The NO terminals should receive the field wire.
Describe terminals.
A terminal is a piece of hardware for electronic communication that handles data input and display. An internet-connected PC or workstation, Voice over IP (VOIP) network endpoint, telematics device, mobile data terminal, text terminal, or textual language interface are all examples of terminals. A terminal, often known as a text terminal, is a basic interface for using a computer. It is used to connect text-based interfaces including command line interfaces and text interfaces and is made out of a video monitor and a keyboard.
To know more about terminal
https://brainly.com/question/4455094
#SPJ4
when using the format painter, double-click the format painter button to paste the same format multiple times and click the format painter again to .
When using the format painter in a word processing or presentation program, double-clicking the format painter button will allow you to paste the same format multiple times without having to repeatedly select the format painter tool. This is useful if you want to apply the same format to multiple text or object selections in the document.
What Are The Steps To Format Painter?To use the format painter in this way, follow these steps:
Select the text or object in the document that has the format that you want to copy. Click on the format painter button to activate the tool.Double-click the format painter button to enter multiple paste mode. The cursor will change to a paintbrush icon with a double arrow, indicating that you can paste the format multiple times.Select the text or object that you want to apply the format to. The format will be applied to the selection automatically.Repeat step 4 for each additional selection that you want to apply the format to.When you are finished applying the format, click on the format painter button again to deactivate the tool.By double-clicking the format painter button, you can paste the same format multiple times without having to repeatedly select the tool. This can save time and improve your workflow when formatting documents.
To Know More About Format Painter, Check Out
https://brainly.com/question/3264068
#SPJ4
true or false? the purpose of a gateway firewall is to block potentially hostile traffic from reaching the internal lan.
Answer:True
Explanation:
Limit the query results to records where the student's date of birth DOB is less than or equal to January 1, 1995. Run the query to view the results.
Click Run in the Results group under the Design tab. Only show records in the search results that have a Credits field value greater than 120. To see the results, run the query.
On the ribbon, select the Format tab. Select the tiny button located in the Size group's lower left corner. Click the Text Box tab in the Format Text Box window. We can adjust the margins to the size we want under the Internal margin section. The number of rows returned by a SELECT statement is limited by the SQL LIMIT clause. we can limit our results for Microsoft databases like SQL Server or MS Access by using the SELECT TOP command, which is Microsoft's in-house version of the SELECT LIMIT statement.
Learn more about microsoft here-
https://brainly.com/question/26695071
#SPJ4
how many different ways are there to order the seven jobs in the queue so that either qkj or lpw come last?
In 40320 different ways. You can encounter tasks when developing your web application that take too long to complete within a typical web request, like parsing and storing an uploaded CSV file.
Fortunately, Laravel makes it simple to set up queued tasks that may be completed in the background. A uniform queueing API is offered by Laravel queues for a number of queue backends, including Redis, Amazon SQS, and even relational databases. A printer queue contains 8 distinct jobs.
There are 8 different ways to place them in the line.
8 tasks can be arranged in 40320 different ways, according to this formula:
Learn more about database here-
https://brainly.com/question/6447559
#SPJ4
10. if the str length procedure from section 9.3 used scasb, how would it calculate and return the string length?
The string length is calculated and returned using (EDI final - EDI initial) - 1.
What is string length?A string is a data type that is used in programming to represent text rather than numbers. A string is a collection of characters that can include letters, numbers, symbols, and even spaces. To be recognized as a string, it must be enclosed in quotation marks.String length in C++ actually means the number of bytes used to encode the given string. Because one byte in C++ usually maps to one character, this metric also primarily means "number of characters."The length property gets back an integer value indicating how many characters are in the string. The length property will return 0 if the string is empty.To learn more about string length refer to :
https://brainly.com/question/17314276
#SPJ4
a study examined the average pay for men and women entering the workforce as doctors for 21 different positions.26 (a) if each gender was equally paid, then we would expect about half of those positions to have men paid more than women and women would be paid more than men in the other half of positions. write appropriate hypotheses to test this scenario. (b) men were, on average, paid more in 19 of those 21 positions. supposing these 21 positions represent a simple random sample, complete a hypothesis test using your hypotheses from part (a).
a) The hypothesis test is given as follows:
Null hypothesis: [tex]H_0: p = 0.5[/tex].Alternative hypothesis: [tex]H_1: p \neq 0.5[/tex]b) There is sufficient evidence to conclude that each gender is not equally paid.
