Division by zero when the program is executing is an example of a _____________ error.

Answers

Answer 1

Division by zero when the program is executing is an example of a runtime error.

Since dividing by zero is not a specified operation, the program cannot be performed at runtime since it lacks the necessary valid code, which results in a run-time error. Runtime errors are errors that happen while a program is being executed.

There are various forms of runtime errors, such as logic errors that result in inaccurate output. Runtime errors also include memory leaks.

These mistakes—also referred to as "bugs"—can be corrected with quick updates or minor patches created just for the purpose.

Know more about runtime error here:

https://brainly.com/question/13106116

#SPJ4


Related Questions

iven this series of address references given as word addresses: 5, 6, 14, 19, 24, 16, 67, 51, 22, 14, 6, 25, 7, 30, 9, and 14. assume a direct map cache with 16 one-word blocks that is initially empty, a. label each reference in the list as hit or miss? b. show the final contents of the cache? c. show the hits and misses and final cache contents for a fully associative cache with four-word blocks and a total size of 16 words using the series of references given. assume lru replacement.

Answers

Answer: Please add more context.

A logical design that controls the order in which a set of statements execute is called a __________. a. control structure b. sequence structure c. logical structure d. relational structur

Answers

A logical design that controls the order in which a set of statements execute is called a B: sequence structure.

In the context of programming, sequence structure is the default control structure in which the instructions are executed one after another. For instance, in order to carry out a basic arithmetic sum operation between two numbers using a program, the basic execution of actions will be as follows:

input two numbers from the useradd both numbersassign the sum to a third variabledisplays result i.e. sum

You can learn more about sequence structure at

https://brainly.com/question/14308686

#SPJ4

linux bash has feature to complete a partially typed command. please choose, what is not a requirement of completion feature

Answers

The only mode in which command-line completion typically operates is interactive. In other words, even when the completion is clear-cut, it cannot be used partially written commands in batch files or scripts.

What does a computer command mean?

A command in computing is a request for a program to carry out a certain task. It could be sent using a function interface, such a shell, as data to a network as part of either a network protocol, as an item in a desktop application brought on by the user choosing an item from a menu, or as a command sent to a computer over a network.

What key is known as command?

On a typical Apple keyboard, the Command key seems to be a modifier key that can be found either flank of the space bar. By hitting it in conjunction with one or several other keys, it is used to carry out tasks. There are a number of other aliases for the Command key, along with the Apple key, helix key, public key, clover button, and meta key.

To know more about commands visit:

https://brainly.com/question/28938722

#SPJ4

Which of the following is not an Agile process work item?
O Bugs
O Tasks
O Features
O Issues

Answers

a is the correct answer

The ________ function does the same thing as using the mathematical ^ operator.

Select one:

a. abs

b. pow

c. round

d. cos

e. sqrt

Answers

The  sqrt  function does the same thing as using the mathematical ^ operator.

The power of a number is determined utilizing the pow() function. The power raised to the base number is returned by the pow() function, which takes two boundaries (the base worth and the power esteem). This is indicated by "^". This function in computer programming assists with deciding the worth of a whole number raised to a specific power. This is composed as,

pow = power = ^ (Power operator)

In mathematics, it likewise assists with computing the number raised to power. For example, 3^2 = 3²=9. The clear can be loaded up with the pow() function.

to know more about computer programming click here:

https://brainly.com/question/23275071

#SPJ4

The rmdir command automatically removes a directory and all of its subdirectories and files. True False

Answers

The given statement is false.

You can remove all files in a directory using unlink command. Another option is to use the rm command to delete all files in a directory.

The SunOS command line is utilized to control files and registries. You type in the file and registry names related to SunOS commands to complete explicit tasks. This is not the same as utilizing the OpenWindows File Manager, where files are shown as symbols that can be tapped on and moved, and commands are chosen from menus.

This part acquaints you with the ideas and strategies used to work with files and indexes from the SunOS command line. These tasks apply to any SunOS command line, whether you are utilizing a Shell or Command Tool in the OpenWindows climate or are signed in from a far off terminal. To completely utilize the SunOS working framework it is fundamental for you to comprehend the ideas introduced in this section.

to know more about command click here:

https://brainly.com/question/25808182

#SPJ4

write python code to create a function called reward highest that will take in a dictionary as an argument, identify the student who received the highest score, update that student's grade to 100, and then return the updated dictionary.

Answers

Below is an example of how you could write a function to achieve this by using the python programming.

