Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform produced by A when “$” is sent. Also mention the OSI layer that is responsible for this.

Answers

Answer 1

Answer:

Physical / Data link layer

Explanation:

If two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the data would be transmitted if the network is clear but if the network is not clear, the transmission would wait until the network is clear.

The Open Systems Interconnection model (OSI model) has seven layers each with its own function.

The physical layer is the first layer responsible for data transmission over a physical link. The data packets are converted to signals over a transmission media like ethernet cable.

The data link layer is the second layer in the OSI layer responsible for transmission of data packets between nodes in a network. It also provides a way of detecting errors and correcting this errors produced as a result of data transmission.


Related Questions

Write an if-else statement with multiple branches. If year is 2101 or later, print "Distant future" (without quotes). Otherwise, if year is 2001 or greater, print "21st century". Otherwise, if year is 1901 or greater, print "20th century". Else (1900 or earlier), print "Long ago". Sample output with input: 1776 Long ago

Answers

Answer:

year = int(input("Enter a year: "))

if year >= 2101:

   print("Distant future")

elif year >= 2001:

   print("21st century")

elif year >= 1901:

   print("20th century")

else:

   print("Long ago")

Explanation:

*The code is in Python.

Ask the user to enter a year

Use if-else statement to check the year and print the appropriate message given for each condition. If year is greater than or equal to 2101, print "Distant future". If year is greater than or equal to 2001, print "21st century". If year is greater than or equal to 1901, print "20th century". Otherwise, print "Long ago".

g You are looking to rob a jewelry store. You have been staking it out for a couple of weeks now and have learned the weights and values of every item in the store. You are looking to get the biggest score you possibly can but you are only one person and your backpack can only fit so much. Write a function called get_best_backpack(items: List[Item], max_capacity: int) -> "List[Item]" that accepts a list of Items as well as the maximum capacity that your backpack can hold and returns a list containing the most valuable items you can take that still fit in your backpack.

Answers

Answer:

A python code (Python recursion) was used for this given question

Explanation:

Solution

For this solution to the question, I am attaching code for these 2 files:

item.py

code.py

Source code for item.py:

class Item(object):

def __init__(self, name: str, weight: int, value: int) -> None:

  self.name = name

  self.weight = weight

  self.value = value

def __lt__(self, other: "Item"):

  if self.value == other.value:

if self.weight == other.weight:

  return self.name < other.name

else:

  return self.weight < other.weight

  else:

   return self.value < other.value

def __eq__(self, other: "Item") -> bool:

  if is instance(other, Item):

return (self.name == other.name and

self.value == other.value and

self.weight == other.weight)

  else:

return False

def __ne__(self, other: "Item") -> bool:

  return not (self == other)

def __str__(self) -> str:

  return f'A {self.name} worth {self.value} that weighs {self.weight}'

Source code for code.py:

#!/usr/bin/env python3

from typing import List

from typing import List, Generator

from item import Item

'''

Inductive definition of the function

fun3(0) is 5

fun3(1) is 7

fun3(2) is 11

func3(n) is fun3(n-1) + fun3(n-2) + fun3(n-3)

Solution 1: Straightforward but exponential

'''

def fun3_1(n: int) -> int:

result = None

if n == 0:

result = 5 # Base case

elif n == 1:

result = 7 # Base case

elif n == 2:

result = 11 # Base case

else:

result = fun3_1(n-1) + fun3_1(n-2) + fun3_1(n-3) # Recursive case

return result

''

Solution 2: New helper recursive function makes it linear

'''

def fun3(n: int) -> int:

''' Recursive core.

fun3(n) = _fun3(n-i, fun3(2+i), fun3(1+i), fun3(i))

'''

def fun3_helper_r(n: int, f_2: int, f_1: int, f_0: int):

result = None

if n == 0:

result = f_0 # Base case

elif n == 1:

result = f_1 # Base case

elif n == 2:

result = f_2 # Base case

else:

result = fun3_helper_r(n-1, f_2+f_1+f_0, f_2, f_1) # Recursive step

return result

return fun3_helper_r(n, 11, 7, 5)

''' binary_strings accepts a string of 0's, 1's, and X's and returns a generator that goes through all possible strings where the X's

could be either 0's or 1's. For example, with the string '0XX1',

the possible strings are '0001', '0011', '0101', and '0111'

'''

def binary_strings(string: str) -> Generator[str, None, None]:

def _binary_strings(string: str, binary_chars: List[str], idx: int):

if idx == len(string):

yield ''.join(binary_chars)

binary_chars = [' ']*len(string)

else:

char = string[idx]

if char != 'X':

binary_chars[idx]= char

yield from _binary_strings(string, binary_chars, idx+1)

else:

binary_chars[idx] = '0'

yield from _binary_strings(string, binary_chars, idx+1)

binary_chars[idx] = '1'

yield from _binary_strings(string, binary_chars, idx+1)

binary_chars = [' ']*len(string)

idx = 0

yield from _binary_strings(string, binary_chars, 0)

''' Recursive KnapSack: You are looking to rob a jewelry store. You have been staking it out for a couple of weeks now and have learned

the weights and values of every item in the store. You are looking to

get the biggest score you possibly can but you are only one person and

your backpack can only fit so much. Write a function that accepts a

list of items as well as the maximum capacity that your backpack can

hold and returns a list containing the most valuable items you can

take that still fit in your backpack. '''

def get_best_backpack(items: List[Item], max_capacity: int) -> List[Item]:

def get_best_r(took: List[Item], rest: List[Item], capacity: int) -> List[Item]:

if not rest or not capacity: # Base case

return took

else:

item = rest[0]

list1 = []

list1_val = 0

if item.weight <= capacity:

list1 = get_best_r(took+[item], rest[1:], capacity-item.weight)

list1_val = sum(x.value for x in list1)

list2 = get_best_r(took, rest[1:], capacity)

list2_val = sum(x.value for x in list2)

return list1 if list1_val > list2_val else list2

return get_best_r([], items, max_capacity)

Note: Kindly find an attached copy of the code outputs for python programming language below

Explain the difference between storage devices and virtual storage

Answers

Answer:

Storage devices tend to be built in/physical pieces of storage such as an SD Card or Hard Drive. Virtual storage is more-so like Cloud storage, where the files are hosted elsewhere.