What are the hypothesis tested?At the null hypothesis, it is tested if there isn't enough evidence to conclude that men and women are not equally paid, that is, the proportion is of 0.5, hence:
[tex]H_0: p = 0.5[/tex].
At the alternative hypothesis, it is tested if there is enough evidence to conclude that men and women are not equally paid, that is, the proportion is not of 0.5, hence:
[tex]H_1: p \neq 0.5[/tex].
We have a two-tailed test, as we are testing if the proportion is different of a value, with a standard significance level of 0.05, hence the critical value is of:
|z| = 1.96.
What is the test statistic?The test statistic is obtained by the equation presented as follows:
[tex]z = \frac{\overline{p} - p}{\sqrt{\frac{p(1-p)}{n}}}[/tex]
In which the parameters of the equation are listed as follows:
[tex]\overline{p}[/tex] is the sample proportion.p is the proportion tested at the null hypothesis.n is the sample size.The values of these parameters are given as follows:
[tex]n = 21, \overline{p} = \frac{19}{21} = 0.9048, p = 0.5[/tex]
Hence the test statistic is of:
[tex]z = \frac{\overline{p} - p}{\sqrt{\frac{p(1-p)}{n}}}[/tex]
[tex]z = \frac{0.9048 - 0.5}{\sqrt{\frac{0.5(0.5)}{21}}}[/tex]
z = 3.71.
There is sufficient evidence to conclude that each gender is not equally paid, as the test statistic is greater than the critical value for the two-tailed test.
More can be learned about the test of an hypothesis at https://brainly.com/question/13873630
#SPJ1
____ is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance.
Conceptual design
Network design
Logical design
Physical design
Physical design
Physical design is the process of determining the data storage organization and data access characteristics of the database to ensure its integrity, security, and performance.
What is database?A database is a methodical collection of information. They allow for electronic data storage and manipulation. Databases facilitate data management.
Consider the following database: A database is used by an online telephone directory to store data about people, phone numbers, and other contact information. A database is used by your electricity service provider to manage billing, client issues, fault data, and so on.
Let us also take a look at Fakebook. It must store, manipulate, and present data about members, their friends, member activities, messages, advertisements, and a variety of other topics. We can provide an infinite number of database usage examples.
Learn more about database
https://brainly.com/question/518894
#SPJ4
you are the network administrator in jolene consultancy pvt. ltd., a small consultancy in missouri. you have been assigned the task of monitoring network traffic in the systems. you must ensure that many devices can be configured to report their traffic and other statistics to a network monitor. which of the following would you use in this scenario?
The best method for analyzing network performance is to perform a baseline check on performance.
A system called an intrusion detection system (IDS) watches network traffic for unusual activity and issues notifications when it is seen.
While an IDS's major duties are anomaly detection and reporting, certain intrusion detection systems are also equipped to respond to suspicious activity or abnormal traffic by blocking traffic coming from suspect Internet Protocol (IP) addresses.
An intrusion prevention system (IPS), in contrast to an IDS, monitors network packets for potentially harmful network traffic. However, unlike an IDS, an IPS's main objective is to prevent threats after they have been identified.
To know more about IDS click here:
https://brainly.com/question/29038449
#SPJ4
you can add a command button to a form using the command button wizard, one of many (fill the blank) wizards access offers.
You can add a command button to a form using the command button wizard, one of many form wizards access offers.
On the Creation tab, Access offers a number of quick-generate form options that each let you create a form with a single click. Use the Form Wizard instead if you'd want to be more selective about the fields that show up on the form. Additionally, you may specify how the data is sorted and categorized using the wizard, and you can use fields from several tables or queries (provided that you specified the relationships between the tables and queries beforehand).
The outcomes that the Form Wizard can provide depend on the settings you choose. Therefore, until you achieve the desired outcomes, we advise that you run the form wizard numerous times, trying with various settings each time.
