Large computer programs, such as operating systems, achieve zero defects prior to release. Group of answer choices True False PreviousNext

Answers

Answer 1

Answer:

The answer is "False"

Explanation:

It is put to use Six Sigma had 3.4 defects per million opportunities (DPMO) from the start, allowing for a 1.5-sigma process shift. However, the definition of zero faults is a little hazy. Perhaps the area beyond 3.4 DPMO is referred to by the term "zero faults.", that's why Before being released, large computer programs, such as operating systems, must have no faults the wrong choice.


Related Questions

Provide the EXACT C++ line of code necessary to return the heap-dynamic variable ptr to the operating system.

Answers

Full question:

Provide the EXACT C++ line of code necessary to return the heap-dynamic variable ptr to the operating system.

Pokemon *ptr;

ptr = new Pokemon[6];

Answer:

delete ptr;

Explanation:

The command in the answer above deallocates memory(preventing memory leaks) and returns control to the operating system.

The command in the question dynamically allocates memory to the the heap(dynamically allocated memory is called heap) while the program is running(different from statically allocated memory that allocates before program compiles). When the variable is no longer needed, deallocation occurs using the command in our answer where the variable is deleted using the pointer(keeps track of dynamic variables).

_________________________ are the countable products resulting from a program, while ________________________ are the changes in clients that are achieved as a result of program participation.

Answers

Answer: Outputs; Outcomes.

Explanation:

Program refers to the collection of instructions which the computer can execute in order to perform a certain task.

Outputs are are the countable products resulting from a program, while on the other hand, outcomes are the changes in clients that are achieved as a result of program participation.

RecursionexerciseCOP 3502; Summer2021We have gone through many examples in the class and those examples are available in the slides and uploaded codes. Try to test those codes and modify as you wish for getting more clarification.In additiontry the following:---------------------------------------------------------------------------------------------------------------------------------------1.What would be the output of the following recursive function if we call rec2(5)

Answers

Answer:

The output is:

1 2 3 4 5

Explanation:

Given

See attachment for code segment

Required

The output of rec2(5)

From the attached code segment, we have the following:

The base case: if (x==0){ return;}

The above implies that, the recursion ends when the value of x gets reduced to 0

The recursion:

rec2(x-1); ---- This continually reduces x by 1 and passes the value to the function

printf("%d ", x); This prints the passed value of x

Hence, the output of rec2(5) is: 1 2 3 4 5

Many companies possess valuable information they want to guard closely (ex. new chip design, competition plans, legal documents). Personal computer hard disks these days are full of important photos, videos, and movies. As more and more information is stored in computer systems, the need to protect it is becoming increasingly important. Which of the following statements is incorrect with respect to Security?
a. security has many facets; three of the more important ones are: the nature of the threats, the nature of intruders, and cryptography
b. data integrity means that unauthorized users should not be able to modify any data without the owner's permission
c. a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for
d. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes

Answers

Answer: D. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes

Explanation:

Data security is essential to protecting unwanted people from having access to ones data, malicious attack should also be prevented and unusual behavior should be monitored.

Data security has many facets such as threat nature, the nature of intruders, and cryptography. Furthermore, data integrity means that unauthorized users should not be able to modify any data without the owner's permission. Also, the statement that a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for is correct.

It should be no noted that rats gnawing backup tapes cannot prevent data loss. Therefore, the correct option is D

If you fail a course as a MAIN (residency) course, you can repeat that course as either a MAIN (residency) or an online (IG or IIG) course. True False

Answers

Answer: False

Explanation:

The statement that "you fail a course as a MAIN (residency) course, you can repeat that course as either a MAIN (residency) or an online (IG or IIG) course" is false.

It should be noted that if one fail a course as a residency course, the course can only be repeated as a main (residency) course and not an online course. When a course is failed, such course has to be repeated the following semester and this will give the person the chance to improve their GPA.

Show the result of inserting 10, 12, 1, 14, 6, 5, 8, 15, 3, 9, 7, 4, 11, 13, and 2, one at a time, into an initially empty binary heap. b. Show the result of using the linear-time algorithm to build a binary heap using the same input.
Show the result of performing three deleteMin operations in the heap of the previous exercise.

