Answer:
Primary memory is the main memory ,Secondary memory can be external devices like CD, floppy magnetic discs etc
thats it to it really those are some of the reason
List the steps that the insertion sort algorithm would make in sorting the values 4, 1, 3, 2.
Answer:
The Insertion Algorithm will loop through the values given and move certain values back until the final array is sorted.
Explanation:
Insertion Algorithms start with the second value in a set.
Initial set: 4, 1, 3, 2
Step 1: 1 is lower than 4 so it is moved behind 4 and 4-2 are pushed forward by one ....... 1, 4, 3, 2
Step 2: 3 is lower than 4 but higher than 1 so it is moved behind 4 and 4 and 2 are pushed forward by one ..... 1, 3, 4, 2
Step 3: 2 is lower than 4 and lower than 3 but higher than 1 so it is moved behind 3, and 3-4 are pushed forward by one ...... 1, 2, 3, 4
The Set is now Sorted and the Insertion Algorithm is finished.
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
Something within a while loop must eventually cause the condition to become false, or a(n) __________ results.
1. null value
2. infinite loop
3. unexpected exit
4. compiler error
5. None of these
Answer: Infinite loop
Explanation:
A while loop terminates when the condition within the loop becomes false else the it will continue to loop for ever and thereby lead to memory overflow.
example : while(i<10)
{ print("hello");
}
here if value of i <10 then it will print hello, but if there is no condition it will lead to an infinite loop. example : while();
________ of Willa Catha present an unadorned picture oflife on the prairies of the Midwestern United States during the19th century.
The stories who
That the novels
The novels which
The novels
Answer:
"The novels"
Explanation:
Great question, it is always good to ask away and get rid of any doubts that you may be having.
Based on the sentence, we can see it is mentioning an object that belongs to Willa Catha. Unfortunately, all of them can be possible correct answers based on that information so we need to check which ones make the sentence factually and grammatically correct.
Therefore the only answer that makes this sentence both factually and grammatically correct is the last answer "The novels".
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
Cash cows are always in
a. Introductory industry
b. Growing industry
c. Mature industry
d. Declining industry
Answer:
The correct answer is C. Cash cows are always in mature industry.
Explanation:
A cash cow is a company, business area or product that generates a large free cash flow over time. Cash flow depends on the profitability of the company or product, that is, revenues are greater than costs, but also because the surplus is not tied up in the business in the form of working capital.
The cash flow in a company can be used to pay off debt but also as a dividend to owners. An individual product that constitutes a cash cow can help to finance other activities in the company or group.
Does RISC provide better performance today than CISC?
Answer: Yes, RISC has better performance than CISC at present .
Explanation: Following are the reasons for the better performance of the RISC as compared to CISC:-
RISC(Reduced instruction set computer) processors has simple instructions which take about one clock cycle whereas CSIC (complex instruction set computer) processor has complex instructions which may take multiple clocks to execute. Decoding of instruction in RISC is simple as compared to CISC .Execution time is less in RISC whereas CISC takes more time to executeRISC has reduced instruction that is the instructions are less but in CISC , the instruction set is complex which make the operation more complexNo requirement of external memory in RISC for calculation but CISC requires external memory for calculation. Convert the following Base 2 (binary) numbers to base 10(decimal):
11101
1010101
Answer:
11101=29 in base 10.
1010101=85 in base 10.
Explanation:
To convert a binary or Base 2 number into a decimal or base 10 we have multiply respective 1 and 0's to respective powers of 2 and then add them which gives us the decimal number.The LSB(Least Significant Bit) or right most digit in binary number will be multiplied by 2⁰ and increment the power by 1 as we move to the left side or to the MSB(Most Significant Bit).
(11101)₂=1x16+1x8+1x4+0x2+1x1 =16+8+4+1=(29)₁₀.
(1010101)₂=1x64+0x32+1x16+0x8+1x4+0x2+1x1=64+16+4+1=(85₁₀) .
T F In a function prototype, the names of the parameter variables may be left out.
Answer:
True.
Explanation:
In a function prototype, the names of the parameter variables may be left out.
ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?why or why not?
Answer:
The answer to this question is Yes it is possible
Explanation:
It can be done In the case where a special server is required in each network that would forward the request to the remote ARP(Address Resolution Protocol) server and will receive the response from the server and send it to the requesting host.So we conclude that we can do that hence the answer is Yes.
BorderLayout is the default layout manager for a JFrame’scontent pane
?? True
?? False
Answer:
True
Explanation:
BorderLayout is the default JFrame, JInternalFrame, and JApplet content panel layout manager.Border layout are used to arrange components(such as text fields, buttons, labels etc) in a particular manner.
Example
public class BorderLayout
extends Object
implements LayoutManager2, Serializable
These classes are used for making effective GUI(graphical user interface) in java.
Example for JFrame's content pane-
JButton button = new JButton("Button click (PAGE_START)");
/*making object JButton with a button name 'click*/
pane.add(button, BorderLayout.PAGE_START);
/*Adding Border layout in button*/
PAGE_START is BorderLayout constant,there are four more which defines the area-
PAGE_END
LINE_START
LINE_END
CENTER
Generally, what is the term for storage locations in a processor?
Answer: Registers
Explanation:
Registers are small storage locations identified by different types of registers. The function of the register is to provide data for immediate processing to the CPU. These registers hold data temporarily and provide easy access of data to the processor.
what is java applets?and can we used java applets in web site??
Answer: Java applets is the program written in java language that run in web application. Yes, we can use java applets in web sites.
Explanation: Java applets are the minor java language program that runs with the help of internet for the web applications having compatibility to work with java .These programs usually run in web browser for the execution and it is the client side applet. It is used because it serve the purpose of having approachable and interactive features .It is possible to use it in web sites .
Answer: Java applets is the program written in java language that run in web application. Yes, we can use java applets in web sites.
Explanation: Java applets are the minor java language program that runs with the help of internet for the web applications having compatibility to work with java .These programs usually run in web browser for the execution and it is the client side applet. It is used because it serve the purpose of having approachable and interactive features .It is possible to use it in web sites .
Which algorithm makes the most efficient use ofmemory?
Answer:
Best-fit Algorithm
Explanation:
Best-fit: Allocating the smallest memory location that is greater than or equal to the size of process.
Example
Let these are the memory locations-210kb,310kb,260kb,610kb
and size of processes-160kb,450kb,250kb,300kb
For the first-fit,
We allocate 160 kb to the 210kb memory location
Then, we allocate 450 kb to the 610kb because others don't have the size.
Then,we allocate 250kb to the 310 kb.
300 kb will stop,as no memory locations can execute.
For the Best-fit,
We allocate 160 kb to the 210kb memory location
Then,we allocate 450kb to the 610kb.
Then,we allocate 250kb to the 260kb not 310kb according to best-fit.
Then we allocate 300kb to the 310kb.
For the worst fit,
We allocate 160 kb to the 610kb memory location according to the worst-fit algorithm.
Then,we can't allocate 450kb to any memory location.
Then,we allocate 250kb to the 310kb .
We can' allocate 300kb in 260kb memory location.
As we can see from this example that in First-fit algorithm 300kb process will stop as no memory location is there.
In worst-fit algorithm ,We can't allocate 450kb,300kb to any memory locations.
In Best-fit algorithm,we can allocate the process to each location,so this algorithm is using memory in a efficient way.
1) Only analog signals can be used to transmit information.
a) True b) False
Answer: False
Explanation:
Digital signal is used for transmission of information over a dedicated line wheres for using analog signal for transmission of information it is first converted to digital to be able to transfer it across long distances./
The power we use at home has a frequency of 60 HZ. What is the time period of such a power?
Answer:
The period of the power for our lights at home is 0.0116 s, or 16.6 ms.
program for bit stuffing...?
Answer: Program for bit stuffing in C
#include<stdio.h>
int main()
{
int i=0,count=0;
char data[50];
printf("Enter the Bits: ");
scanf("%s",data); //entering the bits ie. 0,1
printf("Data Bits Before Bit Stuffing:%s",databits);
printf("\nData Bits After Bit stuffing :");
for(i=0; i<strlen(data); i++)
{
if(data[i]=='1')
count++;
else
count=0;
printf("%c",data[i]);
if(count==4)
{
printf("0");
count=0;
}
}
return 0;
}
Explanation:
bit stuffing is the insertion of non-information bits during transmission of frames between sender and receiver. In the above program we are stuffing 0 bit after 4 consecutive 1's. So to count the number of 1's we have used a count variable. We have used a char array to store the data bits . We use a for loop to iterate through the data bits to stuff a 0 after 4 consecutive 1's.
Write a program to define three variables to hold three test scores. The program should ask the user to enter three test scores and then assign the values entered to the variables. The program should display the average of the test scores and the letter grade that is assigned for the test score average. Use the grading scheme in the following table. 90 or greater 80-89 70-79 60-69 Below 60
Answer:
It's always good to use if else with boolean expressions in such cases.
Explanation:
I have written a program where I have used c# as programming language.
I used if else block with boolean expressions to enforce conditions to print the grades according to the average of test scores. I have used Logical And(&&) operator in boolean expressions so that all the conditions in if and if else must be true
Here is the program:
using System;
public class Test
{
public static void Main()
{
int testScore1, testScore2, testScore3;
Console.WriteLine("enter first testScore");
testScore1 = Convert.ToInt32(Console.ReadLine());
Console.WriteLine("enter second testScore");
testScore2 = Convert.ToInt32(Console.ReadLine());
Console.WriteLine("enter third testScore");
testScore3 = Convert.ToInt32(Console.ReadLine());
float avg = (testScore1 + testScore2 + testScore3) / 3;
if(avg>=90)
{
Console.WriteLine("You got grade A");
}
else if(avg >=80 && avg <=89)
{
Console.WriteLine("You got grade B");
}
else if (avg >= 70 && avg <= 79)
{
Console.WriteLine("You got grade c");
}
else if (avg >= 60 && avg <= 69)
{
Console.WriteLine("You got grade D");
}
else if(avg< 60)
{
Console.WriteLine("You got grade E");
}
else
{
Console.WriteLine("Sorry, You failed");
}
Console.ReadLine();
}
}
Explanation of program:
I created three variables named, testScore1, testScore2, testScore3 of datatype int. I prompted the user to enter three test score values. Each value is read using Console.ReadLine() . As the value entered is of type integer, I converted the console read value into int using Convert method.
In the next step, I calculated average using the formula.
Now, Based on the average, I can calculate the grade according to the given grading scheme.
UML uses the________________ diagram to model the flow of procedureor
activities in aclass.
a. Activity b. case
Answer:
A - Activity
Explanation:
UML contains multiple subdivisions of diagrams which allow you to visualize what the software will do, while activity diagrams demonstrate the process of what happens in the system being modeled. This is why UML uses the activity diagram to model the flow of procedure.
.When a system is designed such that there is one-to-manydependency between objdects with automatic notification ofdependents when any object changes, the implied patterns iscalled:
A.observer B.mediator C.interpreter D.iterator
Answer: A) observer
Explanation:
When the system are designed in such a way that there is one to many dependency between the object, when the object changed with the automatic notice of the dependent , and the implied pattern are known as observer. As, the pattern observer are defined a one to many object dependency so, when the state of one object changed, then the dependent update automatically. Observable object are get notified for the changes when a class are get implemented observer interface.
Which of the following is NOT areserved word in Java?intpublicstaticnum
Answer:
num
Explanation:
In java reserved words are also known as keywords, keywords are reserve words for a language that can't be used as an identifier(name of a class, name of a variable, name of an array etc.) int, public static, are reserve words.
In given question num is not a reserved word.
True / False
Generally, a multiply instruction takes more clock cycles than an add instruction.
Answer: True
Explanation:
A multiplication takes more clock cycle than an add instruction as, multiplication has more complicated circuit as compared to addition instruction. Multiplication instruction may takes more duration depends on its processor or architecture. Sometimes, it is difficult and take longer time to calculate the multiplication of decimal integer and numbers.
Which of the following statements is false? a. Racks and bins are examples of storage equipment. b. Automation refers to equipment that complements, rather than replaces, human contact. c. Forklifts can be dangerous. d. In a part-to-picker system, the pick location is brought to the picker.
Answer:
b. Automation refers to equipment that complements, rather than replaces, human contact.
In these kinds of systems, a mechanical device—typically—brings the pick location to the picker. The device's transit time is crucial in part-to-picker systems. Since the proper pick position is automatically offered, the picker's search time is greatly decreased. Thus option B is correct.
What best define about In a part-to-picker system?Systems for picking orders from warehouses are created to improve picking operations' effectiveness, speed, and accuracy. One or more of these systems can be used by businesses to improve order fulfilment processes in their distribution centres.
In this approach, warehouses set up a space for material handling, where merchandise is frequently moved using forklifts. Additionally, the system has a picking section where order pickers acquire goods to complete customer orders.
Therefore, Automation refers to equipment that complements, rather than replaces, human contact.
Learn more about picker system here:
https://brainly.com/question/23287453
#SPJ5
What are search tries? Why are they more efficient than usualsearching
algorithms?