To know more about Form Wizard click here:
https://brainly.com/question/9759966
#SPJ4
encrypting data is not an appropriate measure for mobile devices such as smartphones.
a. true
b. false
Encrypting data is not an appropriate measure for mobile devices such as smartphones is option b. false.
What happens when data is encrypted?Data encryption transforms data from a readable plaintext format into ciphertext, an unintelligible encoded format. Data that has been encrypted cannot be viewed or used by users or processes until it has been decrypted. Since the decryption key is confidential, it needs to be secured against unwanted access.
Therefore, it is incorrect to say that even if a device is lost or stolen, encrypting portable media will help to preserve vital information. Data encryption is not a suitable security technique for mobile devices like cellphones.
Learn more about Encrypting data from
https://brainly.com/question/28283722
#SPJ1
aldosterone a. stimulates na reabsorption in the distal and collecting tubules b. is secreted by the granular cells
In the adrenal cortex's zona glomerulosa, which is its outer layer, aldosterone is a steroid hormone that is both synthesized and secreted.
What is Regulation of aldosterone synthesis and secretion?The zona glomerulosa, the outer layer of the adrenal cortex, is where a steroid hormone known as aldosterone is created and secreted. Aldosterone is in charge of controlling sodium homeostasis, which helps to control blood pressure and volume. Hypotension and circulatory shock can occur when aldosterone secretion is insufficient, especially in infants. Conversely, excessive levels of aldosterone, or those that are too high for sodium status, can cause hypertension and exacerbate the harmful effects of high blood pressure on a variety of organs, including renal disease, stroke, visual loss, and congestive heart failure. Aldosterone is also thought to directly harm end organs like the kidney and heart.Given how crucial aldosterone is to the physiology and pathology of the cardiovascular system, it is essential to comprehend the mechanisms that regulate its production and release from the adrenal cortex. The mechanisms regulating aldosterone production in zona glomerulosa cells are covered in this article, with a focus on the signaling pathways involved in the secretory response to the main regulators of aldosterone production, the renin-angiotensin II system, serum potassium levels, and adrenocorticotrophic hormone. There are several signaling pathways at play, including diacylglycerol, protein kinases C and D, 12-hydroxyeicosatetraenoic acid, phospholipase D, mitogen-activated protein kinase pathways, tyrosine kinases, adenylate cyclase, and cAMP-dependent protein kinase.Understanding the signaling mechanisms that control aldosterone biosynthesis in great detail may lead to the identification of novel therapeutic targets for the management of hypertension, primary aldosteronism, congestive heart failure, renal disease, and other cardiovascular diseases.To Learn more About aldosterone refer to:
https://brainly.com/question/9310217
#SPJ4
Gino needs to be able to SSH to a Linux server on his network from his Windows workstation in order to modify the configuration of the web server service. Which of the following types of programs might he use to do so?
a. virtual private network b. remote desktop gateway c. terminal emulator d. virtual desktop infrastructure
Since Gino needs to be able to SSH to a Linux server on his network from his Windows workstation in order to modify the configuration of the web server service, the type of program which he might use to do so is: B. remote desktop gateway.
What is SSH?SSH is an abbreviation for secure shell and it can be defined as a network protocol that avails a network administrator a secure way to access data over an unsecured network.
What is remote desktop gateway?In Computer technology, remote desktop gateway is sometimes referred to as RD Gateway and it can be defined as a type of software program (role service) that is designed and developed to enable an authorized remote user an ability to securely connect and modify the resources that are stored on an internal or private web server service.
Read more on SSH here: brainly.com/question/17147683
#SPJ1
an exception will never be thrown when a program attempts to read beyond the end of a file. question 61 options: true false
Any item of data within a sequential access file can be accessed directly without having to read any of the data that came before it.
An input file's read position is originally set to the file's first item when it is opened. Before utilizing methods like Stack. pop() or Stack. peek() that could throw an Empty Stack Exception, one can make sure the stack is not empty in order to avoid the Empty Stack Exception. In the event that an error scenario is discovered, it is utilized to transfer control to an error handler. Choose the omitted expression from the code snippet below. Until a genuine integer value is entered, the method should keep asking the user for it.
