A(n) ______________ is one that continually offers an improved product that customers are eager to purchase.

Select one:

a. Disruptive technology

b. Sustaining technology

c. Innovative technology

d. None of the above

Answers

Answer 1

Answer: b)Sustaining technology

Explanation: Sustaining technology is the technology that is used for enhancing the product than before . The improvement is made in the product to improve it's marketing and increasing it's value. In this way, the customer will tend to purchase the product .

Other options are incorrect because disruptive technology is the damaging the marketing of current product by using new marketing product, innovative technology is the technology that changing product to make it  interesting.Thus, the most suitable option is option(b).


Related Questions

Distinguish between 802.3 standards and 802.11 standards.

Answers

Explanation:

Following are differences between 802.3 and 802.11 standards:-

The 802.3 standards are for Ethernet standards while the 802.11 standards are for wireless LAN.Ether networks uses standards at data link layer and physical layer while Wireless LAN is implemented by a set of specification of physical layer and media access control.The products of 802.11 are certified by Wi-Fi logo if and only if when they are upto certain standards of interperability but it is less secured while 802.3 products are constantly improving and are highly secured.

Final answer:

IEEE 802.3 and 802.11 standards differ primarily in their networking methods; 802.3 (Ethernet) is used for wired connections, while 802.11 (Wi-Fi) is used for wireless networking.

Explanation:

The key distinction between IEEE 802.3 standards and IEEE 802.11 standards lies in the methods and mediums they use for transmitting data. The IEEE 802.3 standard, often recognized as Ethernet, is mainly used for wired networking and employs physical cables (typically copper or fiber optic) to transfer data between computers. Ethernet has been the foundational standard for wired local area networks (LANs) and has evolved over time to support higher speeds and different cabling types.

On the other hand, the IEEE 802.11 standard is centered around wireless networking, commonly referred to as Wi-Fi. This standard allows devices to connect to a LAN and access the internet without the use of physical cables. Wi-Fi has become widely used in private homes, offices, and public hotspots due to its convenience in establishing network connections. The standard includes various versions (such as a, b, g, n, ac, and others) which differ in aspects such as transmission speed, range, and frequency used.

While Ethernet provides a reliable and secure connection typically required for business environments and data centers, Wi-Fi offers mobility and ease of access, which are essential for portable devices and consumer electronics. Both standards are fundamental to modern telecommunications and networking but serve different purposes and environments.

Electric Bill Problem 3.0 (20 Points) What is the total cost of using the following at /kWh? a. 1600 W air conditioner for 6h b. 1200 W hair dryer for 15 min .4800 W clothes dryer for 30 min d. 900 W coffee maker for 10 min 200 W Play Station 3 for 2 h e. f. 50 W stereo for 3.5 h

Answers

Answer:

The total const is 13025 KWh

Explanation:

These are the steps to solve this problem:

Convert all the powers from W to KW dividing by 1000.Convert all the times on minutes to hours dividing by 60.Then you can apply energy consumption formula [tex]Energy = Power*Time[/tex] for any of the appliances. the results will be at KWh.Sum all the consumtions and you will have the total cost.

Attached you will have a spreadsheet as a guidance. Any  questions, just let me know.

Which of the following correct modes, can be used to apply loopback policy?

Select one or more:

a. Merge mode

b. Replace mode

c. Remote mode

d. Local mode

Answers

Answer: (A) Merge mode and (B) Remote mode

Explanation:

 The merge and remote mode is basically used in the loop-back policy. The loop back policy is used in the computer configuration as the group policy of the management editor.

The loop-back policy is basically allowed the administrator for access the setting of the group policy.When the merge mode are enable in the loop back policy then, the computer configuration are basically based on the particular computer configuration that are located in the computer active directory.  

Remote mode is also used to apply in the loop back policy and when this mode enabled then, it change the user configuration. In the active directory of the replace mode the user settings is basically based on the configuration of the user setting.

What is the purpose and what are some of the components of a wide area network connection?

Answers

Answer:

WAN(wide area network) is the network that is used for the connection in the geographical areas on large scale.They are used for connecting the areas like cities, countries, states etc.The connection of various LANs(Local area network) and MAN(Metropolitan area network) form the WAN.

There are several components that are used in the wide area network structure. Some of the constituents are as follows:-

ATM()Asynchronous transfer modeFiber optic communication pathModem having cablesFrame relayDial up internet etc.

