Convert 2910 to binary, hexadecimal and octal. Convert 5810 to binary, hexadecimal and octal. Convert E316 to binary, decimal and octal. Convert 5916 to binary, decimal and octal. Convert 010010102 to decimal, octal and hexadecimal. Convert 001010102 to decimal, octal and hexadecimal. Convert 438 to binary, decimal and hexadecimal. Convert 618 to binary, decimal and hexadecimal.

Answers

Answer 1

Answer:

2910 to binary = 101101011110

2910 to hexadecimal = B5E

2910 to octal = 5536

E316 to binary = 1110001100010110

E316 to octal = 161426

E316 to decimal = 58134

5916 to binary = 101100100010110

5916 to decimal = 22806

5916 to octal = 54426

010010102 to decimal = 149

010010102 to octal = 225

010010102 to hexadecimal = 95

FOR 438 and 618, 8 is not a valid digit for octal..


Related Questions

(Find the number of days in a month) Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, If the user entered month 2 and year 2012, the program should display that February 2012 has 29 days. If the user entered month 3 and year 2015, the program should display that March 2015 has 31 days.

Answers

it would be a table program. you can add a table and put your data into the table

Enter a formula in cell C9 using the PMT function to calculate the monthly payment on a loan using the assumptions listed in the Status Quo scenario. In the PMT formula, use C6 as the monthly interest rate (rate), C8 as the total number of payments (nper), and C4 as the loan amount (pv). Enter this formula in cell C9, and then copy the formula to the range D9:F9.

Answers

Answer:

=PMT(C6,C8,C4)

Put that in cell c9

Then use the lower right of the cell to drag it from D9:F9

In this exercise we have to use excel knowledge, so we have to:

=PMT(C6,C8,C4) in the cell C9 and extended to D9:F9

How is PMT calculated in Excel?

PMT, one of the financial functions, calculates the payment for a loan based on constant payments and a constant interest rate. Use the Excel Formula Coach to figure out a monthly loan payment.

For this we need to put the form as:

=PMT(C6,C8,C4)

See more about excel at brainly.com/question/12788694

The university computer lab’s director keeps track of lab usage, as measured by the number of students using the lab. This function is important for budgeting purposes. The computer lab director assigns you the task of developing a data warehouse to keep track of the lab usage statistics. The main requirements for this database are to:

Answers

Answer:

to keep count of how many users there are in total.

Explanation:

all i had to do was read the question twice to understand the answer is pretty

much in the question.

The director of the computer lab tasks with creating a data warehouse to manage lab utilization data. The major needs for this database are to keep count of how many users there are in total.

What is the budgeting process?

The tactical measures used by a corporation to create a financial plan are the budgeting processes. Budgeting for a future time entails more than simply allocating spending; it also entails figuring out how much income is required to achieve organizational objectives.

These procedures are used by accounting departments to regulate corporate activities, particularly expenditure. A person may use budgeting process to record how much money a business makes and spends over a specific time period.

Therefore, With the aid of budgeting, it may establish financial objectives for the team and the entire organization.

Learn more about the budgeting process, refer to:

https://brainly.com/question/21411418

#SPJ2

A laptop computer has two internal signals: An unplugged signal, which is '1' if the laptop's power supply is connected, and '0' otherwise. A low battery signal, which is '0' if the laptop's battery has reached an almost empty state, and '1' otherwise. Suppose the laptop's power control system accepts a single hibernate signal which determines if the laptop should change its current operating state and shut down. If the laptop should shut down when the battery is low and its charger is unplugged, which gate could be used to produce the hibernate signal?

Answers

Answer:

The correct usage is a NOR gate which is indicated in the explanation.

Explanation:

The truth table for the given two signals, namely

p=unplugged signal

q=low battery signal

can  form a truth table of following form

Here p has 2 states

1 if the power supply is connected

0 otherwise

Similarly q has 2 states

0 if the battery has reached almost zero state

1 otherwise

As the condition for the Hibernate Signal is given as to only activate when the battery is low and the power supply is not connected. This indicate that the value of Hibernate signal should be 1 when both p and q are 0.

Using this condition, the truth table is formed as

unplugged signal | low battery signal |  Hibernate Signal

            0               |                 0             |             1

            0               |                 1              |             0

            1                |                 0             |             0

            1                |                 1              |             0

Now the truth table of NOR is given as

a    |     b    |  a or b   |   ~(a or b)

0    |     0    |      0      |        1

0    |     1     |      1       |        0

1     |     0    |      1       |        0

1     |     1     |      1       |        0

This indicates that the both truth tables are same thus the NOR gate is to be used for this purpose.