Learn more about integer here-
https://brainly.com/question/28454591
#SPJ4
What is the meaning of unwanted software?.
Unwanted software are programs that alter the Windows experience without your consent or control. This can take the form of modified browsing experience, lack of control over downloads and installation, misleading messages, or unauthorized changes to Windows settings
____ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.
System maintenance is essential to ensure that a system remains secure, stable, and efficient. Without regular maintenance, a system may become vulnerable to security threats, experience decreased performance, or become unable to meet changing requirements.
Maintaining Computer Systems for Optimal PerformanceSystem maintenance is the process of updating and improving the performance, stability, security, and usability of a computer system. It involves activities such as:
Changing programs, procedures, or documentation to ensure correct system performanceAdapting the system to changing requirementsMaking the system operate more efficiently.System maintenance activities are important because they keep systems running smoothly and efficiently. By updating programs, procedures, and documentation, any errors or bugs in the system can be identified and fixed before they become major issues.
Additionally, maintenance activities are necessary to ensure the system is able to meet current user needs, as requirements and user preferences may change over time. Finally, periodic maintenance can help reduce the need for more complex and costly repairs in the future.
Learn more about System maintenance: https://brainly.com/question/21047147
#SPJ4
every object has access to its own address by means of: every object has access to its own address by means of: recursive function calls a method named self() the current reference the this pointer g
Program for recursive function calls a method named self() the current reference the this pointer g.
Create a recursive function to print a string's reverse.
def reverse(string):
if len(string) == 0:
return
temp = string[0]
reverse(string[1:])
print(temp, end='')
string = "Brainly"
reverse(string)
String pointer (str) is the input for the recursive function (reverse), which calls itself with the next position of the passed pointer (str+1). When the pointer reaches "0," the recursion continues in this manner, with each function printing a char at the passed location (str) before returning one at a time. The ability to store each character in a recursive stack and print while returning
Learn more about recursive function here:
https://brainly.com/question/23896867
#SPJ4
5 1 g the energy of the electron in a hydrogen atom can be calculated from the bohr formula: in this equation stands for the rydberg energy, and stands for the principal quantum number of the orbital that holds the electron. (you can find the value of the rydberg energy using the data button on the aleks toolbar.) calculate the wavelength of the line in the emission line spectrum of hydrogen caused by the transition of the electron from an orbital with to an orbital with . round your answer to significant digits.
I've answerd this similiar question with he transition of the electron from an orbital with =n10 to an orbital with =n8 and the emission of the transition is: λ = 162 10⁻⁷ m
Here's how to calculate itBohr's model for the hydrogen atom gives energy by the equation
= - k²e² / 2m (1 / n²)
Where k is the Coulomb constant, e and m the charge and mass of the electron respectively and n is an integer
The Planck equation
E = h f
The speed of light is
c = λ f
E = h c /λ
For a transition between two states we have
- = - k²e² / 2m (1 / ² -1 / ²)
h c / λ = -k² e² / 2m (1 / ² - 1/ ²)
1 / λ = (- k² e² / 2m h c) (1 / ² - 1/²)
The Rydberg constant with a value of 1,097 107 m-1 is the result of the constant in parentheses
Let's calculate the emission of the transition
1 /λ = 1.097 10⁷ (1/10² - 1/8²)
1 / λ = 1.097 10⁷ (0.01 - 0.015625)
1 /λ = 0.006170625 10⁷
λ = 162 10⁻⁷ m
Learn more about Bohr atomic model: https://brainly.com/question/3964366?referrer=searchResults
#SPJ4
where you can restrict data put into a table, you can change things such as if a field is required or the number of characters allowed. breakup report properties query
The place where you can restrict data put into a table, you can change things such as if a field is required or the number of characters allowed is the query.
What happens when data that doesn't conform to a validation rule is entered in Access?A message box alerting the user to the issue is automatically displayed by Access when data is entered that doesn't comply with a validation rule. The AND and OR operators can be combined in a single query. A copy of your database is made using the Back Up Database option.