Answer:

    A wide area network (WAN) is a network of devices, local area networks (LANs), or metropolitan area networks (MANs) that are connected over wired or wireless communication lines. A virtual private network (VPN) connects different WAN sites. These connections span large geographic areas and can occur between cities, regions and even countries. A WAN is often used by large companies looking to manage and share information and resources between branches. This type of network is mainly used as a way to connect smaller LANs and, although they have slower data transmission capabilities from LANs, they are able to connect a wider coverage area.

Here are some components that are frequently found in a network:

Servers: These are computers that serve some service, that is, they exist only in order to provide resources for computers to do work.Client: Computers that access resources offered by the network through servers.Feature: Anything that can be offered such as printers, files, internet access, etc.Protocol: For computers to communicate, there must be a common language. Protocol is the medium that computers can communicate with.Cabling: Data is trafficked through physical devices, and the definition of cabling is the medium in which that data is trafficked as fiber optics or wireless networks.

. What are the technical advantages of optical fibres over other communications media?

Answers

Answer: The advantage of the optical fibre over the other medium of the communication are as follows:-

The bandwidth of the optical fibre is comparatively higher than the other communication media The security in regard with the loss of data can be tracked easily as compared with other copper wire medium of communication.Thus, the security system of optical fibre is more reliable.The capacity of the fibre and the transmission power is also high as compared with other media of the communication such as copper wires,etc.The optical fibre is less space consuming than other communication medium.

Final answer:

Optical fibres have significant technical advantages including low loss, allowing for longer distances without signal amplification, high bandwidth supporting more data transmission, and reduced crosstalk for clearer communication over traditional copper cables.

Explanation:

Optical fibres offer significant advantages over traditional communication media like copper cables, especially for long-distance communications. One of the primary technical advantages of optical fibres is their low loss, allowing light to travel many kilometers before needing amplification, which is much superior to the performance of copper conductors. Another critical advantage is high bandwidth, where lasers emit light that enables far more conversations in one fiber than what electric signals on copper cables can support. Additionally, optical fibres exhibit reduced crosstalk, meaning optical signals in one fiber do not produce undesirable effects in other adjacent fibers, ensuring clearer and more reliable communication.

Create a float variable named area.

Answers

Answer:

float area;

Explanation:

The float datatype is used for storing the decimal number .The syntax of declaring float variable is given below.

float variablename ;

float area;

area=89.900002; // storing the value

following the program in c language

#include<stdio.h> // header file

int main() // main function

{

  float area=89.900002; // declared and initialize a float variable

  printf("%f",area); // display the area value

return 0;

}

Array aggregate assignment is possible in Java.

True or False

Answers

Answer: True

Explanation:

    Yes, the given statement is true that the array aggregate assignment are possible in the java. As, the array assignment is basically possible in the structure and array assignment.

The assignment statement is basically generated by the array and structure assignment and it is also known as master variable.

The actual statement and prefix is basically applied to the assignment statement for the null value.

An object reference provides a(an)______for an object and is used to gain access to the object (Points : 2) entry
target
instance
handle

Answers

Answer: Instance

Explanation: Instance is the term found in the object-orient programming concept. It is used for the realization of the variation present in any object specifically.The program execution at each time instant is known as the instance of program. Generation of realized instance is known as instantiation.

This helps in the accessing of the object in the program.Other options are incorrect entry , target and handle are not the technical term related with the accessing of object .Thus the correct answer is instance.

How many bits are in an IP address?

Answers

Answer: IPv4(Internet protocol version 4)) =32 bits

               IPv6(Internet protocol version 6) =128 bits

Explanation: IP(Internet protocol)address are the unique addresses that is provided to the hardware components that are attached with the internet service. The identification of the hardware devices are made on the basis of IP address .It is a numerical notation .

The most commonly used version of the IP addresses are IPv4 (Internet protocol version 4)and IPv6(Internet protocol version 6) that persist of 32 bits and 128 bits address respectively. IPv4 and IPv6 has different bits due to the growth of the internet facility and improvement in the version.Most commonly used internet service at current time is IPv6.

