An integer is stored in eax. Write a subroutine to print the integer. Specifically, use the algorithm below to get the individual digits and then print those.
Code to print a number, digit by digit. Use simple AT&T Assembly please.
Determine the number of digits of the number:
Create an int variable to count the digits. Start it at 0.
Create an int variable to hold powers of 10. Start it at 1.
while power_of_10 < original_number
digit_counter++
power_of_10 = power_of_10 * 10
'Decrement' power of 10:
power_of_10 = power_of_10 / 10 (integer dividion)
Print the number:
for temp_digit_counter = 1 to digit_counter
digit_to_print = original_number / power_of_10 (integer division again)
print digit_to_print
original_number = original_number - digit_to_print * power_of_10 or
original_number = remainder from previous division
power_of_10 = power_of_10 / 10 (integer division again)

Answers

Answer 1

An integer is stored in eax. A subroutine to print the integer has to be written, making use of the algorithm below to get the individual digits and then print those. Simple AT&T assembly language will be used in the subroutine.

`The above code initializes eax to the number of digits and enters a loop that decrements eax until it is 0. During each iteration of the loop, edx is set to the original number, eax is set to 0, and integer division is performed on edx and the 'decremented' power of 10.

The quotient is stored in edx, which is then used to calculate the ASCII value of the digit to be printed. The digit is then printed to stdout using the write system call. Finally, the original number is restored and the loop continues.

To know more about integer visit:.

https://brainly.com/question/490943

#SPJ11


Related Questions

Obtain USBR profile for an ogee spillway with the following data: (30) Design discharge=13875 m³/s Crest length of spillway = 183 m Crest level of spillway= 203.34 m River bed level = 166.50 m Note: Helping figures for design of ogee profile are attached below (Annexure-l &II)

Answers

To obtain the USBR profile for an ogee spillway with the given data, follow these steps:

1. Determine the required parameters for the USBR profile, such as the chute width, chute slope, and energy dissipation.

2. Use the design discharge, crest length, crest level, and river bed level to calculate the required parameters.

3. Refer to the attached figures (Annexure-l & II) for guidance on designing the ogee profile, considering factors like hydraulic jump location and energy dissipation.

To obtain the USBR profile for an ogee spillway, several design considerations need to be taken into account. The design discharge, crest length, crest level, and river bed level are crucial parameters for determining the characteristics of the spillway.

Using hydraulic engineering principles and design guidelines, the required parameters for the USBR profile can be calculated. These parameters may include the chute width, chute slope, and other dimensions that ensure proper flow and energy dissipation.

Additionally, the attached figures (Annexure-l & II) provide visual guidance for designing the ogee profile. These figures illustrate important features, such as the hydraulic jump location, which aids in achieving efficient energy dissipation and preventing erosion.

By following the design guidelines and using the provided data, you can obtain the USBR profile for the ogee spillway and ensure the safe and effective management of water flow.

Learn more about parameters

brainly.com/question/29911057

#SPJ11

A four-pole, 250 V, lap-connected DC shunt motor delivers 12 kW output power. It runs at a speed of 1,143 rpm and draws armature and field currents of 69 A and 3 A respectively. The total number of armature conductors is 500 and armature resistance is 0.17 ohm. Assume 1.5 V per brush contact drop and calculate the flux per pole. Show the numerical answer rounded to 3 decimals in Wb.

Answers

The solution to the given problem is explained below:Given data:Power, P = 12 kW Armature voltage, V = 250 VSpeed, N = 1143 rpm

Armature current, Ia = 69 AField current, If = 3 A

Total number of armature conductors, Z = 500Armature resistance, Ra = 0.17 ohm

Brush contact drop, Vb = 1.5 VFormula:Back emf, Eb = (P / N) × 60V = Eb + Ia Ra + VbEb = (P / N) × 60 - Ia Ra - VbFlux per pole, ϕ = (Eb / PΦ = (Eb / V) / (Z / 2)ϕ = (Eb / V) / (Z / 2) × 2 / P Calculation:

Putting the values in the above formulas:Eb = (12000 / 1143) × 60 - 69 × 0.17 - 2 × 1.5= 235.42 VΦ = (235.42 / 250) / (500 / 2) × 2 / 12000= 0.0206 Wb or 20.6 mWb

the flux per pole of the given DC shunt motor is 0.0206 Wb or 20.6 mWb (Approximately).

To know more about voltage visit:

https://brainly.com/question/32002804

#SPJ11

Quantified mathematical expressions Interpret the following statements as English sentences, then decide whether they are true or false. Here x and y are integers. Justify your conclusion. 1. Vx=y(x +y=0) 2. ByVac (x + y = x) = 3. FxVy(x + y = x)

Answers

1. The statement Vx=y(x +y=0) means "For all x, if x+y=0 then x=y". This statement is true. Suppose we choose any integer x, and suppose x+y=0. Then we have x=-y, and so y=-x. Therefore x=y. We have shown that x=y whenever x+y=0. Since this is true for any x, we conclude that Vx=y(x+y=0) is true. 2.

The statement ByVac (x + y = x) means "There exists a y such that for all x, x+y=x". This statement is false. Let x=1. Then we need to find a y such that y+1=1 for all y. This is impossible, since we can take y=0, for which we have y+1=1+0=1, which is not equal to 1+y=0+1=1.

Therefore ByVac (x + y = x) is false. 3. The statement FxVy(x + y = x) means "There exists an x such that for all y, x+y=x". This statement is true. Let x be any integer. Then for any y, we have x+y=x.

Therefore, for any x, there exists a y such that x+y=x, namely y=0. We have shown that for any x, there exists a y such that x+y=x. Since this is true for any x, we conclude that FxVy(x + y = x) is true.

To know more about conclude visit:

https://brainly.com/question/32764205

#SPJ11

3. Analyze the suitable construct that will print "1" if a is equal to b, print "2" if a is less than b, print "3" if a is greater than b.
1) $a=50;
2) $b=20;
3) _____________
4) {
5) echo "1";
6) }
7) ______________
8) {
9) echo "2";
10) }
11) ____
12) {
13) echo "3";
14) }
i. Which statement can be used in line 3 to check whether the value of $a is equal to the value of $b?
ii. Which statement can be used in line 7 to check whether the value of $a is less than the value of $b?
iii. Which statement can be used in line 11, to check whether the value of $a is greater than the value of $b?

Answers

The suitable construct for the given task would be an "if-else" statement. The condition in line 3 should use the equality operator (==) to check if $a is equal to $b. In line 7, the condition should use the less than operator (<) to check if $a is less than $b. Lastly, in line 11, the condition should use the greater than operator (>) to check if $a is greater than $b.

To achieve the desired functionality, an "if-else" statement is appropriate in this case. It allows us to evaluate conditions and execute different blocks of code based on the result of those conditions.

In line 3, the equality operator (==) should be used to check if $a is equal to $b. The equality operator compares the values of two variables and returns true if they are equal. Therefore, the condition should be written as "if ($a == $b)".

In line 7, the less than operator (<) should be used to check if $a is less than $b. The less than operator compares the values of two variables and returns true if the left operand is smaller than the right operand. The condition should be written as "elseif ($a < $b)".