Answers

Answer:

Explanation:

A)

10 10 10 1 1

/ / \ --> / \ / \

12 12 1 12 10 12 10

/

14

1 1 1 1

/ \ / \ / \ / \

12 10 --> 6 10 6 10 --> 6 5

/ \ / \ / \ / / \ /

14 6 14 12 14 12 5 14 12 10

1 1 1 1

/ \ / \ / \ / \

6 5 6 5 6 5 --> 3 5

/ \ / \ / \ / \ / \ / \ / \ / \

14 12 10 8 14 12 10 8 14 12 10 8 6 12 10 8

/ / \ / \

15 15 3 15 14

After inserting all 1

/ \

3 2

/ \ / \

6 7 5 4

/ \ / \ / \ / \

15 14 12 9 10 11 13 8

b)

First level build : 10

/ \

12 1

/ \ / \

14 6 5 8

/ \ / \ / \ / \

15 3 9 7 4 11 13 2

Heap bottom level: 10

/ \

12 1

/ \ / \

3 6 4 2

/ \ / \ / \ / \

15 14 9 7 5 11 13 8

Heap next level up: 10

/ \

3 1

/ \ / \

12 6 4 2

/ \ / \ / \ / \

15 14 9 7 5 11 13 8

Final heap: 1

/ \

3 2

/ \ / \

12 6 4 8

/ \ / \ / \ / \

15 14 9 7 5 11 13 10

c)

Duing the first time,

First, assume the last element, the 8, is at the root and bubble down.

Then, assume the last element, the 13, is at the root and bubble down.

Then, assume the last element, the 11, is at the root and bubble down.

Final heap:

4

/ \

6 5

/ \ / \

13 7 10 8

/ \ / \ /

15 14 12 9 11

In the next iteration,

First, assume the last element, the 10, is at the root and bubble down.

Then, assume the last element, the 13, is at the root and bubble down.

Then, asssume the last element, the 11, is at the root and bubble down.

So, after performing all operations, the heap looks like below:

4

/ \

6 5

/ \ / \

12 7 10 8

/ \ / \ /

15 14 9 13 11

The fastest way to pull financial data from the application into Excel as refreshable formulas that can be edited or updated is:

Answers

Answer:

Download the financial report as =FDS codes with cell referencing.

Explanation:

An excel is a spreadsheet that is developed by the Microsoft company for the Windows operating system. It can be also used in iOS, macOS and Android. It has many features including  graphing tools, calculation, pivot tables, etc.

In excel the fastest way to pull out a financial data from an application into the Excel as the refreshable formulas which can be edited or can be uploaded later on is by downloading the financial report as an +FDS code with the cell referencing.

In excel, cell refreshing is a way to refer to a cell in the formula.

A blogger writes that the new "U-Phone" is superior to any other on the market. Before buying the U-Phone based on this review, a savvy consumer should (5 points)

consider if the blogger has been paid by U-Phone
assume the blogger probably knows a lot about U-Phones
examine multiple U-Phone advertisements
speak to a U-Phone representative for an unbiased opinion

Answers

Answer:

Speak to a U-Phone representative.

Explanation:

A representative will tell you the necessary details about the U-phone without any biases whatsoever, as they´re the closest to the company when it comes to detail about their products.

Tu teléfono es muy bueno no sé mucho de que se trata porque no se inglés y el celular está en inglés.

Which symbol is used to identify edge-triggered flip-flops

Answers

Answer:

A triangle on the Clock input.

Gray London is a retired race car driver who helped Dale Earnhardt, Jr. get his start. He is writing a book and making a video about the early days or Dale Earnhardt. He is trying to decide whether to market these items directly over the Internet or to use intermediaries. To make this decision, he needs to know the pros and cons of each route. Provide that information and make a recommendation to him.

Answers

Answer:

Explanation:

Marketing your product directly over the internet can lead to much greater profits and there are many options that you can choose from in order to target the correct audience. Unfortunately, doing so does require marketing knowledge and is basically like growing a business. If you were to use intermediaries they already have the knowledge necessary to market your product but will take a percentage of the profits, which will ultimately limit your gains. Since Gray London is a race car driver, I am assumming that he does not have any prior technological expertise or marketing expertise, therefore I would recommend using intermediaries.

You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the discussion forum. Which of the following would be appropriate in a post?
A. Including an advertisement for how to subscribe to the data analytics magazine.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.

Answers

Select All that apply

Answer:

These are the things that are would be appropriate in a post.

B. Checking your post for typos or grammatical errors.

C. Giving credit to the original author.

D. Including your own thoughts about the article.

Explanation:

The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.

write a program that assigns values to
three variables, assigns the sum (adds
the three values to a variable called
total and prints total.