Operational feasibility, which refers to user acceptance and support, as well as management acceptance and support, is also known as __________

Answers

Answer:Behavioral feasibility

Explanation: Behavioral feasibility is related with the human concerns. It describes about the reactions gained in the form of feedback from users towards the growth of computer system. The extent to which development is accepted and supported is evaluated.

The changes and development is made for the betterment of the system and makes it feasible for solving the issues. Operational feasibility is also related with the operation performed for the improvement of the system and the acceptance it receives from the users.

Network 192.168.0.0 /16 is a private address pool. How many networks of 62 hosts can be created from it. (Include the first and last networks)

Answers

Answer:

1024

Explanation:

In the given network 192.168.0.0/16 there are 16 network bits and remaining 16 bits out of 32 bits can serve as host bits.

Now 62 hosts can be accomodated in 6 bits since [tex]2^{5}< 62<2^{6}[/tex]. Thus out of 16 hosts bits only 6 are needed to accomodate 62 hosts.

Therefore remaining 10 bits can be used to define other network address within the main network address.

So there can be total [tex]2^{10}= 1024[/tex] networks of 62 hosts.  

Write a C++ program that overloads a function named LinearSearch that searches an array of data of either integer data type, float, or double for a specific data. Test it in main by creating and assigning values to an array of integers, float, and double and searching each of them for some specific data.Please circle the part that is doing function/operator overloading and explain the advantages of using function/operator overloading in your code.

Answers

Explanation:

#include <iostream>

#include <vector>

#include <iomanip>

using namespace std;

/*

Overloading means equal function name with different call prototype each.

It's a useful tool that lets you think once and write similar role code twice or more times keeping equal function name.

Please look at lines 12-14: they are overloaded call prototype versions of LinearSearch with identical mission (to know if a value is present in a set)

*/

//#define GENERICS

#ifndef GENERICS                                                                // Conditional compilation statement

bool LinearSearch(vector<int>   ,int);

bool LinearSearch(vector<float> ,float);

bool LinearSearch(vector<double>,double);

#else                                                                           // Conditional compilation statement (uncomment line 10 statement)

template <typename genType>

bool LinearSearch(vector<genType> v, genType value);                            // LinearSearch (generic type parameters version)

#endif

int main(int argc, char *argv[]) {                                              // Test code follows:    

vector<int> vInt    {1,                     -2,     3,          -4,     5};     // Test data (int)

vector<float> vFlo  {1.23456f,              -2.35f, 3.1416f,    -4.7f,  5.55f}; // Test data (float)

vector<double> vDou {1.234567890123456789,  -2.35,  3.1415927,  -4.7,   5.55};  // Test data (double)

cout <<3 << "        is " << (LinearSearch(vInt,3)      ?"":"not ") << "in: {";for(auto x:vInt) cout << setw(11) << x;cout << "}\n";

cout <<3.1416f<< "   is " << (LinearSearch(vFlo,3.1416f)?"":"not ") << "in: {";for(auto x:vFlo) cout << setw(11) << x;cout << "}\n";

cout <<3.14   << " is " << (LinearSearch(vDou,3.1416) ?"":"not ") << "in: {";for(auto x:vDou) cout << /*setprecision(9)<<*/setw(11) << x;cout << "}\n";

return 0;

}

#ifndef GENERICS

// Overloaded function code follows:

bool LinearSearch(vector<int> v, int value) {                                   // LinearSearch (integer parameters version)

bool found = false;                                                             // Until now we haven't found the value we are searching for,

for(auto x:v) found = found || x == value;                                      // but if it is here found becomes true.

return(found);

}

bool LinearSearch(vector<float> v, float value) {                               // LinearSearch (float parameters version)

bool found = false;

for(auto x:v) found = found || x == value;

return(found);

}

bool LinearSearch(vector<double> v, double value) {                             // LinearSearch (double float parameters version)

bool found = false;

for(auto x:v) found = found || x == value;

return(found);

}

/*

So far, so good. It works! But, despite there was little effort involved, redundant code remains.

Is there any solution? Yes! It's called generic programming.

