Answers

Answer:

Explanation:

In this case, the price of the RAM can rise because cost increase, assume the news of the Wall Street Journal, people with earning lower $80,000 they won't buy RAM because is too expensive, and people with over these earnings will buy less RAM, in addition, the incomes will fall, and the demand of RAM will fall too, but for the same reason the price could fall for the poor demand.

Which of the following greedy strategies results in an optimal solution for the activity selection problem? Select all that applies. a. Earliest start time b. Latest finish time c. Earliest finish time d. Latest start time

Answers

Answer:

Option C and Option D.

Explanation:

When the title indicates, a greedy algorithm often makes the decision which imply to be the best overall. Which obviously makes a locally-optimal choice throughout the expectation that such a option can contribute to an answer that is generally optimal.

so, Earliest finish time and latest start time are the greedy methods resulting in an effective solution for the problems of operation selection.

What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?

Answers

Answer:

"Classification" is the correct answer to this question.

Explanation:

Classification is primarily a method of data processing, it makes easy for information to be separated and divided into a different business or personal goals by the data set demands.  

It's also known as a mechanism of sorting or identifying information in different types of aspects or groups in the categorization of data. It is used to allocate the confidential information to the level of sensitivity.

What is the largest numeric value that could be represented with three bytes if each digit were encoded using one ASCII pattern per byte? What if binary notation were used?

Answers

The largest numeric value that can be represented in 3 bytes is 224

Explanation:

commonly, to represent a 999 number, 10 bits are used.But with 3 bytes, it can save or store integer with the range from 0 to 224-1 in the 24 bits. (3 * 8 bits =24 bits).Then the binary notation is used for encoded numeric data in order to store in the computer storage device.

Final answer:

The largest value with three bytes using ASCII is 127127127, but for practical numerical storage in binary notation, the largest value with three bytes is 16777215, represented as 11111111 11111111 11111111 in binary.

Explanation:

The largest numeric value that could be represented with three bytes using one ASCII pattern per byte depends on the ASCII printable characters range. ASCII characters are represented within the range of 0 to 127, therefore in three bytes, the largest decimal values you could represent would be 127127127. However, this is not typically how numeric values are stored.

When using binary notation, each byte consists of 8 bits, and the maximum value for each bit is 1. Therefore, the largest value in a single byte is 11111111, which is 255 in decimal. Hence, in three bytes, the largest decimal number that can be stored is 16777215 (which is 11111111 11111111 11111111 in binary).

Develop a menu-driven program that inputs two numbers and, at the user’s option, finds their sum, difference, product, or quotient.

Answers

Answer:

import java.util.Scanner;

public class TestClock {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter num 1");

       double num1 = in.nextDouble();

       System.out.println("Enter num 2");

       double num2 = in.nextDouble();

       System.out.println("enter \"s\" for addition\t \"d\" for difference\t \"p\" for the product\t and \"q\" for the quotient");

       char op = in.next().charAt(0);

       if(op =='s'||op=='S'){

           double sum = num1+num2;

           System.out.println("The sum is "+sum);

       }

       else   if(op =='d'||op=='D'){

           double diff = num1-num2;

           System.out.println("The difference is "+diff);

       }

       else if(op =='p'||op=='P'){

           double prod = num1*num2;

           System.out.println("The product is "+prod);

       }

       else if(op =='q'||op=='Q'){

           double quo = num1/num2;

           System.out.println("The Quotient is "+quo);

       }

   }

}

Explanation:

Use Scanner class to receive the two numbers and save in a two variablesCreate a new variable for Operation (op) to store a characterRequest the user to enter a character for the opearation (e.g s=sum, p=product, q=quotient and d=difference)Use if/else..if statements to implement the required operation

"online privacy alliance (opa) is an organization of companies dedicated to protecting online privacy. members of opa agree to create a privacy policy for a customer that is easy to read and understand. which of the following provisions is not included in the policy?
(a) the option of choosing who sees
(b) the datatypes of data collected
(c) how data is used
(d) how collected data is secured

Answers

Answer:

Option A.