In line 11, the greater than operator (>) should be used to check if $a is greater than $b. The greater than operator compares the values of two variables and returns true if the left operand is greater than the right operand. The condition should be written as "else ($a > $b)".

By using these conditions in the if-else construct, the appropriate message ("1", "2", or "3") will be printed based on the comparison between $a and $b.

Learn more about suitable  here:

https://brainly.com/question/33331266

#SPJ11

ive already asked this question, but I didn't provide the necessary files so I'm asking again. I need help coding this program. please add as many comments and explanation as possible so I know how to do it for next time. Please code in C++
.
Assignment
In this assignment, you will be required to implement a generic SortedArray Container class. Elements in the SortedArray should be always in the non-decreasing order. Unlike basic arrays that burden the programmer with the task of keeping track of its capacity and utilization, the SortedArray must also provide an interface to the programmer to allow for retrieval of information about the number of elements inside it as well as the maximum number of elements it can store.

Answers

Here is the code for implementing a generic Sorted Array Container class in C++ along with detailed explanations and comments.```
#include
using namespace std;

template  class SortedArray {
   T* arr;             // Pointer to the array
   int size;           // Current number of elements in the array
   int capacity;       // Maximum number of elements that can be stored in the array

   public:
   SortedArray(int capacity) {     // Constructor to initialize the array with the given capacity
       arr = new T[capacity];
       size = 0;
       this->capacity = capacity;

To know more about code visit:

https://brainly.com/question/15301012

#SPJ11

Write a program using assembly language(MIPS) to implement the following quadratic function:
F(x) = 8x2 + 8x -8
The program should get the value of x=5.6 from the user and then solve the equation and print the value of F(x) to the console. Use the syscall procedures to read and print floats.

Answers

The MIPS assembly language program solves the quadratic function F(x) = [tex]8x^2 + 8x - 8[/tex] for a user-defined value of x. It uses the syscall procedures to read the value of x from the user and print the calculated value of F(x) to the console.

To implement the quadratic function in MIPS assembly language, we need to follow a step-by-step process. First, we read the value of x from the user using the syscall procedure. We can use syscall code 6 to read a float value into a register. Let's assume the user inputs x = 5.6.

Next, we perform the necessary calculations to solve the quadratic equation. We multiply the value of x by itself to calculate [tex]x^2[/tex]. Then, we multiply [tex]x^2[/tex] by 8 and store the result in a register. We also multiply the original value of x by 8 and store it in another register. Finally, we subtract 8 from the second register that holds the value of 8x.

After the calculations, we add the results of the two registers that hold the values of [tex]8x^2[/tex] and 8x. This sum represents F(x). We can then print the value of F(x) to the console using the syscall procedure with the appropriate syscall code for printing floats (e.g., syscall code 2).

In this case, when x = 5.6, the program would calculate F(x) = [tex]8(5.6)^2 + 8(5.6) - 8[/tex], which results in F(x) = 224.32. The program would print this value to the console using the syscall procedure, allowing the user to see the calculated result.

Learn more about program here:

https://brainly.com/question/30613605

#SPJ11

Please answer with exact JAVA/C++ syntax PROJECTS
A compiler translates (or compiles) a program written in a high-level programming language that is suitable for human programmers into the low-level machine language that is required by computers. A lexical analysis stage that basically divides the input text into a list of "words". This is the initial part of reading and analyzing the program text: The text is read and divided into tokens, each of which corresponds to a symbol in the programming language, e.g., a variable name, keyword or number. The next process will be a syntax analysis stage that analyses the way these words form structures and converts the text into a data structure that reflects the textual structure.
The following set of rules that define for the syntax:
1) All statements will end in a semicolon.
2) Whitespace is not significant, i.e. a+b is the same as a + b.
3) Comments begin with /* and end with */ and they can extend across multiple lines.
4) The only keywords are var, input, and output. Their function is as follows: var declares a new variable. All variables must be declared before they're used. input reads a variable from the console. output displays the value of a variable on the console.
5) All variables are integers.
6) The only operations allowed are +, -, *, /, and =. Parentheses may be used to force operation ordering.
7) Variable names may only consist of uppercase and lowercase letters, underscores (_), and numbers. A variable name may not start with a number.
After the syntax analysis being performed the type checking, this phase analyses the syntax tree to determine if the program violates certain consistency requirements, e.g., if a variable is used but not declared or if it is used in a context that does not make sense given the type of the variable, such as trying to use a boolean value as a function pointer.
Design: invent a language, or a language fragment, for some particular purpose or with some particular characteristic.
Modeling: try to formalize some interesting aspect of some existing language Make sure that computations are sufficiently documented and supported by theories and literatures.
Implementation: explore novel techniques for implementing a given language fragment
Take note in submitting the project:
1. May choose any two programming language. (C, C++, Java, C#, Python, etc) for implementation of the proposed project.
2. A copy of the software (source codes) needs to be submitted and screen shots for each of the programming language.
3. Submit the following in word document:
a. front page
b. source code
c. screen shots
4. Remember to use the filename: SURNAME-TP-PROJECT

Answers

A lexical analysis stage in a compiler divides the program text into tokens, representing symbols in the programming language.

Tokenizing involves breaking the input text into individual elements such as variable names, keywords, and numbers. This initial step is crucial for further analysis and processing of the program.In Java, the java.util.Scanner class can be used to perform lexical analysis. The Scanner class provides methods like next(), nextInt(), and nextLine() to read and extract tokens from the input text.

For C++, the std::istringstream class along with the extraction operator (>>) can be used for tokenizing. The input text can be read into a std::string and then passed to the std::istringstream object. Tokens can be extracted using the extraction operator, just like reading input from the console.By employing appropriate techniques in Java or C++, you can effectively implement the lexical analysis stage to tokenize the program text.

Learn more about programming language here:

https://brainly.com/question/23959041

#SPJ11

Hello I need help with an sql query! I have posted instructions
below!!
The query should:
1. Prompt the user for an activity to list all the items in the
database with that activity
2. Continue prompt

Answers

To fulfill the requirements, you can use the following SQL query:

```

SELECT * FROM items WHERE activity = [user_input];

```

1: The SQL query uses the SELECT statement to retrieve data from the "items" table. The WHERE clause filters the results based on the specified condition, which in this case is the user input for the activity. Replace `[user_input]` with the appropriate parameter or variable to capture the user's input.

2: The query will return all the items in the database that match the specified activity. If there are multiple items with the same activity, they will all be included in the result set.

By using this SQL query, you can prompt the user for an activity and retrieve the corresponding items from the database. The query is flexible and can be adapted to your specific database structure and naming conventions.

SQL (Structured Query Language) is a programming language used for managing and manipulating relational databases. It allows you to retrieve, insert, update, and delete data from database tables. The SELECT statement is commonly used to query data from tables based on specific conditions.

In this scenario, the query prompts the user for an activity and retrieves all items from the database that match that activity. The WHERE clause is used to specify the condition for filtering the results. By understanding SQL syntax and using appropriate query statements, you can efficiently retrieve and manipulate data in your database.

Learn more about SQL query:

brainly.com/question/31663284

#SPJ11

A project for a new structure will be founded on spread footings. The maximum (unfactored) column load for a specific footing is P-140 T, but it does not include the self weight of the footing. If quit 55 T/m2 and D-2.5 m, calculate the required area of the footing considering FS 3. Type your answer in m² but do not include the units. .