Coding Part:

def reward_highest(student_grades):

 # Find the student with the highest grade

 highest_grade = 0

 highest_student = ""

 for student, grade in student_grades.items():

   if grade > highest_grade:

     highest_grade = grade

     highest_student = student

 # Update that student's grade to 100

 student_grades[highest_student] = 100

 # Return the updated dictionary

 return student_grades

You can call this function by passing it a dictionary of student names and grades, like this:

student_grades = {

 "Alice": 87,

 "Bob": 72,

 "Charlie": 92

}

updated_grades = reward_highest(student_grades)

print(updated_grades)  # { "Alice": 87, "Bob": 72, "Charlie": 100 }

To know more about function in python programming, visit: https://brainly.com/question/25755578

#SPJ4

which concept defines the most basic infrastructure mode network: a bss of one wap and one or more wireless clients?

Answers

Basic Service Set Identifier (BSSID): Identifies the most basic infrastructure mode network, a BSS with one or more wireless clients.

Which of the following infrastructure service sets employs a single AP to build the wireless LAN? Basic Service Set Identifier (BSSID): Identifies the most basic infrastructure mode network, a BSS with one or more wireless clients.Infrastructure mode is a wireless network framework in which the network's heart is a central WLAN access point / router.Wireless devices in infrastructure mode connect with one another via a WLAN access point/router.All wireless network devices connect with one another via an access point in infrastructure mode (wireless router).A computer with a wireless network adapter communicates directly with a printer equipped with a wireless print server when in ad hoc mode.BSS consists of a single AP that is connected to all stations, or wireless devices, in the network.In this context, an AP is a common access point that serves as a medium and generates WLAN (Wireless Local Area Network).SSID Matching (Service Set Identifier).

To learn more about infrastructure mode network refer

https://brainly.com/question/15021917

#SPJ4

you are working as a cybersecurity expert in an enterprise. while examining the newly established enterprise network, you found that when a request to write data to the drive is made, the controller sends that request to each drive. when a read action is required, the data is read twice, once from each drive. which type of raid is used in the newly established network?

Answers

Based on the information provided, it appears that the enterprise network uses a RAID 1 configuration.

What is RAID 1?

RAID 1 is a type of RAID (Redundant Array of Independent Disks) configuration in which data is mirrored across two or more drives, so that the same data is written to each drive.

This provides redundancy and improved data availability, since the data can still be accessed even if one of the drives fails.

In a RAID 1 configuration, when a request to write data to the drive is made, the controller sends the request to each drive, and the data is written to both drives simultaneously.

When a read action is required, the data is read from both drives and compared to ensure that the data is consistent and accurate.

The description of the enterprise network's behavior matches the characteristics of a RAID 1 configuration, so it is likely that this is the type of RAID used in the newly established network.

To Know More About Data redundancy, Check Out

https://brainly.com/question/13438926

#SPJ4

Implement a simplified version of a crypto broker platform. Initially, there is an array of users, with each user depositing only cash - deposits[i] is the amount of cash the (i + 1)th user has deposited.
Assume that for now the platform contains just a single stock and all operations are done with this stock only. All operations are supposed to be in the same currency, and currency exchange is not supported for now.

The platform should support the following 3 types of operations:

"deposit " - deposits money to the specified user account.
"buy " - the specified user buys the specified amount of crypto at the specified price. The platform should make sure the user has enough money in their account to process the operation.
"sell " - the specified user sells the specified amount of crypto at specified price. The platform should make sure the user has enough cryptos in their account to process the operation.
Your task is to return an integer array representing the total amount of money in the specified user's account after each operation.

Example

For deposits = [9, 7, 12] and

operations = [
"buy 1 3 2",
"sell 1 4 10",
"deposit 2 12",
"buy 2 10 2",
"buy 2 6 3"
]

the output should be cryptoTrading(deposits, operations) = [3, 3, 19, 19, 1].

Let's consider all operations:

The user with user_id = 1 wants to buy 3 shares of the stock at price = 2 - the required amount of money is needed_money = 3 * 2 = 6. The user has 9 ≥ 6 units of money in their account, so this operation will be processed successfully. After this operation, the user has 3 units of money remaining.
The user with user_id = 1 wants to sell 4 shares of the stock at price = 10 - this operation will not be processed successfully because the user does not have 4 shares of the stock. Since the operation is not processed successfully, the user still has 3 units of money remaining.
The user with user_id = 2 deposits 12 units of money into their account. After this operation, the user has 19 units of money.
The user with user_id = 2 wants to buy 10 shares the stock at price = 2 - the required amount of money is needed_money = 10 * 2 = 20. The user has 19 < 20 units of money in their account, so this operation will not be processed successfully. The user still has 19 units of money remaining.
The user with user_id = 2 wants to buy 6 shares of the stock at price = 3 - the required amount of money is needed_money = 6 * 3 = 18. The user has 19 ≥ 18units of money, so this operation will be processed successfully. After this operation, the user has 1 unit of money remaining.
So, the output is [3, 3, 19, 19, 1].

