Answer:
The output of the code:
Enter a 4 digit integer : 1 2 3 4
The decrypted number is : 0 1 8 9
The original number is : 1 2 3 4
Explanation:
Okay, the code will be written in Java(programming language) and the file must be saved as "Encryption.java."
Here is the code, you can just copy and paste the code;
import java.util.Scanner;
public class Encryption {
public static String encrypt(String number) {
int arr[] = new int[4];
for(int i=0;i<4;i++) {
char ch = number.charAt(i);
arr[i] = Character.getNumericValue(ch);
}
for(int i=0;i<4;i++) {
int temp = arr[i] ;
temp += 7 ;
temp = temp % 10 ;
arr[i] = temp ;
}
int temp = arr[0];
arr[0] = arr[2];
arr[2]= temp ;
temp = arr[1];
arr[1] =arr[3];
arr[3] = temp ;
int newNumber = 0 ;
for(int i=0;i<4;i++)
newNumber = newNumber * 10 + arr[i];
String output = Integer.toString(newNumber);
if(arr[0]==0)
output = "0"+output;
return output;
}
public static String decrypt(String number) {
int arr[] = new int[4];
for(int i=0;i<4;i++) {
char ch = number.charAt(i);
arr[i] = Character.getNumericValue(ch);
}
int temp = arr[0];
arr[0]=arr[2];
arr[2]=temp;
temp = arr[1];
arr[1]=arr[3];
arr[3]=temp;
for(int i=0;i<4;i++) {
int digit = arr[i];
switch(digit) {
case 0:
arr[i] = 3;
break;
case 1:
arr[i] = 4;
break;
case 2:
arr[i] = 5;
break;
case 3:
arr[i] = 6;
break;
case 4:
arr[i] = 7;
break;
case 5:
arr[i] = 8;
break;
case 6:
arr[i] = 9;
break;
case 7:
arr[i] = 0;
break;
case 8:
arr[i] = 1;
break;
case 9:
arr[i] = 2;
break;
}
}
int newNumber = 0 ;
for(int i=0;i<4;i++)
newNumber = newNumber * 10 + arr[i];
String output = Integer.toString(newNumber);
if(arr[0]==0)
output = "0"+output;
return output;
}
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
System.out.print("Enter a 4 digit integer:");
String number = sc.nextLine();
String encryptedNumber = encrypt(number);
System.out.println("The decrypted number is:"+encryptedNumber);
System.out.println("The original number is:"+decrypt(encryptedNumber));
}
}
Rewrite this if/else if code segment into a switch statement int num = 0; int a = 10, b = 20, c = 20, d = 30, x = 40; if (num > 101 && num <= 105) { a += 1; } else if (num == 208) { b += 1; x = 8; } else if (num > 208 && num < 210) { c = c * 3; } else { d += 1004; }
Answer:
public class SwitchCase {
public static void main(String[] args) {
int num = 0;
int a = 10, b = 20, c = 20, d = 30, x = 40;
switch (num){
case 102: a += 1;
case 103: a += 1;
case 104: a += 1;
case 105: a += 1;
break;
case 208: b += 1; x = 8;
break;
case 209: c = c * 3;
case 210: c = c * 3;
break;
default: d += 1004;
}
}
}
Explanation:
Given above is the equivalent code using Switch case in JavaThe switch case test multiple levels of conditions and can easily replace the uses of several if....elseif.....else statements.When using a switch, each condition is treated as a separate case followed by a full colon and the the statement to execute if the case is true.The default statement handles the final else when all the other coditions are false5.14 ◆ Write a version of the inner product procedure described in Problem 5.13 that uses 6 × 1 loop unrolling. For x86-64, our measurements of the unrolled version give a CPE of 1.07 for integer data but still 3.01 for both floating-point data. A. Explain why any (scalar) version of an inner product procedure running on an Intel Core i7 Haswell processor cannot achieve a CPE less than 1.00. B. Explain why the performance for floating-point data did not improve with loop unrolling.