What password did the boss gave to the man?

Answers

Answer:

1947

Explanation:

because i dont know

Answer:

where is the password?

Explanation:

Maya wrote a program and forgot to put the steps in the correct order. Which step does Maya need to review? Pattern following Planning Segmenting Sequencing

Answers

Answer:

Sequencing

Explanation:

Answer:

SEQUENCING

Explanation:

If a large organization wants software that will benefit the entire organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required.

Answers

Answer:

Hello your question lacks the required options which is : True or False

answer : TRUE

Explanation:

If a large organization wants to develop a software that will benefit the entire organization such software will be known as an enterprise application software and such application software must be developed in such a way that it meets the required purpose for which the organization is designed it for.

An enterprise application software is a computer software developed specially to satisfy the specific needs of an entire  organization inside of the individual needs of the people working in the organization.

Using MARS/MIPS
A) Write a program which increments from 0 to 15 and display results in Decimal on the console
B) Modify above program to increment from 0 to 15 and display results in Hexadecimal on the console

Answers

Answer:

Explanation:

MIPS program which increments from 0 to 15 and display results in Decimal on the console

In this program the user defined procedures print_int and print_eot were used to print the integer values and new line characters(\n) respectively.the mechanisam of the loop is explaine in the comment section of the program.

     addi $s0, $0, 0

     addi $s1, $0, 15

print_int:

              li $v0, 1                # system call to print integer

              syscall                

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s1<$s0

beq $s0, $0, end

end:

MIPS progam to increment from 0 to 15 and display results in Hexadecimal on the console

this program is slightly differed from the previous program in this program the system call issued in print_int is implemented with a system call that prints numbers in hex.

addi $s0, $0, 15

     addi $s1, $0, 0

print_int:

   li      $v0,34                  # syscall number for "print hex"

   syscall                         # issue the syscall

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s0>$s1

beq $s0, $0, end

end:

The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a victim large sums of money for assisting them in secretly moving large sums of money.

a. True
b. False

Answers

Answer:

b. False

Explanation:

The system of fraud is called 4-1-9 scam. And yes, victims are always promised large sum of money to secretly help in moving a large sum of money.

You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your university of business. The scanner identifies one computer named Prince Hal that has many serious vulnerabilities. You deduce to whom the machine belongs. Explain the ethical implication of:________.
a. telling the owner what you have found,
b. telling you local administrator or security officer what you have found
c. exploiting one of the relatively minor vulnerabilities to show the owner how serious the exposure is
d. exploiting a relatively minor vulnerability as a prank without telling the owner,
e. telling the owner what you have found and the demanding money for details on the vulnerabilities
f. using one of the vulnerabilities to acquire control of the machine, downloading and installing patches and changing settings to address all the vulnerabilities, and never telling anyone what you have done.

Answers

Answer and Explanation:

The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.

Anyone help pls ? Complete the code below to add css to make the background of the web page orange.
< html>

Answers

Answer:

In HTML file

<body style="background-color:orange;">

Or

In CSS file

body {

background-color: orange;

}

WRITTEN INTERVIEW QUESTIONS
Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to response to each prompt/question individually for clarity of the reviewer. Writing sample should be submitted in Microsoft Word format and include candidate’s name.
PhD IT
1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
2. What are your research interests in the area of information technology? How did you become interested in this area of research?
3. What is your current job/career and how will this program impact your career growth?
4. What unique qualities do you think you have that will help you in being successful in this program?
5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?

Answers

Explanation:

1. I grew up in a small community and my family owned a small business which involved manual labor. Although, having little income, my Dad sought to give us the best education he could afford from his little savings. With the small family savings I went to college where I studied Information Technology, after graduating I worked for a startup firm for two years before I decided to proceed with post graduate studies and I attained my Masters in UA. I met a friend who recommended I study in University of Cumberlands, I hesitated initially but was convinced after I researched the institution.

2. I'm particularly interested in the applications of information technology in labor intensive businesses and work because of my family background.

3. I have my own startup firm that designs work communication software for companies, however I intend to broaden my knowledge through this program into Information Technology based systems using machine learning algorithm.

