Which of the following statements is not true?A. A structured chart is a sequential representation of program designB. the Real-Time system is a particular case of a on-line-systemC. Batch totals are not incorporated while designing real-time applicationsD. 4GLs are used for application proto typingE. None of the above
Answer:
A structured chart is a sequential representation of program design
Explanation:
It is true that a real-time system which is a term to describe an operating system working in relation to real-time is actually a form of the online system. Hence, option B is not correct.
It is also true that Batch totals are not incorporated while designing real-time applications because Batch Data processing is carried out in a separate manner and at a time when the computer is free. Thus Option C is not Correct
It is also true that 4GL which stands for Forth generation programming language is used for application prototyping. Again Option D is not Correct.
However, a structured chart is not a sequential representation of program design, but rather a break down to the infinitesimal module in the program design. Hence, option A is the correct answer.
Which of these is the largest?
terabyte
exabyte
gigabyte
kilobyte
PLEASE HELP
Answer: Exabyte
Explanation:
I took the Quiz
design an algorithm to find and display the price of the pizza per square inch
Answer:
The algorithm is as follows
StartRead the price of unit Pizza, PRead the Radius of Pizza, RArea = 3.14 * R * RPrice Per Area = P/AreaPrint Price Per AreaStopExplanation:
The algorithm is self explanatory.
However, take note of the following
Price Per Square inch is calculated by dividing the price (P) of the pizza by its areaA pizza has a circular surface, so the area will be calculated using Area = πR²So, the formula to calculate the required output is P/Area as shown in the algorithm above.why ISO is not protocol? however it is service
Answer:
First, the OSI model is just that, a model. Its use is not mandated for networking, yet most protocols and systems adhere to it quite closely. It is mainly useful for discussing, describing, and understanding individual network functions. Second, not all layers are used in some simpler applications.
A good administrative position to acquire as a stepping stone to further positions is
Answer:
A good administrative position to acquire as a stepping stone to future positions is an intern.
Explanation:
When an individual is an intern within an administrative sector, he will be able to learn many concepts and guidelines of this type of work, getting involved in various areas within the sector and accumulating knowledge that will serve him to occupy greater positions within the sector.
In this case, being a trainee is a better option due to the exchange of areas in which he can participate and which will show where his greatest capacities are concentrated within an administrative sector.
What converts source code onto object code
Answer:
The Compiler
Explanation:
A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file
When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
Answer:
c. 4 to 6
Explanation:
According to the VMware, a virtual machine software company widely known for producing the virtualization software, which is capable of making computer hardware components to be compartmentalized into various virtual layers, recommended the best practices of virtual CPU per core to be running 4 to 6.
Hence, in this case, the correct answer is option C
You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember
there is an app on your phone that will use your location and show you that information. What is the app using?
A. Chip-and-pin technology
B. Augmented reality
C. Kiosk
D. Digital literacy
Since you remember there is an app on your phone that will use your location and show you that information. The app that is been used is option D. Digital literacy
What does "digital literacy" mean?The ability to communicate and obtain information in a culture where digital technologies like internet platforms, social media, and mobile devices are used more frequently is referred to as digital literacy.
Therefore, a person Understanding and using technology are both components of digital literacy. Your ability to find, consume, and produce information online can be improved with the aid of digital literacy skills. Understanding digital literacy allows you to utilize technology properly and helps you stay away from its risks.
Learn more about Digital literacy from
https://brainly.com/question/20718794
#SPJ1
One suggested means of gaining eye contact before reversing is to:____.
Answer:
hit the vehicle horn
Explanation:
Remember, a driver reversing may easily go unnoticed by pedestrians as the driver may be coming from behind. Thus, a suggested means of gaining the eye contact of pedestrians before reversing is to hit the vehicle horn.
Taking an online class doesn't require any special skills.
Please select the best answer from the choices provided
()T
()F
help pls
Answer:
F
Explanation:
It depends on whether the person has interest in it
The statement - "Taking an online class doesn't require any special skills" is false.