Input/Output

[execution time limit] 0.5 seconds (cpp)

[input] array.integer deposits

An array of integers representing the amount of money (in cash) that users deposit to their accounts.

Guaranteed constraints:
1 ≤ deposits.length ≤ 104,
1 ≤ deposits[i] ≤ 105.

[input] array.string operations

An array of strings representing the operations described above. Specifically, it's guaranteed that:

In buy and sell operations - amount and price are integers.
In all operations - user_id will be integers between 1 to deposits.length.
After each operation, the total amount of money in each user's account will be an integer.
[output] array.integer

An array of integers where the ith element of the array represents the total amount of money in the specified user's account after the ith operation.

CAN YOU USE python to solve this def cryptoTrading(deposits, operations) :

Answers

To implement a simplified version of a crypto broker platform. Use #include<bits/stdc++.h>

using namespace std;

//This is cryptoTrading function

vector<int> cryptoTrading(vector<int> deposits, vector<string> operations) {

   //res vector will store the final result

   vector<int>res;

   //This unordered map value will store the current deposit of each person

   unordered_map<int,int>value;

   //This unordered map value will store the current number of stock of each person

   unordered_map<int,int>stock;

   //First traverse the deposits vector

   for(int i=0;i<deposits.size();i++){

       //Here,person number which is (i+1) is key, and it's corresponding deposit is value

       value[(i+1)]=deposits[i];

   }

   //Now start traversing the operations vector

   for(int i=0;i<operations.size();i++){

       //task string will store the operation to perform, initially it is an empty string

       string task="";

       //index variable will keep track the spaces in sentence

       int index=-1;

       //Now start traverse the current operation sentence

       for(int j=0;j<operations[i].length();j++){

           //It will stop when a space is found

           if(operations[i][j]==' '){

               //And store the next index of that space in index variable

               index=j+1;

               break;

           }

           //Otherwise concatenate the character with task

           task=task+operations[i][j];

       }

       //If task is "buy" then

       if(task=="buy"){

           //person variable will store the person number

           int person=0;

           //Again traverse the operation sentence, from index

           for(int j=index;j<operations[i].length();j++){

               //It will stop when a space is found

               if(operations[i][j]==' '){

                     //store the next index of that space in index variable

                   index=j+1;

                   break;

               }

               //Otherwise add numbers with person variable

               person=(person*10)+(operations[i][j]-'0');

           }

           //num will store the number of stock to buy

               }

                //Otherwise add numbers with num variable

               num=(num*10)+(operations[i][j]-'0');

           }

            //val will store the value of that stock

           int val=0;

           //Repeat the same operations

           for(int j=index;j<operations[i].length();j++){

               if(operations[i][j]==' '){

                   break;

               }

               //add numbers with val

               val=(val*10)+(operations[i][j]-'0');

           }

           //if that person's current deposit is less than (num*val) then

           if(value[person]<(num*val)){

               //push that person's current deposit in res vector

               res.push_back(value[person]);

           }

           //Otherwise

           else if(value[person]>=(num*val)){

               //subtract (num*val) from that person's current deposit

               value[person]=value[person]-(num*val);

               //And add num with person's current stock

                stock[person]=stock[person]+num;

                //push that person's current deposit in res vector

               res.push_back(value[person]);

           }

       }

        //If task is "sell" then

       else if(task=="sell"){

           //Repeat the same process to find person's number

           int person=0;

           for(int j=index;j<operations[i].length();j++){

               if(operations[i][j]==' '){

                   index=j+1;

                   break;

               }

               person=(person*10)+(operations[i][j]-'0');

           }

           //Repeat the same process to find number of stocks

           int num=0;

           for(int j=index;j<operations[i].length();j++){

               if(operations[i][j]==' '){

                   index=j+1;

                   break;

               }

               num=(num*10)+(operations[i][j]-'0');

           }

           //Repeat the same process to find value of stock

           int val=0;

           for(int j=index;j<operations[i].length();j++){

               if(operations[i][j]==' '){

                   break;

               }

               val=(val*10)+(operations[i][j]-'0');

           }

            //if that person's current stock is less than num then

           if(stock[person]<num){

               //push that person's current deposit in res vector

               res.push_back(value[person]);

           }

           //Otherwise

           else if(stock[person]>=num){

              //subtract num from that person's current stock

               stock[person]=stock[person]-num;

               //And add (num*val) with person's current deposit

               value[person]=value[person]+(num*val);

               //push that person's current deposit in res vector

               res.push_back(value[person]);