Explanation:

It is a business association working to protect your online privacy. Opa members agree to establish a User privacy Policy that is readable and understandable. So, the option of choosing who sees the data  is the provision is not available in the policy because It has data types policy gathered and how data collected is protected.

Define a function print total inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot. Sample output with inputs: 5 8 Total inches: 68

Answers

Answer:

   public static void printTotalInches(double num_feet, double num_inches){

       double inches = 12*num_feet;

       System.out.println("Total value in feets is: "+(inches+num_inches));

   }

This function is written in Java Programming Language. Find a complete program with a call to the function in the explanation section

Explanation:

public class ANot {

   public static void main(String[] args) {

//Calling the function and passing the arguments

   printTotalInches(5,8);

   }

   public static void printTotalInches(double num_feet, double num_inches){

       double inches = 12*num_feet;

       System.out.println("Total value in feets is: "+(inches+num_inches));

   }

}

Answer:

def calc_total_inches(num_feet, num_inches):

   return num_feet*12+num_inches

Explanation:

The Internet has made going global easier than it has ever been, but the promise of "borderless commerce" remains restrained because of the a. cultural variations of the people visiting a website. b. old brick-and-mortar rules, regulations, and habits. c. system of floating exchange rates. d. demographic makeup of various people accessing a website.

Answers

Answer:

The correct option is B: Old brick-and-mortar rules, regulations, and habits

Explanation:

Globalization has been made possible because of the internet. However, the promise of what is considered "borderless commerce" is limited due to the old brick and mortar rules, regulations, and habits. Brick and mortar is considered the traditional businesses offering products and services to customer in a rented or owned store and requires face-to-face business. Hence globalization via the internet is limited because companies have to sort out their building and stores, follow every law and regulation to opening offices and other habits practiced by these brick-and-mortar businesses.

Suppose two hosts, A and B, are separated by 15,000 kilometers and are connected by a direct link of R = 5 Mbps. Suppose the propagation speed over the link is 2.5 * 108 meters/sec.How long does it take to send a 1,500,000 bit file, assuming it is sent continuously?

Answers

Answer:

360 msec

Explanation:

Data provided in the question:

Distance between the two hosts = 15,000 kilometer

= 1.5 × 10⁷ m    [ ∵ 1 km = 1000 m ]

Transmission rate, R = 5 Mbps = 5 × 10⁶ bits per second

Propagation speed over the link = 2.5 × 10⁸ meters/sec

Size of file to be sent = 1,500,000 bit

Now,

Propagation delay (dprop)

= Distance ÷ Speed

= ( 1.5 × 10⁷ ) ÷ (2.5 × 10⁸)

= 0.06 sec

= 60 msec           [ ∵ 1 sec = 1000 millisecond ]

Transmission delay (dtrans)

= Size of file ÷ Rate of transmission

= 1500000 ÷ ( 5 × 10⁶ )

= 0.3 sec

= 300 msec

Therefore,

Time required for transmitting the file

= Propagation delay + Transmission delay

= 60 msec + 300 msec

= 360 msec

Final answer:

The total time to send a 1,500,000-bit file from host A to host B over a distance of 15,000 kilometers at a rate of 5 Mbps is 0.36 seconds, which is the sum of the transmission time (0.3 seconds) and the propagation delay (0.06 seconds).

Explanation:

To calculate the time taken to send a 1,500,000-bit file from host A to host B separated by 15,000 kilometers at a rate of 5 Mbps, you need to consider both the transmission time and the propagation delay. The transmission time is the time required to push all the file's bits onto the wire and is given by the file size divided by the transmission rate. The second part is the propagation delay, which is the time it takes for the first bit to travel from the source to the destination.

The transmission time can be calculated as: Transmission Time = File size / Rate = 1,500,000 bits / (5 x 10⁶ bits/sec) = 0.3 seconds.

The propagation delay is the distance divided by the speed of light in the medium, which is: Propagation Delay = Distance / Speed of light = 15,000 km / (2.5 x 10⁸ m/s) = 0.06 seconds. Since the distance needs to be in meters, we convert it by multiplying by 1,000: Propagation Delay = 15,000,000 m / (2.5 x 10⁸ m/s) = 0.06 seconds.