*/

#else

/*

Consider the following code:

   - Template statement at first accepts a generic type as a parameter (genType)

   - genType is used for both parameters (array and value to search)

   - Template statements located after generic version of LinearSearch instructs compiler to generate each type version

Conclusions:    

   - Compared with overloaded versions generic code is more elegant and avoids completely redundancy

   - It enhances overloading while keeping its advantages

*/

template <typename genType>

bool LinearSearch(vector<genType> v, genType value) {   // LinearSearch (generic type parameters version)

bool found = false;                                     // Until now we haven't found the value we are searching for,

for(auto x:v) found = found || x == value;              // but if it is here found becomes true.

return(found);

}

template bool LinearSearch(vector<int>   ,int);

template bool LinearSearch(vector<float> ,float);

template bool LinearSearch(vector<double>,double);

#endif

Write a program that asks the user to enter five different, integer numbers. The program then reports the largest number and the smallest number.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

  int mi=INT_MAX;

   int mx=INT_MIN;

   int Num;

   cout<<"enter five different Numbers:";

   // read 10 non-negative Numbers

   for(int a=1;a<=5;a++)

   {

       // read the input number

       cin>>Num;

     // find maximum

       if(Num>mx)

       {

           mx=Num;

       }

       // find minumum

       if(Num<mi)

       {

           mi=Num;

       }

   }

   // print maximum and minimum

   cout<<"maximum of five numbers is: "<<mx<<endl;

   cout<<"minimum of five numbers is: "<<mi<<endl;

return 0;

}

Explanation:

Declare two variables "mi" & "mx" and initialize them with INT_MAX and INT_MIN respectively.Then read the five number from user and compare it with "mi" & "mx" ,if input is greater than "mx" then update "mx" or if input is less than "mi" then update the "mi". After all the inputs, "mi" will have smallest and "mx" will have largest value.

Output:

enter five different Numbers:6 19 3 44 23

maximum of five numbers is: 44

minimum of five numbers is: 3  

A(n) ________ is an object that is generated in memory as the result of an error or an unexpected event.

a.)exception

b.)error message

c.)default exception handler

d.)exception handler

Answers

Answer: a)Exception

Explanation:  Exception is the occurrence of an situation in the computer system field due to which interruption is caused in the execution of the program. A object is created in this event known and the exception object that contains the information about the error that has occurred.

The exception is handled by the exception handler.It catches the exception during the execution or after run time. Other options are incorrect because they are not the unexpected event to disorder the flow of program.Thus the correct option is option(a).

Write a program that converts a line of data containing three integers so that the data appears on three separate lines.

Answers

Answer:

Following are the program in C language

#include <stdio.h>// header file

int main() // main function

{

   int x1,y1,z1; // variable declaration

   printf(" Enter the three number :");

   scanf("%d%d%d",&x1,&y1,&z1); // input the three number by user

   printf(" Number 1:%d",x1); // dispaly number 2

   printf("\n");// move the control to next line

   printf(" Number 2:%d",y1);// dispaly number 2

   printf("\n");// move the control to next line

   printf(" Number 3:%d",z1);// dispaly number 3

return 0;

}

Output:

Enter the three number :12 23 45

Number 1:  12

Number 2: 23

Number 3: 45

Explanation:

In this program we have declared three variable x1, y1, z1 of type int .After that we take the input from user  by using scanf function and finally  printed the value on the three separate lines.

In a LOS communication, consider d = 60km, the requirement is to make two antennas (transmitter and receiver) such that the height of one antenna should be four time of the other. Considering this, find the appropriate heights of these two antennas.

Answers

Answer:

for ratio 1:4

height for antenna 1 = 42.36

and height for antenna 2 =169.46

Explanation:

given data

distance d = 60km

height h1 = 4 h2

to find out

find the appropriate heights of these two antennas

solution

we know here that distance between 2 antennas  in LOS ( line of sight ) is express as

[tex]d = 3.57\sqrt{kh}[/tex]   ......................1

here d is distance and k is curvature of earth i.e 4/3  and h is height

we know height is 1:4 so total height is 5 part to get ratio

put value in equation 1

[tex]60 = 3.57\sqrt{\frac{4}{3} h}[/tex]  

solve it we get

h = 211.83

so for ration divide by 5

[tex]\frac{211.83}{5}[/tex]

= 42.36

so for ratio 1:4

so height for antenna 1 = 42.36

and height for antenna 2 = 4 × 42.36 = 169.46

.A(n) ____________ conversion occurs when C# converts one data type to another and the programmer has not provided code to perform the conversion.

a.explicit

b.implicit

c.narrowing conversion

d.widening

Answers

Answer:

The correct answer for the given question is option(b) i.e "Implicit conversion".