           }

       }

       //If task is "deposit" then

       else if(task=="deposit"){

           //Repeat the same process to find person's number

           int person=0;

           for(int j=index;j<operations[i].length();j++){

               if(operations[i][j]==' '){

                   index=j+1;

                   break;

               }

               person=(person*10)+(operations[i][j]-'0');

           }

           //Repeat the same process to find value to deposit

           int val=0;

           for(int j=index;j<operations[i].length();j++){

               if(operations[i][j]==' '){

                   break;

   }

   //At the end return res vector

   return res;

}

//This is main function

int main()

{

//Do a sample run of above method

vector<int>deposits{9,7,12};

vector<string>operations{"buy 1 3 2","sell 1 4 10","deposit 2 12","buy 2 10 2","buy 2 6 3"};

vector<int>res=cryptoTrading(deposits,operations);

//Display the result

cout<<"Result: ";

for(int i=0;i<res.size();i++){

   cout<<res[i]<<" ";

}

return 0;

}

To learn more about crypto

https://brainly.com/question/15084188

#SPJ4

what option, when passed to the shutdown command, will restart the local computer?

Answers

The option, when passed to the shutdown command, will restart the local computer is /r. The correct option is d.

What is a shutdown command?

Your system is completely turned off when you shut it down until you turn it back on. Restart, on the other hand, only briefly shuts down the computer. Therefore, a shutdown is preferred if you are concerned about your battery life.

This maximizes power efficiency and increases battery life. To open the run box, press Windows + R on your keyboard. Step 2: At this point, all you need to do is type "shutdown /s /f /t 0" in the Run box and press the OK or Enter keys. Your computer is about to shut down.

Therefore, the correct option is d. /r.

To learn more about shutdown command, refer to the below link:

https://brainly.com/question/6389199

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. -h

b. /s

c. /h

d. /r

you want to create a rollover cable that has an rj45 connector on both ends. how should you connect the wires within the connectors?

Answers

Connect pins 1 and 8 together, pins 2 and 7, pins 3 and 6, and pins 4 and 5.On one end of a crossover cable, the T568A standard is used, and on the other, the T568B standard.

What kind of connector is commonly used for a rollover cable's ends? Connect pins 1 and 8 together, pins 2 and 7, pins 3 and 6, and pins 4 and 5.On one end of a crossover cable, the T568A standard is used, and on the other, the T568B standard.RJ45 Connectors are crimped into CAT5/CAT6 Cable Using a Crimping Tool for IP Camera Installations.Uses pass through and standard connectors.Utilizes the well-liked RJ45 Pass-Through Connectors.Removes the excess wires from the connection. A rollover cable, often referred to as a Yost cable, Cisco cable, or a Console cable, is a form of null-modem connection that connects a computer terminal to a router's console port.To further identify it from other kinds of network cabling, this cable is often flat and light blue in color.

To learn more about rollover cable refer

https://brainly.com/question/13438932

#SPJ4

a directory is also an object to which access should be controlled. why is it not appropriate to allow users to modify their own directories?

Answers

A second object to which access should be restricted is a directory. Why should users not be able to change their own directories. The best approach is to limit who can access a folder.

Directory Permissions Explained?

Protecting sensitive information is ensured by setting folder permissions. An object's ability to access or edit other objects and files in the directory is governed by a set of rules known as AD permissions. Additionally, you can look for Windows Security in the start menu. Choose the tile labeled Virus & threat protection.

Since the administrator does not have complete control over object access, it is possible that permissions could be configured erroneously, which could result in a data breach. By default, all users have access to create and modify objects in the workspace, such as notebooks, experiments, and models.

To learn more about own directories from given link

brainly.com/question/25480553

#SPJ4

Select the code below that associates a favorites icon named favicon.ico with a web page document.

Answers

The HTML code with favorite icon favicon.ico is <link rel="icon" type="image/x-icon" href="favicon.ico">

HTML is the most commonly used markup language for Web pages. You may make your own website using HTML. HTML is a simple language to grasp. The HTML code> element specifies a piece of computer code. The material is shown in the browser's default monospace typeface.

The coding used to build a web page and its content is known as HTML (HyperText Markup Language). For instance, material may be organized into paragraphs, a list of bulleted points, or graphics and data tables.

Anyone with a passing or professional interest in web development should learn HTML. Even individuals who do not want to earn a livelihood by designing websites will find the language useful!

Learn more about HTML Code Here https://brainly.com/question/13563358

#SPJ4

what does low-level coding mean? question 2 options: a) the code being used is the code for the lowest level in the bom structure. b) a final item has only a few levels in the bom structure. c) assigns lowest level on bill of materials to all common components to avoid duplicate mrp computations d) the lowest-paid staff member in the production department performs the coding. e) the top level of the bom is below level zero and that boms are not organized around the finished product.