Explanation:

Print Job Cost Calculator (10 points)
Filename: PrintJobCost.java
Write a program that asks the user to enter a string that encodes a print job. The string has this format:
"Papersize ColorType Count"
PaperSize, colorType and count are separated by exactly one space.
The first part of the string represents the size of the paper used:
Paper Size (string) Cost per Sheet ($)
"Letter" 0.05
The second part of the string represents the color of the printing. This cost is added to the cost of the paper itself
Printing Type (string) Cost per Sheet($)
"Grayscale" 0.01
"Colored" 0.10
The program computes and prints the total cost of the current printing job to two decimal places to the right of the decimal point.
Note: You may assume that all function arguments will be valid (e.g., no negative values, invalid paper sizes, etc.)
Several example runs are given below.
t Enter print job info: Legal Grayscale 44 Print job cost: $3.08 C Enter print job info: A4 Colored 4 Print job cost: $0.62 t Enter print job info: Letter Grayscale 32 Print job cost: $1.9

Answers

Answer: Provided in the explanation section

Explanation:

Provided is the code  to run this program

Source Code:

import java.util.Scanner;

class PrintJobCost

{

  public static void main(String[] args) {

      Scanner input=new Scanner(System.in);

      System.out.print("Enter print job info:");

      String info=input.nextLine();

      String size="",type="";

      int count=0,i=0,len=info.length();

      double cost=0.0;

      while(info.charAt(i)!=' '){

          size=size+info.charAt(i);  

          i++;

      }

      i++;

      while(info.charAt(i)!=' '){

          type=type+info.charAt(i);

          i++;

      }

      i++;

      while(i<len){

          count=count*10+Integer.parseInt(String.valueOf(info.charAt(i)));

          i++;

      }

      if(size.equals("Letter"))

          cost=cost+0.05;

      else if(size.equals("Legal"))

          cost=cost+0.06;

      else if(size.equals("A4"))

          cost=cost+0.055;

      else if(size.equals("A5"))

          cost=cost+0.04;

      if(type.equals("Grayscale"))

          cost=cost+0.01;

      else if(type.equals("Colored"))

          cost=cost+0.10;

      cost=cost*count;

      System.out.printf("print job Cost:$ %.2f\n",cost);

  }

}

cheers i hope this helped !!!

Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read it. Eve can write to File1 but can't read it. Alice has Top Secret, {A,B,C}. Bob has Secret{A,B}, Charlie has Confidential,{C} and Eve is Unclassified. File2 should be classified as

Answers

Answer:

Top Secret, (A,B,C)

Explanation:

Solution:

Some information are known to be sensitive, and has a higher level of classification.

Examples for such levels are: Secret, Top secret ,Unclassified and  Confidential, and Unclassified.  all users of the system has a  level of clearance. fro a user to be able to gain access to document, he or she must have posses a level of the document.

Now, this is governed by two rules which is stated below:

No user can have access to any information that is considered higher than their level of clearance.

Secondly, a user can write to files only that contains an equal level or lower of his clearance level, this is to stop what is called the write down effect.

It is important to note that ABC, categories determine what type of access is permitted.

Now, for the given example, since, Bob and charlie cannot read it, which shows that the file must be of top priority or importance, then Bob and Charlie needs clearance to the file,the file 2 is considered a top priority.

Therefore, the File 2 is classified as a Top Secret, (A,B,C)

Anyone watch anime, i love stay kids and they sang the op for Tower of God XD

Answers

Answer:

I do Stray kids and Tower Of God is good combo mannnn

Answer:

Yes

Explanation:

I dont comprehend how this question requires any intellectual answer but it's ok.

): A cable has a bandwidth of 3000 Hz assigned for data communication. The SNR is 3162. How many signal levels do we need?

Answers

Answer:

[tex]L=2^{25830}[/tex] is the correct answer .

Explanation:

bandwidth = 3000 Hz

SNR =3162

We know that

[tex]bitrate = bandwidth * log2(1 + SNR)[/tex]

Putting the value of bandwidth and SNR in the given equation .

[tex]bitrate = 3000 * log_{2} ^\ (1 + 3162) \\\\birate = 3000 * log_{2} ^\ {3163} \\\\birate =3000 * 11.\ 6\\\\bitrate=\ 34860 bps[/tex]

Now using the formula

[tex]BitRate = 2 * Bandwidth * log_{2} (L)[/tex]

Putting the value of bitRate and bandwidth we get

[tex]34860=2\ * 3000\ * \ log_{2} (L)\\34860=6000 * \ log_{2} (L)[/tex]

[tex]31860-6000=log_2L\\25830=log_2L\\L=2^{25830}[/tex]

When we convert an automaton to a regular expression, we need to build expression not go through certain other states. Below is a nondeterministic finite automaton with three states. For each of the six orders of the three states, find s for the labels along paths from one state to another state that do regular expressions that give the set of labels along all paths from the first state to the second state that never go through the third state. Then identify one of these expressions from the list of choices below.
a) (10)*1 represents the paths from C to B that do not go through A.
b) 1 represents the paths from C to B that do not go through A.
c) (01)+ represents the paths from B to C that do not go through A
d) 1 represents the paths from A to B that do not go through C.