Answer:
(a) the number of times the value is performs is up to four cycles. and as such the integer i is executed up to 5 times. (b)The point version of the floating point can have CPE of 3.00, even when the multiplication operation required is either 4 or 5 clock.
Explanation:
Solution
The two floating point versions can have CPEs of 3.00, even though the multiplication operation demands either 4 or 5 clock cycles by the latency suggests the total number of clock cycles needed to work the actual operation, while issues time to specify the minimum number of cycles between operations.
Now,
sum = sum + udata[i] * vdata[i]
in this case, the value of i performs from 0 to 3.
Thus,
The value of sum is denoted as,
sum = ((((sum + udata[0] * vdata[0])+(udata[1] * vdata[1]))+( udata[2] * vdata[2]))+(udata[3] * vdata[3]))
Thus,
(A)The number of times the value is executed is up to 4 cycle. And the integer i performed up to 5 times.
Thus,
(B) The floating point version can have CPE of 3.00, even though the multiplication operation required either 4 or 5 clock.
SUMMING THE TRIPLES OF THE EVEN INTEGERS FROM 2 THROUGH 10) Starting with a list containing 1 through 10, use filter, map and sum to calculate the total of the triples of the even integers from 2 through 10. Reimplement your code with list comprehensions rather than filter and map.
Answer:
numbers=list(range(1,11)) #creating the list
even_numbers=list(filter(lambda x: x%2==0, numbers)) #filtering out the even numbers using filter()
triples=list(map(lambda x:x*3 ,even_numbers)) #calculating the triples of each even number using map
total_triples=sum(triples) #calculatting the sum
numbers=list(range(1,11)) #creating the list
even_numbers=[x for x in numbers if x%2==0] #filtering out the even numbers using list comprehension
triples=[x*3 for x in even_numbers] #calculating the triples of each even number using list comprehension
total_triples=sum(triples) #calculating the sum.
Explanation:
Go to the page where you are going to write the code, name the file as 1.py, and copy and paste the following code;
numbers=list(range(1,11)) #creating the list
even_numbers=list(filter(lambda x: x%2==0, numbers)) #filtering out the even numbers using filter()
triples=list(map(lambda x:x*3 ,even_numbers)) #calculating the triples of each even number using map
total_triples=sum(triples) #calculatting the sum
numbers=list(range(1,11)) #creating the list
even_numbers=[x for x in numbers if x%2==0] #filtering out the even numbers using list comprehension
triples=[x*3 for x in even_numbers] #calculating the triples of each even number using list comprehension
total_triples=sum(triples) #calculating the sum
What is the fastest typing speed ever recorded? Please be specific!
Answer:
250 wpm for almost an hour straight. This was recorded by Barbara Blackburn in 1946.
Implement the function get_stats The function get_stats calculates statistics on a sample of values. It does the following: its input parameter is a csv string a csv (comma separated values) string contains a list of numbers (the sample) return a tuple that has 3 values: (n, stdev, mean) tuple[0] is the number of items in the sample tuple[1] is the standard deviation of the sample tuple[2] is the mean of the sample
Answer:
Check the explanation
Explanation:
PYTHON CODE: (lesson.py)
import statistics
# function to find standard deviation, mean
def get_stats(csv_string):
# calling the function to clean the data
sample=clean(csv_string)
# finding deviation, mean
std_dev=statistics.stdev(sample)
mean=statistics.mean(sample)
# counting the element in sample
count=len(sample)
# return the results in a tuple
return (count, std_dev, mean)
# function to clean the csv string
def clean(csv_string):
# temporary list
t=[]
# splitting the string by comma
data=csv_string.split(',')
# looping item in data list
for item in data:
# removing space,single quote, double quote
item=item.strip()
item= item.replace("'",'')
item= item.replace('"','')
# if the item is valid
if item:
# converting into float
try:
t.append(float(item))
except:
continue
# returning the list of float
return t
if __name__=='__main__':
csv = "a, 1, '-2', 2.35, None,, 4, True"
print(clean(csv))
print(get_stats('1.0,2.0,3.0'))
6. Why did he choose to install the window not totally plumb?
Answer:
Because then it would break
Explanation:
You achieve this by obtaining correct measurements. When measuring a window, plumb refers to the vertical planes, and level refers to the horizontal planes. So he did not install the window totally plumb
The cord of a bow string drill was used for
a. holding the cutting tool.
b. providing power for rotation.
c. transportation of the drill.
d. finding the center of the hole.