4. I am committed to work and study, as some have called me a curious mind because of my passion towards learning.

5. I view obtaining a doctorate as not just a personal achievement but of lasting benefits to society as I use knowledge derived to improve the work experience of society.

I am confident that after my program I would be one the renowned contributors to the applications of information technology in labor intensive businesses.

Identify a logical operation (along
with a corresponding mask) that, when
applied to an input string of 8 bits,
produces an output string of all 0s if and
only if the input string is 10000001.​

Answers

Answer: Provided in the explanation section

Explanation:

The Question says;

Identify a logical operation (along

with a corresponding mask) that, when

applied to an input string of 8 bits,

produces an output string of all 0s if and

only if the input string is 10000001.​

The Answer (Explanation):

XOR, exclusive OR only gives 1 when both the bits are different.

So, if we want to have all 0s, and the for input only 10000001, then we have only one operation which satisfies this condition - XOR 10000001. AND

with 00000000 would also give 0,

but it would give 0 with all the inputs, not just 10000001.

Cheers i hope this helped !!

public class Student {
private String getFood() {
return "Pizza";
}
public String getInfo() {
return this.getFood();
}
}
public class GradStudent extends Student {
private String getFood() {
return "Taco";
}
public void teach(){
System.out.println("Education!");
getInfo();
}
}
What is the output from this:

Student s1 = new GradStudent();
s1.teach();
Education! would be printed, followed by a run-time error when getInfo is called.

Education! Pizza

This code won't run because it won't compile.

Education! Taco

This code causes a run-time error because getInfo is not declared in the GradStudent class.

Answers

Answer:

getInfo(); ==

getSy.Info()

Explanation:

Get System Info

Look at attachment.

Answers

Answer: Choice 1

Explanation:

The turtle will loop around 9 times since each time we are subtracting 10 until it hits 10 from 100. Only the first one seems to be like that.

Hope that helped,

-sirswagger21

Answer:

Explanation:

I switch.my acounntt it got hacked

Remember to save _____ and be certain that you have your files saved before closing out.

Answers

It could be ‘save as’ or ‘your work’, not completely sure

Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential __________ to the confidentiality of the data in the files

Answers

Answer:

maybe threat?

Explanation:

In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that are ____________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.

Answers

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

In 1987, Congress passed the Computer Security Act (CSA). This was the first law to address federal computer security. Under the CSA, every federal agency had to inventory its IT systems. Agencies also had to create security plans for those systems and review their plans every year.
A. True
B. False

Answers

Answer:

A.) True is the answer hope it helps

Consider the following concurrent tasks, in which each assignment statement executes atomically. Within a task, the statements occur in order. Initially, the shared variables x and y are set to 0.
Task 1 Task 2
x = 1 y = 1
a = y b = x
At the end of the concurrent tasks, the values ofa andb are examined. Which of the following must be true?
I. ( a == 0 ) ( b == 1 )
II. ( b == 0 ) ( a == 1 )
III. ( a == 1 ) ( b == 1 )
(A) I only
(B) II only
(C) III only
(D) I and II only
(E) I, II, and III

Answers

Answer:

(D) I and II only

Explanation:

Concurrent tasks is when there is more than one task to be performed but the order of the task is not determined. The tasks occur asynchronously which means multiple processors occur execute input instruction simultaneously. When x =1 and y = 1, the concurrent task will be performed and the a will be zero or either 1.  

The new Director of Information Technology has asked you to recommend a strategy to upgrade the servers on their network. Recommendations on server hardware, CPU chip set, speed, and caching are needed. You should also recommend which servers to upgrade first and determine whether any servers are still appropriate to keep.

Answers

Answer:

servers to be upgraded are : APPLICATION AND LOAD BALANCING SERVERS

servers still appropriate to use : DNS AND DHCP SERVERS

Explanation:

The recommendations to be made in line with what the new director of information is asking for includes :

1 ) For the servers to be upgraded : The servers that requires upgrades  includes the APPLICATION SERVER and LOAD BALANCING SERVER. this is because these two servers are critical to the growth/expansion of any business, and they handle large volume of data

Recommendations on the servers upgrade includes:

Hardware : 2.3 GHz Intel Xeon Gold 5118 12-Core

CPU chip set :  Socket: FCLGA3647, Type: NSBM

Speed : processor 3.2 GHz

caching:   > 100 Gb

2)  For servers that do not necessarily need to be upgraded : The servers that do not need immediate upgrade are DNS and DHCP