Answers

Answer: Provided in the explanation section

Explanation:

The below explanation will help to make this question simple to understanding.

For the questions presented, this analysis surfaces,

⇒ a) (10)*1 in this path we can go through A for C to B as 1010 exist from C to A then B also.

i.e. Option A is wrong , there is transition from c to A with 1.

b) 0 represent the path from B to A and from B to C also. So this is also not a solution.

i.e. Option B is wrong with input 1 there is path to both A and B from c

c) (1+11)0)*1 in this path for cover the 1+11 we have to go in two paths one is only 1 and second is 11. So 11 is the path which goes through the A.

i.e. Option c is wrong , with input 0 there is path to c input symbol 1 is not required

d) (01)+ is correct because we have + sign here not * so it not executes multiple times execute only 1 more time. So it is the path from B to C that does not through A.

cheers i hope this helped !!

Mileage Calculator You are tasked with creating a mileage caclulator to calculate the amount of money that should be paid to employees. The mileage is computed as follows An amount of .25 for each mile up to 100 miles An amount of .15 for every mile above 100. So 115 miles would be (.25 * 100) (.15 * 15) This can all be coded using a mathematical solution but I want you to use an if / else statement. Here is how you are to implement it: If the total miles input is less than or equal to 100 then simply calculate the miles * .25 and output the amount otherwise compute the total amount for all miles mathematically. Input: Total number of miles Process: dollar amount owed for miles driven Output: Amount of money due

Answers

Answer:

mileage = float(input("Enter mileage: ")) if (mileage > 100):    amount = (mileage - 100) * 0.15 + 100 * 0.25 else:    amount = mileage * 0.25   print("Total amount: $" + str(amount))

Explanation:

The solution code is written in Python 3.

Firstly, prompt user to input a mileage (Line 1).

Next, create an if statement to check if a mileage greater than 100 (Line 3). If so, apply the formula to calculate amount with mileage above 100 (Line 4) otherwise,  calculate the amount just by multiplying the mileage by 0.25.

At last, print the total amount (Line 8).

A drawback of using observation as a data collection method is that:_______
a. it is inaccurate in measuring overt behavior.
b. it cannot be used to study cross-cultural differences.
c. it is appropriate only for frequently occurring behaviors.
d. it cannot be used to collect sensitive data about respondents.

Answers

Answer:

The answer is d, because it is not reliable in the sense that it can be used for important and sensitive information when your collecting data.

Separating calculations into methods simplifies modifying and expanding programs.
The following program calculates the tax rate and tax to pay, using methods. One method returns a tax rate based on an annual salary.
Run the program below with annual salaries of 40000, 60000, and 0.
Change the program to use a method to input the annual salary.
Run the program again with the same annual salaries as above. Are results the same?
This is the code including what I am working on added. I will not run. I need to remove some areas to designate the scanner as the source of input but I am unsure of which area.
import java.util.Scanner;
public class IncomeTax {
// Method to get a value from one table based on a range in the other table
public static double getCorrespondingTableValue(int search, int [] baseTable, double [] valueTable) {
int baseTableLength = baseTable.length;
double value = 0.0;
int i = 0;
boolean keepLooking = true;
i = 0;
while ((i < baseTableLength) && keepLooking) {
if (search <= baseTable[i]) {
value = valueTable[i];
keepLooking = false;
}
else {
++i;
}
}
return value;
}
public static void readInput(int salaryOne, int salaryTwo, int salaryThree);
annualSalary = 0;
Scanner scnr = new Scanner(System.in);
scnr nextInt();
new annualSalary;
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
int annualSalary = 0;
double taxRate = 0.0;
int taxToPay = 0;
int i = 0;
int [] salaryBase = { 20000, 50000, 100000, 999999999 };
double [] taxBase = { .10, .20, .30, .40 };
// FIXME: Change the input to come from a method
System.out.println("\nEnter annual salary (0 to exit): ");
annualSalary = scnr.nextInt();
while (annualSalary > 0) {
taxRate = getCorrespondingTableValue(annualSalary, salaryBase, taxBase);
taxToPay= (int)(annualSalary * taxRate); // Truncate tax to an integer amount
System.out.println("Annual salary: " + annualSalary +
"\tTax rate: " + taxRate +
"\tTax to pay: " + taxToPay);
// Get the next annual salary
// FIXME: Change the input to come from a method
System.out.println("\nEnter annual salary (0 to exit): ");
annualSalary = scnr.nextInt();
}
return;
}
}

Answers

Answer: Provided in the explanation section

Explanation:

Programs:

IncomeTax.java

import java.util.Scanner;

public class IncomeTax {

  // Method to get a value from one table based on a range in the other table

  public static double getCorrespondingTableValue(int search, int [] baseTable, double [] valueTable) {

  int baseTableLength = baseTable.length;

  double value = 0.0;

  int i = 0;

  boolean keepLooking = true;

  i = 0;

  while ((i < baseTableLength) && keepLooking) {

  if (search <= baseTable[i]) {

  value = valueTable[i];

  keepLooking = false;

  }

  else {

  ++i;

  }

  }

  return value;

  }

  public static int readInput(Scanner scan){

      System.out.println("\nEnter annual salary (0 to exit): ");

      int annualSalary = scan.nextInt();

      return annualSalary;

  }

  public static void main (String [] args) {

  Scanner scnr = new Scanner(System.in);

  int annualSalary = 0;

  double taxRate = 0.0;

  int taxToPay = 0;

  int [] salaryBase = { 20000, 50000, 100000, 999999999 };

  double [] taxBase = { .10, .20, .30, .40 };

