Answer: palace or castle
Explanation: the anthill is the big place where the ants live and the palace is the big place where the king lives.
Sequential and direct access are two methods to locate data in memory. Discuss why major devices now a days use direct access? How can we convert data that is written on a device that supports only sequential access to a device that only support direct access method?
Answer:
Direct data access reduces the speed of retrieving data from memory or storage. Retrieving data and storing it in a cache memory provides direct access to data in the storage.
Explanation:
Sequential memory access, as the name implies, goes through the memory length location in search of the specified data. Direct memory access, provides a memory location index for direct retrieval of data.
Examples of direct and sequential memory access are RAM and tapes respectively. Data in sequential memory access can be access directly by getting data in advance and storing them in cache memory for direct access by the processor.
Super Scores
I am sure all of you know about SAT Superscore. Superscoring is the process by which colleges consider the highest section scores across all the dates a student took the SAT. Rather than confining the scores to one particular date, this approach will take the student's highest section scores, forming the highest possible composite score. Let us solve a generic problem here. Let us start with a sample input and output 2 3
700 800 775 775 800 700 800 800 1600
First line of input specifies 2 sections and 3 takes for this student. So, we need to find the best score for each section across all the test takes & output the best section scores and the corresponding total - next 3 lines show the scores for each section for each take - For this sample input/output, student got 800 in both sections, so the final total is 1600 Your program should be generic to handle any # of sections and any # of takes 2591421130838 5 int main() 6 int nursections, nuntakes, naxScores; cin >> nun sections >> nuntakes; 9 maxScores - new int [numSections); //dynamic memory allocation of arnay! 10 11 // initialize the array 12 for(int 1-e; Icnum Sections; i++) 13 maxScores[1] - ; 14 15 //CODE HERE 16 17 1/output the max score for each section and compute & output total too. 18 int total -e; 19 for(int 1-e; Icnum Sections; 1.) { 20 cout << maxScores[1] << **; 21 total + maxScores[i]; 22 ) 23 cout << total; 24 ) I
Answer:
Replace:
//CODE HERE
//output the max score for each section and compute & output total too.
with the following lines of codes:
int num;
for(int i=0; i<numtakes; i++) {
for(int j=0; j<numsections; j++) {
cin>>num;
if(num>maxScores[j]){
maxScores[j] = num; }
} }
Explanation:
Your program is poorly formatted. (See attachment for correct presentation of question)
What's required of the us is to complete the source program.
The codes has been completed in the Answer section above, however, the line by line explanation is as follows:
This line declares num that gets user for input for each entry
int num;
This line iterates through the number of takes
for(int i=0; i<numtakes; i++) {
This line iterates through the number of sections
for(int j=0; j<numsections; j++) {
This gets user input for each entry
cin>>num;
The following if condition determines the greatest entry in each section
if(num>maxScores[j]){
maxScores[j] = num; }
} }
For further explanation, I've added the complete source file as an attachment where I used comments to explain each line.
Return-from-trap instruction returns into the calling user program while simultaneously reducing the privilege level back to ________ Select one: a. User mode b. Kernel mode c. OS mode d. CPU mode
Answer:
A. user mode
Explanation:
A computer system is a machine that is run by a series of programs that connect the virtual parts (software) to the hardware or electronic parts. The kernel is a computer program that connects the software and hardware of a computer system.
The kernel-mode has several privileges like I/O, interrupts and traps, etc. This mode is tapped by root or administrators to utilize these privileges. Unlike the kernel mode, the user-mode does not have these functions, so a return from the trap instruction (kernel) reduces the privileges back to the user mode.
Question #2 Dropdown What are the missing words in the program? divide(numA, numB): numA / numb
Answer:
def
return
Explanation:
I hope this helps!
What feature allows you to access previous copies of a document on OneDrive?
File storage
Recover file
Stored work
Version history
Version history feature
OneDrive's Version history feature allows you to view older versions of an Office Online document. If you find a version you want, you can then restore it, moving it to the top of the list as the latest version of the file.
Answer:
Version history
Explanation:
Question 1 (1 point)
What is an advantage of the wireless option for peripheral?
Assume that d is a double variable. Write an if statement that assigns d to the int variable i if the value in d is not larger than the maximum value for an int.
Answer:
That's because the value has reached the size limit of the int data type. ... you should use long rather than int , because long can store much larger numbers than int . If ... In other words, a float or double variable can't accurately represent 0.1 . ... If you're using Java to measure the size of your house, you'd need an electron ...