Answers

The correct option a) the code being used is the code for the lowest level in the BOM structure, describes the  low-level coding.

Explain the term  low-level coding?

A high-level programming language refers to one that manipulates conceptual functions in a systematic way and provides a relatively high level of abstraction.

An assembly-like programming language known as a low-level programming language has commands that are more similar to processor instructions.When a program which depends on preset hardware needs to be written, low-level programming is required. Low-level programming is employed to directly alter hardware, grant access to specialized processor instructions, or solve pressing optimization issues.

Thus, Low-level coding mean, the code being used is the code for the lowest level in the bom structure.

To know more about the low-level coding, here

https://brainly.com/question/29433728

#SPJ4

why can local measurements of relative sea level trends differ from location to location? actual sea level is not consistent across the globe natural and manmade phenomena raise/lower landforms relative to sea level trick question, local measurements of relative sea level trends are all always the same across the globe human error always accounts for differences in local measurements relative sea level trends

Answers

Local measurements of relative sea level trends differ from location to location because A: 'actual sea level is not consistent across the globe'.

Sea level rise at certain locations may be more or less than the global average due to many local factors, such as ocean currents, subsidence, variations in land height, and whether the land is rebounding still from the compressive weight of Ice Age glaciers. This is the reason that makes the local measurements of relative sea levels different around the globe, meaning that the sea level varies across the globe.

You can learn more about sea level at

https://brainly.com/question/27383443

#SPJ4

rstp serves as an improved protocol in comparison to the older stp. which of the following answers lists a feature of rstp that does not exist in stp?

Answers

The criteria utilized by switches to choose a port to perform in the backup port function are different in RSTP from STP, making it an improved protocol in contrast to the latter.

What distinguishes RSTP from STP?

As its name implies, the rapid spanning tree protocol (RSTP) allows for a quicker switch to the port-forwarding state. RSTP only has three switchport states: discarding, learning, and forwarding, as opposed to STP's five.

How is STP enhanced by RSTP?

RSTP is an improvement over STP (Spanning Tree Protocol) primarily because it reduces convergence time, or the amount of time it takes for all switches on a network to agree on the topology of the network.

To know more about RSTP visit:-

https://brainly.com/question/29665799

#SPJ4

which of the following answers apply to the ieee 802.11a wireless standard? (select 2 answers) group of answer choices maximum data signaling rate of 11 mbps 5.0 ghz frequency band 2.4 ghz frequency band maximum data signaling rate of up to 600 mbps 5.4 ghz frequency band maximum data signaling rate of 54 mbps

Answers

Maximum data signaling rate of 54 Mbps and 5.0 GHz frequency band, apply to the ieee 802.11a wireless standard.

How many wireless standards are there?

In order to connect the nodes, WiFi or WLAN uses high-frequency radio waves. WLANs using IEEE 802.11 have a number of standards. 802.11, 802.11a, 802.11b, 802.11g, 802.11n, and 802.11p are the most well-known of them. All standards employ carrier-sense multiple access with collision avoidance (CSMA/CA).

Wi-Fi networks (as well as other data transmission networks) must adhere to a set of services and protocols known as wireless standards. IEEE 802.11 Wireless LAN (WLAN) & Mesh are the two wireless standards you'll run into the most frequently. Every couple of years, the IEEE makes changes to the 802.11 Wi-Fi standard. In order to use both frequency bands, the majority of WiFi equipment are dual-band. Range, speed, and bandwidth are the key differences between the two bands.

To learn more about wireless standards, visit:

https://brainly.com/question/27384537

#SPJ4

When large amounts of data are stored in electronic form, they are vulnerable to many more kinds of threats than when they existed in manual form. Through communications networks, information systems in different locations are interconnected. The potential for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the network. Without protection against malware and intruders, connecting to the Internet would be very dangerous. Discuss in detail types of malware, provide examples. Describe in detail essential business tools used to protect information systems against threats.

Answers

The statement from the question is about why systems are vulnerable.

Why systems are vulnerable?

Systems are exposed because they can be accessed at any point along the link since they are interconnected. This interconnectedness raises the risk of fraud, abuse, misuse, and unauthorized access to confidential and sensitive information. In the simplest terms possible, a computer system vulnerability is a flaw or weakness in a system or network that could be used by an attacker to harm the system or influence it in some way. So systems must have best protection from hacker.

Learn more about systems vulnerable: https://brainly.com/question/29034300

#SPJ4

when inserting bullets into a table cell, which of the following is not true?

Answers

It is not true that the bullet will appear centered vertically in the cell when inserting bullet into a table cell.

A bullet, sometimes known as a bullet point, is an asterisk, black dot, circle, or other mark that appears before the text. When order is irrelevant, bullet lists are used to identify essential elements or to denote significance. In documents and presentations, bullet points are frequently used to assist organize information and make it simpler to read or understand.