Answer:
I don't remember much on this stuff but I think it was B
Let A be an array of n numbers. Recall that a pair of indices i, j is said to be under an inversion if A[i] > A[j] and i < j. Design a divide-and-conquer based algorithm to count the number of inversions in an array of n numbers. You can start by splitting into two subproblems. Answer clearly how you do the merge step, then obtain a recurrence relation that captures the run time of the algorithm. Solve the recurrence relation. Write the complete pseudocode.
Answer:
Check the explanation
Explanation:
#include <stdio.h>
int inversions(int a[], int low, int high)
{
int mid= (high+low)/2;
if(low>=high)return 0 ;
else
{
int l= inversions(a,low,mid);
int r=inversions(a,mid+1,high);
int total= 0 ;
for(int i = low;i<=mid;i++)
{
for(int j=mid+1;j<=high;j++)
if(a[i]>a[j])total++;
}
return total+ l+r ;
}
}
int main() {
int a[]={5,4,3,2,1};
printf("%d",inversions(a,0,4));
return 0;
}
Check the output in the below attached image.
Components of a product or system must be
1) Reliable
2) Flexible
3) Purposeful
4)Interchangeable
Answer:
The correct answer to the following question will be Option D (Interchangeable).
Explanation:
Interchangeability applies towards any portion, part as well as a unit that could be accompanied either by equivalent portion, component, and unit within a specified commodity or piece of technology or equipment.This would be the degree to which another object can be quickly replaced with such an equivalent object without re-calibration being required.The other three solutions are not situation-ally appropriate, so option D seems to be the right choice.
Implement the function pairSum that takes as parameters a list of distinct integers and a target value n and prints the indices of all pairs of values in the list that sum up to n. If there are no pairs that sum up to n, the function should not print anything. Note that the function does not duplicate pairs of indices
Answer:
Following are the code to this question:
def pairSum(a,x): #find size of list
s=len(a) # use length function to calculte length of list and store in s variable
for x1 in range(0, s): #outer loop to count all list value
for x2 in range(x1+1, s): #inner loop
if a[x1] + a[x2] == x: #condition check
print(x1," ",x2) #print value of loop x1 and x2
pairSum([12,7,8,6,1,13],13) #calling pairSum method
Output:
0 4
1 3
Explanation:
Description of the above python can be described as follows:
In the above code, a method pairSum is declared, which accepts two-parameter, which is "a and x". Inside the method "s" variable is declared that uses the "len" method, which stores the length of "a" in the "s" variable. In the next line, two for loop is declared, in the first loop, it counts all variable position, inside the loop another loop is used that calculates the next value and inside a condition is defined, that matches list and x variable value. if the condition is true it will print loop value.Define a thread that will use a TCP connection socket to serve a client Behavior of the thread: it will receive a string from the client and convert it to an uppercase string; the thread should exit after it finishes serving all the requests of a client Create a listening TCP socket While (true) { Wait for the connection from a client Create a new thread that will use the newly created TCP connection socket to serve the client Start the new thread. }
Answer:
The primary intention of writing this article is to give you an overview of how we can entertain multiple client requests to a server in parallel. For example, you are going to create a TCP/IP server which can receive multiple client requests at the same time and entertain each client request in parallel so that no client will have to wait for server time. Normally, you will get lots of examples of TCP/IP servers and client examples online which are not capable of processing multiple client requests in parallel.
Explanation:
hope i helped
Which of the following should be the first page of a report?
O Title page
Introduction
O Table of contents
Terms of reference
Answer:
Title page should be the first page of a report.
hope it helps!
How we can earn from an app
Answer:
Hewo, Here are some ways in which apps earn money :-
AdvertisementSubscriptionsIn-App purchasesMerchandisePhysical purchasesSponsorshiphope it helps!
the smallest unit of time in music called?
Answer:
Ready to help ☺️
Explanation:
A tatum is a feature of music that has been defined as the smallest time interval between notes in a rhythmic phrase.
Answer:
A tatum bc is a feature of music that has been variously defined as the smallest time interval between successive notes in a rhythmic phrase "the shortest durational value
Which term describes the order of arrangement of files and folders on a computer?
File is the order of arrangement of files and folders.
Answer:
Term describes the order of arrangement of files and folders on a computer would be ORGANIZATION.
:) Hope this helps!
Answer:
The term that describes the order of arrangement of files and folders on a computer is organization.
Explanation:
Your job as a researcher for a college is going well. You have gained confidence and skill at pulling data and you are not making as many rookie mistakes. The college executives are begging to take notice of your skills. The college has had serious problems with reporting in the past for several reasons. One problem is there was no centralized department for numbers. Human Resources did some reporting, financial aid another, and the rest was covered by the registrar’s office. It was difficult to determine simple things like number of students enrolled in the fall semester because different departments would generate different. The higher ups want one consistent number they can rely on and they think your department should be in charge of generating that number.
As the first report as the official office numbers they want you to generate a report that tracks student demographics over time (a longitudinal study). Your college has a large percentage of its student body who are affiliated with the military (active duty military, retired military, military spouse, military dependent). For this study the college executives want to see how they stack up to other colleges that have a large percentage of military students.
After doing some research you find a field in the database that named mil_status. The documentation you have on the field says this is the field you are looking for. Since you need to determine when the student was in the military to generate this report you look for a start and end date associated with mil_status. Sure enough the table also has a mil_status_start and a mil_status_end field. These fields when combined with enrollment data allow you to determine if a student was in the military when they were a student. You query the data to check for bad dates and discover a serious issue. Most of the start dates and end dates are NULL. You once again make some quick phone calls to find out what’s going on. It seems this field is not populated unless the college receives official paperwork from the military listing the soldier’s enlistment date. In addition to this you find out that students are not required to update their information ever semester. This means once their mil status is set it is unlikely to ever change. Based on this information prepare a post that addresses the following:
1) What recommendation(s) would you make to the college’s executives to address this issue?
2) Collecting this data will have tangible and intangible costs associated with it. For example requiring official paper work adds an extra burden on registration and on the student. Students may decide to go elsewhere instead of supplying the paperwork or may stop identifying themselves as military. The executives want the data but they don’t want its collection to impact enrollment or place an undue burden on registration (the line is long enough already). How would you respond to these concerns?
3) You noticed something odd in the mil_Status field. The possible values are "Active Duty Military", "Military spouse", "Retired military", "Military Reserves", and "Military dependent". In what way is this field problematic? How could you fix it?
Answer:
Check the explanation
Explanation:
Following are the things to be implemented immediately
Database should be maintained centralized manner so that any one can access data. Number should be given at the time of admission it should contain year of admission,course of admission …etc in the form of code eg. 2015FW1001 means year 2015 Fashion studies Winter admission no 1001. At the time of admission only they have to give the details of military status. Department which taking care of this issue should only have the permission to modify and delete the data. All the departments should be connected to the server by internet/intranet/network. Students should be given user id and password
Same database should be connected and given access through internet also with limited privileges so that user can update their status of military by submitting proof. By these information uploaded centralized administrative department update the status if they satisfied with the documents uploaded.
We can overcome the problem of mil status by giving the freedom to the student update their military status by uploading the documents.
What does the following code do?
package shop.ui;
import javax.swing.JOptionPane;
//import java.io.IOException;
final class PopupUI implements UI {
PopupUI() {}
public void displayMessage(String message) {
JOptionPane.showMessageDialog(null,message);
}
public void displayError(String message) {
JOptionPane.showMessageDialog(null,message,"Error",JOptionPane.ERROR_MESSAGE);
}
public void processMenu(UIMenu menu) {
StringBuffer b = new StringBuffer();
b.append(menu.getHeading());
b.append("\n");
b.append("Enter choice by number:");
b.append("\n");
for (int i = 1; i < menu.size(); i++) {
b.append(" " + i + ". " + menu.getPrompt(i));
b.append("\n");
}
String response = JOptionPane.showInputDialog(b.toString());
int selection;
try {
selection = Integer.parseInt(response, 10);
if ((selection < 0) || (selection >= menu.size()))
selection = 0;
} catch (NumberFormatException e) {
selection = 0;
}
menu.runAction(selection);
}
public String[] processForm(UIForm form) {
// TODO
String[]formArray = new String[form.size()];
for(int i=0;i
{
String message = JOptionPane.showInputDialog(form.getPrompt(i));
formArray[i] = message;
}
return formArray;
}
}
Answer: what is this?
Explanation:
Design and implement the Heap.h header using the given Heap class below:
template
class Heap
public:
Heap();
Heap(const T elements[], int arraySize); //
Remove the root from the heap and maintain the heap property
T remove() throw (runtime_error);
// Insert element into the heap and maintain the heap property
void add(const T& element);
// Get the number of element in the heap
int getSize() const;
private:
vector v;
Removing the root in a heap - after the root is removed, the tree must be rebuilt to maintain the heap property:
Move the last node to replace the root;
Let the root be the current node;
While (the current node has children and the current node is smaller than one of its children) Swap the current node with the larger of its children; The current node now is one level down;}
Adding a new node - to add a new node to the heap, first add it to the end of the heap and then rebuild the tree as follows:
Let the last node be the current node;
While (the current node is greater than its parent)
{Swap the current node with its parent; The current node now is one level up:}
To test the header file, write the heapSort function and use the following main program:
#include
#include "Heap.h"
using namespace std;
template
void heapSort(T list[], int arraySize) 1/
your code here .. p
int main()
const int SIZE = 9;
int list[] = { 1, 2, 3, 4, 9, 11, 3, 1, 2 }; heapSort(list, SIZE);
cout << "Sorted elements using heap: \n";
for (int i = 0; i < SIZE; i++) cout << list[i] << " ";
cout << endl;
system("pause");
return;
Sample output:
Sorted elements using heap:
1 1 2 3 3 4 7 9 11
Answer:
See explaination
Explanation:
/* Heap.h */
#ifndef HEAP_H
#define HEAP_H
#include<iostream>
using namespace std;
template<class T>
class Heap
{
public:
//constructor
Heap()
{
arr = nullptr;
size = maxsize = 0;
}
//parameterized constructor
Heap(const T elements[], int arraySize)
{
maxsize = arraySize;
size = 0;
arr = new T[maxsize];
for(int i=0; i<maxsize; i++)
{
add(elements[i]);
}
}
//Remove the root from the heap and maintain the heap property
T remove() //code is altered
{
T item = arr[0];
arr[0] = arr[size-1];
size--;
T x = arr[0];
int parent = 0;
while(1)
{
int child = 2*parent + 1;
if(child>=size) break;
if(child+1 < size &&arr[child+1]>arr[child])
child++;
if(x>=arr[child]) break;
arr[parent] = arr[child];
parent = child;
}
arr[parent] = x;
return item;
}
//Insert element into the heap and maintain the heap property
void add(const T&element)
{
if(size==0)
{
arr[size] = element;
size++;
return;
}
T x = element;
int child = size;
int parent = (child-1)/2;
while(child>0 && x>arr[parent])
{
arr[child] = arr[parent];
child = parent;
parent = (child-1)/2;
}
arr[child] = x;
size++;
}
//Get the number of element in the heap
int getSize() const
{
return size;
}
private:
T *arr; //code is altered
int size, maxsize;
};
#endif // HEAP_H
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
/* main.cpp */
#include<iostream>
#include "Heap.h"
using namespace std;
template <typename T>
void heapSort(T list[], int arraySize)
{
Heap<T> heap(list, arraySize);
int n = heap.getSize();
for(int i=n-1; i>0; i--)
{
list[i] = heap.remove();
}
}
int main()
{
const int SIZE = 9;
int list[] = {1, 7, 3, 4, 9, 11, 3, 1, 2};
heapSort<int>(list, SIZE);
cout << "Sorted elements using heap: \n";
for (int i = 0; i < SIZE; i++)
cout << list[i] << " ";
cout <<endl;
system("pause");
return 0;
}
3.15 LAB: Countdown until matching digits
Write a program that takes in an integer in the range 20-98 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.
Ex: If the input is:
93
the output is:
93 92 91 90 89 88
Ex: If the input is:
77
the output is:
77
Ex: If the input is:
15
or any value not between 20 and 98 (inclusive), the output is:
Input must be 20-98.
#include
using namespace std;
int main() {
// variable
int num;
// read number
cin >> num;
while(num<20||num>98)
{
cout<<"Input must be 20-98 ";
cin>> num;
}
while(num % 10 != num /10)
{
// print numbers.
cout<
// update num.
num--;
}
// display the number.
cout<
return 0;
}
I keep getting Program generated too much output.
Output restricted to 50000 characters.
Check program for any unterminated loops generating output
Answer:
See explaination
Explanation:
n = int(input())
if 20 <= n <= 98:
while n % 11 != 0: // for all numbers in range (20-98) all the identical
digit numbers are divisible by 11,So all numbers that
are not divisible by 11 are a part of count down, This
while loop stops when output digits get identical.
print(n, end=" ")
n = n - 1
print(n)
else:
print("Input must be 20-98")
An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored espionage activity on the company’s network. Management agrees with her initial findings given the forensic artifacts she presents are characteristics of malware, but management is unclear on why the analyst thought it was Chinese-state sponsored. You have been brought in as a consultant to help determine 1) whether the systems have been compromised and 2) whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored. What steps would you take to answer these questions given that you have been provided a MD5 hashes, two call back domains, and an email that is believed to have been used to conduct a spearphishing attack associated with the corresponding MD5 hash. What other threat intelligence can be generated from this information and how would that help shape your assessment?
Answer: Provided in the explanation segment
Explanation:
Below is a detailed explanation to make this problem more clearer to understand.
(1). We are asked to determine whether the systems have been compromised;
Ans: (YES) From the question given, We can see that the System is compromised. This is so because the plan of communication has different details of scenarios where incidents occur. This communication plan has a well read table of contents that lists specific type of incidents, where each incident has a brief description of the event.
(2). Whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored.
Ans: I can say that the analyst uses several different internet protocol address located in so as to conduct its operations, in one instance, a log file recovered form an open indexed server revealed tham an IP address located is used to administer the command control node that was communicating with the malware.
(3). What other threat intelligence can be generated from this information?
Ans: The threat that can be generated from this include; Custom backdoors, Strategic web compromises, and also Web Server exploitation.
(4). How would that help shape your assessment?
Ans: This helps in such a way where information is gathered and transferred out of the target network which involve movement of files through multiple systems.
Files also gotten from networks as well as using tools (archival) to compress and also encrypt data with effectiveness of their data theft.
cheers i hope this helped!!!
customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practicing presentation skills. As a salesperson what size hard disc would you recommend and why?
Answer:
A 512 GB Solid State Drive (SSD) will be recommended
Explanation:
Recommended hard disk for the installation of Microsoft PowerPoint application is 3 GB and since the computer is a new one it will be best to buy a hard disc with enough room for expansion, performance speed, durability and reliability
Therefore, a 512 GB Solid State Drive (SSD) is recommended as the price difference is small compared to the spinning hard drive and also there is ample space to store PowerPoint training presentation items locally.
To encrypt messages I propose the formula C = (3P + 1) mod 27, where P is the "plain text" (the original letter value) and C is the "cipher text" (the encrypted letter value). For example, if P = 2 (the letter 'c' ), C would be 7 (the letter 'h') since (3(2) + 1) mod 27 = 7. There is a problem though: When I send the message 'c' to my friend, encrypted as 'h', they don't know whether the original message was 'c' or another letter that also encrypts to 'h'. What other letter(s) would also encrypt to 'h' besides 'c' in this system?
Answer:
C = (3P+1) % 27
so when P will be max 26,when P is 26 the (3P+1) = 79. And 79/27 = 2 so let's give name n = 2.
Now doing reverse process
We get ,
P = ((27*n)+C-1)/3
Where n can be 0,1,2
So substituting value of n one by one and the C=7(corresponding index of h)
For n= 0,we get P=2, corresponding char is 'c'
For n=1,we get P=11, corresponding char is 'l'
For n=2,we get P= 20, corresponding cahr is 'u'.
So beside 'c',the system will generate 'h' for 'l' and 'u' also.
What should the timing of transition slides be per minute?
Maintain the flow of the presentation to
slides per minute
Answer:
15 seconds
Explanation:
A presentation slide is supposed to be on for 15 seconds and stop to ask if anyone has any questions, if you are explaining something or reading alond with the slide it could be as long as you want it to be.
Answer:
4 slides per minute
Explanation:
What do we call data that's broken down into bits and sent through a network?
Answer:
Bits
Explanation:
Who is your favorite smite god in Hi-Rez’s “Smite”
Answer:
Variety
Explanation:
Write a program that maintains a database containing data, such as name and birthday, about your friends and relatives. You should be able to enter, remove, modify, or search this data. Initially, you can assume that the names are unique. The program should be able to save the data in a fi le for use later. Design a class to represent the database and another class to represent the people. Use a binary search tree of people as a data member of the database class. You can enhance this problem by adding an operation that lists everyone who satisfi es a given criterion. For example, you could list people born in a given month. You should also be able to list everyone in the database.
Answer:
[tex]5909? \times \frac{?}{?} 10100010 {?}^{?} 00010.222 {?}^{2} [/tex]
Select the correct navigational path to create the function syntax to use the IF function.
Click the Formula tab on the ribbon and look in the ???
'gallery
Select the range of cells.
Then, begin the formula with the ????? click ?????. and click OK.
Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.
Answer:
1. Logical
2.=
3.IF
Explanation:
just did the assignment
Reggie receives a phone call from a computer user at his company who says that his computer would not turn on this morning. After asking questions, Reggie realizes that the computer seems to turn on because the user can hear fans spinning and the indicator light comes on and flashes during the boot. The Num Lock key is on, but there is no video on the monitor. Reggie also learns that the computer has a new video card. The night before the computer was working fine, according to the user. Reggie tests the video cord and the monitor. When Reggie reattaches the video cable to the video card port, the computer appears to be working. What might be the problem?
Answer:
The Integrated video may not be working properly well or functioning well.
Explanation:
Solution:
In this case, it is known that the computer was working fine a night before the problem.
If the video cable is connected to a wrong video port, then the computer was unable to work previous night.the integrated video cord has not seated because most times it occurs, due to the heat sink in the card. after restoring the video cable to the video card port, it works.
If the video was disabled in BIOS/UEFI, it does not show video, even after restoring the cable.
TRUE OR FALSE! HELP!!
Answer:
True
Explanation:
There's no one law that governs internet privacy.
What is the best thing to do if you only want your close friends to be able to see your posts?
A
Avoid posting details about your life.
B
Check your privacy settings.
C
Choose your posts carefully.
D
Only post photos instead of comments.
Answer:
check privacy settings. There will be a filter i am pretty sure :)