Explanation:
In the program below, which two variables have the same scope?
def rhyme(word):
leftCharacter = word[0]
if leftCharacter != 'd':
return 'd' + word[1:]
else:
return 'f' + word[1:]
def poem():
print("Enter Q to quit.")
userWord = input("Enter a word: ")
while userWord != 'Q' and userWord != 'q':
rhymeWord = rhyme(userWord)
print(rhymeWord)
userWord = input("Enter a word: ")
# the main part of your program that calls the function
poem()
userWord and ____
Fill in the blank Answer options: poem, word, rhymeWord
Answer:
rhymeWord
Explanation:
correct answer edge 2020
# the main part of your program that calls the function poem() userWord and rhymeWord. Hence, option C is correct.
What is rhymeWord?Rhyming words all have the same last consonant. Simply put, it is the repetition of similar sounds. When two words have similar sounds, usually those that follow the final stressed syllable of each word, the words are said to rhyme. Cat-hat, rotten-forgotten, and heard-bird are some examples of words that rhyme; they all have similar sounds after the final stressed syllable.
If the last sounds of two or more words are the same or similar, then the words will rhyme. Some words that rhyme are goat, boat, moat, float, and coat. To determine whether two words rhyme, use your ears to listen while you speak the words. If two words have a similar or matching sound, they rhyme.
Thus, option C is correct.
For more information about rhymeWord, click here:
https://brainly.com/question/2398244
#SPJ2
While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should you do?A. Go ahead and resolve his situation first B. Request the colleague to call after sometime C. Work on both the issues at the same time D. Tell your colleague to work on his own.
Answer:
Request the colleague to call after sometime
Explanation:
While working on a customer issue, your colleague calls and asks for help to resolve his issue. What should be done is to "Request the colleague to call after some time."
This is because,e in situations like that, it is believed that the customer should come first, and that is the purpose of being there. For employee to serve the customer. A colleague can easily link up with other employees to get his issues sorted, or simply wait.
The art element line is a moving point.
True or False
PLS HELP IN WHATEVER WAY YOU CAN ASAP
the company's Chief Financial Officer recognizes the need for an upgrade to the smart watches but does not understand why the budget proposed request more than the purchase price of the update software how would you respond to this
Answer:
what ever way I can you say
I would respond by explaining that the price may go up or down before we buy them and that it is good to have some wiggle room with the cost. I would also mention that any unused money will come right back and that it is just a precaution.
When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the variablec) the length of the variabled) a copy of the variablee) the binary memory address
Answer:
The answer is "Option d".
Explanation:
In this question the choice d, that is "a copy of the variable" is correct because the method takes a reference value or a copy of the variable in its parameter, the example of this question can be defined as follows:
void me2(double x)//defining a method me2 with a double parameter
{
//method body
}
double x = 35.655;//defining a double variable x
me2(x);//calling a method with passing the copy of th e variable
Input an int between 0 and 100 and print the numbers between it and 100, including the number itself and the number 100. If the number is less than or equal to 0, or greater than or equal to 100 print "error". Print 20 numbers per line.
Language: Java
import java.util.Scanner;
public class JavaApplication42 {
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
int count = 0;
System.out.println("Enter an integer between 0 and 100");
int num = scan.nextInt();
if (num <= 0 || num >= 100){
System.out.println("error");
}
else{
while(num <= 100){
if (count == 20){
System.out.println("");
count = 0;
}
else{
System.out.print(num+" ");
count++;
num++;
}
}
}
}
}
I hope this helps!
The pentagonal number is an illustration of loops.