A table cell is a subset of a chart table that is used to store information or data. Cells are arranged horizontally (in rows) and vertically (columns of cells). Each cell holds information about the combination of row and column heads with which it is collinear.

Whenever a bullet point is inserted in a table cell, by default the arrangement is in horizontal position (rows) at the left side of the designated cell, not in colums (vertically).

Learn more about bullet points here https://brainly.com/question/6759219

#SPJ4

when successive frames are transmitted on different channels, assigned randomly by the master node (as in a bluetooth device), the technique is called

Answers

BT devices use an adaptive frequency-hopping spread spectrum (FHSS) algorithm to communicate over the unlicensed, widely accessible Industrial, Scientific and Medical (ISM) radio band.

Other communication protocols, like those used by cell phones, demand the use of bands that are owned by businesses. A monitory use fee is one effect for a device using a band owned by a business. However, the FCC and its comparable international organizations have recognized the ISM band as a freely accessible radio band. Although this band is known as the 2.45 GHz band, it is actually a combined bandwidth of (79) 1 MHz18 bands in the 2402-2480 MHz frequency range. Since the ISM band is accessible everywhere, the design aim for BT using this frequency was to provide for universal availability.

Learn more about protocols here-

https://brainly.com/question/27581708

#SPJ4

which two acronyms represent the data link sublayers that ethernet relies upon to operate? (choose two.)

Answers

The data connection sublayers that are necessary for ethernet to function are denoted by the abbreviations llc and mac.

Wide area networks, metropolitan area networks, and local area networks all use members of the Ethernet family of wired computer networking technologies (WAN). Initially standardized as IEEE 802.3 in 1983, it was commercially released in 1980. Since then, Ethernet has undergone refinement to handle faster data rates, a larger number of nodes, and longer link distances while retaining a significant amount of backward compatibility. Competing wired LAN technologies including Token Ring, FDDI, and ARCNET have been mostly superseded by Ethernet over time.

In contrast to the more recent Ethernet variations, which employ twisted pair and fiber optic links in conjunction with switches, the original 10BASE5 Ethernet uses coaxial cable as a shared medium. during the course of its history.

Learn more about ethernet here:

https://brainly.com/question/14632734

#SPJ4

a service that is running on your windows system has hung badly and does not respond when you try to use the services console to restart the service. you run the tasklist command at the command prompt and find that the service's process has a pid of 1234 and an image name of telecom.exe. which commands could you run to shut down the service? (select two.)

Answers

The same command can be run from a Run window. Launch Start.Enter "Command Prompt" into the search box, then right-click the first result and choose "Run as administrator."

What does the Run shutdown command do? The same command can be run from a Run window.To shut down your device, open a Command Prompt, Power Shell, or Run window, type the command "shutdown /s" (without quotation marks), and then hit Enter on your keyboard.Input services.msc by pressing Windows Key + R, then hit Enter.Find the service you wish to launch, stop, or restart.Select Start, Stop, or Restart from the context menu when you right-click that service.Launch Start.Enter "Command Prompt" into the search box, then right-click the first result and choose "Run as administrator."After one minute, enter the command shutdown /s to force a graceful shutdown of the device.

To learn more about shutdown command refer

https://brainly.com/question/27806137

#SPJ4

At each step of its operation, the input to a Central Processing Unit is O A a program O B. an instruction O C. main memory OD.control unit

Answers

At each step of its operation, the input to a Central Processing Unit is an instruction.

The part of a computer that obtains and executes instructions is called the central processing unit (CPU). A system's CPU can be thought of as its brain. It is made up of a control unit, a number of registers, and an arithmetic and logic unit (ALU). The term "processor" is frequently used to refer to the CPU. The ALU performs mathematical, logical, and related processes as directed by the software.

The control unit directs the movement of data within the CPU, the exchange of data and control signals across external interfaces, and all ALU operations (system bus). The CPU has high-speed internal memory storage units called registers.

Some registers can be accessed by the user, or by the programmer via the machine instruction set. Other registers are solely reserved for the CPU to be used for control.

All CPU parts are synchronized by an internal clock. Megahertz (MHz), or millions of clock pulses per second, is a unit of measurement for clock speed. The clock speed simply gauges how quickly the CPU executes an instruction.

To learn more about Central Processing Unit click here:

brainly.com/question/6282100

#SPJ4

Assume 185 and 122 are unsigned 8-bit decimal integers. Calculate 185 – 122. Is there overflow, underflow, or neither?

Answers

The value is 63 that is neither overflow nor underflow where 185 and 122 are unsigned 8-bit decimal integers.