 

  // FIXME: Change the input to come from a method

  annualSalary = readInput(scnr);

  while (annualSalary > 0) {

  taxRate = getCorrespondingTableValue(annualSalary, salaryBase, taxBase);

  taxToPay= (int)(annualSalary * taxRate); // Truncate tax to an integer amount

  System.out.println("Annual salary: " + annualSalary +

  "\tTax rate: " + taxRate +

  "\tTax to pay: " + taxToPay);

  // Get the next annual salary

  // FIXME: Change the input to come from a method

  annualSalary = readInput(scnr);

  }

  return;

  }

  }

     

Output:

Enter annual salary (0 to exit):

10000

Annual salary: 10000   Tax rate: 0.1   Tax to pay: 1000

Enter annual salary (0 to exit):

50000

Annual salary: 50000   Tax rate: 0.2   Tax to pay: 10000

Enter annual salary (0 to exit):

0

what are the reasonsfor documenting business rules​

Answers

Answer:

This is because when there is a mistake, misunderstanding or trouble and one need's evidence, the documented business rule will be available as your evidence.

Explanation:

Sorry if I'm wrong hope it helps

write pseudocode to represent the logic of a program that allows the user to enter a value for one edge of a cube. The program calculates the surface area of one side of the cube, the surface area of the cube, and its volume. The program outputs all the results.

Answers

Answer:

prompt("Enter a value for one edge of a cube")

Store user's value into edgeCube

area = 6 * (edgeCube * edgeCube)

volume = edgeCube * edgeCube * edgeCube

print("One side of the cube is: " + edgecube);

print("The area is: " + area)

print("The volume is: " + volume)

The part of a computer that we can touch and feel: (one word answer)

Answers

Answer:

hardware

Explanation:

hardware is the part where we can touch and feel while software ,we cant

Answer:

keyboard

Explanation:

Look at the following array definition:

const int numbers[SIZE] = { 18, 17, 12, 14 };
Suppose we want to pass the array to the function processArray in the following manner:

processArray(numbers, SIZE);
Which of the following function headers is the correct one for the processArray function?

a. void processArray(const int *arr, int size)
b. void processArray(int * const arr, int size)

Answers

Answer:

The answer is void process Array (int arr {}, int n)

Explanation:

Solution

From the given question, the right choice answer i not listed  here.

However this is the right answer choice stated as follows: void process Array (int arr {}, int n)

The size of this array is not fixed. we need to pass or move the array as the second  argument to the function.

The option a and b is wrong.

Determining the Services Running on a Network Alexander Rocco Corporation has multiple OSs running in its many branch offices. Before conducting a penetration test to determine the network’s vulnerabilities, you must analyze the services currently running on the network. Bob Kaikea, a member of your security team who’s experienced in programming and database design but weak in networking concepts, wants to be briefed on network topology issues at Alexander Rocco Corporation. Write a memo to Bob summarizing port numbers and services that run on most networks. The memo should discuss the concepts of well-known ports and give a brief description of the most commonly used ports: 20, 21, 23, 25, 53, and 110. Complete your mini-case projects in a Microsoft Word document (or any other text editor) and submit the completed work as instructed below. Remember - papers need to be in APA format with Title page.

Answers

Answer: provided in the explanation section

Explanation:

 Network’s vulnerabilities:

           Vulnerability is a weak spot in your network that might be exploited by a security threat. Risks are the potential consequences and impacts of unaddressed vulnerabilities. In other words, failing to do Windows Updates on your Web server is vulnerability.

           Regularly scheduled network vulnerability scanning can help an organization identify weaknesses in their network security before the bad guys can mount an attack. The goal of running a vulnerability scanner or conducting an external vulnerability assessments is to identify devices on your network that are open to known vulnerabilities without actually compromising your systems.

           The overall objective of a Vulnerability Assessment is to scan, investigate, analyze and report on the level of risk associated with any security vulnerabilities discovered on the public, internet-facing devices and to provide your organization with appropriate mitigation strategies to address those discovered vulnerabilities.

         

Network topology issues:

Coverage Topology

           Coverage problem reflects how well an area is monitored or tracked. The coverage and connectivity problems in networks have received considerable attention in the research community in recent years

 

Geographic routing

           Geographic routing uses geographic and topological information of the network to achieve optimal routing schemes with high routing efficiency and low power consumption

Port Numbers

           Port Numbers While IP addresses determine the physical endpoints of a network connection, port numbers determine the logical endpoints of the connection. Port numbers are 16-bit integers with a useful range from 1 to 65535.

Port numbers are assigned by an organization called IANA and ports are allocated to various needs to avoid confusion.

Ports are classified into 3 main categories.

Well Known Ports (Port numbers 0 - 1023)

           In a client-server application, the server usually provides its service on a well-known port number. Well-known port numbers are a subset of the numbers which are assigned to applications. According to RFC1700 [5], well-known port numbers are managed by the Internet Assigned Numbers Authority (IANA). They used to be in the range from 1 to 255, but in 1992 the range was increased up to 1023.

Registered Ports (Port numbers1024 - 49151)

Such ports are used by programs run by users in the system.

           In addition to the well-known ports below 1024 there are more port numbers assigned to applications but are located anywhere from 1024 to 65535.

Private or Dynamic Ports (Port numbers 49152 - 65535)

           Private ports are not assigned for any specific purpose.

         

Discuss the concepts of well-known ports and give a brief description of the most commonly used ports: 20, 21, 23, 25, 53, and 110.

Commonly Used Port Numbers

The following port numbers are unofficial list of commonly used for linux/unix based servers.

         

20&21               TCP                FTP (File server protocol)

           FTP is one of the most commonly used file transfer protocols on the Internet and within private networks. An FTP server can easily be set up with little networking knowledge and provides the ability to easily relocate files from one system to another. FTP control is handled on TCP port 21 and its data transfer can use TCP port 20 as well as dynamic ports depending on the specific configuration.

23                   TCP/UDP          Telnet

           Telnet is the primary method used to manage network devices at the command level. Unlike SSH which provides a secure connection, Telnet does not, it simply provides a basic unsecured connection. Many lower level network devices support Telnet and not SSH as it required some additional processing. Caution should be used when connecting to a device using Telnet over a public network as the login credentials will be transmitted in the clear.

25                   TCP/UDP         SMTP   (for sending outgoing emails)

           SMTP is used for two primary functions, it is used to transfer mail (email) from source to destination between mail servers and it is used by end users to send email to a mail system.

53         TCP/UDP        DNS Server (Domain name service for DNS request)

           The DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for network routing. DNS is hieratical with main root servers that contain databases that list the managers of high level Top Level Domains (TLD) (such as .com). T

110             TCP                 POP3 (For receiving emails)

           POP version 3 is one of the two main protocols used to retrieve mail from a server. POP was designed to be very simple by allowing a client to retrieve the complete contents of a server mailbox and then deleting the contents from the server.

Write MATLAB script programs to perform the following conversions, taking a value in SI units as the input argument and returning the value to US Customary Units.

a. Length: Centimeters to inches.
b. Temperature: °C to °F
c. Force: Newton to Pound-forced.
d. Speed: Meters per second to miles per hour

Answers

The answer most likely C

software that interprets commands from the keyboard and mouse is also known as the? A. desktop B. Operating system C. operating disk D. hard drive

Answers

Answer:

C

Explanation:

Suppose that you are given the following partial data segment, which starts at address 0x0700 : .data idArray DWORD 1800, 1719, 1638, 1557, 1476, 1395, 1314, 1233, 1152, 1071, 990 u DWORD LENGTHOF idArray v DWORD SIZEOF idArray What value does EAX contain after the following code has executed? (Ignore the .0000 that Canvas sticks on the end) mov esi, OFFSET idArray mov eax, [esi+0*TYPE idArray]

Answers

Answer:

The value EAX contain after the code has been executed is 1233

Explanation:

Solution

Now,

The below instruction describes the MOV operation.

The MOV esi, OFFSET idArray .

It shows the movement, the offset value of the idArray in the esi.

Thus,

Follow the below instruction

MOV eax, [esi+7*TYPE idArray]

It will move the address of the idArray at that position into eax.

Value at the 7th position is moved to eax.

Therefore, the value at eax will be 1233.

What are keyboards that include all the keys found on a typical virtual keyboard, as well as extra keys, such as function and navigation keys

Answers

Answer:

multimedia keyboard i think

Explanation:

The keyboards that include all the keys found on a typical virtual keyboard including function and navigation keys are called;

Laptops

A virtual keyboard is one that appears only when we require it and then goes away after we are done using it. Due to the nature of them, they occupy a small space. Examples of these virtual keyboards are the keyboards in touch screen mobile phones as well as tablets. Also, there are some computer operating systems that support virtual keyboards such as Windows 10.

Now, it is pertinent to know that virtual keyboards don't require physical keys to operate and also they don't possess the function and navigation keys that traditional keyboards have.

The only other unit that has a keyboard that possesses the function and navigation keys are Laptops.

Read more at; https://brainly.in/question/11722276

Consider the class Money declared below. Write the member functions declared below and the definition of the overloaded +. Modify the class declaration and write the definitions that overload the stream extraction and stream insertion operators >> and << to handle Money objects like $250.99
Write a short driver main() program to test the overloaded operators +, << and >> class Money { public: friend Money operator +(const Money& amountl, const Money& amount2) Money(); // constructors Money( int dollars, int cents); // set dollars, cents double get_value() const; void printamount();// print dollars and cents like $12.25 private: int all_cents; // all amount in cents };

Answers

Answer: Provided in the explanation section

Explanation:

#include<iostream>

using namespace std;

class Money{

  private:

      int all_cents;

  public:

      Money();

      double get_value() const;

      Money(int,int);

      void printamount();

      friend Money operator+(const Money&, const Money&);

      friend ostream& operator<<(ostream&, const Money&);

      friend istream& operator>>(istream&, Money&);

};

Money::Money(){all_cents=0;}

double Money::get_value() const{return all_cents/100.0;}

Money::Money(int dollar ,int cents){

  all_cents = dollar*100+cents;

}

void Money::printamount(){

  cout<<"$"<<get_value()<<endl;

}

Money operator+(const Money& m1, const Money& m2){

  int total_cents = m1.all_cents + m2.all_cents;

  int dollars = total_cents/100;

  total_cents %=100;

  return Money(dollars,total_cents);

}

ostream& operator<<(ostream& out, const Money& m1){

  out<<"$"<<m1.get_value()<<endl;

  return out;

}

istream& operator>>(istream& input, Money& m1){

  input>>m1.all_cents;

  return input;

}

int main(){

 

  Money m1;

  cout<<"Enter total cents: ";

  cin>>m1;

  cout<<"Total Amount: "<<m1;

 

  Money m2 = Money(5,60);

  Money m3 = Money(4,60);

  cout<<"m2 = ";m2.printamount();

  cout<<"m3 = ";m3.printamount();

  Money sum = m2+m3;

  cout<<"sum = "<<sum;

 

}

cheers i hope this helped !!