Loops are used to perform repetitive operations
The program in Java where comments are used to explain each line is as follows:
import java.util.*;
public class Main {
public static void main(String[] args) {
//This creates a Scanner object
Scanner input = new Scanner(System.in);
//This gets input for num
int num = input.nextInt();
//This prints error is num is out of range
if(num <=0 || num >= 100){
System.out.print("Error");
}
else{
//This initializes counter to 0
int count = 0;
//This iterates through num
for (int i = num; i <= 100; i++) {
//This prints the current number
System.out.print((i)+"\t");
//This increments the counter by 1
count++;
//If the counter is 10
if(count == 10){
//This prints a new line
System.out.println();
//This sets the counter to 0
count = 0;
}
}
}
}
}
Read more about loops at:
https://brainly.com/question/19344465
Crowdsourcing is not only used for relatively simple tasks such as designing a Web site or designing a case for a smartphone. Today, it is increasingly being used in more complex designs as well. Precyse Technologies provides supply-chain products and solutions that assist organizations in tracking their inventories using RFID technology. It was having difficulty improving the performance and battery life of a particular RFID device; there were not adequate internal resources to tackle the problem. So, Precyse asked InnoCentive, a crowdsourcing provider, for assistance, believing that crowdsourcing would provide quick access to a worldwide talent pool and a higher return on investment (ROI). Ultimately, the company received more than 300 ideas from global experts for solving its problem. It narrowed the pool down to three finalists, from which a winner was chosen. The whole process took approximately four months, and Precyse estimated that it saved the company $250,000. 1. What are some typical applications of crowdsourcing? 2. What are some advantages of crowdsourcing? 3. How could crowdsourcing reduce the systems design cost and are there certain problems you would not want to use crowdsourcing to solve?
1) SOME APPLICATIONS OF CROWD SOURCING ARE;
- MARKETING STRATEGY; There is finalizing of marketing strategies by firms and this is based on the crowd sourcing ideas.
- THOUGHT LEADERSHIP; There has been catering to crowdsourcing for high level thought leadership by many firms and this is done in various fields such as Human resources.
- DESIGNING; Designing is very common for crowdsourcing and this is seen where a bunch of talent pool is being used for the purpose of designing websites,applications and as well as other prototypes.
SOME OF THE ADVANTAGES OF CROWDSOURCING ARE;
- An individual can actually save lots of costs,this is because they don't need to hire a permanent resource and this resource can be quite expensive.
- Another advantage of crowdsourcing is that one can actually get services and idea from pool of professionals that are far talented across the world.
- It also play a role in obtaining of ideas from a group of people and this can go a way in shortening the resolution process, therefore saving time.
CROWDSOURCING HELPS IN GETTING IDEAS AND SERVICES FROM A WIDER POOL OF PROFESSIONALS THAT ARE TALENTED,So;
Lots of time are being saved when there is actually a large talent pool.
This then translates into shorter span in the system design process and it also results in the saving of costs.
However,a firm don't necessarily need to hire permanent resources for critical inputs I'm the design process and this also results in saving of costs s well.
People are known to be using Crowdsourcing. The applications of crowdsourcing is often done so as to gather information or work product.
This helps to gather or seeks money to aid individuals, charities, or for one to start a business. The advantages of crowdsourcing are cost savings, speed, etc.Crowdsourcing is known to help man to remove the various costs due to functioning as a pay-per-task model.
A well managed crowdsourcing can be used to pay workforce.
Learn more about Crowdsourcing from
https://brainly.com/question/6983872
Internet entities (routers, switches, DNS servers, Web servers, user end systems, and so on) often need to communicate securely. Give three specific example pairs of Internet entities that may want secure communication.
Answer: See explanation
Explanation:
A secure connection simply means when there's encryption of a connection through the use of security protocols so that data flowing between the nodew can be secured.
Examples of Internet entities that may want secure communication include:
i. Two routers
ii. Our laptop and web server.
iii. Connection that exists between two DNS name servers.
anyone know how to fix black screen of death on computer
Answer:
you asked a question so you must have fixed it
Explanation:
logic
What is output?
C = 1
sum - 0
while (c < 10):
c = c + 3
sum = sum + c
print (sum)
Explanation:
Please make me Brainliesthow is the information technology Career Cluster different from the others clusters?
Answer:
All career clusters use information technology in carrying out their work.
Explanation:
Which of these is a valid use of the Reply All feature?
correcting someone's spelling mistake in an e-mail
responding with "I agree" or "me too"
responding with "please take me off your list"
none of these
Answer:
I think is None of this ,
According to the options given none of these is a valid use of the Reply All feature. Thus, option D is correct.
What is the use of auto-responder?If you use an auto-responder, all your customers will receive a standardized reply. That will make it clear for them that their message has not been read yet. However, even if your message states that you will eventually read and respond properly to every single email.
It is likely that customers will doubt it. They do not expect an automatic response upon contacting you - quite the contrary, they expect their issues to be addressed specifically and immediately.
An email message is a text that is transmitted or received over a computer network and is often short and casual. Email communications are often only text messages, but they can also contain attachments (such spreadsheets and graphic files). Multiple people can receive an email message at once.
Therefore, According to the options given none of these is a valid use of the Reply All feature. Thus, option D is correct.