Answers

Explanation:

10:A program that assigns the sum 20,30,40

20: input 20,30,40

30:sum input

40: print total

End

A(n) _____ is a network connection device that can build tables that identify addresses on each network.

Answers

Answer:

Dynamic Router

Explanation:

A dynamic router is a network connection device that can build tables that identify addresses on each network.

What is Dynamic network?

Dynamic networks are networks that vary over time; their vertices are often not binary and instead represent a probability for having a link between two nodes.

Statistical approaches or computer simulations are often necessary to explore how such networks evolve, adapt or respond to external intervention.

DNA statistical tools are generally optimized for large-scale networks and admit the analysis of multiple networks simultaneously in which, there are multiple types of nodes (multi-node) and multiple types of links (multi-plex).

Therefore, A dynamic router is a network connection device that can build tables that identify addresses on each network.

To learn more about dynamic router, refer to the link:

https://brainly.com/question/14285971

#SPJ6

Validate that the user age field is at least 21 and at most 35. If valid, set the background of the field to LightGreen and assign true to userAgeValid. Otherwise, set the background to Orange and userAgeValid to false.HTML JavaScript 1 var validColor-"LightGreen"; 2 var invalidColor"Orange" 3 var userAgeInput -document.getElementByIdC"userAge"); 4 var formWidget -document.getElementByIdC"userForm"); 5 var userAgeValid - false; 7 function userAgeCheck(event) 10 11 function formCheck(event) 12 if (luserAgeValid) { 13 14 15 16 17 userAgeInput.addEventListener("input", userAgeCheck); 18 formWidget.addEventListener('submit', formCheck); event.preventDefault); 3 Check Iry again

Answers

Answer:

Explanation:

The code provided had many errors. I fixed the errors and changed the userAgeCheck function as requested. Checking the age of that the user has passed as an input and changing the variables as needed depending on the age. The background color that was changed was for the form field as the question was not very specific on which field needed to be changed. The piece of the code that was created can be seen in the attached image below.

var validColor = "LightGreen";

var invalidColor = "Orange";

var userAgeInput = document.getElementById("userAge");

var formWidget = document.getElementById("userForm");

var userAgeValid = false;

function userAgeCheck(event) {

   if ((userAgeInput >= 25) && (userAgeInput <= 35)) {

       document.getElementById("userForm").style.backgroundColor = validColor;

       userAgeValid = true;

   } else {

       document.getElementById("userForm").style.backgroundColor = invalidColor;

       userAgeValid = false;

   }

};

function formCheck(event) {};

if (!userAgeValid) {

   userAgeInput.addEventListener("input", userAgeCheck);

   formWidget.addEventListener('submit', formCheck);  

   event.preventDefault();

}

(a) Define a goal for software product quality and an associated metric for that attribute. (b) Explain how you could show that the goal is validatable. (c) Explain how you could show that the goal is verifiable. 2. (a) Create a list of software product attributes and a list for software project attributes. (b) Rank these in the order of how difficult you consider them to be measured. (c) Discuss the reasons for your choices

Answers

C discuss the reasons for your choices

Major findings of evolution of computers

Answers

Answer:

twitt

Explanation:

LAB: Count characters - methods
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string.
Ex: If the input is
n Monday
the output is
1
Ex: If the input is
Today is Monday
the output is
0
Ex: If the input is
n it's a sunny day
the output is
0
Your program must define and call the following method that returns the number of times the input character appears in the input string public static int countCharacters (char userChar, String userString)
Note: This is a lab from a previous chapter that now requires the use of a method
LabProgram.java
1 import java.util.Scanner
2
3 public class LabProgram
4
5 /* Define your method here */
6
7 public static void main(String[] args) {
8 Type your code here: * >
9 }
10 }

Answers

Answer:

i hope understand you

mark me brainlist

Explanation:

using namespace std;

#include <iostream>

 

#include <string.h>

#include <stdlib.h>

#include <stdio.h>

 

#define BLANK_CHAR (' ')

 

 

int CountCharacters(char userChar, char * userString)

{

 

int countReturn=0;

 

int n = strlen(userString);

 

for (int iLoop=0; iLoop<n; iLoop++)

{

       if (userString[iLoop]==userChar)

       {

        countReturn++;

 }

}

return(countReturn);

}

 