What is online class?An online class is a course that is delivered through the Internet. They are often delivered via a learning management system, where students may monitor their course curriculum and academic progress, as well as communicate with their classmates and course teacher.
When taking an online class, one must be alert and prompt. Furthermore, certain material may be obscure owing to a communication barrier between the student and teacher.
The student must be able to grasp what the teacher is saying in a short period of time, and self-teaching abilities should be strengthened in distance online education. As a result, the supplied assertion is untrue.
Learn more about online class here:
https://brainly.com/question/13649312
#SPJ2
If you have a second Ethernet adapter, which network location is being used by the adapter?
Answer:
Public network
Explanation:
The network includes different networks and settings for sharing which are applied to the network which you are connected to.
A public network is being used by the adapter. The public network is a network that is unrestrictive. That is, any member of the public can easily have access to it and connect to the internet. Such a network exposed users to risks by exposing the connected devices.
An optimal solution to an Operations problem will yield:____________
Answer:
The best solution.
Explanation:
In the operations and management of systems such as manufacturing, transport, government, network, service systems, we encounter various type of challenges and problems. These challenges and problems must be fixed or resolved as soon as possible in order to restore normal operations, as well as ensuring that the solution mitigates the occurrence of such problems in the future.
Hence, an optimal solution to an Operations problem will yield the best solution because it gives the maximum functionality. For instance, an optimal solution is considered to be the best solution because it gives the least cost, effective and efficient or gives the most profit.
what is an unknown network called
Answer
It means the network has no name and your device has picked it up as a wifi / network.
Explanation:
This likely means the owners of the network have not set a SSID. ( SSID is network name.)
. (a) Prove or disprove carefully and in detail: (i) Θ is transitive and (ii) ω is transitive. (b) Assume n is a positive integer. Algorithm A(n: int) int z = 0; int temp = 0; for (int i = 0; i < n ; i++) { for (int j = 0 ; j < i ; j++) { int temp = i + j ; int z = z + temp; } } System.out.println(z) ; What is the input size for Algorithm A? Analyze carefully and explicitly the time complexity of A in terms of the input size. Show all steps. Is A a polynomial time algorithm? Justify your answer.
Answer:
The Following are the solution to this question:
Explanation:
In Option a:
In the point (i) [tex]\Omega[/tex] is transitive, which means it converts one action to others object because if [tex]\Omega(f(n))=g(n)[/tex] indicates [tex]c.g(n)<=f(n)[/tex]. It's true by definition, that becomes valid. But if [tex]\Omega(g(n))=h(n)[/tex], which implies [tex]c.h(n)<=g(n)[/tex]. it's a very essential component. If [tex]c.h(n) < = g(n) = f(n) \[/tex]. They [tex]\Omega(f(n))[/tex] will also be [tex]h(n)[/tex].
In point (ii), The value of [tex]\Theta[/tex] is convergent since the [tex]\Theta(g(n))=f(n)[/tex]. It means they should be dual a and b constant variable, therefore [tex]a.g(n)<=f(n)<=b.g(n)[/tex] could only be valid for the constant variable, that is [tex]\frac{1}{a}\ \ and\ \ \frac{1}{b}[/tex].
In Option b:
In this algorithm, the input size value is equal to 1 object, and the value of A is a polynomial-time complexity, which is similar to its outcome that is [tex]O(n^{2})[/tex]. It is the outside there will be a loop(i) for n iterations, that is also encoded inside it, the for loop(j), which would be a loop[tex](n^{2})[/tex]. All internal loops operate on a total number of [tex]N^{2}[/tex] generations and therefore the final time complexity is [tex]O(n^{2})[/tex].
Which are elements involved in modeling a solution? Choose all that apply. A) often includes a visual graphic B) shows the flow of information from task to task C) assigns demands D) breaks the solution into tasks E) includes pseudocode
Often includes a visual graphic, shows the flow of information from task to task, breaks the solution into tasks and includes pseudocode are elements involved in modeling a solution. Hence, options A, B, D and E are correct.