Learn more about Email communications on:
https://brainly.com/question/30262540
#SPJ3
Which is a conditional statement?
If it is sunny, we can play ball.
It is sunny today.
It is sunny or rainy.
It is sunny across the street, but not sunny here.
Answer:
it is 1, I know this because i got 100% on my quiz
Explanation:
Which of the following represent the use of formatting to create readable code?
Choose all that apply.
Line breaks are used to separate every ten lines of code.
Line breaks are used to separate segments of code.
Indentation is used to create a pattern that is easy to follow.
Indentation is used to make it easier to follow the flow of logic in the code.
Answer:
The true statements are:
Line breaks are used to separate segments of code.
Indentation is used to create a pattern that is easy to follow.
Indentation is used to make it easier to follow the flow of logic in the code.
Explanation:
Line breaks and indentation are used to increase the readability of a program. The coding formatting is done using the line breaks and indentation to separate segments of code so that the code is easier to read.
Hence,
The true statements are:
Line breaks are used to separate segments of code.
Indentation is used to create a pattern that is easy to follow.
Indentation is used to make it easier to follow the flow of logic in the code.
Answer:
b and d
Explanation:
2. Suppose you and your friend want to exchange lecture notes taken during class. She has an iPhone and you have an iPad. What is the easiest way to do the exchange?
a. Cope the files to an SD card and move the SD card to each device.
b. Drop the files in OneDrive and share notebooks with each other.
c. Send a text to each other with the files attached.
d. Transfer the files through an AirDrop connection.
Answer:
d. Transfer the files through an AirDrop connection.
Explanation:
I feel like im not sure 100%
But i hope it helps!
HAPPY THXGIVING!
Write a function that converts a string into an int. Assume the int is between 10 and 99. Do not use the atoi() or the stoi() function.
Answer:
Written in C++
#include <iostream>
#include <sstream>
using namespace std;
int main() {
string num;
cout<<"Enter a number: ";
cin>>num;
stringstream sstream(num);
int convertnum = 0;
sstream >> convertnum;
cout << "Output: " << convertnum;
}
Explanation:
Without using atoi() or stoi(), we can make use of a string stream and this is explained as follows:
This line declares a string variable num
string num;
This line prompts user for input
cout<<"Enter a number: ";
This line gets user input
cin>>num;
This line declares a string stream variable, sstream
stringstream sstream(num);
This line declares and initializes the output variable, convertnum to 0
int convertnum = 0;
The stream is passed into the output variable, convertnum
sstream >> convertnum;
This line displays the output
cout << "Output: " << convertnum;
Note that: if user enters a non integer character such as (alphabet, etc), only the integer part will be convert.
For instance,
40a will be outputted as 40
Does anyone have any Edge(nuity) tips? Like how to skip videos and such.
Answer:
yes
Explanation:
it is quite easy chat me up and i will give u the link
If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.
Question
If a function receives an object as an argument and needs to change the objects member data, the object should be:_____________.
A) passed by constant reference
B) passed by reference
C) passed by value
D) none of the above
Answer:
The correct answer is B)
Explanation:
The above question relates to computer programming.
Passing by reference is the same and can be used interchangeably with passing by address.
A special ID used by a computer's procesing unit for recording or tracking data is referred to as a memory address.
When the memory address of a calling function is passed on to the function, the function is said to have been passed by address or reference.
This enables changes to be made to the function or argument directly from the parameter.
Cheers
If a student passes off an author’s work as his or her own, the student has
Help Quick Please!!!!
Ann sent out a business letter three weeks ago, hoping to increase sales. However, she has not seen an increase. She thinks that making the communication more impressive will increase the business. Ann should _____.
Rachel tries to follow ergonomic principles at work to avoid RSI. Which posture or method chelto prevent Sl while using the
keyboard
Rachel should use an adjustable chair. She should place the chair and keyboard in a way that her elbows bend at ________
Answer:right angle
Explanation:
Are the blank space around the edges of the page
Answer:
The blank space around the edges of a sheet of paper — as with the page of a book — that surrounds the text is called the margin.
what are the principle elements of public key cryptosystem
Answer: Components of a Cryptosystem
- Plaintext. It is the data to be protected during transmission.
- Encryption Algorithm. ...
- Ciphertext. ...
- Decryption Algorithm, is a mathematical process, that produces a unique plaintext for any given ciphertext and decryption key. ...
- Encryption Key. ...
- Decryption Key.
Explanation: