Answer:
Firstly, the software designer basically understand the pattern of the system by think with broader perspective. By establish the pattern first design the proper context of the system.
The pattern dependency basically focus on manage the relationship between the different types of the modules. It basically provide the actual guidance which increase the reuse-ability of the module.
We can also extract the given pattern that from the level of the abstraction and lack cohesion modules are basically difficult to maintain.
Flash memory is:
a) a semiconductor
b) a type of ROM
c) non-volatile
d) all of the above
e) none of the above
Answer:
d) all of the above.
Explanation:
Flash Memory is a memory storage that is non volatile.It can be erased electrically and reprogrammed since it is a type of ROM(Read Only Memory).It is the least expensive form of semiconductor memory.It offers lower power consumption and can be erased in large blocks.
Hence the answer to this question is option d.
Left uncaught, a thrown exception will cause your program to terminate.
Select one:
a. FALSE
b. TRUE
Answer: True
Explanation:
Yes, the given statement is true that the left uncaught, the throwing exceptions caused stop execution or terminate the program. The uncaught exception is basically refers that the compiler control the termination function in the program.
Left Uncaught exception basically cause termination of the program and also implement the interface in the uncaught exception handler in the particular java thread.
If (41)r = (21)10, determine the value of the radix r.
Answer:
r=5.
Explanation:
Since we know we can convert a a number with any base to base ten(10) by multiplying the corresponding powers of the base.Stating form the LSB(Least Significant Bit) and with the power 0 and the power will increase by 1 as we move to MSB(Most Significant Bit).
[tex]4*r^1+1*r^0 = 21[/tex]
[tex]4r = 21 -1[/tex]
[tex]4r=20[/tex]
[tex]r=5[/tex]
Complete the following conversions. You MUST show all of your work to receive full credit.
Convert the following Hex numbers to decimal.
a. FFFF
b. 0123
c. 005F
d. 026A
e. 73B0
Answer:
Following are the decimal num
a. FFFF=65535
b. 0123=291
c. 005F=95
d. 026A=618
e. 73B0=29616
Explanation:
Conversion of hexa decimal number to decimal number is done by multiplying the digit with corresponding power of 16.
FFFF= 15 x 16³+15 x 16² + 15 x 16¹+ 15 x 16⁰.
=61440+3840+240+15
=65535
0123=0 x 16³+1 x 16²+2 x 16¹+3 x 16⁰
=0+256+32+3
=291
005F=0 x 16³+0 x 16²+5 x 16¹+F x 16⁰
=0+0+80+15
=95
026A=0 x 16³+2 x 16²+6 x 16¹+A x 16⁰
=0+512+96+10
=618
73B0=7 x 16³+3 x 16²+B x 16¹+0 x 16⁰
=28672+768+176+0
=29616
how can i take out a random (double) number in between 5.0 to 15.0 in c++?
Answer:
#include <iostream>
using namespace std;
int main() {
srand(time(0));
for(int i=0;i<5;i++)
{
double f = (double)rand() / RAND_MAX;//generating random numbers.
double a= 5.0 + f * (15.0 - 5.0);//random numbers in range provided.
cout<<a<<" ";
}
return 0;
}
Explanation:
The above program generate five random numbers in the range 5.0 to 15.0.The function rand() is used to generate random numbers.First we have to call srand(time(0)) otherwise the rand() function will generate same random numbers over and over every time.
Wi-Fi is all around us. Is there any downside to its pervasiveness?
Answer:
Wi-Fi(Wireless fidelity) is the networking technology that helps in providing the internet connectivity to the users. The Wi-Fi is all around the surrounding due to several Wi-Fi connections the users demand and use. It creates the networking environment where internet access becomes easy.
There are drawback to Wi-Fi service range that covers a large area is the high number of users.The addition of many users slow down the data rate and accessing .The radiation from this service is also a negative side of the Wi-Fi pervasiveness.