Answers

To calculate the required area of the footing, we can use the factored load and the allowable bearing capacity of the soil. The required area of the footing is approximately 0.3371 m²

Maximum (unfactored) column load: P = 140 T

Self weight of the footing: q = 55 T/m²

Depth of the footing: D = 2.5 m

Factor of Safety: FS = 3

First, let's calculate the factored load:

Factored load = P / FS = 140 T / 3 = 46.67 T

Next, we need to consider the self weight of the footing. The weight of the footing can be calculated by multiplying the area (A) by the depth (D) and the unit weight (q):

Weight of the footing = A * D * q

Since we are considering the self weight of the footing, we need to subtract this weight from the factored load to get the net load on the footing:

Net load on the footing = Factored load - Weight of the footing

To find the required area of the footing, we can rearrange the equation as follows:

Required area of the footing = Net load on the footing / (D * q)

Substituting the values into the equation:

Required area of the footing = (46.67 T) / (2.5 m * 55 T/m²)

Calculating the value:

Required area of the footing = 0.3371 m² (rounded to four decimal places)

Therefore, the required area of the footing is approximately 0.3371 m².

Learn more about capacity here

https://brainly.com/question/29620221

#SPJ11

Regarding PHP. Indicate the sequence of values ​​in the array $arr , after the execution of the following code :
$arr = ["0", "1", "2"];
unset ($arr[0]);
print_r($arr);
A) Array ([1] => 0 [2] => 0 )
B) Array ([0] => 0 [1] => 1 )
C) Array ([0] => 0 [2} => 2 )
D) Array ([1] => 1 [2} => 2 )
E) None of the above

Answers

After executing the code `unset($arr[0])` with the initial array `$arr = ["0", "1", "2"]`, the resulting array will be `[0] => 0 [1] => 1`. The correct answer is B.

The code snippet provided `unset($arr[0])` removes the element at index 0 from the array `$arr`. After executing this code, the resulting array will have the remaining elements shifted to fill the gap.

In this case, the initial array `$arr` is `["0", "1", "2"]`. When we unset the element at index 0, the resulting array will be `["1", "2"]`. The index 0 will now hold the value "1", and the index 1 will hold the value "2".

Array ([0] => 0 [1] => 1) After executing the code, the array `$arr` will contain the values `["0", "1"]` with the corresponding indices `[0]` and `[1]`.

Learn more about array  here:

https://brainly.com/question/29989214

#SPJ11

SECTION – B TRUE OR FALSE QUESTIONS [10 MARKS] Answer all questions. Each question carries ONE (1) mark. State whether each of the following statements is TRUE or FALSE. 1. A ‘byte’ is a single binary digit representing a zero or a one. 2. Eyes, ears and fingers are part of input devices in the human system. 3. A Modem converts signal from binary form to digital and vice versa. 4. The scroll bars are located at the left and top edges of the screen. 5. Software describes all programs that are installed in a computer. 6. A plotter is an output device that is similar to a printer in all aspects. 7. Visual Display Units is used in online programming. 8. Main memory is subdivided into RAM and ROM. 9. CPU is where the processing of data takes place. 10. ‘Trojan horses’ and ‘logic bombs’ are examples of viruses.

Answers

SECTION – B TRUE OR FALSE QUESTIONS [10 MARKS] Answer all questions. Each question carries ONE (1) mark. State whether each of the following statements is TRUE or FALSE.The given statements are:1. A ‘byte’ is a single binary digit representing a zero or a one.False2.

Eyes, ears and fingers are part of input devices in the human system.False3. A Modem converts signal from binary form to digital and vice versa.False4. The scroll bars are located at the left and top edges of the screen.False5. Software describes all programs that are installed in a computer.False6. A plotter is an output device that is similar to a printer in all aspects.False7. Visual Display Units are used in online programming.False8. Main memory is subdivided into RAM and ROM.False9.

CPU is where the processing of data takes place.True10. ‘Trojan horses’ and ‘logic bombs’ are examples of viruses.TrueTherefore, the answer is:FalseFalseFalseFalseFalseFalseFalseFalseTrueTrue.

To know more about FALSE visit:

https://brainly.com/question/30615879

#SPJ11

when does a stream of characters becomes token?
what is the advantage of IDE or linker
what is the problem with a Grammer that generates two different parse tree?
Give one advantage of Assembler over compiler
Give one disadvantage of high level language over Assemble language
Explain 2 features of a parse tree?
differenciate between top-down and bottom-up parsing methods
explain 5 techniques used to improve a code
briefly describe 2 code generation technique
what is the difference between target language and machine language

Answers

1. A stream of characters becomes a token when it has been identified by the lexical analysis as a valid sequence of characters that represents a single element of meaning. A detailed explanation of this is that in the process of lexical analysis, the input stream of characters is broken up into chunks called tokens that are the atomic elements of the language. Each token represents a terminal symbol in the language's grammar and has a specific meaning and type associated with it. For example, in the C programming language, the token "int" represents the type specifier for integers.
The advantage of an IDE (Integrated Development Environment) is that it provides a set of tools for software development in a single application, such as text editing, debugging, and code completion. The advantage of a linker is that it allows separate object files to be combined into a single executable file or library.

The problem with a grammar that generates two different parse trees is that it can lead to ambiguous or non-deterministic parsing. This means that the same input can be parsed in more than one way, which can result in incorrect or unexpected behavior.
One advantage of an assembler over a compiler is that it allows for greater control over the hardware, as the resulting code is more low-level and specific to the machine architecture.
One disadvantage of a high-level language over assembly language is that it can be less efficient and result in slower execution times, as the code is further removed from the hardware.

To know more about ide visit:

brainly.com/question/33338628

#SPJ11

If the force passes through a point having an x coordinate of 1 m , determine the y and z coordinates of the point.
Express your answers using three significant figures separated by a comma.
Also, realizing that MO=FdMO=Fd, determine the perpendicular distance dd from point OO to the line of action of FF.
Express your answer to three significant figures and include the appropriate units.
The force F={6i+6j+12k}NF={6i+6j+12k}N creates a moment about point OO of MO={−12i+8j+2k}MO={−12i+8j+2k} N⋅mN⋅m.

Answers

The given force is F={6i+6j+12k}NF={6i+6j+12k}N creates a moment around the point O which is defined as MO={−12i+8j+2k}MO={−12i+8j+2k} N⋅mN⋅m. To determine the y and z coordinates of the point through which the force passes, consider the following:Let the point be P(x,y,z).

The force is F = {6i+6j+12k}NF={6i+6j+12k}NIf the force passes through the point P, then the line joining P and the point of the application of the force will be perpendicular to the force. So the force F can be used as the normal vector of the line.Let P(1,y,z).Then the equation of the line passing through the point P is given byr−p=f⇒(x−1)i+(y−j)j+(z−k)k=t(6i+6j+12k)i.e, x=1+6t, y=j+6t, z=k+12t

The perpendicular distance of the point O from this line can be calculated as follows:|d| = |OP × F|/|F|where, × is the cross-product of the vectors OP and F.|OP × F| = | |i j k|1−i j−k| |6 6 12| |= |i (12−6j−6k) j(−12+i+6k) k(6−6i+j)| |=|2i−2j+2k||F| = |6i+6j+12k|So, |d| = |OP × F|/|F|= |2i−2j+2k||6i+6j+12k|≈0.471 mThus, the perpendicular distance of the point O from the line of action of the force is approximately equal to 0.471 m.

To know more about moment visit:

https://brainly.com/question/28687664

#SPJ11

Q-3- information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure and business applications. The evaluation of evidence obtained determi

Answers

Information systems audit is an assessment of management controls in an IT infrastructure and business applications. It involves evaluating evidence to determine the effectiveness of these controls.

During an information systems audit, a systematic examination is conducted to assess the security, reliability, and compliance of an organization's IT systems. This includes evaluating the controls in place to protect data, ensure system availability, and maintain data integrity. The audit process typically involves reviewing policies, procedures, and technical configurations, as well as conducting interviews and testing.

The evaluation of evidence obtained during the audit helps identify any weaknesses or vulnerabilities in the IT systems and provides recommendations for improvement. By conducting regular information systems audits, organizations can enhance their risk management, safeguard critical data, and ensure regulatory compliance.

Learn more about Information systems here:

https://brainly.com/question/13081794

#SPJ11.

Question 1 (5 points) Saved Using the location, region and countries table write a query to return the address, postal code, city and state of all the offices in the "AMERICA" region

Answers

To retrieve the address, postal code, city, and state of all offices in the "AMERICA" region using the location, region, and countries tables, you can use the following SQL query:

```sql

SELECT l.address, l.postal_code, l.city, l.state

FROM location l

JOIN countries c ON l.country_id = c.country_id

JOIN region r ON c.region_id = r.region_id

WHERE r.region_name = 'AMERICA';

```

This query performs an inner join between the `location`, `countries`, and `region` tables based on the corresponding foreign keys. It selects the desired columns (`address`, `postal_code`, `city`, `state`) from the `location` table. The `WHERE` clause filters the results to only include offices in the "AMERICA" region by specifying `r.region_name = 'AMERICA'`.

Please note that the table and column names used in the query should match the actual names in your database schema.

Learn more about SQL query here:

https://brainly.com/question/31663284


#SPJ11

The purpose of this project is to design a reinforced concrete building in the real world using the knowledge you learned in the class. Project statement: A building with plan and section dimensions shown in the figures below. Consider the following: • The ground floor and roof are one-way slab construction supported on beams and girders. The ACI 318-19 specification and the ASCE-7-16 load standard should be used. Member Properties: Use f = 28 MPa and fy = 420 MP, fyt = 280 MPa (Stirrups) The super imposed dead load (not including self-weight) is 1.50 kN/m² The floor live load is 3.x (x is your group number) The roof live load is 2.5 kN/m². The columns are tied column type. • The design must be hand calculations. A dimension is 10 m, B dimension is 9 m, C dimension is 3.4 m. Tasks: 1- Calculate the dead and live loads (floor live loads and roof live loads). 2- For the analysis of the slabs, beams, and girders, use the approximate moments and shears obtained from the ACI coefficients. 3- Design the one-way reinforced concrete slab. 4- Design all reinforced concrete beams and girders against flexural and shear. 5- Design all reinforced concrete columns. 6- Show all your hand calculations in your report. 7- Draw sections (handwriting). 8- Time for each presentation is 15 minutes. 9- The contribution of each student in the project needs to be clearly documented. No credit or only partial credits will be given to students who have little to no significant contribution to the project.

Answers

Calculate the dead and live loads. The dead load is the weight of the structure itself, including the weight of the concrete, steel, and other materials. The live load is the weight of people, furniture, and other objects that will be using the structure.

Design the one-way reinforced concrete slab. The slab is the horizontal surface that supports the weight of the structure. It is made of concrete and steel reinforcement. The thickness of the slab and the amount of reinforcement are determined by the dead and live loads.

Design all reinforced concrete beams and girders. The beams and girders are the vertical members that support the weight of the slab. They are made of concrete and steel reinforcement. The size of the beams and girders and the amount of reinforcement are determined by the dead and live loads.

Design all reinforced concrete columns. The columns are the vertical members that support the weight of the beams and girders. They are made of concrete and steel reinforcement. The size of the columns and the amount of reinforcement are determined by the dead and live loads.

Show all your hand calculations in your report. This is important so that your design can be checked for accuracy.

Draw sections (handwriting). This is important so that you can visualize the structure and understand how it works.

Present your design to the class. This is your opportunity to show off your work and explain your design decisions.

Here are some additional tips for designing a reinforced concrete building:

Use the latest code and standards. This will ensure that your design is safe and meets all applicable requirements.

Use a computer program to help with the calculations. This can save you time and help to ensure that your calculations are accurate.

Get feedback from your instructor and classmates. This will help you to identify any potential problems with your design and improve your design.

Learn more about steel reinforcement here:

https://brainly.com/question/31607449

#SPJ11

f potatoes have a root zone of 0.6 m and the water content of the soil are: 0m = 0.2 g/g 0w = 0.28 m³/m³ Equivalent depth = 280 mm/m: What is the total amount of water in the root zone?

Answers

The total amount of water in the root zone is given in the problem which is 0.28 m³/m³.  we can determine the total amount of water in the root zone of potatoes if we know the root zone depth and bulk density of the soil.

However, the bulk density of soil is not provided in the problem.  we cannot determine the total amount of water in the root zone.

The given terms in the problem are used to determine the available water capacity (AWC) of the soil which is a measure of the water available to plants from the soil.

AWC is defined as the amount of water that can be stored in the soil between field capacity (FC) and wilting point (WP).

To know more about density visit:

https://brainly.com/question/29775886

#SPJ11

8. When ________ and _______ are required, most experienced C programmers prefer to use a for statement rather than a while statement.
a) indentation and incrementation
b) initialization and updating
c) repetition and execution
d) incrementation and evaluation

Answers

Answer: b) initialization and updating.

I’m pretty sure

Direction: Answer the questions below as comprehensively as possible. 1. Classification is one of the most commonly used technique when it comes to classifying large sets of data. It uses a decision to classify data. Each decision is established on a query related to one of the input variables. Based on the acknowledgments, the data instance is classified. A few well-characterized classes generally provide an efficient synthesis of the set of objects. As such, a classification is a powerful tool for data exploration. The algorithm that performs the classification is the classifier while the observations are the instances. With classification, you can distinguish between data that is useful to your goal and data that is not relevant. Different types of classification method uses algorithms. Read the above scenario and answer the following questions. (5marks) a. Evaluate two popular Data Mining Algorithms for Classification. Illustrate the reasons why they are popular. (Rubric: 5 marks =2 marks for each correct and complete answer. 1 mark for correct reason they are popular)

Answers

Two popular data mining algorithms for classification and the reasons why they are popular are as follows:

1. Decision Trees algorithm                                                                                          2. Naive Bayes algorithm

1. Decision Trees algorithm: The decision tree algorithm is one of the most popular data mining algorithms used for classification. It is used to build a decision tree to classify the data. The tree is constructed by splitting the dataset into smaller subsets based on a particular attribute value and is continued until the subsets are homogeneous. The decision tree algorithm is popular because of its simplicity, efficiency, and effectiveness in producing understandable and interpretable models. Decision trees provide a structured way to represent the data and can be used to generate rules, which can be used to classify new data instances. Additionally, the decision tree algorithm can handle both categorical and continuous data, and it is not sensitive to outliers.

2. Naive Bayes algorithm: The Naive Bayes algorithm is another popular data mining algorithm used for classification. It is based on Bayes' theorem and assumes that the predictors are independent of each other. It is simple and fast, and it can handle large datasets with high dimensionality. The Naive Bayes algorithm is popular because of its accuracy, speed, and simplicity. It is also easy to implement and can be used for both binary and multiclass classification. Additionally, the Naive Bayes algorithm requires less training data than other classification algorithms. The Naive Bayes algorithm is often used in text classification, spam filtering, and sentiment analysis.In conclusion, the decision tree algorithm and the Naive Bayes algorithm are two popular data mining algorithms used for classification. The decision tree algorithm is popular because of its simplicity, efficiency, and effectiveness in producing understandable and interpretable models, while the Naive Bayes algorithm is popular because of its accuracy, speed, and simplicity. Both algorithms can handle large datasets with high dimensionality and can be used for both binary and multiclass classification.

To know more about Decision Trees algorithm refer to:

https://brainly.com/question/32657664

#SPJ11

#SPACE INVADERS CLONE
Q.Modify the program in such that after shooting an
enemy it dissappers and that after shooting down all the enemy
ships, there is a transition to the next level, where there are

Answers

To modify the Space Invaders Clone program such that after shooting an enemy it disappears and after shooting down all enemy ships, there is a transition to the next level, the following steps can be followed:

Step 1: Add a new function called 'collision'. In this function, we need to check whether the bullet has collided with an enemy. If yes, then we need to remove the enemy from the screen and the bullet as well. In order to achieve this, we can loop through the enemies and check for collision. If collision occurs, we can remove the enemy and bullet using the 'remove' method and increase the score as well.

Step 2: Once all the enemies have been destroyed, we need to transition to the next level. For this, we can check the length of the 'enemies' array and if it's zero, then we need to remove all the bullets from the screen and increase the level by one. We can also add new enemies based on the level and increase their speed as well. In order to achieve this, we can use a new function called 'nextLevel'.

Step 3: Finally, we need to call these two functions inside the 'draw' function. The 'collision' function needs to be called before drawing the enemies and bullets and the 'nextLevel' function needs to be called after checking for collision and before drawing the enemies and bullets.The modified program is given below:#SPACE INVADERS CLONE// Player varslet player;

let playerSpeed = 5;

// Bullet varslet bullets = [];

let bulletSpeed = 7;

// Enemy varslet enemies = [];

let enemySpeed = 2;

let enemyRows = 3;

let enemyCols = 5;

let enemySpacing = 80;

// Score varslet score = 0;

// Level varslet level = 1;

function setup()

{ createCanvas(600, 600);

player = new Player(width / 2, height - 50);

for (let i = 0; i < enemyCols; i++) { for (let j = 0; j < enemyRows; j++) { let enemy = new Enemy(i * enemySpacing + 80, j * 60 + 50);

enemies.push(enemy); } } }

function draw() { background(0);

collision(); if (enemies.length === 0) { nextLevel(); }

player.update();

player.show();

for (let i = 0; i < bullets.length; i++) { bullets[i].update(); bullets[i].show(); }

for (let i = 0; i < enemies.length; i++) { enemies[i].update(); enemies[i].show(); }

textSize(32); fill(255);

text("Score: " + score, 10, 30);

text("Level: " + level, 10, 60);

}function keyPressed() { if (keyCode === 32) { let bullet = new Bullet(player.x, player.y - 20);

bullets.push(bullet); }}

function collision()

{ for (let i = 0; i < bullets.length; i++) { for (let j = 0; j < enemies.length; j++) { if (bullets[i].hits(enemies[j]))

{ bullets[i].remove();

enemies[j].remove(); score += 10; }}}

bullets = bullets.filter(bullet => !bullet.toDelete);

enemies = enemies.filter(enemy => !enemy.toDelete);}function nextLevel() { bullets = []; level += 1; enemyRows += 1; enemySpacing -= 10;

for (let i = 0; i < enemyCols; i++) { for (let j = 0; j < enemyRows; j++)

{ let enemy = new Enemy(i * enemySpacing + 80, j * 60 + 50); enemies.

push(enemy); } } }

In conclusion, the above modification will enable the Space Invaders Clone program to remove an enemy from the screen after it has been shot and also transition to the next level once all the enemy ships have been shot down.

To know more about shooting visit :

https://brainly.com/question/32037807

#SPJ11

Compared with a system using ASK modulation, an FSK based system: a) require the same bandwidth b) Transmits the data at faster rate c) requires a narrow bandwidth d) always requires twice bandwidth Select one: a. d b. b C. C d. a

Answers

The correct answer is a. d) always requires twice the bandwidth.

In Frequency Shift Keying (FSK), the digital data is transmitted by shifting the frequency of the carrier signal between two different frequencies, typically referred to as the mark and space frequencies. The mark frequency represents one binary state, while the space-frequency represents the other binary state. The transition between these frequencies indicates the change in data.

In Amplitude Shift Keying (ASK), the digital data is transmitted by varying the amplitude of the carrier signal. The amplitude is changed to represent different binary states, typically a high amplitude for one state and a low amplitude for the other state.

When comparing ASK and FSK modulation, FSK requires twice the bandwidth of ASK. This is because FSK uses two distinct frequencies to represent the binary states, while ASK modulates the amplitude of a single carrier frequency. The frequency separation between the mark and space frequencies in FSK determines the required bandwidth.

Therefore, the correct answer is d) always requires twice the bandwidth.

Learn more about Frequency Shift Keying (FSK) here:

https://brainly.com/question/26226551

#SPJ11

To control ice build-up on a heat pump outdoor coil in the heating cycle, a ____ is attached to a large diaphragm. A) toggle switch
B) microswitch
C) push button switch
D) sail switch

Answers

To control ice build-up on a heat pump outdoor coil in the heating cycle, a sail switch is attached to a large diaphragm.What is a sail switch?A sail switch is an electromechanical switch that is operated by a wind-blown sail. The sail is usually connected to an armature that is fixed to the switch's actuator.

As the wind turns the sail, the switch actuator moves, activating or deactivating the switch contacts.This switch type is frequently used in HVAC systems to detect the flow of air through the supply air ductwork. When the HVAC system blower starts, the sail switch detects the air pressure generated by the air flowing through the duct. As a result, the switch contacts are closed and the system's operation is permitted.

To control ice build-up on a heat pump outdoor coil in the heating cycle, a sail switch is attached to a large diaphragm. This switch controls the flow of air over the outdoor coil and turns the system off if the wind speed is insufficient. When there is enough wind speed, the sail switch will open and allow the system to operate.

To know more about Heat Visit;

brainly.com/question/12112869

#SPJ11

Given the rules of the CFG below, write the accepting
language.
Given the rules of the CFG below, write the accepting language. S→ bbA | aaB A→ aA | E B→ bB | E

Answers

The context-free grammar (CFG) can be represented as follows:

S → bbA | aaB,

A → aA | ε,

B → bB | ε.

To determine the accepting language generated by this CFG, we can start with the start variable, S, and try to derive strings of terminals. Let's consider the possible productions:

1. S → bbA (produced by the first alternative of S)

  Since A can derive ε, we can immediately see that S → bb is a valid production.

2. S → aaB (produced by the second alternative of S)

  Similarly, since B can derive ε, we can immediately see that S → aa is a valid production.

3. A → aA (produced by the first alternative of A)

  This means that we can prefix any number of a's to a string that can be derived from A. In other words, A can generate the set of strings {a^n | n ≥ 0}.

4. B → bB (produced by the first alternative of B)

  This means that we can suffix any number of b's to a string that can be derived from B. In other words, B can generate the set of strings {b^n | n ≥ 0}.

Putting everything together, we can see that the language generated by the CFG is the set of strings of the form {a^n b^m | n, m ≥ 0}. In other words, the accepting language is all strings consisting of zero or more a's followed by zero or more b's. This language can be denoted by the regular expression a* b*. Thus, we have described the accepting language.

To know more about variable visit:

https://brainly.com/question/15078630

#SPJ11

Plot the following equation with Excel, for values of x from 0 to 10: y = 3√x Upload Choose a File Question 2 25 pts Repeat Q1 with MATLAB, using a for loop and the plot command. Upload Choose a File Question 3 Repeat Q1 with MATLAB, but this time by creating a function (for determining y(x)) and the plot command. Hint: The function will calculate and output y with x as the argument of the function

Answers

In order to plot the equation `y = 3√x` for values of `x` from 0 to 10, we can use Microsoft Excel. Here's how to do it: Step 1: Open Microsoft Excel and enter the values of `x` from 0 to 10 in column A.

Step 2: In cell B1, enter the formula `=3*SQRT(A1)` and press Enter. This will calculate the value of `y` for the first value of `x`.

Step 3: Copy the formula in cell B1 to the cells below it by selecting cell B1, then clicking and dragging the small square in the bottom right corner of the cell down to the last cell in column B. This will calculate the values of `y` for all the other values of `x`.

Step 4: Highlight both columns A and B by clicking and dragging your mouse over them.

Step 5: Click on the "Insert" tab in the top menu bar and then select "Scatter" under "Charts". This will create a scatter plot of the data. You can now customize the chart to your liking.

Step 6: Save your Excel file.

If you want to plot the same equation in MATLAB using a for loop and the plot command, here's how to do it:

Step 1: Open MATLAB and create a new script file.

Step 2: Define a vector `x` containing the values of `x` from 0 to 10 using the following code: `x = 0:0.1:10;`

Step 3: Use a for loop to calculate the values of `y` for each value of `x` using the following code: `for i = 1:length(x) y(i) = 3*sqrt(x(i)); end`

Step 4: Plot the data using the following code: `plot(x,y)`

Step 5: Customize the plot to your liking and save the file.

To know more about Microsoft Excel visit:

https://brainly.com/question/32584761

#SPJ11

Discuss the reason why the new roads need to be built in Malaysia.

Answers

The construction of new roads in Malaysia is a necessity because of rapid population growth, urbanization, and the increasing number of vehicles. The new roads reduce congestion, promote economic growth, and support the development of rural areas.

The construction of new roads in Malaysia is an ongoing process. The need to build new roads is caused by several factors such as rapid population growth, urbanization, and the increasing number of vehicles. This explanation will discuss why there is a need to build new roads in Malaysia. It will also provide a conclusion to the topic.Explanation Malaysia's population is rapidly increasing, and it's expected to hit 39 million by 2050. The increasing population leads to urbanization, which in turn leads to increased demand for transportation infrastructure. The new roads provide a means for people to move around quickly and conveniently from one place to another. Besides, new roads reduce congestion on existing roads by providing an alternative route to road users. Congestion is a significant problem in many Malaysian cities, which leads to productivity losses and an increase in fuel consumption. New roads help to address these challenges by providing a smoother flow of traffic. They also play a crucial role in the development of rural areas. New roads make it easier for people to transport goods and services to rural areas.

In conclusion,  As such, the government of Malaysia should continue to invest in transportation infrastructure to meet the country's growing transportation needs.

To know more about economic growth visit:

brainly.com/question/11679822

#SPJ11

) The organization must secure top management commitment before commencing Environmental Management System (EMS) development activities. (i) Why this is essential for EMS development and implementation? (2 marks) (ii) Give two examples on how top management demonstrated leadership and commitment with respect to the EMS" (4 marks) (b) What is the definition of environmental aspect in the context of Environmental Management System? (3 marks) (c) A catering company is planning to open a new café near Hong Kong Wetland Park. Name any two possible environmental aspetts on the cafe regarding its daily operation.

Answers

(i) It is essential to secure top management commitment before commencing Environmental Management System (EMS) development and implementation for the following reasons:

- Leadership and commitment from top management set the tone for the entire organization and demonstrate the importance of environmental management.

- Top management commitment ensures the allocation of necessary resources, including financial and human resources, to implement and maintain the EMS effectively.

- It helps in establishing clear environmental goals, objectives, and policies, which guide the organization's environmental performance.

- Top management involvement fosters employee engagement and participation in environmental initiatives, creating a culture of environmental responsibility throughout the organization.

- It enhances the organization's credibility and reputation by demonstrating a genuine commitment to environmental protection and sustainability.

(ii) Two examples of how top management can demonstrate leadership and commitment with respect to the EMS are:

1. Setting environmental objectives and targets: Top management can establish specific, measurable environmental objectives and targets aligned with the organization's overall goals. They can communicate these objectives to employees, monitor progress, and provide the necessary support to achieve them. For example, setting a target to reduce energy consumption by 10% within a year shows top management's commitment to energy efficiency and environmental conservation.

2. Providing resources and training: Top management can allocate adequate resources, both financial and human, for the successful implementation of the EMS. This includes providing funds for environmental initiatives, investing in eco-friendly technologies, and ensuring employees receive appropriate training on environmental awareness and best practices. By investing in resources and training, top management demonstrates their commitment to improving environmental performance and compliance.

(b) In the context of an Environmental Management System (EMS), the definition of environmental aspect is any element of an organization's activities, products, or services that can interact with the environment. It includes the activities, processes, and materials used by an organization that can lead to environmental impacts, whether positive or negative. Environmental aspects can range from energy consumption, waste generation, emissions, use of natural resources, to noise levels, and chemical handling, among others. Identifying and evaluating environmental aspects is crucial for effective environmental management and developing appropriate controls and measures to minimize environmental impacts.

(c) Two possible environmental aspects of the cafe regarding its daily operation near Hong Kong Wetland Park could be:

1. Waste management: The cafe may generate significant amounts of waste, including food waste, packaging materials, and disposable items. Proper waste management practices, such as recycling, composting, and responsible disposal, need to be implemented to minimize the environmental impact of waste generation and ensure compliance with local regulations.

2. Water usage: The cafe's daily operation may involve significant water consumption for food preparation, cleaning, and sanitation. Ensuring efficient water use, implementing water-saving measures, and monitoring water consumption can help minimize the cafe's water footprint and conserve this valuable resource. Additionally, measures to prevent water pollution, such as proper grease trap maintenance and wastewater treatment, should be considered to protect the nearby wetland environment.