Compute -ABE16-DF416 using 15’s complement

Answers

Answer:

33600

Explanation:

Let M = ABE16

and N = DF416

In hexadecimal representation: 10 = A, 11 = B, 12 = C, 13 = D, 14 = E, 15 = F

Step 1: Find the 15's complement of N

 F  F  F  F  F

- D  F  4  1  6

2  0  B  E  9

Step 2: Add 15's complement of N to M

  A  B  E  1  6

+ 2  0  B  E  9  

  C  C  9  F  F

Step 3: Find the 15's complement of CC9FF

 F  F   F  F  F

- C  C  9  F  F

 3   3  6  0  0

Therefore, ABE16 - DF416 using 15's complement is 33600

Write an INSERT statement that adds these rows to the Invoice_Line_Items table:
invoice_sequence: 1 2
account_number: 160 527
line_item_amount: $180.23 $254.35
line_item_description: Hard drive Exchange Server update
Set the invoice_id column of these two rows to the invoice ID that was generated
by MySQL for the invoice you added in exercise 4.

Answers

Answer:

Insertion query for first row :

INSERT into Invoice_Line_Items (invoice_sequence, account_number, line_item_amount, line_item_description) Values (1, 160, '$180.23', "Hard drive Exchange");

Insertion query for second row :

INSERT into Invoice_Line_Items (invoice_sequence, account_number, line_item_amount, line_item_description) Values (2, 527, '$254.35', "Server update");

Explanation:

* In SQL for insertion query, we use INSERT keyword which comes under DML (Data manipulation Language).

* Statement is given below -

INSERT into Table_name  (column1, column2, ....column N) Values (value1, value2, .....value N);

* With the use of INSERT query we can insert value in multiple rows at a same time in a table which reduces our work load.

Write a class called Triangle that can be used to represent a triangle. It should include the following methods that return boolean values indicating if the particular property holds: a. isRight (a right triangle) b. isScalene (no two sides are the same length) c. isIsosceles (exactly two sides are the same length) d. isEquilateral (all three sides are the same length).

Answers

Answer:

Explanation:

import java.io.*;

class Triangle

{

  private double side1, side2, side3; // the length of the sides of

                                       // the triangle.

  //---------------------------------------------------------------

  // constructor

  //

  // input : the length of the three sides of the triangle.

  //---------------------------------------------------------------

  public Triangle(double side1, double side2, double side3)

  {

      this.side1 = side1;

      this.side2 = side2;

      this.side3 = side3;

  }

  //---------------------------------------------------------------

  // isRight

  //

  // returns : true if and only if this triangle is a right triangle.

  //---------------------------------------------------------------

  boolean isRight()

  {

      double square1 = side1*side1;

      double square2 = side2*side2;

      double square3 = side3*side3;

      if ((square1 == square2 + square3) ||

          (square2 == square1 + square3) ||

          (square3 == square1 + square2))

          return true;

      else

          return false;

  }

  // isValid

  // returns : true if and only if this triangle is a valid triangle.

  boolean isValid()

  {

      if ((side1 + side2 < side3) ||

          (side1 + side3 < side2) ||

          (side2 + side3 < side1))

          return false;

      else

          return true;

  }

  // isEquilateral

  //

  // returns : true if and only if all three sides of this triangle

  // are of the same length.

  boolean isEquilateral()

  {

      if (side1 == side2 && side2 == side3)

          return true;

      else

          return false;

  }

  // isIsosceles

  //

  // returns : true if and only if exactly two sides of this triangle

  // has the same length.

  boolean isIsosceles()

  {

      if ((side1 == side2 && side2 != side3) ||

          (side1 == side3 && side2 != side3) ||

          (side2 == side3 && side1 != side3))

          return true;

      else

          return false;

  }

  // isIsosceles

  // returns : true if and only if exactly no two sides of this

  // triangle has the same length.

  boolean isScalene()

  {

      if (side1 == side2 || side2 == side3 || side1 == side3)

          return false;

      else

          return true;

  }

}

//-------------------------------------------------------------------

// class Application

//

// This class is the main class of this application. It prompts

// the user for input to construct a triangle, then prints out

// the special properties of the triangle.