The way Access data entry be limited are:
Make a rule for record validation.Open the table whose records you want to verify.Click Record Validation Rule after clicking Validation in the Field Validation group on the Fields tab.Make the rule using the Expression Builder.Learn more about query from
https://brainly.com/question/25694408
#SPJ1
Ceejay needs to find a way to allow users to work from home using company owned laptops during a pandemic so that they are able to access resources on the intranet. Which of the following would be the best choice for him to implement?
a. RDP b. VPN c. VNC d. IP Spoofing
Since Ceejay needs to find a way to allow users to work from home using company owned laptops during a pandemic so that they are able to access resources on the intranet, the best choice for him to implement is: B. VPN.
What is a VPN?In Computer technology, a VPN is an abbreviation for Virtual Private Network and it can be defined as a secured, encrypted and private web-based service that is typically used for accessing region-restricted and censored internet content from remote locations.
In this context, we can reasonably infer and logically deduce that Ceejay should implement a Virtual Private Network (VPN) connection in order to enable his company's employees (users) to access resources stored on the intranet.
Read more on VPN here: brainly.com/question/28945467
#SPJ1
which wires get switched by wiring one end as t68a and the other end as t568b? what type of crossover cable is created using this wiring scheme?
The wires that get switched by wiring one end as T68a and the other end as T568b is a cross-over cable.
The cross-over cable that is created using this wiring scheme is called Straight Through Cable.
What is a Straight Through Cable?
An Ethernet crossover cable is an Ethernet crossover cable that is used to link computing devices directly. It is most commonly used to link two devices of the same sort, such as two computers or two switches.
In local area networks, a straight-through cable connects various devices such as a computer to a network hub such as a router, router and switch, PC and switch, and so on. It is a wireless connection alternative in which one or more computers reach a router through a wireless signal.
Learn more about Cross-over cable:
https://brainly.com/question/29235530
#SPJ1
what is the difference between protecting against eavesdropping and protexting against a man in the middle attack
To protect against eavesdropping, one must take steps to stop outsiders from listening in on two parties' conversations, such as utilising encryption.
The definition of communication
Simply put, communication is the act of passing information from one location, person, or group to another. A message, a recipient, and at least one sender are all components of every communication. Despite how straightforward it may seem, communication is a really complicated topic.
By using authentication techniques like digital signatures, it is possible to protect against man-in-the-middle attacks by ensuring that no one else may listen in on the conversation between the two parties.
To know more about communication
https://brainly.com/question/22613693
#SPJ4
the process whereby a person takes a file from their own computer, and sends it to be stored on a source on the internet is known as .
File transfer refers to the procedure wherein a person delivers a file from their computer to be saved on a source online.
What is a computer?An electrical tool that manipulates data or information is a computer. Data storage, retrieval, and processing are all capabilities. It's possible that one already know that they can use a computer to type documents, send emails, play games, and surf the Internet.
The Latin word "computer" means "to compute," and this is where the name "computer" comes from. The computer is officially known as Common Operating Machine Intended for Technological and Educational Research.
Learn more about computer from here:
https://brainly.com/question/21080395
#SPJ1
the excel cell conditional formatting function allows users to select a column and format cells that contain a given text string and highlight .A. text color only B. both text and fill colors C. fill color only D. text color or fill color E. I DON'T KNOW YET
The excel cell conditional formatting function allows users to select a column and format cells that contain a given text string and highlight is both text and fill colors option B.
Choose the excel cells, table, or entire sheet to which you wish to apply conditional formatting. Select Text that Contains from the Conditional Formatting drop-down menu after selecting Highlight Cells Rules under the Home tab. Then click OK after entering the text you wish to highlight in the box next to containing. You can easily highlight certain numbers or make selected cells stand out with conditional formatting. Depending on a condition, this modifies how a cell range looks (or criteria). Cells with values that satisfy a given criterion can be highlighted using conditional formatting. Based on the value of the cell, conditional formatting enables you to automatically apply formatting to one or more cells, such as colors, icons, and data bars.