/******************************************

    Removes white spaces from passed string; returns pointer

     to the string that is stripped of the whitespace chars;

   

  Returns NULL pointer is empty string is passed;  

     Side Effects:

 CALLER MUST FREE THE OUTPUT BUFFER that is returned

 

 **********************************************************/

char * RemoveSpaces(char * userString)

{

 

 char * outbuff = NULL;

 

 if (userString!=NULL)

 {

   int n = strlen(userString);

    outbuff = (char *) malloc(n);

 

   if (outbuff != NULL)

   {

          memset(outbuff,0,n);

          int iIndex=0;

          //copies non-blank chars to outbuff

         for (int iLoop=0; iLoop<n; iLoop++)

         {

           if (userString[iLoop]!=BLANK_CHAR)

          {

           outbuff[iIndex]=userString[iLoop];

           iIndex++;

   }

   

   } //for

         

   }

   

   }

 return(outbuff);

 

}

 

 

int main()

{

 

 char inbuff[255];

 cout << " PLEASE INPUT THE STRING OF WHICH YOU WOULD LIKE TO STRIP WHITESPACE CHARS :>";

 gets(inbuff);

 

 char * outbuff = RemoveSpaces(inbuff);

 if (outbuff !=NULL)

 {

    cout << ">" << outbuff << "<" << endl;

    free(outbuff);

    }

     

   memset(inbuff,0,255);  

   cout << " PLEASE INPUT THE STRING IN WHICH YOU WOULD LIKE TO SEARCH CHAR :>";

gets(inbuff);

 

  char chChar;

 cout << "PLEASE INPUT THE CHARCTER YOU SEEK :>";

 cin >> chChar;

 

 int iCount = CountCharacters(chChar,inbuff);

 cout << " char " << chChar << " appears " << iCount << " time(s) in >" << inbuff << "<" << endl;

 

}

Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the print member function and a separate cout statement to output courseStudents's data. End with a newline. Sample output from the given program:
#include
#include
using namespace std;
class PersonData {
public:
void SetName(string userName) {
lastName = userName;
};
void SetAge(int numYears) {
ageYears = numYears;
};
// Other parts omitted
void PrintAll() {
cout << "Name: " << lastName;
cout << ", Age: " << ageYears;
};
private:
int ageYears;
string lastName;
};
class StudentData: public PersonData {
public:
void SetID(int studentId) {
idNum = studentId;
};
int GetID() {
return idNum;
};
private:
int idNum;
};
int main() {
StudentData courseStudent;
/* Your solution goes here */
return 0;
}

Answers

Answer:

Replace /* Your solution goes here */

with the following:

courseStudent.SetName("Smith");

courseStudent.SetAge(20);

courseStudent.SetID(9999);

courseStudent.PrintAll();

cout <<courseStudent.GetID();

Explanation:

From the given code segment, we have the following methods defined under the StudentData class;

SetName -> It receives name from the main

SetAge -> It receives age from the main

SetID --> It receives ID from the main and passes it to GetID method

printID --> Prints all the required output.

So, we have:

Pass name to setName

courseStudent.SetName("Smith");

Pass age to setAge

courseStudent.SetAge(20);

Pass ID to setID

courseStudent.SetID(9999);

Print all necessary outputs

courseStudent.PrintAll();

Manually print the student ID

cout <<courseStudent.GetID();

The valid call to the function installApplication is

void main(  )
{
 // call the function installApplication
}

void installApplication(char appInitial, int appVersion)
{
  // rest of function not important
}

Answers

Answer:

B. installApplication(‘A’, 1);

Explanation:

Given

The above code segment

Required

The correct call to installApplication

The function installApplication is declared as void, meaning that it is not expected to return anything.

Also, it receives a character and an integer argument.

So, the call to this function must include a character and an integer argument, in that order.

Option D is incorrect because both arguments are integer

Option C is incorrect because it passes no argument to the function.

Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).

Option B is correct

Which of the following financial functions can you use to calculate the payments to repay your loan

Answers

Answer:

PMT function. PMT, one of the financial functions, calculates the payment for a loan based on constant payments and a constant interest rate. Use the Excel Formula Coach to figure out a monthly loan payment.

Explanation:

To connect several computers together, one generally needs to be running a(n) ____ operating system

Answers

Answer:

Local Area Network

Explanation:

In the Information technology it is called Local Area Network.