Explanation:

Implicit conversion converts one datatype to another without forcefully .it convert the one datatype to another automatically.The implicit type is a type safe  conversion .

For  example

int i = 57;  

float f = l;  // convert i to f without  forcefully.

The explicit conversion converts one datatype to another forcefully .This type of conversion is not a type safe conversion.

double d = 765.12;  

int i = (int)d;  // convert d to i forcefully

so the correct option is option(b).

Use the laws of propositional logic to prove the following:

(a) ¬p → ¬q ≡ q → p

(b) p ∧ (¬p → q) ≡ p

(c) (p → q) ∧ (p → r) ≡ p → (q ∧ r)

Answers

Final answer:

The logical equivalences ¬p → ¬q ≡ q → p, p ∧ (¬p → q) ≡ p, and (p → q) ∧ (p → r) ≡ p → (q ∧ r) are proven using the laws of propositional logic including contraposition, noncontradiction, and distribution.

Explanation:

Proof of Logical Equivalences

Using the laws of propositional logic, we can prove the following equivalences:

¬p → ¬q ≡ q → p can be proven by considering the truth tables for each side of the equivalence or using the contraposition law which states that the implication ¬p → ¬q is equivalent to q → p.

p ∧ (¬p → q) ≡ p can be proven by realizing that according to the law of noncontradiction, p and ¬p cannot both be true. If p is true, the implication ¬p → q is always true, thus the conjunction simplifies to just p.

(p → q) ∧ (p → r) ≡ p → (q ∧ r) uses the distribution of the implication over conjunction, which tells us that if p implies both q and r separately, then p must imply their conjunction q ∧ r.

Each of these logical equivalences utilizes fundamental logical laws such as the law of contraposition, noncontradiction, and distribution, to establish the equivalences. Understanding these laws helps in proving logical equivalences and understanding the structure of logical arguments.

What class of DSS focuses on simulation and optimization?

Answers

Answer:

Model-Driven DSS

Explanation:

Model-Driven DSS emphasizes direct exposure and manipulation of a model like optimization, statistical, simulation models and financial model.

Model-driven DSS uses data and variables obtained by policy-makers to help decision-makers to analyze a situation. However, they are generally not data-intensive, which is normally a very massive database which is not required for model-driven DSS.

explain the concept of scalability. How would you respond?

Answers

Answer:

In computer science, scalability is the ability of an application or product that could be software or software to continue responding well when its context is increased in volume or size to meet the user demand. Typically, when a product becomes aging or the context demands a rescaling to a larger size or volume, if the product is prepared to respond to this demand, then it's called a scalable product.

Write an algorithm that asks a user to enter a number between 1 and 10. (This range includes the numbers 1 and 10.) When they enter the number, check that it is actually between 1 and 10. If it is not, ask them to enter a number again. Continue to ask until they enter a valid number. Once their number is valid, output the number. (C++ form)

Answers

Answer:

do{

   cout<<"Introduce number \n"; //print the message

   cin>>num; //set the value of the number given

}while(num<1 || num>10); //repeat while the number is out of the range

cout<<"Number: "<<num; //print the number

Explanation:

The idea behind this code is to create a loop in which I can compare the number given  (between 1 and 10) and then print the number or get back and ask the number again.

#include <iostream>

using namespace std;

int main()

{

   int num; //create num variable

do

{

   cout<<"Introduce number \n"; //print the message

   cin>>num; //set the value of the number given

}while(num<1 || num>10); //repeat while the number is out of the range

cout<<"Number: "<<num; //print the number

}

What is an abstract class? (Points : 2) A generalized class used only to create related derived classes
A class without any superclasses
A class from which we create many instances
Any subclass with more than one superclass

Answers

Answer:

A generalized class used only to create related derived classes

Explanation:

An abstract class is a class which cannot be instantiated on its own. It is defined using an abstract keyword. However, an abstract class can be inherited from and the derived class can actually be instantiated. For example:

abstract class A{

}

class B extends A{

void test(){

}

}

Here class A is an abstract class, while class B inherits from A. Now we can create an instance of class B as follows:

B b = new B();

b.test();

Which of the following is supported by a primary key?

Changeable over time
May be null
Unique
Updateable

Answers

Answer:

Unique.