Learn more about excel cells here:
https://brainly.com/question/1380185
#SPJ4
PLEASE HELP I HAVE TO SUBMIT IT TODAY
Q. Accept two numbers using an InputBox in two different variables and print the sum of two in a message box. (Visual Basic)
Using the knowledge in computational language in python it is possible to write a code that two numbers using an InputBox in two different variables and print the sum of two in a message box.
Writting the code:Public Sub AddTwoNumbers()
Dim FirstNumber As String = InputBox("Enter the first number.")) 'Get the first number
Dim SecondNumber As String = Convert.toInt32InputBox("Enter the second number.")) 'G
Dim Result As Integer = 0 'Used to store the result in
'Now pthe calculation.
Result = FirstNumber + SecondNumber
'Then show the result in a MessageBox
MessageBox.Show("The result is: " & Result.ToString())
End Sub
See more about python at brainly.com/question/18502436
#SPJ1
which statement holds true for the term cost-per-click? responses it refers to the cost associated with the storage and bandwidth to deliver a website once it is clicked on. it refers to the cost associated with the storage and bandwidth to deliver a website once it is clicked on. it refers to the number of users who clicked an ad divided by the number of times the ad was delivered. it refers to the number of users who clicked an ad divided by the number of times the ad was delivered. it refers to the ad rates quoted in cost-per-thousand impressions. it refers to the ad rates quoted in cost-per-thousand impressions. it refers to the amount of money an advertiser pays for each click on their ad.
The statement that hold true for the term cost-per-click is it refers to the amount of money an advertiser pays for each click on their ad.
What is advertiser
An advertiser is the organization, company, or individual who pays for applying a time to present a persuasive advertisement or advertising space or message to the public on purpose to keep attention from them. An advertiser root from latin verb root "annunciare" that means which means to make known a news or to announce. There is several ways to do advertising such as direct mail advertising, mobile advertising, native advertising, podcast advertising, outdoor advertising, paid search advertising and social media advertising.
Learn more about advertising at https://brainly.com/question/1658517
A. (100%) We have described the generating of mazes in the class (see Section 8.7 of the textbook). Suppose we want to output the path in the maze. Assume that the maze is represented as an n x m matrix M; each cell in the matrix stores information about what walls are present (or absent). The starting point of a path is M[0, 0] and the ending point is M[n-1, m-1]a) Write a program to output a path in the maze. Give output in the form SEN... (representing go south, then east, then north, etc.).b) Write a program that draws the maze and, at the press of a button, draws the path.
A program is a set of instructions that a computer uses to carry out a particular task and give desired output.
What is a program?Programs are like the instructions for a computer, to use an analogy. It includes a list of components (called variables, which can stand in for text, images, or numeric data) and a list of instructions (called statements), which instruct the computer on how to carry out a particular task.
Programming languages like C++, Python, and Ruby are used to create specific types of programs. These high-level, writable, and human-readable programming languages are used. Compilers, interpreters, and assemblers inside the computer system translate these languages into low level machine languages after that.
Although it is typically much more cryptic and challenging to understand, assembly language is a type of low level language that is one step above a machine language. It can technically be written by a human.
A program to output a path in the maze is here:
int main() {
vector<vector<int>> maze{
{1, 0, 0, 0, 0, 0},
{1, 1, 0, 1, 0, 0},
{0, 1, 1, 1, 0, 0},
{0, 0, 0, 1, 0, 0},
{1, 1, 1, 1, 1, 1}};
int n = maze.size();
int m = maze[0].size();
// creating mark vector
vector<vector<int>> mark(n, vector<int>(m, 0));
// finding the solution...
findSolution(maze, mark, n, m);
// printing output in form of RB form....