Final answer:
The downsides to the pervasiveness of Wi-Fi include the digital divide, security risks, and the psychological impact of being constantly connected. To mitigate these issues, digital literacy, cybersecurity, and healthy digital habits are crucial.
Explanation:
Wi-Fi's pervasiveness indeed comes with downsides alongside the immense benefits it provides in terms of connectivity and access to information. One major concern is the digital divide, a gap that is widening between those who have access to technology and those who do not, both locally and globally. This phenomenon can lead to disparities in access to information and inequalities in educational and economic opportunities.
Another significant concern is security risks. With Wi-Fi networks, there is the potential for eavesdropping and unauthorized access to communications, raising issues of privacy and data protection. As we further integrate Wi-Fi and other wireless technologies into critical infrastructure and personal devices, the risk for systemic failures and technological vulnerabilities increases, which could have severe consequences in the event of natural disasters or targeted attacks.
. Why is it insufficient to develop a long-term IT strategy and not reexamine the strategy on a regular basis?
a. Systems need to be maintained
b. To keep the CIO part of the executive team
c. Organizational goals change over time
d. To automate business processes
Answer:
The correct answer is c. Organizational goals change over time.
Explanation:
Develop a long-term IT strategy is an important goal to provide planning and solutions to an organization but it is important to reexamine the IT strategy on a regular basis to do corrections on this strategy because organizational goals change over time.
The value of the mathematical constant e can be expressed as an infinite series: e=1+1/1!+1/2!+1/3!+... Write a program that approximates e by computing the value of 1+1/1!+1/2!+1/3!+...+1/n! where n is an integer entered by the user.
Answer:
// here is code in c++ to find the approx value of "e".
#include <bits/stdc++.h>
using namespace std;
// function to find factorial of a number
double fact(int n){
double f =1.0;
// if n=0 then return 1
if(n==0)
return 1;
for(int a=1;a<=n;++a)
f = f *a;
// return the factorial of number
return f;
}
// driver function
int main()
{
// variable
int n;
double sum=0;
cout<<"enter n:";
// read the value of n
cin>>n;
// Calculate the sum of the series
for (int x = 0; x <= n; x++)
{
sum += 1.0/fact(x);
}
// print the approx value of "e"
cout<<"Approx Value of e is: "<<sum<<endl;
return 0;
}
Explanation:
Read the value of "n" from user. Declare and initialize variable "sum" to store the sum of series.Create a function to Calculate the factorial of a given number. Calculate the sum of all the term of the series 1+1/1!+1/2!.....+1/n!.This will be the approx value of "e".
Output:
enter n:12
Approx Value of e is: 2.71828
Euler's number, e, can be approximated using a series expansion. The provided C program calculates e by summing the series up to 1/n! where n is entered by the user.
Euler's number, e, is a mathematical constant approximately equal to 2.71828. It can be computed using the series expansion:
e = 1 + 1/1! + 1/2! + 1/3! + ... + 1/n!Below is a C program that approximates e by computing the sum up to 1/n! where n is an integer entered by the user.
#include <stdio.h>For a class Foo, one difference between a variable declared Foo * and a variable declared Foo & is that only the variable declared Foo & can potentially have the value NULL.
Select one:
a. FALSE
b. TRUE
Answer:
False.
Explanation:
When we declare a variable as reference type we have to initialize that variable otherwise the compiler will give error that the reference variable is not initialized.You also cannot initialize the variable Foo& with NULL value because it is a reference variable and we have to initialize it.
On the other there is no need to initialize the variable Foo * since it is a pointer it can also store NULL value.
So the answer is only Foo* can store NULL value not Foo &.
What is the Matlab command to create a column vector with 11 equally spaced elements, whose first element is 2 and whose last is 32.
Answer:
transpose(linspace(2,32,11))
Explanation:
To get the equally spaced elements you can use:
linspace is the command for generating a linearly spaced vector.
For instance, the command:
linspace(element1,element2,n)
generates n points, between element1 and element2
The spacing between the points is calculated by
[tex]\frac{element2-element1}{n-1}[/tex]
In your case, the linspace command will create a vector with 1 row and 11 columns (1x11).
To get the column vector:
In order to convert this vector into one with 11 rows and 1 column (11x1), you can use:
tanspose(vector)
where vector is linspace(element1,element2,n)
Broadly speaking, how is testing in an object-oriented approach different to testing in traditional software development?
Answer:
In object oriented programming methodology, the attention is that capture the main structure and conduct of data frameworks into little modules that joins the two information and procedure.
The main principle of Object Oriented Design (OOD) is that it helps in improve the quality and efficiency of framework analysis and configuration by make the system more progressively usable.
The software Programming testing is a significant period of the product advancement cycle of the life. Testing is the way toward executing the main structure of the program with the help of main objective and also discovering mistakes.
In today world the situation of the object oriented ideas are utilized all through programming designing. Testing of item arranged programming is unique in relation to testing with the traditional programming.
__________________ are evaluations of a network
Answer:
The evaluation of the network is basically depend upon the various factors such as the stage, type and size of the network development. The main purpose for the evaluation of the network is that the system works with high efficiency without any interruption in the network.
According to the size and the type of the network we can easily evaluate the particular network in the system and then we can easily work on the network infrastructure to make the network more efficient.
While there are a lot of programming languages out there, one of the most widely used when it comes to web applications and web oriented products is Javascript. It differs from other 'standard' program languages in many ways. Using the Internet and/or your book as a resource, describe some of the differences between JavaScript and other programming languages like C++, C#, and Java?
Explanation:
The main differences between Javascript and other programming languages are as following :-
Javascript is a scripting language so it doesn't need to be compiled to get executed while other programming languages like C++,Java etc need to be compiled.Javascript is typed dynamically while other languages are static typed.Browsers can execute Javascript code on the other hand they can't execute Java,C++ etc.. What year did the USA host World Cup? Right answer 1994
Answer:
USA host World Cup in 1994 1994 FIFA World Cup
Explanation:
USA host World Cup in 1994 FIFA World Cup
it was the 15th edition of FIFA World Cup
and Brazil was won the tournament
Brazil beat Italy by 3–2 in penalty shoot-out
it was play between 17 June to 17 July and 24 team play this World Cup
and there matches played = 52
and 9 cities host this game
United States of America was chosen as the host by FIFA on the 4 July, 1988
Some companies, especially consulting firms, require their employees to create ____ about sessions with clients.
timesheets
reports
logs
stories
Answer: Reports
Explanation:
Some companies always ask to the employees to create the particular report for the session with their clients.
As, the report is the main communication channel between the company employees and clients where all the information are complied together and focus for transmitting the data clearly.
Efficient reports are basically help in the decision making and problem with sufficient knowledge.
On the other hand, all the other options are not needed for session with the clients in the organization. Therefore, report is the correct option.
Using Karnaugh maps, simplify the following Boolean function:
F(a,b,c,d) = a' b' c' + b' c d' + a' b c d' + a b' c'
Answer:
F(a,b,c,d)=b'c' + a'cd' + ab'd'.
Explanation:
The image of the corresponding k-map is attached to this answer please refer it.By the sop given in the question the k-map is formed.There are 3 groups formed 1 group of four 1's and 2 groups of 2 1's.Hence there are three sop and the sop is reduced from the previous SOP.
. Write the C++ code that reads an integer from the user, and then computes that integer's absolute value.
Answer:
Following are the program in C++
#include <iostream>// header file
using namespace std;
int main() // main function
{
int num; // variable declarartion
cout<<" Enter the number:";
cin>>num; // user input
num=abs(num); // finding the absolute
cout<<num; // display number
return 0;
}
Output:
Enter the number:-90
90
Explanation:
In this program we have declared a variable "num" of type int. After that we find the absolute value by using abs function and finally display the variable "num".