What is integer?

Integers are integers that do not have a fractional component and do not accept decimal points. Some programming languages describe these many sorts of integers, whereas others do not. In C, for example, you must save the value 3 as an integer (int) and 4.5 as a float ( float ). The INTEGER data type contains whole integers with precision of 9 or 10 digits ranging from -2,147,483,647 to 2,147,483,647. The value 2,147,483,648 is reserved and cannot be used. The INTEGER value is a signed binary integer that is commonly used to record counts, numbers, and other data.

Here,

185 – 122=63, It is neither overflow or underflow.

To know more about integer,

https://brainly.com/question/14592593

#SPJ1

in linux, you are preparing to delete the tprice user account because the user has just left the company. however, before you delete the account, you want to list all files owned by tprice so you can decide which files to keep. what command enables you to view all files owned by the tprice account?

Answers

find / -user trice command enables you to view all files owned by the trice account.

what is linux?

Linux (/links/ (listen) LEE-nuuks or /links/ LIN-uuks) is a group of free and open-source operating systems based on the Linux kernel, which Linus Torvalds initially made available on September 17, 1991. The kernel and other system-supporting programs and libraries, many of which are made available by the GNU Project, are often included in Linux distributions, which are how Linux is typically packaged. Many Linux versions have the word "Linux" in their name, while the Free Software Foundation prefers to refer to their operating system as "GNU/Linux" to stress the significance of GNU software, which has generated some debate.

Popular Linux distributions include Fedora Linux, Debian, and Ubuntu, the latter of which is made up of numerous more distributions and customizations, such as Xubuntu and Lubuntu. Red Hat Enterprise Linux and SUSE Linux Enterprise are examples of commercial distributions.

To know more about linux visit:

https://brainly.com/question/15122141

#SPJ4

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? Connection-oriented protocol Sequencing and checksums Framing Flow Control

Answers

(TCP) is a more complex, connection-oriented protocol used for dependable data transport when real-time delivery is not necessary. TCP has the ability to fix transmission faults. It has the ability to recognize packets that were received out of order and restore the original order.

What TCP in its role as a reliable delivery protocol?

TCP accomplishes this via a method called positive acknowledgement with re-transmission because packet transfer by many networks is not dependable.

Therefore, TCP is a dependable byte stream delivery service that ensures all bytes received will be exact copies of those transmitted and will arrive in the same sequence.

Learn more about TCP here:

https://brainly.com/question/13440442

#SPJ1

for situations in which no routine procedure can be used to generate an appropriate response, which type of mechanism is used to select the best schema control unit for translation into action?

Answers

The supervisory attentional system is used to select the best schema control unit for translation into action.

What is control unit?

A control unit, or CU, is circuitry that guides actions within a computer's CPU. It tells the computer's memory, processing unit, and both output and input devices how to respond to the program's commands. Control units are used by devices such as CPUs and GPUs. A control unit's primary role is to retrieve data from main memory, identify the devices and processes involved, and generate control signals to carry out the operations. It aids the computer system in carrying out the stored program instructions.

To know more about control unit,

https://brainly.com/question/14592536

#SPJ4

tianna, an administrative assistant, has noticed the print quality of her locally connected laser printer has been gradually declining. sometimes the printing is wavy and other times it appears speckled. she is asked to urgently print 10 copies of a 15-page document for an important meeting because the copy machine is being serviced. since she cannot risk generating poor quality printouts, she calls you at the help desk. what would you do first to try to fix the problem quickly? select two.

Answers

To fix the problem quickly we should:

Print a self-test via the console on the printer.Replace the toner cartridge on the printer.
What is printer?

A printer is a computer peripheral that creates a permanent representation of text or graphics, typically on paper. Although the majority of output is readable by humans, bar code printers are an example of a printer's expanded use. 3D printers, inkjet printers, laser printers, and thermal printers are a few of the various types of printers.

Charles Babbage created the first computer printer in the 19th century for his difference engine, but it wasn't until 2000 that his mechanical printer design was actually implemented.

In particular, an electrostatic inking device and a method for electrostatically depositing ink on predetermined areas of a receiving medium were the first printing mechanisms for applying a marking medium to a recording medium to be granted a patent, both by C. R. Winston, Teletype Corporation, using continuous inkjet printing, in 1962.

Learn more about printers

https://brainly.com/question/29457239

#SPJ4

Which of the following is the default return value of functions in C++?

Answers

Answer:

In C++, if a function does not specify a return type, the default return type is int. If a function does not return a value, the default return value is undefined.For example, the following function has a default return type of int:

// Default return type is int

void foo()

{

   // Do something

}

If you want the function to return a value, you can specify the return type and use the return statement to specify the value to be returned. For example:

int add(int x, int y)

{

   return x + y;

}

This function has a return type of int and returns the sum of its two arguments.It's generally a good practice to explicitly specify the return type of a function, even if it's int, to make it clear to the reader what the function is expected to return.