What order? (function templates) Define a generic function called CheckOrder() that checks if four items are in ascending, neither, or descending order. The function should return -1 if the items are in ascending order, 0 if the items are unordered, and 1 if the items are in descending order. The program reads four items from input and outputs if the items are ordered. The items can be different types, including integers, strings, characters, or doubles. Ex. If the input is:

Answers

Answer:

Explanation:

The following code was written in Java and creates the generic class to allow you to compare any type of data structure. Three different test cases were used using both integers and strings. The first is an ascending list of integers, the second is a descending list of integers, and the third is an unordered list of strings. The output can be seen in the attached image below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Order: " + checkOrder(10, 22, 51, 53));

       System.out.println("Order: " + checkOrder(55, 44, 33, 22));

       System.out.println("Order: " + checkOrder("John", " Gabriel", "Daniela", "Zendaya"));

   }

   public static <E extends Comparable<E>> int checkOrder(E var1, E var2, E var3, E var4) {

       E prevVar = var1;

       if (var2.compareTo(prevVar) > 0) {

           prevVar = var2;

       } else {

           if (var3.compareTo(prevVar) < 0) {

               prevVar = var3;

           } else {

               return 0;

           }

           if (var4.compareTo(prevVar) < 0) {

               return 1;

           }  else {

               return 0;

           }

       }

       if (var3.compareTo(prevVar) > 0) {

           prevVar = var3;

       }

       if (var4.compareTo(prevVar) > 0) {

           return -1;

       }

       return 0;

   }

}

9.17 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input.

Answers

Answer:

Hence the code is given as follows,

import java.util.Scanner;

public class LabProgram {

   public static String createAcronym(String userPhrase){

       String result = "";

       String splits[] = userPhrase.split(" ");

       for(int i = 0;i<splits.length;i++){

           if(splits[i].charAt(0)>='A' && splits[i].charAt(0)<='Z')

               result += splits[i].charAt(0);

       }

       return result;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       String s = scan.nextLine();

       System.out.println(createAcronym(s));

   }

}

Write a program using integers user_num and x as input, and output user_num divided by x three times.Ex: If the input is:20002Then the output is:1000 500 250Note: In Python 3, integer division discards fractions. Ex: 6 // 4 is 1 (the 0.5 is discarded).LAB ACTIVITY2.29.1: LAB: Divide by x0 / 10main.pyLoad default template...12''' Type your code here. '''

Answers

Answer:

Following are the code to the given question:

user_num = int(input())#defining a variable user_num that takes input from user-end

x = int(input())#defining a variable x that takes input from user-end

for j in range(3):#defining for loop that divides the value three times

   user_num = user_num // x#dividing the value and store integer part

   print(user_num)#print value

Output:

2000

2

1000

500

250

Explanation:

In the above-given program code two-variable "user_num and x" is declared that inputs the value from the user-end and define a for loop that uses the "j" variable with the range method.

In the loop, it divides the "user_num" value with the "x" value and holds the integer part in the "user_num" variable, and prints its value.  

Write a program that removes all non-alpha characters from the given input. Ex: If the input is: -Hello, 1 world$! the output is: Helloworld

Also, this needs to be answered by 11:59 tonight.

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that takes in a string as a parameter, loops through the string and checks if each character is an alpha char. If it is, then it adds it to an output variable and when it is done looping it prints the output variable. A test case has been provided and the output can be seen in the attached image below.

def checkLetters(str):

   output = ''

   for char in str:

       if char.isalpha() == True:

           output += char

   return output

Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
PH
var num2 = 32;
var num1 = 12;
var rem=num2 % numi;
while(rem > 0)
{
num2 = num1;
num1 = rem;
rem = num2 % num1;
}
document.write(num1);
The output of the document.write statement at the end of this block is

Answers

Answer:

4

Explanation:

Given

The attached code segment

Required

The output

The first and second lines initialize num2 to 32 and num1 to 12, respectively.

Next, the remainder is calculated on line 3

[tex]rem = 32\%12[/tex]

[tex]rem = 8[/tex]

Then the while loop is repeated as long as rem > 0.

At first, we have:

[tex]num2 = 32[/tex]

[tex]num1 = 12[/tex]

[tex]rem = 8[/tex]

The first iteration gives:

[tex]num2 = 12[/tex]

[tex]num1 = 8[/tex]

[tex]rem = 12\%8 = 4[/tex]

Is 4 > 0? Yes; The loop is executed again.