To know more about management, visit

https://brainly.com/question/32737727

#SPJ11

let a = {x:0}; for (let i: = 0; i < 2; i++) { a = Array.create(5, {y:1}); } a = 1; After running this code, how many objects (including arrays) can be garbage collected?

Answers

The given code is: let a = {x:0};for (let i: = 0; i < 2; i++) {    a = Array. create(5, {y:1});}a = 1;Here is the explanation of the code :In the first line of the code, an object named `a` is declared with a property `x` whose value is zero.

Then in the next line of the code, a `for` loop is used in which another object is created with the name `a` by using the `Array. create` method. Inside the `Array. create` method, an array of length 5 is created and each index of the array has an object with a property `y` whose value is 1. So, in total, five objects are created for each index of the array. But since the loop is running two times, so 10 objects are created, and all these objects belong to the `a` object .In the last line of the code, the value of `a` is set to 1 and all the objects that were created earlier in the code are not referenced anywhere. That's why they are eligible for garbage collection. In conclusion, a total of 11 objects can be garbage collected including the arrays and objects created in the `for` loop and the object created at the start of the code.

To  know more about   property visit:

brainly.com/question/29134417

#SPJ11

Quiz Content
Create a class called it Course:
This class has three data members: courseCode (String), courseID (Int) and grade (double).
The class has a three arguments constructor and all needed getters and setters.
You could add any needed functions, for example (equals, toString and copy).
Create a Java class called "Student.java"
Add those instance variables: name, id and a reference variable to an array of Course : courses:
Three constructor overloads:
default.
with name and id.
name and id and array of courses
Add equals function.
Add copy function.
Add toString function.
Create Java class called "Lab8.java" add main function in it.
In Lab8.java, create first Student Object with two arguments constructor, then set the courses field with the setter.
create the second Student Object with the three arguments constructor.
Create an array of Students and initialize it with the two objects.
Print both students information in a for loop.
Compare between the two objects.
add a function in Lab8.java to calculate the average mark for each student, call this function for both objects and print their average.
// ITE 3455
// ITC 5102
Output:
Jone Lee : 2311 - [ITE3455 : 77.2, Android1: 66.1, Java1: 73.2, ITC5102: 78.9]
Don Lee : 1241 - [iOSITE2 : 77.2, Android2: 66.1, Java1: 73.2]
The two students are different.
Jone Lee average = (77.2 + 66.1 + 73.2+ 78.9 ) / 4
Don Lee average = (77.2 + 66.1 + 73.2)/3

Answers

The right way of implementation of the requested classes as well as the functions in Java is given in the code attached.

What is the Java class

A Java class record may be a record containing Java bytecode that can be executed on the Java Virtual Machine. A Java course record is as a rule created by a Java compiler from Java programming dialect source records containing Java classes.

Therefore, The code makes two student objects, sets their courses utilizing the setter strategy, and after that initializes an cluster of Understudy objects. It at that point prints the data of each understudy utilizing the abrogated toString() strategy.

Read more about Java class here:

https://brainly.com/question/25458754

#SPJ4

A memory management system uses TLB (Translation lookaside
buffer) to enhance memory access time. If time to access a TLB is x nanoseconds and
time to access main memory is y nanoseconds (y >>x), determine effective memory
access time when TLB hit ratio is p ( 0 < p <1)? Also, determine the effective memory
access time when x = 1 nanosec, y=20 nanosec, and p = 0.7.

Answers

The correct answer is  the effective memory access time with these values would be 7 nanoseconds.

To calculate the effective memory access time (EMAT) with TLB, we can use the formula:

EMAT = TLB access time + (1 - TLB hit ratio) * Main memory access time

Given that the TLB access time is x nanoseconds, the main memory access time is y nanoseconds, and the TLB hit ratio is p, we can substitute these values into the formula to find the EMAT.

EMAT = x + (1 - p) * y

For example, if x = 1 nanosecond, y = 20 nanoseconds, and p = 0.7, we can calculate the EMAT as follows:

EMAT = 1 + (1 - 0.7) * 20

= 1 + 0.3 * 20

= 1 + 6

= 7 nanoseconds

To know more about memory click the link below:

brainly.com/question/19425406

#SPJ11

Which of the following lists books generating at least $12.00 in profit?
a.SELECT * FROM books WHERE retail-cost > 12;
b. SELECT * FROM books WHERE retail-cost <= 12;
c. SELECT * FROM books WHERE profit >= 12;
d. SELECT * FROM books WHERE retail-cost => 12.00;
e. none of the above

Answers

The SQL query that generating at least $12.00 in profit is SELECT * FROM books WHERE profit >= 12;. Option c is correct.

SELECT * FROM books WHERE retail-cost > 12 - This query selects all the books that have a retail cost of greater than $12, but it does not specify anything about the profit generated by those books.

SELECT * FROM books WHERE retail-cost <= 12 - This query selects all the books that have a retail cost of $12 or less, but it does not specify anything about the profit generated by those books.

SELECT * FROM books WHERE profit >= 12 - This query selects all the books that generate at least $12.00 in profit. This is the correct answer to the question.

SELECT * FROM books WHERE retail-cost => 12.00 - The ">=" operator used in this query is incorrect syntax. It should be ">=" instead of "=>". However, even if we correct the syntax, this query selects all the books that have a retail cost of greater than or equal to $12, but it does not specify anything about the profit generated by those books.

Therefore, c is correct.