//-------------------------------------------------------------------

public class Application

{

  //---------------------------------------------------------------

  // getInput

  //

  // input : stdin - BufferedReader to read input from

  //         msg - message to prompt the user with

  // returns : a double value input by user, guranteed to be

  //           greater than zero.

  //---------------------------------------------------------------

  private static double getInput(BufferedReader stdin, String msg)

      throws IOException

  {

      System.out.print(msg);

      double input = Double.valueOf(stdin.readLine()).doubleValue();

      while (input <= 0) {

          System.out.println("ERROR : length of the side of triangle must " +

              "be a positive number.");

          System.out.print(msg);

          input = Double.valueOf(stdin.readLine()).doubleValue();

      }

      return input;

  }

  //---------------------------------------------------------------

  // printProperties

  //

  // input : triangle - a Triangle object

  // print out the properties of this triangle.

  //---------------------------------------------------------------

  private static void printProperties(Triangle triangle)

  {

      // We first check if this is a valid triangle. If not

      // we simply returns.

      if (!triangle.isValid()) {

          System.out.println("This is not a valid triangle.");

          return;

      }

      // Check for right/equilateral/isosceles/scalene triangles

      // Note that a triangle can be both right triangle and isosceles

      // or both right triangle and scalene.

     

      if (triangle.isRight())

          System.out.println("This is a right triangle.");

      if (triangle.isEquilateral())

          System.out.println("This is an equilateral triangle.");

      else if (triangle.isIsosceles())

          System.out.println("This is an isosceles triangle.");

      else

          // we do not need to call isScalene here because a triangle

          // is either equilateral/isosceles or scalene.

          System.out.println("This is an scalene triangle.");

  }

  // main

  // Get the length of the sides of a triangle from user, then

  // print out the properties of the triangle.

  public static void main(String args[]) throws IOException

  {

      BufferedReader stdin = new BufferedReader

          (new InputStreamReader(System.in));

      double side1 = getInput(stdin,

          "What is the length of the first side of your triangle? ");

      double side2 = getInput(stdin,

          "What is the length of the second side of your triangle? ");

      double side3 = getInput(stdin,

          "What is the length of the third side of your triangle? ");

      System.out.print("Pondering...\n");

      printProperties(new Triangle(side1, side2, side3));

  }

}

Consider a load-balancing algorithm that ensures that each queue has approximately the same number of threads, independent of priority. How effectively would a priority-based scheduling algorithm handle this situation if one run queue had all high-priority threads and a second queue had all low-priority threads

Answers

Answer and Explanation:

Consider giving greater priority to both the queue contains the national priority comment section as well as, therefore, first method the thread throughout this queue.If the item from either the major priority queue becomes decoupled, if the balancing between some of the number of comments in some of these two queues becomes disrupted, instead decouple one thread from either the queue comprising the low-value thread as well as position that one in the queue with the highest - priority loop to match the number of connections in such 2 queues.Whenever a new thread arrives with some kind of proper description, a friendly interface could've been introduced to just the queue contains fewer threads to achieve stability.

Therefore, the load-balancing requirements for keeping about the same number of threads would be retained and the meaningful matter of top priority thread would also be retained.

Based on the information given, it is important to give higher priority to the queue that contains the high priority thread.

Also, once an element from the high priority queue is dequeued, then dequeue one thread from the queue containing low priority thread and this will be enqueued into the queue having high priority thread in order to balance the number of threads.

Since the priority queue automatically adjusts the thread, hence the removal of the thread from one priority queue to another is not a problem.

Learn more about threads on:

https://brainly.com/question/8798580

Seth would like to make sure as many interested customers as possible are seeing his business’s website displayed in their search results. What are a few things he could pay attention to in order to achieve this?

Answers

Answer:

Hi! Make sure that the website has a few things. Proper Keywords, the pages have the proper tags, a form on the website, contact information, CIty State, Etc., Then a phone number. Social media icons that link properly to the social media pages.

Explanation:

What are the best data structures to create the following items? And why?
1. Designing a Card Game with 52 cards.
2. Online shopping cart (Amazon, eBay, Walmart, Cosco, Safeway, ...)
3. Online waiting list (De Anza College class waiting list, ...)
4. Online Tickets (Flight tickets, concert tickets, ...)