This gives:

[tex]num2 = 8[/tex]

[tex]num1 = 4[/tex]

[tex]rem = 8\%4=0[/tex]

Is 0 > 0? No; The loop is executed

The last statement prints the last value of num1;

In the last loop, we have:

[tex]num1 = 4[/tex]

Hence, the output is 4

Answer:

Below is correct, the answer is 4.

Explanation:

PLATO

Difference between analog and hybrid computer in tabular form​

Answers

Answer:

Analog computers are faster than digital. Analog computers lack memory whereas digital computers store information. ... It has the speed of analog computer and the memory and accuracy of digital computer. Hybrid computers are used mainly in specialized applications where both kinds of data need to be process.

hope it is helpful for you

Compute change
A cashier distributes change using the maximum number of five dollar bills, followed by one dollar bills. For example, 19 yields 3 fives and 4 ones. Write a single statement that assigns the number of one dollar bills to variable numOnes, given amountToChange. Hint: Use the % operator.
import java.util.Scanner;
public class ComputingChange {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int amountToChange;
int numFives;
int numOnes;
amountToChange = scnr.nextInt();
numFives = amountToChange / 5;
/* Your solution goes here */
System.out.print("numFives: ");
System.out.println(numFives);
System.out.print("numOnes: ");
System.out.println(numOnes);
}
}

Answers

Answer:

Explanation:

The following code is written in Java and modified to do as requested. It asks the user to enter a number that is saved to the amountToChange and then uses the % operator to calculate the number of 5 dollar bills and the number of 1 dollar bills to give back. A test case has been provided and the output can be seen in the attached image below.

import java.util.Scanner;

class ComputingChange {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       int amountToChange;

       int numFives;

       int numOnes;

       amountToChange = scnr.nextInt();

       numFives = amountToChange / 5;

       /* Your solution goes here */

       numOnes = amountToChange % 5;

       System.out.print("numFives: ");

       System.out.println(numFives);

       System.out.print("numOnes: ");

       System.out.println(numOnes);

   }

}

A retail department store is approximately square, 35 meters (100 feet) on each side. Each wall has two entrances equally spaced apart. Located at each entrance is a point-of-sale cash register. Suggest a local area network solution that interconnects all eight cash registers. Draw a diagram showing the room, the location of all cash registers, the wiring, the switches, and the server. What type of wiring would you suggest?

Answers

Answer:

The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server

Explanation:

The local area network ( LAN ) solution  that will be used to interconnect all the POS  registers is ; The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server .  

This is because category 5e/6 twisted pair cable has a data rate transfer of up to 10 Mbps and it is best used for LAN connections

while The function of the three switches is to connect each cash register to the the central server been used .

attached below is a schematic representation

Jane is a full-time student on a somewhat limited budget, taking online classes, and she loves to play the latest video games. She needs to update her computer and wonders what to purchase. Which of the following might you suggest?

a. A workstation with a 3.9 GHz quad-core processor, 16 gigabytes of RAM, and a 24" monitor.
b. A laptop system with a 3.2 GHz processor. 6 gigabytes of RAM, and a 17" monitor.
c. A desktop system with a 1.9 GHz processor, 1 gigabyte of RAM, and a 13" monitor
d. A handheld PC (with no smartphone functionality)

Answers

Answer:

a. A workstation with a 3.9 GHz quad-core processor, 16 gigabytes of RAM, and a 24" monitor.

Explanation:

From the description, Jane needs to be able to multitask and run various programs at the same time in order to be efficient. Also since she wants to play the latest video games she will need high end hardware. Therefore, from the available options the best one would be a workstation with a 3.9 GHz quad-core processor, 16 gigabytes of RAM, and a 24" monitor. This has a very fast cpu with 4 cores to process various threads at the same time. It also has 16GB of memory to be able to multitask without problems and a 24" monitor. From the available options this is the best choice.