printOutputString(mark, n, m);
// drawing the maze
drawMaze(mark);
return 0;
}
Learn more about Programs
https://brainly.com/question/26134656
#SPJ4
You MUST use pointers and dynamic allocation to complete the following exercise to receive points. Write a program that takes a positive integer as input, indicating the number of integers (separated by whitespaces) that will follow. (1) Create a dynamic integer array with the size equal to the value of the first input integer to store the user input values. If the first input integer is not positive, the program will output "Invalid size!" and exit. (2) Find and print out the maximum even number and maximum odd number in the entered integer array. Ex: if the input is: 5 43 5 0 23 9 the program would output: The maximum even number is 0 The maximum odd number is 43 You MUST define and call the following two functions to return the memory addresses of the elements that store the maximum even number and maximum odd number, respectively. Both functions take the dynamically created integer array and its size as input. int *findMaxEvenNumber(int *array, int size); int *findMaxOddNumber(int *array, int size); NOTE For the function of finding the maximum even number, if the entered array does not have an even number, it will return a nullptr pointer. The same for the function of finding the maximum odd number. If no even number exists in the array, the program will return No even number in the array The maximum odd number is Similarly, if no odd number in the array, the program will output The maximum even number is No odd number in the array
A program that takes a positive integer as input, indicating the number of integers.
#include <iostream>
using namespace std;
int maxEven=-999; //Takes only integer value
int maxOdd=-999;
int *findMaxEvenNumber(int *array,int size)
for(int i=0;i<size;i++)
{
if(array[i]%2==0 && array[i]>maxEven)
maxEven=array[i];
}
return &maxEven;
}
int *findMaxOddNumber(int *array,int size)
for(int i=0;i<size;i++)
{
if(array[i]%2==1 && array[i]>maxOdd)
maxOdd=array[i];
}
return &maxOdd;
}
int main()
{
int n,i=-1;
int *arr;
do
{
if(i==-1)
{
cin>>n;
arr = new int(n);
}
else
cin>>arr[i];
i++;
}
while(i<n);
int *even,*odd;
even=findMaxEvenNumber(arr,n);
odd=findMaxOddNumber(arr,n)
if(*even==-999)
cout<<"No even number in the array"<<endl;
else
cout<<"The maximum even number is "<<maxEven<<endl;
if(*odd==-999)
cout<<"No odd number in the array"<<endl;
else
cout<<"The maximum odd number is "<<maxOdd<<endl;
return 0;
}
Learn more about integer here:
https://brainly.com/question/14592593
#SPJ4
what is your favorite page-replacement strategy? why? if you could use that same strategy for cpu cache line replacement in hardware, would you? speed? space?
LRU is my go-to page replacement method (Least Recently Used). Because we can maintain the pages that have been used most recently in memory and delete the ones that haven't, this method is effective.
What is a computer's central processing unit?
Central Processing Unit is referred to as a CPU. Other names for it are processor and microprocessor. It's one of the most crucial components of any digital computing system, if not the most crucial.
It is therefore both time and space efficient. I would employ the same technique to replace the CPU cache line in hardware. LRU works well for CPU cache line renewal since it is quick and efficient with regard to storage.
To know more about central processing unit
https://brainly.com/question/474553
#SPJ4
boot system commands tell a router to search the most common locations for a valid ios image. where are the boot system commands stored?
Boot system commands stored at NVRAM
What is NVRAM?NVRAM (Non-Volatile Random Access Memory) is a type of cellphone memory with arbitrary access (RAM) which is generally used to store configurations made by firmware, such as BIOS, EFI or other firmwares on embedded devices, such as routers.
Generally, NVRAM is produced with CMOS (Complimentary Metal-Oxide Semiconductor) manufacturing technology so that the power it needs is also small. To turn it on so that stored data is not lost, NVRAM uses a Lithium battery with the serial number CR-2032.
Learn more about NVRAM: https://brainly.com/question/5101565
#SPJ4
the comparison operator is used to select records by matching field values specific to a pattern that includes one or more wildcard characters.
The LIKE operator is a comparison operator that is used to selected records by comparing field values to a pattern that contains one or multiple wildcard characters.
what does operator mean?
In computer programming, an operator is a symbol that often denotes an act or process. These symbols were modified from logic and mathematics. A specific value or operand can be manipulated by an operator. The fundamental building block of every program, operators are used for anything from extremely basic tasks like counting to sophisticated techniques like security encryption. An operator manipulates a mathematical , logical value, or operand, exactly a given way to produce a specific result, depending on the kind of operator.
To know more about operator
https://brainly.com/question/28238572
#SPJ4