Write and test a Python program to find and print the smallest number in a set of integer numbers. The program should read input numbers until it reads a negative number. The negative number serves as a sentinel or marker telling the program when to stop reading numbers. The smallest of all numbers input as well as how many numbers were read (not considering the sentinel number) should be printed.

Answers

Answer:

numbers = []

count = 0

while True:

   number = int(input("Enter a number: "))

   if number < 0:

       break

   else:

       numbers.append(number)

       count += 1

min_number = min(numbers)  

print(str(min_number) + " was the smallest among " + str(count) + " entered numbers.")

Explanation:

Initialize an empty array, to hold the entered numbers, and count as 0

Create a while loop that iterates until a specific condition is met

Inside the loop, ask the user to enter the numbers. When the user enters a negative number terminate the loop. Otherwise, add the entered number to the numbers array and increment the count by 1.

When the loop is done, find the smallest of the number in the numbers array using min method and assign it to the min_number.

Print the min_number and count

Create a class to represent the locker and another class to represent the combination lock. The Locker class will include an attribute that is of type CombinationLock. Each class must include a constructor with no input argument and also a constructor that requires input arguments for all attributes. Each class must include the appropriate set and get methods. Each class must include a method to print out all attributes.

Answers

Answer:

Class Locker

public class Locker {  

int lockno;  

String student;

int booksno;

private CombinationLock comblock = new CombinationLock();

public Locker() {

 lockno = 0;

 student= "No Name";

 booksno = 0;

 comblock.reset();  }

public Locker(int lockno, String student, int booksno,

  CombinationLock comblock) {

 super();

 this.lockno= lockno;

 this.student= student;

 this.booksno= booksno;

 this.comblock= comblock;  }

public int getLockNo() {

 return lockno;   }

public void setLockNo(int lockno) {

 this.lockno= lockno;  }

public String getName() {

 return student;  }

public void setName(String student) {

 this.student = student;  }

public int getBooksNumber() {

 return booksno;   }

public void setBooksNumber(int booksno) {

 this.booksno= booksno;  }

public String getComblock() {

 return comblock.toString();  }

public void setComblock(int no1, int no2, int no3) {

 this.comblock.setNo1(no1);  

 this.comblock.setNo2(no2);  

 this.comblock.setNo3(no3);   }

public String printValues() {

 return "Locker [lockno=" + lockno+ ", student="

   + student+ ", booksno=" + booksno

   + ", comblock=" + comblock+ "]";  }  }

The class Locker has attributes lockno for lock number, student for students names and bookno for recording number of books. Locker class also an attribute of type CombinationLock named as comblock. Locker class includes a constructor Locker() with no input argument and also a constructor Locker() that requires input arguments for all attributes lockno, student, booksno and comblock. super() calls on immediate parent class constructor. Class Locker contains the following set methods: setLockNo, setName, setBooksNumber and setComblock. Class Locker contains the following get methods: getLockNo, getName, getBooksNumber and getComblock. printValues() method displays the values of attributes.

Explanation:

Class CombinationLock

*/ CombinationLock has attributes no1, no2 and no3. It has a  constructor CombinationLock() with no input argument and also a constructor CombinationLock() that requires input arguments for attributes no1 no2 and no3. Class CombinationLock contains the following set methods: setNo1, setNo2 and setNo3. The class contains the following get methods: getNo1, getNo2 and getNo3. The class includes a method printValues() to print out all attributes.

public class CombinationLock {

int no1;

int no2;

int no3;  

public CombinationLock() {

 this.no1= 0;

 this.no2= 0;

 this.no3= 0;   }  

public CombinationLock(int no1, int no2, int no3) {

 super();

 this.no1= no1;

 this.no2= no2;

 this.no3= no3;  }

 

public int getNo1() {

 return no1;  }

public void setNo1(int no1) {

 this.no1= no1;  }

public int getNo2() {

 return no2;  }

public void setNo2(int no2) {

 this.no2= no2;  }

public int getNo3() {

 return no3;  }

public void setNo3(int no3) {

 this.no3= no3;  }

 

public void reset() {

 this.no1=0;

 this.no2=0;

 this.no3=0;  }

public String printValues() {

 return "CombinationLock [no1=" + no1+ ", no2=" +  no2

   + ", no3=" + no3+ "]";  }  }

(Geometry: area of a regular polygon)
A regular polygon is an n-sided polygon in which all sides are of the same length and all angles have the same degree (i.e., the polygon is both equilateral and equiangular). The formula for computing the area of a regular polygon is
area = (n * s^2) / (4 * tan(PI / n)
Here, s is the length of a side. Write a program that prompts the user to enter the number of sides and their length of a regular polygon and displays its area.

Answers

Answer:

import math

n = int(input("Enter the number of sides: "))

s = float(input("Enter the length of a side: "))

area = (n * s**2) / (4 * math.tan(math.pi/n))

print("The area is: " + str(area))

Explanation:

*The code is in Python.

Import the math to be able to compute the pi and tan

Ask the user to enter the number of sides and the length of a side

Calculate the area using the given formula

Print the area

How do I write: "get a random number between -10 and 11 but it cannot be 0"? (java)

Answers

Answer:

  generate a random number in a known range and map the result to the range you want

Explanation:

Use any of the usual methods to get a random number in the range 0-20, then subtract 9. Use an IF statement to test if the result is 0. If it is, replace the value with -10.