Answers

Answer:

The best structures to create the following items are

ARRAYHASHMAPS  QUEUE SORTED LINK LISTS

Explanation:

The best structures to create the following items are:

Array : for the storage of cards in a card game the best data structure to be used should be the Array data structure. this is because  the size of the data ( 52 cards ) is known and using Array will help with the storing of the cards values in the Game.Hashmaps : Hashmap data structure should be implemented in online shopping cart this IS BECAUSE  items can be easily added or removed from the cart therefore there is a need to map the Items ID or name to its actual database online waiting list are usually organised/arranged in a first-in-first-out order and this organization is best created using the queue data structure Sorted link lists is the best data structure used to create, store and manage online tickets. the sorted link data structure helps to manage insertions and deletions of tickets in large numbers  and it also reduces the stress involved in searching through a large number of tickets by keeping the tickets in sorted lists

In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and notification of appropriate individuals?
a. Full-interruption
b. Desk check
c. Simulation
d. Structured walk-through

Answers

Answer:Full-interruption--A

Explanation:  The Full-interruption is one of the major steps for  a Disaster Recovery Plan, DRP which ensures businesses are not disrupted by saving valuable resources during a disaster like a data breach from fire or flood.

Although expensive and very risky especially in its simulation of a disruption, this thorough  plan ensures that when a disaster occurs, the  operations are shut down at the primary site and are transferred to the recovery site allowing Individuals follow every procedure, ranging from the interruption of service to the restoration of data from backups, also with the notification of appropriate individuals.

Write a program that takes in an integer in the range 10 to 100 as input. Your program should countdown from that number to 0, printing
the count each of each iteration After ten numbers have been printed to the screen, you should start a newline. The program should stop
looping at 0 and not output that value
I would suggest using a counter to cổunt how many items have been printed out and then after 10 items, print a new line character and
then reset the counter.
important: Your output should use %3d" for exact spacing and a space before and after each number that is output with newlines in order
to test correctly. In C please

Answers

Answer:

The program written in C language is as follows

#include<stdio.h>

int main()

{

//Declare digit

int digit;

//Prompt user for input

printf("Enter any integer: [10 - 100]: ");

scanf("%d", &digit);

//Check if digit is within range 10 to 100

while(digit<10 || digit >100)

{

printf("Enter any integer: [10 - 100]: ");

scanf("%d", &digit);

}

//Initialize counter to 0

int counter = 0;

for(int i=digit;i>0;i--)

{

 printf("%3d", i); //Print individual digit

 counter++;

 if(counter == 10) //Check if printed digit is up to 10

 {

  printf("\n"); //If yes, print a new line

  counter=0; //And reset counter to 0

 }

}

}

Explanation:

int digit; ->This line declares digit as type int

printf("Enter any integer: [10 - 100]: "); -> This line prompts user for input

scanf("%d", &digit);-> The input us saved in digit

while(digit<10 || digit >100) {

printf("Enter any integer: [10 - 100]: ");

scanf("%d", &digit); }

->The above lines checks if input number is between 10 and 100

int counter = 0; -> Declare and set a counter variable to 0

for(int i=digit;i>0;i--){ -> Iterate from user input to 0

printf("%3d", i); -> This line prints individual digits with 3 line spacing

counter++; -> This line increments counter by 1

if(counter == 10){-> This line checks if printed digit is up to 10

printf("\n"); -> If yes, a new line is printed

counter=0;} -> Reset counter to 0

} - > End of iteration

write the following function so that it returns the same result, but does

not increment the variable ptr. Your new program must not use anysquare brackets, but must use an integer variable to visit each double in the array. You may eliminate any unneeded variable.

double computeAverage(const double* scores, int nScores)

{
const double* ptr = scores;
double tot = 0;
while (ptr != scores + nScores)

{
tot += *ptr; } ptr++;

}
return tot/nScores;

b. Rewrite the following function so that it does not use any square brackets (not even in the parameter declarations) but does use the integervariable k. Do not use any of the functions such as strlen, strcpy, etc.

// This function searches through str for the character chr.
// If the chr is found, it returns a pointer into str where
// the character was first found, otherwise nullptr (not found).

const char* findTheChar(const char str[], char chr)

{
for(intk=0;str[k]!=0;k++)
if (str[k] == chr)

}

return &str[k];
return nullptr;
}

c. Now rewrite the function shown in part b so that it uses neither square brackets nor any integer variables. Your new function must not use any local variables other than the parameters.

Answers

Answer:

Explanation:

a.  