What is pseudocode?Pseudocode is a made-up, informal language that aids in the creation of algorithms by programmers. A "text-based" detail design tool is pseudocode. The Pseudocode rules are not too complicated. Statements that demonstrate "dependence" must all be indented. Some of these are while, do, for, if, and switch.
Pseudo code: It's just a plain text document with annotations and informative text that implements an algorithm. It has no grammar like any other programming language, making it impossible for a computer to compile or interpret.
A simplified version of an algorithm that expresses coding logic in English is known as pseudocode. It enables programmers to plan the architecture of any algorithm using straightforward commands. Pseudocode describes numerous coding actions and their proper order mostly in plain English.
Thus, options A, B, D and E are correct.
For more information about pseudocode, click here
https://brainly.com/question/13208346
#SPJ2
Select the correct answer from each drop-down menu. What skills should Tara hone to get a job in testing? Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tester. Since Tara is trying to get a job as a tester, she should concentrate on improving her and skills in order to get the desired job.
Answer:
heres your answer
Explanation:
have a good day <3
which data type could be used for the field, remark or comment?
Answer:
While CLOB/NCLOB types may seem attractive, they are not nearly as efficent as [N]VARCHAR for most of the functions you would usually want to run on them, and anyone who can't comment in 2000 or 4000 characters isn't likey to generate a comment you'd want to use anyway.
copied from google
hope that helps
which of the following are bee per frame attribute
Explanation:
where are the choices
Consider sorting n numbers stored in array A by first finding the smallest element of A and exchanging it with the element in A[1]. Then find the second smallest element of A, and exchange it with A[2]. Continue in this manner for the first n − 1 elements of A. Write pseudocode for this algorithm, which is known as selection sort. What loop invariant does this algorithm maintain? Why does it need to run for only the first n − 1 elements, rather than for all n elements? Give the best–case and worst–case running times of selection sort in Θ–notation.
Answer:
1. create the first array A
2. create the second array A1, the same length as array A.
3. create a loop to iterate over both arrays for a number of times specific to the length of the arrays, with a condition to get and pop only the minimum value of which arrays for every loop.
4. save both items to "a" for minimum value A and "b" for minimum value A1.
5. call a function to push the "a" variable value to A1 and "b" variable value to the array A.
Explanation:
This code would interchange the values of both arrays, the best-case scenario for the code is O( n ) where n is the number of items in both arrays and worst is the best-case multiplied by the number of time to compare all the items with the minimum value.
what is computing networking
If someone you don”t know asks where you go to school, what should you do?
Answer:come up something that sounds real but is not true.
Explanation: The reason why is because they could look it up if you tod them the real answer and then follow you and kidnap you and they could do a school shooting it"s not lying it's not it's protecting your self and others.#bettersafethansorry
The right thing to do when someone you don't know asks where you go to school, is do not respond.
Why talking to stranger has its cons?The act of talking to Strangers is one that can help a person to know more about a thing but it also has its disadvantage.
Conclusively, note that someone asking you about where you school may want to harm you or do some really bad and as such it is better not to respond when someone you don't know asks where you go to school.
Learn more about school from
https://brainly.com/question/6947486
#SPJ2
Is a pocket watch consider a computer
Answer:
I don't think a pocket watch is considered a computer based off of my logic. Other people may think differently tho.
Explanation:
You want to decide whether you should drive your car to work or take the train. You know the one-way distance from your home to your place of work, and the fuel efficiency of your car (in miles per gallon). You also know the one-way price of a train ticket. You assume the cost of gas at $4 per gallon, and car maintenance at 5 cents per mile. Write an algorithm to decide which commute is cheaper.
Explanation:
Remember, an algorithm in simple words means a set of instructions or steps to be followed in other to solve a problem.
Note, to decide which commute is cheaper, it means the output of the algorithm should be the cheaper way to commute.
Using pseudocode do the following;
determine the inputs and outputs of the problem arrange the identified problem into micro-tasksdescribe each micro-tasks in the pseudocode Test the pseudocode by solving the problem.
Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space. Example output for userNum = 40: 20 10 5 2 1 Note: These activities may test code with different test values. This activity will perform four tests, with userNum = 40, then with userNum = 2, then with userNum = 0, then with userNum = -1. See "How to Use zyBooks". Also note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds, and report "Program end never reached." The system doesn't print the test case that caused the reported message.
Answer:
public class Main
{
public static void main(String[] args) {
int userNum = 40;
while(userNum > 1){
userNum /= 2;
System.out.print(userNum + " ");
}
}
}
Explanation:
*The code is in Java.
Initialize the userNum
Create a while loop that iterates while userNum is greater than 1. Inside the loop, divide the userNum by 2 and set it as userNum (same as typing userNum = userNum / 2;). Print the userNum
Basically, this loop will iterate until userNum becomes 1. It will keep dividing the userNum by 2 and print this value.
For the values that are smaller than 1 or even for 1, the program outputs nothing (Since the value is not greater than 1, the loop will not be executed).
How does Wireshark differ from NetWitness Investigator?
Answer is given below
Explanation:
Wireshark differ from NetWitness Investigator because Windshark shows a detailed view of individual packets. WireShark captures live traffic and displays the results at the packet level. Netwitness shows a high-level view and can be compared to the new packet capture NetWitiness Investigator provides a comprehensive overview of previously tracked traffic that can be used to view anomalies, compliance and attacks.A new object of type list is created for each recursive invocation of f.A. TrueB. False
Answer:
True but double check!
Select the correct answer.
Steve is a recruiter for a large graphic design company. He is looking for a candidate who can translate any vision into reality and make tough decisions. Which quality is he looking for in an employee?
A.
teamwork
B.
leadership
C.
honesty
D.
dedication
E.
self-motivation
Answer:
D
Explanation:
Hard work and dedication prove that you will be there and do what you need to.
Answer:
isnt it leadership
Explanation:
making tough descisions..
Smart home appliances typically include which of the following?
Answer:
Smart home-enabled devices can include appliances like refrigerators, washing machines, dryers, and toaster ovens, as well as heating and air conditioning units and lighting devices.
Explanation:
Smart home appliances include;
Sensors that collect information.WIFI Combability.The ability to send notifications to a smartphone app.What is a smart home appliance?A smart home is known to be home equipment that helps homeowners to control appliances, thermostats, lights, etc.
They are known to be used remotely via a smartphone or tablet through the aid of internet connection. They homes are often set up via wireless or hardwired systems.
Learn more about home appliances from
https://brainly.com/question/18713901
Max shot a video with a digital camera. Where did the video files get stored in the camera?
Answer:
In the memory sticks/cards of the digital camera
Explanation:
Many digital cameras come with removable storage cards in the form of memory cards, memory sticks and flask cards. Activities (pictures and videos) captured with these digital cameras are stored in these removable storage cards. These makes it easy for users to remove the storage cards and insert into other devices.
Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per second. How long in (days or years) would it take for you to find the key to a code that used a 112-‐‑bit key on average? What encryption algorithm might have been used by the encryption system? (Give the name of an encryption algorithm that uses 112-‐‑bit-‐‑key.)
Answer:
Following are the solution to this question:
Explanation:
In point 1:
Trials frequency [tex]= \frac{100 \ million }{second}[/tex]
calculating the main length of cryptography = 112 bit
[tex]\to 100\ Million = 1 \times 10^8[/tex]
calculating the second year value:
[tex]\to 365 \times 24 \times 60 \times 60 =3153600\\\\[/tex]
[tex]=3.15 \times 10^7 \ seconds[/tex]
Currently, in average , at least half the possible sleeves is being used to verify the encryption process: [tex]2^{111} \ keys[/tex]
[tex]\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years[/tex]
the total time value will be [tex]8.22 \times 10^{20} \ years[/tex]
In point 2:
In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).
Algorithm:-
The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::
[tex]ciphertext = EK3(DK2(EK1(plaintext)))[/tex]
I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.
The reverse is the decryption:
[tex]plaintext = DK1(EK2(DK3(ciphertext)))[/tex]
I.e. decrypt by K3, crypt by K2, decrypt by K1.
Every three-bit authentication encrypts a 64-bit block.
Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.