Other Questions
Suppose that a haircut will give Dawn 2,000 units of utility and cost her $40, whereas a set of acrylic nails costs $25 and yields 1,000 units of util. Most likely Dawn should:_____.A. be indifferent between the two choices.B. choose the haircut because she will receive 50 units of utility per dollar as compared with 45 units of utility per dollar for the nails.C. choose the haircut because each unit of utility will cost her 2 cents as compared with 2.5 cents for the nails.D. choose the nails because she will obtain 50 units of utility per dollar as compared with 40 units of utility per dollar for the haircut. Which statement explains how weight is different from mass?Mass is a varying property.Mass is measured in newtons.Weight is always greater than mass.Weight is a measure of gravitational pull. a cone with base radius 7 cm and a volume of 308cm^3 find the vertical height of the cone On weekend nights, a large urban hospital has an average of 4.8 emergency arrivals per hour. Let X be the number of arrivals per hour on a weekend night at this hospital. Assume that successive arrivals are random and independent. What is the probability P(X < 3)? Jonas builds a snow fort. He tells his friends it is 0.8 meters tall inside, but he rounded the height to the nearest tenth.Which could be the height of the snow fort before Jonas rounded it?2 answersA. 0.85B. 0.82C. 077 Kuba King Mbop Mabiinc maMbeky in the Democratic Republic of the Congo. The king wears traditional African clothes and jewelry. What African method of demonstrating status can be seen in the image above? Solve for x. Round to the nearest tenth, if necessary. 1-cite evidencias de que a milhoes de anos areas pode ter havido um supercontinente:o Pageia (obs:nao chute a resposta e nao Como que a resposta erranda pelo Amor de Deus) Pls help! Pls help! Tap the image to see the picture. Do not spam or else I will report!Raghavan has two identical plants. He plants one outside in the ground. The other is growing indoors without direct light. Raghavan predicts the weight of the carbon dioxide and water taken in by the plant and the oxygen given off by the plant.Raghavan notices that a rabbit family has been eating the outdoor plant and that small insects are eating the indoor plant. He sees a fox hunting rabbit, but nothing is eating the insects.The diagrams show Raghavans plants. Raghavan predicted the weight of carbon dioxide and water taken in by the plant. He predicted the weight of oxygen given off by the plant. What should he predict for the weight of the sugar the plant made? A. 1.80 gramB. 3.46 gramC. 3.72 gramD. 5.64 gram I need help with this question. Can you please help me. Ill give you 18 points if its correct The first step for deriving the quadratic formula from the quadratic equation, 0 = ax2 + bx + c, is shown.Step 1: c = ax2 + bxWhich best explains or justifies Step 1?subtraction property of equalitycompleting the squarefactoring out the constantzero property of multiplication The measures of the exterior angles of a pentagon are x', 38, 45,5x", and 72. Solve for x. Neeeeed helpppppppppp If the domain of the coordinate transformation (, ) = ( + 2, 4) is (1, -4), (3, -2), (0, 1), what is the range?A. (-2, -5), (0, -7), (1, -4)B. (0, 3), (-2, 5), (-3, 2)C. (3, 0), (5, -2), (2, -3)D. (-5, -2), (-7, 0), (-4, 1) PANDAMILLE???Rewrite the sentence using an indirect object pronoun instead of the indirect object noun. Write the entire sentence to show that you know where the object pronoun is placed.You may copy and paste the accented characters from this list if needed: Je parle ma mre. (3 points) Which of the following statements is correct concerning the reaction 2 A + B 2 C + 2 D?1. The reaction is second-order overall2. The reaction is third order overall3. The rate is equal to k[A][B]4. The rate is equal to k[A][B]5. It cannot be determined given this information You expect to receive the annual property Net Operating Income (NOI) from a certain property as followsYear 1 $20,000 Year 2 $22,000 Year 3 $30,000 Year 4 $31,000 Year 5 $40,000 In addition, you expect that you can sell the property at the end of the 5th year for 10 times its expected NOI of that year.A. If your opportunity cost of capital (OCC) is 10%, 1) What is the Present Value of the Property Income over the 5 years? 2) What is the Present Value of the Net Sales Proceeds received in Year 5 3) What is the Total Present Value of the property given the 5 year holding period? 4) Ifyou offer to pay the amount you calculate in Ques A3) above to purchase the property, what would be your total return on the investment? 5) If you offer to pay the amount you calculate in Ques A3) to purchase the property, what do you forecast to be the appreciation in value on the property B. If you pay $350,000 for the property at Year 0, what is the net present value (NPV) of a deal? C. In the situation given in the previous question, what is the IRR? Given the function (Image below) [Algebra ll] I am a source of light, you can find me in the bush or in your garden or in the bush during the night, people say i am a worm, who am l ? 6. Lerato wants to purchase a housethat costs R 850 000. She is required topay a 12% deposit and she will borrowthe balance from a bank. Calculatethe amount that Lerato must borrowfrom the bank.