Explanation:

Other Questions
2. Devonne bought 3 carrots, 4 cucumbers,6 apples, and 1 bag of crackers. How manymore vegetables does she need if shewants to have a vegetable for dinner eachnight for 2 weeks?Please help Im in test Casual sneaker sales represent 4.5% and athletic shoe sales represent 3.2%of total store sales. If the total store sales are $900,000, what are the dollarsales for each department? Determines if a number is prime or composite12. Choose the words that make the sentence true.17primeThe number 7 is plies withtwo factors.compositebecause it hasexactlymore thanto 10lbsts els alto alghiaiqhiur historical experience shows that a hospital sometimes receives malpractice claims in the year after the incidents occur. which of the following statements best expresses the general rule for reporting liabilities for such claims, if risk of loss has not been transferred to a third-party insurer? select one: a. liabilities should be recognized in the statements if it is probable that claims will be asserted for incidents occurring before the balance sheet date and the losses can be reasonably estimated. b. no mention is required to be made of these claims anywhere in the financial statements. c. the hospital should have purchased extended insurance. d. a note should be prepared discussing the likelihood that claims will be received after the balance sheet date, but no estimate needs to be made of the possibility of loss. Match the terms with their definition. Budget surplus Budget deficit Balanced budget Government debt Answer Bank when government spending and taxes are equal when the federal government spends more than it collects in taxes in a given time period the total accumulated amount that the government has borrowed and not yet paid back over time when the government receives more in taxes than it spends in a given time period The federal estate and gift tax O was originally created in 2011. O is paid on certain commodities, such as gasoline or tobacco. O must be paid on even small gifts. is paid on property left as an inheritance when the owner dies. Estate and gift taxes as a percentage of GDP are between 2% and 3%. less than 1% about 20% 0%, since the tax was repealed. O what is the reason the significance level of a test is not made arbitrarily small? which intermolecular force do you think is primarily responsible for the difference in boiling point between cyclohexane and decalin if x=3 and y=-5 find the value of x-y^2 Which of the following statements is true? (a) A triangle can have two rightangles (b) A triangle can have two obtuse angles (c) A triangle can have two acute angles(d) A triangle can have all the three angles less than 60 suppose 10 percent of households earn over 80,000 dollars a year,and 0.25 percent of households earn over 450,000. a random sample of 400 house-holds has been chosen. in this sample, letxbe the number of households thatearn over 80,000, and letybe the number of households that earn over 450,000.use either the normal or the poisson approximation, whichever is appropriate ineither case, to nd the simplest estimates you can for the probabilitiesp(x48)andp(y2) How did the defense dismantle the prosecution's case against O.J.? 10)goodwill is:10)a)only recorded by the seller of a business.b)amortized over the greater of its estimated life or 40 years.c)the excess of the fair value of a business over the fair value of all net identifiable assets.d)none of these answer choices are correct. Hair grows at a rate of 2.45 mm every 7 days how much will it grows in 30 days The nurse is caring for a client who is being monitored for hypercalcemia. the nurse understands that what calcium level is considered a medical emergency? Use the passage to answer the question.In the antebellum South, a lone planter on a plantation in South Carolina with200 slaves would be counted for the purposes of determining congressionalrepresentation as how many people?OA. 201 peopleB. 121 peopleOC. 1 peopleD. 151 people which one of the following is not a withdrawal option for a mutual fund owner, who has a minimum nav of $5,000? 9. What are the point and slope given by the equation y + 2 = -7(x-1)? HELP ME PLEASE MY FINAL IS TMR During inspiration, air moves into the lungs because __________.Aabdominal muscles contractBcontraction of the diaphragm decreases the volume of the pleural cavityCcontraction of the internal intercostal muscles decreases the thoracic cavity volumeDthe volume of the lungs decreases with inspirationEthe gas pressure in the lungs becomes lower than the outside pressure as the diaphragm contracts which of the following occurs because ran-gef is found in the nucleus? question 2 options: ran binds a molecule of gtp (releasing gdp), and binds the nuclear import receptor ran binds a molecule of gtp (releasing gdp), and releases the nuclear import receptor ran binds a molecule of gdp (releasing gtp), and binds the nuclear import receptor ran binds a molecule of gdp (releasing gtp), and releases the nuclear import receptor Winik tells us that in the aftermath of Lincolns assassination, hundreds of innocent suspects for rounded up often on flimsiest Reminence, explain the connection between this and the actions of act three scene three from the tragedy of Julius Caesar?