Learn more about SQL https://brainly.com/question/31663284

#SPJ11

Other Questions
D uestion 13 13. If a virus is polymorphic, what is it able to do? O Replicate itself over a network connection O Change its binary characteristics each time its transferred to a new system O Modify the network properties of a client or server O Remain inactive until a particular date Question 14 14. A(n) O host-based O network-based O Content-based O interface-based 6.66 pts 6.9 pts firewall is placed between a private and public network. 15. The most common cause of a security issue with a firewall is O overheating network delay O misconfiguration O traffic jam Write a program that computes the tax and tip on a restaurant bill for a patron with a $44.50 meal charge. The tax should be 6.75 percent of the meal cost. The tip should be 15 percent of the total after adding the tax. Display the meal cost, tax amount, tip amount, and total bill on the screen. Modify the problem, so the program asks the user to enter the cost of the meal, and the percent for the tip. I have this down, but I struggle to fix the idea of getting user input. Thank you to whoever provides an answer! #include #include //for std::setprecision int main(){ int num; cout > num; // Taking input} } int main() { const double meal_charge = 52.65 ; const double tax_rate=6.75 / 100.0 ; const double total_after_tax = meal_charge * tax_rate ; const double tip_rate = 20.0 / 100.0 ; const double tip_amount = total_after_tax * tip_rate ; const double total_bill_amount = total_after_tax + tip_amount ; std::cout As noted above an identified priority relates to the collection, storage and processing of client data. You have been asked to design an implementation plan that develops a series of policies and actions in response to this priority, to help deliver a more systematic, relevant and law-abiding process of gathering data. One of these actions must include the production of a client information form. The form should be produced using Qualtrics or Microsoft Forms and must meet relevant legal, regulatory, organisational and/or societal requirements for data and information governance. The implementation plan must include an indication of who should lead on certain actions and offer insight about the timescales over which the actions must take place. the equation 2x^2 bx c = 0 has two solution x1 and x2. if x1 x2 = 5 and x1 * x2 = 3, find the two solutions redundant relationships in a database design: group of answer choices can be derived from other relationship should always be removed from the database design none of the listed answers cannot be identified by reviewing the er diagram Stock A's beta is 1.7 and Stock B's beta is 0.7. Which of the following statements must be true about these securities? (Assume market equilibrium.) a. Stock B must be a more desirable addition to a portfolio than A. b. Stock A must be a more desirable addition to a portfolio than B. c. The expected return on Stock A should be greater than that on B. d. The expected return on Stock B should be greater than that on A. In pseudocode, describe a recursive algorithm that reverses the elements in a singly linked list. Assumption: that the recursive algorithm is originally called with the head node in a linked list. Algorithm reverse(n): Input: The first node in a sequence of elements forming a singly linked list Output: A reverse linked list (n) ends up as the last node in the sequence). For Java The size of each element in two dimensional must be the same.For example,if the first row has a single dimensional array with 4 elements.The second row must has a single dimensional with 4 elements Selectone: OTrue OFalse 7. An 8-year-old girl has experienced dyspnea for the past 2 weeks. A chest radiograph shows prominent hilar lymphadenopathy and a 1 cm peripheral right middle lobe nodule. No infiltrates are present. A sputum gram stain reveals no pathogens. Which of the following forms of tuberculosis is she most likely to have? A. Secondary B. Cavitary C. Primary D. Miliary 8. A 40-year-old woman has developed increasing cough and shortness of breath for the past 2 weeks. A chest X-ray shows diffuse lung infiltrates. Sputum cultures are negative, and the patient does not respond to routine antibiotic therapy. She is suspected of having atypical pneumonia, and a lung biopsy is done. Which of the following histopathologic findings would be expected in this patient's lungs? A. Dense neutrophilic infiltration in the alveoli B. Clusters of epithelioid macrophages C. Interstitial inflammation by lymphocytes D. Confluent areas of caseous necrosis 9. A 55-year-old man with a long history of heavy smoking has been admitted to the hospital with increasing shortness of breath and dry cough for the past few years. Physical examination shows a barrel chest, hyperresonance on percussion, and clubbing of the digits. The level of alpha-1 antitrypsin is low. A chest X-ray discloses hyperinflation and flattening of the diaphragm. Which of the following best describes the expected histopathology of the lungs in the patient? A Destruction of the walls of airspaces without fibrosis B Prominent bronchial smooth muscle cell hyperplasia C Interstitial fibrosis of the lung parenchyma D Thickening of the epithelial basement membrane 10. A 55-year-old man with a long history of heavy smoking has been admitted to the hospital with increasing shortness of breath, and A 36- year-old woman has had increasing dyspnea for 8 years. On physical examination, she has a barrel-shaped chest, and the patient was diagnosed to have emphysema. Which of the following laboratory findings is she MOST LIKELY to have? A Elevated blood ethanol B Decreased serum alpha-1-antitrypsin C Decreased serum ceruloplasmin D Positive urine opiates Alveolar lumena E A B D OSPE - Histopathology of a lung biopsy from a patient with tuberculosis. Q1) Identify the cells labeled A, B,C, D & E. C - Either using a rational function found in your research or modelling your own scenario with one, explain the function and why it is relevant in your chosen career. - Determine the x-intercept(s), y-intercept, asymptotes, holes, maximum and minimum values (you may use technology to find the max and min values), defining intervals, domain and range. Interpret your results in the context the field. If there are no asymptotes or holes, then use a sample function to explain a situation where each of these could occur. - Using this information, graph the function by hand. Your graph must include appropriate labels. - Graph your function using technology. If this graph is different than the one you have produced, graph it on your sketch using a different colour and a legend to show the difference between your sketch and the graph that technology produced. - Using the graph, what do the maximum and minimum values represent? We now have the alleles that are in the gametes (sex cells) for each of the parents. Determine what genotype is made in the offspring when those gametes come together during fertilization. RRWW RRww RrWw rrWW rrww Training Exercise 1 1 Loop Exercise An Armstrong number is an-digit number that is equal to the sum of each of es digts taken to the nith power. For example, 153 is an armstrong number because 153-19+S* + 3 Other than the numbers through 9, it is the smallest Armstrong number, there are one with two digits After 153, the next smallest Armstrong numbers are 370, 371, 407, 1.634.2.2018 and 9,474. There are only 89 Armstrong numbers in total. The largest Armstrong number is 115,132,219,018,763,992.965,095,597,973,971,522,401, which has 39 Ses has been proven that there are no Armstrong numbers with more than 39 digits. Question: Write a program using loop (whie, do-while or for loop) to print out all Armstrong numbers between 100 and 500. If sum of cubes of each dipt of the number is equal to the number itself, then the number is called an Armstrong number. . For example, 153 - (111)+(5955)+(3:33). . You should Math expressions only for cubing the numbers, means don't use non form NN-Math.pow ( N3) A coil of resistance 59 and inductance 0.1 H is switched on to a 230V supply. Calculate the rate of rise of current at t=0 and at t=2t where t=L/R. What is the steady state value of circuit current? L= 1 H and R = 3.9 KQ. V (w) Vi (w) b) Sketch the magnitude of the frequency response function H(w). c) Determine what type of ideal filter is approximated by this circuit. a) Find H (w) = + vi(t) L R + vo(t) darcy is sitting at her desk in her office one day when, without warning, her heart begins racing rapidly, she starts sweating profusely, and she is gripped with a terrifying fear that she is about to go crazy. she thinks she is having a heart attack. nothing she is doing seems to have caused such an episode. her symptoms most resemble . group of answer choices a compulsion a phobic disorder post-traumatic stress a panic attack in regard to resource leveling, why are noncritical path activities generally the first to be delayed? Write a C++ program that takes two integers from the user in variables num1 and num2, then assigns pointer ptrl to the address of numl and ptr2 to address of num2. Pass the two pointers to a function called ADD that adds the contents of the variables pointed at by the two pointers then returns the sum to the main(). Sketch a simple diagram of a mitochondria, and label the inner membrane and the outer membrane. On your diagram, draw and label some cytochromes of the electron transport chain. Also add NADH, NAD+ and H+ ions to your diagram. a user's monitor displays a distortedly large image. to fix the resolution problem, the it specialist performs which software troubleshooting steps? (select all that apply.) I executed code in example8-6 in Introduction to Programming - 6th Edition, and I got an error like this "/usr/bin/ld: /tmp/ccH2t2Lf.o: in function `main':example8-6.cpp:(.text+0x92): undefined reference to `initializeArray(int*, int)'collect2: error: ld returned 1 exit status"Please help me out, many thanksMy code here:#include using namespace std;const int ARRAY_SIZE = 10;void initializeArray(int list[], int listSize);void fillArray(int list[], int listSize);void printArray(const int list[], int listSize);int sumArray(const int list[], int listSize);int indexLargestElement(const int list[], int listSize);void copyArray(int list1[], int src, int list2[], int tar, int numOfElement);int main(){int listA[ARRAY_SIZE] = {1};int listB[ARRAY_SIZE];cout