Which of the following creates a new table called 'game_scores' with 2 columns 'player_name' and 'player_score'?
(a) CREATE TABLE game_scores (
player_name string(45),
player_score integer(10)
);
(b) NEW TABLE (
player_name varchar(45),
player_score int(10)
) AS game_scores;
(c) NEW TABLE game_scores (
player_name varchar(45),
player_score int(10)
);
(d) CREATE TABLE (
player_name varchar(45),
player_score int(10)
) AS game_scores;
(e) CREATE TABLE game_scores (
player_name varchar(45),
player_score int(10)
);
Answer:
e
Explanation:
the valid sql syntax for creating table is
CREATE TABLE table_name (
column_name column_type
)
varchar and int are the valid sql types not string and integer
AS is used in select queries to aggregate results under given name
Enumerations can contain ___________ values.
a.only unique
b.an indefinite number of
c.up to 10
d.up to 100
Answer: (A) Only unique
Explanation:
Enumeration basically contain only unique value as enumeration is define as the set of the numeric values that is finite and it is represent specifically by the identifiers which is known as the enumeration constant.
It only work with the finite values and also hide all the un-relevant and unnecessary information from the programmers. Enumeration is the type of the data type variable which contain only previous declared values.
Name the contributions of Steve Jobs and Bill Gates, with respect to technology.
Answer: Steve Jobs made several contributions towards technology by introducing the range of Apple devices and technologies .he started the Apple Incorporation.The technologies introduced by his company are as follows:-
iPodiPhoneApple LisaiMaciPad etc.Bill Gates is the founder of Microsoft incorporation and made a lot of development in that field to create various software for the operating system.the creation of "Microsoft Window" was started by him and some other contributions are as follows:
Windows 7Windows 8VistaXPwindows 95 etc.Answer:
Steve jobs also made the Macintosh
Explanation:
Which of the following statements about a stack is correct?
A stack pointer holds the address of the next free location in the stack at any given time.
A stack grows downward from high memory to low memory.
A stack is a set of memory locations reserved for storing information temporarily during the execution of programs.
All of the above
None of the above
Answer:
All of the above.
Explanation:
All the information provided in the question about stack is correct.
A stack pointer(SP) is a register to hold the address of the next free location that is present in the stack at any given time.
The growth of the stack is downwards it goes form high memory to low memory.The first address pushed be stored on the higher memory location in the stack and the next address will be stored at lower memory location.
A stack stored the temporarily for the duration of the execution of the program.
What is the efficiency (Big O Notation) of quicksort algorithm?
Answer:
O(NlogN)
Explanation:
The time complexity of quick sort in worst case is O(N²) but the average case time complexity of quick sort is O(NLogN).The efficiency of quick sort totally depends upon the pivot.If the pivot is the smallest or the largest element in the array every time then the time complexity of quick sort algorithm will come out to be O(N²).
Write a program that reads a string from the keyboard and tests whether it contains a valid date. Display the date and a message that indicates whether it is valid. If it is not valid, also display a message explaining why it is not valid. The input date will have the format mm/dd/yyyy. A valid month value mm must be from 1 to 12 (January is 1). The day value dd must be from 1 to a value that is appropriate for the given month. September, April, June, and November each have 30 days. February has 28 days except for leap years when it has 29. The remaining months all have 31 days each. A leap year is any year that is divisible by 4 but not divisible by 100 unless it is also divisible by 400.