The first programming project involves writing a program that computes the minimum, the maximum and the average weight of a collection of weights represented in pounds and ounces that are read from an input file. This program consists of two classes. The first class is the Weight class, which is specified in integer pounds and ounces stored as a double precision floating point number. It should have five public methods and two private methods:A public constructor that allows the pounds and ounces to be initialized to the values supplied as parameters.A public instance method named lessThan that accepts one weight as a parameter and returns whether the weight object on which it is invoked is less than the weight supplied as a parameter.A public instance method named addTo that accepts one weight as a parameter and adds the weight supplied as a parameter to the weight object on which it is invoked. It should normalize the result.A public instance method named divide that accepts an integer divisor as a parameter. It should divide the weight object on which the method is invoked by the supplied divisor and normalize the result.A public instance toString method that returns a string that looks as follows: x lbs y oz, where x is the number of pounds and y the number of ounces. The number of ounces should be displayed with three places to the right of the decimal.A private instance method toOunces that returns the total number of ounces in the weight object on which is was invoked.A private instance method normalize that normalizes the weight on which it was invoked by ensuring that the number of ounces is less than the number of ounces in a pound.Both instance variable must be private. In addition the class should contain a private named constant that defines the number of ounces in a pound, which is 16. The must not contain any other public methods.The second class should be named Project1. It should consist of the following four class (static) methods.The main method that reads in the file of weights and stores them in an array of type Weight. It should then display the smallest, largest and average weight by calling the remaining three methods. The user should be able to select the input file from the default directory by using the JFileChooser class. The input file should contain one weight per line. If the number of weights in the file exceeds 25, an error message should be displayed and the program should terminate.A private class method named findMinimum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the smallest weight in that array.A private class method named findMaximum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the largest weight in that array.A private class method named findAverage that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the average of all the weights in that array.Be sure to follow good programming style, which means making all instance variables private, naming all constants and avoiding the duplication of code. Furthermore you must select enough different input files to completely test the program.Java programmingThe text file could not be attached but it looks like this:Year,Weight in Lbs,Weight Loss Rate1994,713.6,91995,684.5,8.21996,636.6,7.41997,611,6.81998,567.6,6.31999,523,5.72000,506.5,5.52001,504.5,5.62002,494.4,5.62003,475.8,5.72004,463.2,5.52005,469,5.62006,479.3,5.82007,471.8,5.72008,458.6,5.42009,431.9,52010,404.5,4.82011,387.1,4.72012,387.8,4.72013,367.9,4.5please tell me what to do? How to get the problem done.

Answers

Answer:

yoooooooooooooooooooooooo

Explanation:

lrmgkrmbm mrm g

What are the main differences between photo and video formats?

Answers

Answer:

Nothing just the video is series of photos together

Explanation:

LAB:
Warm up:
People's weights Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
printf("%0.2lf", yourValue);
(1) Prompt the user to enter five numbers, being five people's weights. Store the numbers in an array of doubles. Output the array's numbers on one line, each number followed by one space. (2 pts)
Ex:
Enter weight 1: 236.0
Enter weight 2: 89.5
Enter weight 3: 142.0
Enter weight 4: 166.3
Enter weight 5: 93.0
You entered: 236.00 89.50 142.00 166.30 93.00
(2) Also output the total weight, by summing the array's elements. (1 pt)
(3) Also output the average of the array's elements. (1 pt)
(4) Also output the max array element. (2 pts)
Ex:
Enter weight 1: 236.0
Enter weight 2: 89.5
Enter weight 3: 142.0
Enter weight 4: 166.3
Enter weight 5: 93.0
You entered: 236.00

Answers

Answer:

Following is the program in the C language

#include <stdio.h> // header file  

int main() // main function

{

float weight1[10]; // array declaration  

float sum=0,max1,t; // variable declaration

for(int k = 0; k < 5; k++) //iterating the loop

{

printf("Enter weight %d: ",k+1);

scanf("%f",&weight1[k]); // Read the array by user

}

printf("\n");

printf("You entered: ");

max1=weight1[0];

for(int k = 0; k < 5 ; k++)

{

sum=sum+weight1[k];

if(max1 < weight1[k]) // check condition for highest element

{

max1=weight1[k];

}

printf("%.2lf ",weight1[k]);

}

t=sum/5.0; // find average

printf("\nTotal weight: %.2lf\n",sum); // displat total

printf("Average weight: %.2lf\n",t); // display Average

printf("Max weight: %.2lf\n",max1); // display maximum value

return 0;

}

Output:

Enter weight 1: 1

Enter weight 2: 2

Enter weight 3:3

Enter weight 4:4

Enter weight 5: 5

You entered:  1.00  2.00  3.00  4.00  5.00

Total weight: 15.00

Average weight:  3.00

Max weight:  5.00

Explanation:

Following are description of program :

Declared a array "weight1" of type "float" .Declared a variable sum,t max1 of type "float ".Iterating the loop for taking the input by the user by using scanf statement .Iterating the loop for calculating the maximum value in "max1" variable  ,total in "sum" variable .In the "t" variable we calculated the average. Finally we print the value of the maximum ,average ,total and respective array that are mention in the question .

A _____ is a form of Web conferencing that uses streaming media technologies to broadcast video and/or audio over the Internet from a single content source to many listeners or viewers simultaneously.

Answers

Answer:

Webcast

Explanation:

Webcast is the live broadcast of a video or audio feed from your event or conference harnessing the internet. Webcast is a media presentation of an event circulated over the internet by using media technology to distribute a single source to various viewers.

Generally,  webcast is briefly defined as broadcasting over the internet. The broadcast might not be specifically live  . One can capture the video or the audio he or she wants to publish and publish it online anywhere. Webcast allow your viewers to remain engage as if they are face to face with the broadcaster.

Webcasting is a a great tools that has been used by various multinational and company to reach wide range of audience . This web based broadcast can even provide opportunity for audience to ask question and even provide answers in real time.

Answer:

Webcast.