// Rewriting the given function without using any square brackets

double computeAverage(const double* scores, int nScores)

{

const double* ptr = scores;

double tot = 0;

int i;//declaring integer variable

for(i=0;i<nScores;i++)

{

//using an integer variable i to visit each double in the array

tot += *(ptr+i);

}

return tot/nScores;

}

b.

// Rewriting the given function without using any square brackets

const char* findTheChar(const char* str, char chr)

{

for(int k=0;(*(str+k))!='\0';k++)

{

if ((*(str+k)) == chr)

return (str+k);

}

return nullptr;

}

c.

//Now rewriting the function shown in part b so that it uses neither square brackets nor any integer variables

const char* findTheChar(const char* str, char chr)

{

while((*str)!='\0')

{

if ((*str) == chr)

return (str);

str++;

}

return nullptr;

}

Other Questions
Which is required for sexual reproduction? Dave Krug contributed $1,400 cash along with inventory and land to a new partnership. The inventory had a book value of $1,200 and a market value of $2,800. The land had a book value of $1,800 and a market value of $5,800. The partnership also accepted a $3,400 note payable owed by Krug to a creditor. Prepare the partnership's journal entry to record Krug's investment View transaction list View journal entry worksheet No Transaction General Journal Debit Credit Cash WILL GIVE BRAINLIEST AND 10 POINTS!! An asteroid is hustling through the solar system, in the vicinity of the inner planets. Based on what you know about gravitational attraction, which planet is LEAST likely to attract the asteroid? Which steps can be used to solve for the value of y?(2013(y +57) = 178 _____ de la neige Il y a Il y ont Y a-t-ilY a-il Pls hurry how can I get on america's got talent? A garden measuring 12 meters by 6 meters is going to have a walkway constructed all around the perimeter, increasing the total area to 160 square meters. What will be the width of the pathway? (The pathway will be the same width around the entire garden). Which arcs are congruent? Check all that apply. Arc B C Arc M P Arc B C Arc M O Arc C F Arc K P Arc E G Arc K L Arc L O Arc M P Find a linear second-order differential equation F(x, y, y', y'') = 0 for which y = c1x + c2x4 is a two-parameter family of solutions. Make sure that your equation is free of the arbitrary parameters c1 and c2. (Use yp for y' and ypp for y''.) Help needed ASAP will give brainliest Read the passage.Novels, poetry, and drama are all genres, or types, of literature. These genres can reveal important insights abouthuman nature, as well as protest injustices in the world or make social criticisms. The authors of literary pieces usecharacters, setting, and plot to analyze themes such as love, maturity, and death.The author's use of vocabulary in this passage helps to ()literature.FILL IN THE BLANK:)A. persuade the reader to write B. inform the reader about C. criticize the elements ofD. express feelings or attitude about I WILL GIVE YOU BRAINLIEST!!!!! This sentence is both clear and concise: While it doesn't work for building snow creations, it is commonly the snow that ski resorts use as a top layer of snow, even if it is manufactured, because it is less likely than wet snow to turn to ice and is very light. Select one: True False It take 160 ribbons to make 4 football mums.What is the constant of proportionality that relates the number of football mums made ,y, to the number of ribbons used,x? A.40 B.1/10 C.80 D.1/4 What sit he shape of the cross section formed whens. Cone intersects a plane as shown in the drawing?Give me a reason why tok What is meant by trade dilution a binary ionic compound is made of two components name one of them A procedure in which reinforcement of a previously reinforced behavior is discontinued and as a result, occurrences of that behavior decrease in the future is: a. Punishment. b. Extinction. c. Reinforcement. d. Establishing Operation. The defect length of a corrosion defect in a pressurized steel pipe is normally distributed with mean value 28 mm and standard deviation 7.6 mm.(a)What is the probability that defect length is at most 20 mm Graham Petroleum produces oil. On May 1, it had no work-in-process inventory. It started production of 244 million barrels of oil in May and shipped 216 million barrels in the pipeline. The costs of the resources used by Graham in May consist of the following: Materials $6,000 Million Conversion Cost (Labor and overhead) $7,968 Million Required: The production supervisor estimates that the ending work-in-process is 60 percent complete on May 31. Compute the cost of oil shipped in the pipeline and the amount in work-in-process ending inventory as of May 31. (Do not round intermediate calculations. Enter your answers in millions. For example, enter "1" instead of "1,000,000".)