Explanation:

Unique is supported by a primary key because of primary key we can uniquely identify the tuple so the attribute which has been set as primary key must contain values that are unique and these values cannot be null.These values should not be changeable over time and updateable because there is a chance if these values are manipulated a copy of it may be present in that attribute.So the primary key won't be able to uniquely identify the tuple.

. A program will ""fall through"" a case section if it is missing the __________ statement.

Answers

Answer: Break statement

Explanation:

  In the computer programming language, the break statement is the statement that mainly control the loop statement and it is basically used to terminating the given loop.

When the break explanation is experienced from inside the loop, then the iteration of the loop stops there and control comes back immediately from loop to the main proclamation in the loop. The program fall thorough the case section in the program if it missing the execution of the  break statement.

 

Write a program that prompts the user to enter the minutes (e.g., 1 billion), and displays the number of years and days for the minutes. For simplicity, assume a year has 365 days. Here is a sample run: Enter the number of minutes: 1000000000 1000000000 minutes is approximately 1902 years and 214 days

Answers

Answer:

// here is code in c++.

// include headers

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

long long int minutes,years,days;

long long int s;

cout<<"please enter the minutes:";

 // read the minutes

cin>>minutes;

 // make a copy

s=minutes;

 // calculate days

days=minutes/1440;

 // calculate years

years=days/365;

 // calculate remaining days after years

days=days%365;

// print the result

cout<<s<<" minutes is equal to "<<years<<" years "<<days<<" days."<<endl;

return 0;

}

Explanation:

Read the number of minutes from user and assign it to variable "minutes" of long long int type.Make a copy of input minutes.Then calculate total days by dividing the input minutes with 1440, because there is 1440 minutes in a day.Then find the year by dividing days with 365.Then find the remaining days and print the output.

Output:

please enter the minutes:1000000000                                                                                                                          

1000000000 minutes is equal to 1902 years 214 days.

Convert the following hexadecimal numbers to decimal: (a) FF (b) F0A2 (c) 0F100 (d) 100

Answers

Answer:

a) 255

b) 61602

c)

d)

Explanation:

You need to understand the decimal equivalent of hexadecimal numbers, from 0 to 9 numbers are represented the same way, from 10 to 15 we use the alphabet, meaning 10 equals A in hexadecimal base, 11-B, 12-C, 13-D, 14-E, and 15-F.

For your first exercise you'll enumerate the number's positions fromright to lef begining with 0:

a.               F   F

position    1    0

Now you'll multiply your hexadecimal number (using the decimal equivalent for your letters) for the base (16) elevated to the number of the position:

[tex]F*16^{0}=15*1=15\\F*16^{1}=15*16=240[/tex]

Finally, you'll add your results:

240+15=255

FF=255

b.             F  0  A  2

position   3  2  1   0

[tex]2*16^{0}=2*1=2\\A*16^{1}=10*16=160\\0*16^{2}=0*256=0\\F*16^{3}=16*4096=61440\\\\2+160+0+61440=61602\\[/tex]

F0A2=61602

c.             F  1  0  0

position   3  2  1   0

[tex]0*16^{0}=0*1=0\\0*16^{1}=0*16=0\\1*16^{2}=1*256=256\\F*16^{3}=16*4096=61440\\0+0+256+61440=61696\\[/tex]

0F100=61696

d.              1  0  0

position  2  1   0

[tex]0*16^{0}=0*1=0\\0*16^{1}=0*16=0\\1*16^{2}=1*256=256\\\\0+0+256=256\\[/tex]

100=256

I hope you find this information useful! Good luck!

Final answer:

Hexadecimal to decimal conversion is done by multiplying each digit by 16 raised to the power of its position. For example, FF in hexadecimal converts to 255 in decimal, and F0A2 converts to 61602.

Explanation:

To convert hexadecimal numbers to decimal, we have to understand that hexadecimal is a base-16 number system, which means each digit represents a power of 16. Each digit is multiplied by 16 raised to the power of the position and then summed. The most right-hand position is raised to the power of 0, moving left, the next position is raised to the power of 1, and so on.