Explanation:

A Webcast is a form of Web conferencing that uses streaming media technologies to broadcast video and/or audio over the Internet from a single content source to many listeners or viewers simultaneously.

The Webcast is an internet conferencing tool that transmits and stores, corporate presentations, lectures, workshops, seminars, etc., with the advantage of being a simple operation tool that can bring together groups in real time offering dynamism and reducing geographical distance.

It is a widely used and useful tool for companies, as it can help when traditional communication channels are not sufficient to deal with extremely relevant issues for the company, such as training and presentation of materials for prospecting customers.

The Webcast is an advantageous technology for companies by reducing personnel displacement and reducing costs with facilities, infrastructure and space rental.

Print "Censored" if userInput contains the word "darn", else print userInput. End with a newline. Ex: If userInput is "That darn cat.", then output is: Censored Ex: If userInput is "Dang, that was scary!", then output is: Dang, that was scary! Note: If the submitted code has out-of-range access, the system will stop running the code after a few seconds, and report "Program end never reached." The system doesn't print the test case that caused the reported message.
#include
#include
using namespace std;
int main() {
string userInput;
getline(cin, userInput);
/* Your solution goes here */
return 0;
}

Answers

Answer:

The program goes as follows

Comments are used to explain difficult lines

#include <iostream>

#include <string>

using namespace std;

int main()

{

string userinput;

getline(cin,userinput);

/* My Solution starts here*/

//Initialize sub string position to 0

int stringpos = 0;

// Declare an iterating variable to iterate through userinput

int startpos;  

//Declare and initialize a determinant variable

int k = 0;

while((startpos = userinput.find("darn",stringpos))!=string::npos)

{

 //If userinput contaings "darn", increase k by 1

k++;

// Go to next string position

stringpos = startpos+1;  

}

//If determinant variable k is p then, userinput does not contain "darn"

if(k==0)

{

 cout<<userinput;

}

//Otherwise, it contains "darn"

else

{

 cout<<"Censored";

}

/* My Solution ends here*/

return 0;

}

See attached for .cpp program file

Other Questions
answer for this question Which choices are equivalent to the quotient below? Write an equation in point-slope form for the line through the given point with the given slope.(10, 1); m = -1. Find the shaded area. First to answer (correctly) will get brainliest. I need help ASAP I only have 30 more mins!! Choose the sentence with the correct punctuation.A.Donna packed three possible outfits: Her black and white dress, her blue suit, and her brown skirt.B.Donna packed three possible outfits, her black and white dress, her blue suit, and her brown skirt.C.Donna packed three possible outfits; her black and white dress, her blue suit, and her brown skirt.D.Donna packed three possible outfits: her black and white dress, her blue suit, and her brown skirt. Redistributive philosophies Complete the following table by selecting the redistributive philosophy that matches each statement. Statement Utilitarianism Libertarianism Liberalism The government should choose policies to maximize the total utility of everyone in society. The government should choose policies deemed to be just, as evaluated by an impartial observer behind a "veil of ignorance." The government should punish crimes and enforce voluntary agreements, but not redistribute income. Suppose that Ginny believes that the progressive U.S. tax system is flawed because it supports equality of outcomes rather than equality of opportunity. Which re-distributive philosophy is consistent with Ginny's view?A. LiberalismB. LibertarianismC. Utilitarianism What is the distinct permutation of the letters in PEOPLE? Suppose you just purchased a digital music player and have put 8 tracks on it. After listening to them you decide that you like 4 of the songs. With the random feature on your player, each of the 8 songs is played once in random order. Find the probability that among the first two songs played (a) You like both of them. Would this be unusual? (b) You like neither of them. (c) You like exactly one of them. (d) Redo (a)-(c) if a song can be replayed before all 8 songs are played. What is the surface area of a sphere with a radius of 9 units?A. 57677 units2B. 6487 units2O C. 28871 units2D. 32477 units2 I need help on this. What is the most impportant part of ratios Aziz and Tuan collected 3600 bottles for recycling last year.Aziz collected 5 times as many bottles as Tuan.How many bottles did Tuan collect?please write out the equation with the answer in this format.xx=x Standard form of the equation that goes through (1, 2) with a slope of 7, please! Expand and simplify (2x+2)(2x+1) The Freed Corporation produces three products, X, Y, Z, from a single raw material input. Product Y can be sold at the split-off point for total annual revenues of $50,000, or it can be processed further at a total annual cost of $16,000 and then sold for $68,000. Which of the following statements is true concerning Product Y? a. Product Y should be sold at the split-off point rather than processed further. b. The annual financial advantage of processing Product Y further is $18,000. c. The annual financial advantage of processing Product Y further is $68.000. d. The annual financial advantage from processing Product Y further is $2.000 Two dice are rolled. E is the event that the sum is even, F is the event of rolling at least one six, and G is the event that the sum is eight. List the outcomes for the following events: a. E F {(2, 2), (4, 4), (6, 6)} {(6, 2), (6, 4), (6, 6), (2, 6), (4, 6)} {(2, 6), (4, 6), (6, 6)} b. Ec G {(6, 2), (6, 4), (6, 6), (2, 6), (4, 6)} {(2, 6), (4, 6), (6, 6)} {(2, 2), (4, 4), (6, 6)} What is the relationship between historical questions and historicalarguments?A. Historical arguments connect multiple historical questions.B. Historical questions provide evidence to support historicalarguments.C. Historical arguments are formed to answer historical questions. D. Historical questions are used to turn historical arguments intoessays Each of the musketeers has a lackey (servant). List at least four duties that the lackeys are responsible for. Graph the linear equations. Find three points that solve the equation -3x + 2y= 2