The total time to send the file is the sum of transmission time and propagation delay: Total Time = Transmission Time + Propagation Delay = 0.3 s + 0.06 s = 0.36 seconds.

Other Questions
"The owner of Elixir Force Inc. received the most prestigious corporate award and was also titled as ""the most outstanding new entrepreneur of the year."" In the context of people-based legitimacy, this is typically an indicator of:"_________A. Brand equityB. Public recognition**C. Business network membershipD. Experiential supports (3 pts) Given sample statistics for two data sets: _ Set A: x 23 Med 22 S 1.2 _ Set B: x 24 Med 29 S 3.1 a) Calculate the Pearsons Index of Skewness for both sets. 3 b) Based on your findings, what type of distribution each set has (circle correct answer): Set A: symmetric skewed left skewed right uniform Set B: symmetric skewed left skewed right uniform c) Which set, A or B, can be considered and analyzed as symmetric _______ Stephanie works as a waitress and earns $4.50 an hour. Stephanie's last paycheck was $150. She earns $60 in tips in addition to her hourly pay. Write an equation the represents this situation. How many hours did Stephanie work? Paragraph Please!!!!!!!!!!! The World Health Organization defines _____________ as a state of complete physical, mental, and social well-being. Select one: a. metaphysics b. karma c. health d. transcendental meditation What is the solution to the inequality 12x < 252 Can someone please help me with this 7th grade math homework what's the answer for 13x-37+2x+13 A powerful motorcycle can accelerate from rest to 22.2 m/s (80 km/h) in only 3.42 s. What is its average acceleration? A particle traveling in a circular path of radius 300 m has an instantaneous velocity of 30 m/s and its velocity is increasing at a constant rate of 4 m/s2. What is the magnitude of its total acceleration at this instant? Specializing in the production of a good or service in which one has a comparative advantage enables a country to do all of the following except A. increase the quantity of products that it can consume with no increase in resources. B. engage in mutually beneficial trade with other nations. C. produce a combination of goods that lie outside its own production possibilities frontier. D. consume a combination of goods that lie outside its own production possibilities frontier. 26. When Peter touches a warm radiator, hest is transferred to his body byA, convection,B. radiation,C. Insulation,D. conduction. Although your sister is not a scientist, she says that she uses scientific techniques in her everyday life. You do not believe her but she insists it is true. Which of the following examples could she use to best persuade you? She put some tomatoes in the sun and some in the shade to see if the sun causes them to ripen faster T/F In at least one hundred words, create a clear, original, and debatable thesis statement about at least one theme from Things Fall Apart. Include at least two supporting details for your thesis statement. Be sure to avoid using clichs. Use details from the text to support your answer. g You take a loan for $25,000 to pay for school. You want to pay it back within 4 years by making equal monthly payments. There is a 15% interest rate on the money borrowed. Determine the monthly payment. Match each sentence to the correct sentence type.Al stayed at the library until it closed.complexI'm looking for the extra TV remote.compoundWhen I get hungry, I'll tell Jim, andhe'll get pizzacompound-complexWe are out of juice, but we havewater.independent clause PLZZ HELP Which expression is the factored form of 1.5w+7.5 ?1.5(w+5)1.5(5+w)1.5(w5)1.5(w5) An archaeologist studies theO presentO pastO future Through classical conditioning, Alyce has developed a fear of mice. She also shows a fear response to gerbils and hamsters. Alyce is demonstrating:________ a) stimulus generalization. b) stimulus discrimination. c) spontaneous recovery. d) extinction. e) reconditioning. Acme Steel Co. produces 1,000 tons of steel. Steel sells for $30 per ton. Acme pays wages of $10,000. Acme buys $15,000 worth of coal, which is needed to produce the steel. Acme pays $2,000 in taxes. Acme's contribution to GDP is A. $30,000. B. $20,000. C. $45,000. D. $15,000. The p K a of the carboxyl group of serine is 2.21 , and the p K a of its amino group is 9.15 . Calculate the average net charge on serine if it is in a solution that has a pH of 8.80 .