(a) FF in hex is 15*16^1 + 15*16^0 = 240 + 15 = 255 in decimal.(b) F0A2 in hex is 15*16^3 + 0*16^2 + 10*16^1 + 2*16^0 = 61440 + 0 + 160 + 2 = 61602 in decimal.(c) 0F100 in hex is 0*16^4 + 15*16^3 + 1*16^2 + 0*16^1 + 0*16^0 = 0 + 61440 + 256 + 0 + 0 = 61696 in decimal.(d) 100 in hex is 1*16^2 + 0*16^1 + 0*16^0 = 256 + 0 + 0 = 256 in decimal.

Which of the following is a color effect that can be used to emphasize text?: *
a. Edging
b. Shading
c. Highlighting
d. Choices B and C

Answers

Answer: (C) Highlighting

Explanation:

Highlighting is the process in which we can use the different effects of the color for highlight the background and also used for emphasize the text. Highlight is very useful in highlighting the important line, text and any kind of special word.

It is mostly used for draw attention towards the important sentence in the given whole page or paragraph by highlighting some important line or words.

On the other hand, all the other options are incorrect as they does not involve in the color effect for emphasize the text.

Therefore, (C) is correct option.

Write a for loop that displays your name and student number 12 times.

Example:

Mary Kaur ----- 123456

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

class Solution

{

// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object

       Scanner s=new Scanner(System.in);

        // variables

      String s_name;

      int s_num;

      System.out.print("Please enter the name:");

       // read the student name

      s_name=s.nextLine();

      System.out.print("Please enter the number:");

       // read the student number

      s_num=s.nextInt();

       // print name and number 12 times

      for(int i=0;i<12;i++)

      {

          System.out.println(s_name+"----"+s_num);

      }

   }catch(Exception ex){

       return;}

}

}

Explanation:

Create a scanner class object to read input from user.Read the student name and the number from user and assign them to variable "s_name" and "s_num".Print the student name and number 12 times with the help of for loop.

Output:

Please enter the name:Mary Kaur

Please enter the number:123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

How can an exception be explicitly raised in C++? How are exceptions bound to handlers in C++?

Answers

Answer:

Exceptions are raised using throw statement in c++.

Explanation:

Try block is used to keep the statements which we felt that they will raise an exception. Catch block is used to catch the exception which is thrown by the try block.

#include<iostream.h>

void main(){

int x,y,z;

try{

cout<"enter 2 numbers";

cin>>x>>y;

if(y==0)

throw y;

z=x/y;

}

catch(int x){

cout<<"exception caught";

}

}


Explain what is meant by "big data". Write three examples for Big Data.

Answers

Explanation:

Big Data :- It describes a large volume of data - both unstructured and structured that swamp a business on a day-to-day basis.Big data is very important for a company because it help to determine the root cause of the failures in real time,detects fraudulent,recalculate risks.

Big data in healthcare industry.

Big data in education industry.

Big data in media and entertainment industry.

Big data refers to the massive volumes of data that require advanced tools for processing and analysis. Examples include social media data, healthcare data, and e-commerce data. These large datasets offer new insights and create value in various fields.

Understanding Big Data :

Big data refers to the massive volume of information that exceeds the processing capacity of traditional data management tools. This concept not only highlights the vast quantity of data available but also emphasizes the advanced techniques required to analyze it. By leveraging large scale data sets, we can extract new insights, predict trends, and create new value in various fields.

Examples of Big Data :