Answer:
Trie is a tree based data structure where the keys are strings.
Search trees are a data structures in Computer Science in which they are based on trees.
Explanation:
Search trees are tree based data structures which are used to search elements in the tree as the names suggests (search tree). However, for a tree to perform as search tree the key it has to follow specific conditions. They are , the the key of any node has to be less than the all the keys present in the right sub trees and greater than all the keys present in the left subtree.
Two input capture events occur at counts 0x1037 and 0xFF20 of the free-running counter. How many counts, in decimal have transpired between these two events?
A. 25,891
B. 57, 421
C. 61,161
D. 64, 551
Answer:
The correct answer is C.
Explanation:
You have to do 0xFF20 - 0x1037 but first, you need to convert the counts from hexadecimal base system to decimal base system using this formula:
[tex]N = x_{1} * 16^{0} + x_{2} * 16^{1} + x_{3} * 16^{2} + x_{4} * 16^{3} + ... + x_n 16^{n-1}[/tex], where position of the x₀ is the rightmost digit of the number.
Note:
A = 10.B = 11.C = 12.D = 13.E = 14.F = 15.0xFF20 = 15*16³+15*16²+2*16¹ = 65312
0x1037 = 1*16³+3*16¹+7*16⁰ = 4151
Result: 65312 - 4151 = 61161
List and explain the error in the code
public class Weekdays {
public static void main(String[] args) {
final String[] WEEKDAYS = {"Monday", "Tuesday", "Wednesday", "Thursday", "Friday", "Saturday", "Sunday"}
System.out.println("List of weekdays:");
for (int i = 1; i
System.out.println(WEEKDAYS[i]);
}
Answer:
Errors:
1. semicolon is missing in the declaration of string.
2. for loop is not complete.
3. one curly braces is missing for closing class.
Explanation:
In the programming, semicolon is used at the end of the statement as a terminator.
in the declaration of string array semicolon is missing.
for loop is incomplete.
syntax of for loop;
for(initialization;condition;increment/decrement)
{
statement;
}
and finally curly braces in the programming braces must be enclose.
here, the braces of the class is missing.
What are the two categories of problems that we can simply convert
to parallel code?
.When one component modifies an internal data item in anothercomponent we call this:
A.content coupling B.common coupling C.controlcoupling D. all of the above
Answer:
A. content coupling
Explanation:
When one component modifies an internal data item in another component we call this content coupling.
Which of the following variable names is not valid? 1price 1 price price 1 price1
Answer:
1price 1 price price 1
Explanation:
In the c programming, the rule for valid variable name.
1. Variable name cannot start with numeric value like 1,2,3..
2. Space and special character other than underscore '_' are not allowed.
3. After the first letter, numeric values can be used.
Let discuss the options:
Option A: 1price
it start with number which is not allowed.
Option B: 1 price
it start with number and also contain the space which is not allowed.
Option C: price 1
it contain the space which is not allowed.
Option D: price1
it is the valid variable name, start with letter and their is no space.
Therefore, option A, B and C are correct option.
Unless you explicitly initialize global variables, they are automatically initialized to
_________.
Answer:
Zero(0)
Explanation:
Global Variables
Variables which are declared outside any function. Any function can use these variables,they are automatically initialized to zero(0).They are generally declared before main() function.
Example- C program for showing global variable is 0.
#include <stdio.h>
int g; // declaring g as global variable
int main()
{
printf("%d",g); //printing global variable
return 0;
}
Output
0
Describe the attacks in wireless networks that are more serious com pared to wired network
Answer:
Both types of attacks can be devastating.
Explanation:
Attacks Wireless Networks are sometimes considered more serious because they can be attacked from remote locations. One of the more serious attacks would be against commercial airplanes. A wireless hack and system shutdown of a commercial aircraft can be catastrophic, and can all be done wireless. While a Wired Network attack can cause catastrophic events they need to be attacked from within the location of the network which is usually guarded by security personnel as well as system firewalls.
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
ith reference to McCall's quality modle , what are the three important aspects of a software product ?
Answer: According to McCall's quality model , the three important factors for the aspect of a software product are:-
Product RevisionProduct Operation Product TransitionExplanation:
Product Revision:-these are the factors which includes the maintenance, flexibility and testing of a software .
Product Operation:-these include the factors like checking the correctness, usability, reliability, efficiency and Integrity of software to maintain its quality
Product Transition:- these are the qualities that define the portability, interoperability and whether the software can be reused or not .