Social Media Data: Platforms like Face book, Twi tter, and In stagram generate enormous amounts of data daily through user interactions, posts, likes, and shares.Healthcare Data: Medical records, patient history, and real-time health monitoring systems create vast datasets that can be used to improve patient care and predict health trends.E-commerce Data: Online retailers such as Amazon track user behavior, purchase history, and product reviews to personalize shopping experiences and improve inventory management.
Other Questions
Four people invested in a restaurant. One person invested $100,000. Two others invested inthe ratio x:2x, and the fourth person invested an amount equal to the other three investorscombined. The total investment was $ 1,100,000.Part AWrite an expression for the amount invested by the fourth person. The concentration of the appetite-regulating hormone ghrelin is about 1.3 10-10 M in the blood of a fasting person.How many molecules of ghrelin are in 1 L of blood?a) 2.2 10-34b) 1.3 10-10c) 7.8 1013d) 4.6 1033 In order to learn about children's toy preferences, researchers interview children at a local preschool and base their inferences on the children's responses. This is an example of _______ research. An economic outcome is said to be efficient if the economy isusing all of the scarce resources it has available.conserving on resources, rather than using all available resources.getting all it can get from the scarce resources it has available.able to produce more than what is currently being produced without additional resources. a. Every set has an element. b. The smallest perfect number is 28. c. Is 1.5 an irrational number? d. Please find the popular approximation of pi. e. Can you extract the root of -25? fill in the missing number 8____=48 PLEASE HELP ME WITH THIS AHHHH 15-(21) Colorado experiences a record snowfall during the winter season. What impact will this have on the market for snowmobiles?a. The supply of snowmobiles will increase and the price of snowmobiles will fall.b. The demand curve for snowmobiles will decrease and the price of snowmobiles will fall.c. The supply of snowmobiles will increase and the price of snowmobiles will increase.d. The demand curve for snowmobiles will increase and the price of snowmobiles will rise. Please please help me When a fluid flows through a sharp bend, low pressures maydevelopin localized regions of the bend. Estimate theminimumabsolute pressure (in psi) that can develop withoutcausingcavitation if the fluid is water at 160 oF. Liquid methyl ethyl ketone (mek) flows through a pipe with an inner diameter of 2.067 inches at an average velocity of 0.48 ft/s. at the fluid temperature of 20c the density of liquid mek is 0.805 g/cm3 and the viscosity is 0.43 centipoise [1 cp 1:00 103 kg/ m s]. without using a calculator, determine whether the flow is laminar or turbulent. show your calculations. In a study of the conversion of methane to other fuels, a chemical engineer mixes gaseous methane and gaseous water in a 0.379 L flask at 1191 K. At equilibrium, the flask contains 0.145 mol of CO gas, 0.218 mol of H2 gas, and 0.25 mol of methane. What is the water concentration at equilibrium (Kc = 0.30 for this process at 1191 K)?Enter to 4 decimal places.HINT: Look at sample problem 17.7 in the 8th ed Silberberg book. Write a balanced chemical equation. Write the Kc expression. Calculate the equilibrium concentrations of all the species given (moles/liter). Put values into Kc expression, solve for the unknown. Skeletal muscles are arranged in antagonistic pairs. What does this mean and what is an example?A.There are always paired tendons and ligaments; the hip joint.B.When one sarcomere contracts, the neighboring one relaxes; triceps and biceps.C.One is under conscious control and one is not; the diaphragm and ribs.D.There is always paired cartilage and muscle tissue; the knee joint.E.When one contracts, the other relaxes and this allows the bones to move; triceps and biceps. The calorie count of a serving of food can be computed based on its composition of carbohydrate, fat, and protein. The calorie count C for a serving of food can be computed using the formula Upper C equals 4 h plus 9 f plus 4 p, where h is the number of grams of carbohydrate contained in the serving, f is the number of grams of fat contained in the serving, and p is the number of grams of protein contained in the serving. A serving of raisins contains 148 calories and 29 grams of carbohydrate. If raisins are a fat-free food, how much protein is provided by this serving of raisins? Viola and Paige stand next to each other and kick soccer balls in the air. Thepath of Viola's ball is described by the equation y=-3x2 + 6x + 3. The path ofPaige's ball is shown by the graph.In each function, x is the horizontal distance the ball travels in meters, and yrepresents the height.Whose soccer ball reaches a greater height?OA. Both soccer balls reach the same heightOB. Viola's soccer ballOC. Paige's soccer ball An object with a charge of -2.9 C and a mass of 1.010^2 kg experiences an upward electric force, due to a uniform electric field, equal in magnitude to its weight. Find the magnitude of the electric field?If the electric charge on the object is doubled while its mass remains the same, find the direction and magnitude of its acceleration.? In using the net present value method, only projects with a zero or positive net present value are acceptable because: a. the return from these projects equals or exceeds the cost of capital b. a positive net present value on a particular project guarantees company profitability c. the company will be able to pay the necessary payments on any loans secured to finance the project d. Both a and b are correc What does life expectancy measure?the average income a population likely earns during employmentthe average human development during a population's lifetimethe average number of years that a population is likely to livethe average standard of living during a population's lifetime Find the area of the triangle with the vertices (2,1), (10,-1),and(-1,8). Find the missing length to the nearest tenth of a meter of theright triangle. One side is 1.4m and the other is 3.1. What is thethird side?