Answer:
// here is code in java.
import java.util.*;
// class definition
public class Main {
// main method of the class
public static void main(String[] args) throws Exception {
// Scanner object to read date
Scanner in = new Scanner(System.in);
System.out.print("Enter a date in format mm/dd/yyyy to check:");
// read the date from user
String inp_date = in .next();
// split the date with "/" delimeter
String[] ip = inp_date.split("/");
// find month from date
int inp_month = Integer.parseInt(ip[0]);
// find day from date
int inp_day = Integer.parseInt(ip[1]);
// find year from date
int inp_year = Integer.parseInt(ip[2]);
// boolean variable
boolean flag = true;
// print the input date
System.out.println("Your Entered date was: " + inp_date);
// check month is valid or not
if (inp_month < 1 || inp_month > 12)
{
System.out.println("Entered Date is invalid:");
System.out.println("The input month is not from 1 - 12.");
flag = false;
}
//check day is valid or not
else if (inp_day < 1) {
System.out.println("Entered Date is invalid:");
System.out.println("The value of day is less than 1.");
flag = false;
}
// check days in those month which has 30 days
else if ((inp_month == 4 || inp_month == 6 || inp_month == 9 || inp_month == 11) && inp_day > 30) {
System.out.println("Entered Date is invalid::");
System.out.println("This month have only 30 days, but Entered day is greater than 30.");
flag = false;
}
// if month is February then check leap year and days
else if (inp_month == 2 && ((inp_year % 4 == 0) && (inp_year % 100 != 0))) {
if (inp_day > 29) {
System.out.println("Entered Date is invalid::");
System.out.println("In a leap year, only 29 days in February.");
flag = false;
}
}
// if month is February and year is non-leap
else if (inp_month == 2 && inp_day > 28) {
System.out.println("Entered Date is invalid:");
System.out.println("In a non-leap year, only 28 days in February.");
flag = false;
}
// if all are valid
if (flag)
System.out.println("Entered Date is valid:");
}
}
Explanation:
Read the date from user in mm/dd/yyyy format with the help of Scanner object. Extract day, month and year from the date. Then check whether month is between 1-12 or not and print appropriate message. After that check day is less than 1 or not, if not then print reason. Check the days in those month which has 30 days in it.If month is February then check for leap year and day is greater than 29 then print reason. Else if month is February and year is non-leap then check days whether it is greater than 28 or not. In last If value of flag is true then print date is valid.
Output:
Enter a date in format mm/dd/yyyy to check:2/30/2012
Your Entered date was: 2/30/2012
Entered Date is invalid::
In a leap year, only 29 days in February.
What is a URI (include example)
Answer:
URI is the uniform resource identifier and it is basically a sequence of the character which identify the physical and logical resources. The uniform resource identifier basically contain the predefined set of rules and syntax and also maintain the extensibility hierarchical schema.
There are basically two types of URI that are:
1) Uniform Resource Name (URN)
2) Uniform Resource Locator (URL)
For example: HTTP protocol , file transfer protocol (FTP).
. Write an if/else statement that assign "Excellent" to variable comments (a string data type) when score is 90 or higher, "Good" when score is between 80 and 89, and "Try Harder" when score is less than 80.
Answer:
Following are the program in c++
if(score>= 90)
// check if score 90 or higher
{
comments = "Excellent"; // initialize comments to excellent
}
else if(score<90 && score >= 80)
// check if when score is between 80 and 89
{
comments = "Good"; //initialize comments to good
}
else
//when score is less than 80.
{
comments = "Try Harder"; //initialize comments to try harder
}
Explanation:
Following are the program in c++ language
#include<iostream> // header file
using namespace std; // namespace
int main() // main function
{
string comments; // variable
int score; // variable declaration
cout<<" enter score ";
cin>>score;
if(score>= 90)
{
comments = "Excellent"; // initialize comments to execellent
}
else if(score<90 && score >= 80)
{
comments = "Good"; //initialize comments to good
}
else
{
comments = "Try Harder"; //initialize comments to try harder
}
cout<<comments;
return(0);
}
Output:
enter score
45
Try Harder
In this we check the condition
if score>= 90 then it store the Excellent in variable comments of type string
if(score<90 && score >= 80)
it store the Good in variable comments of type string.
otherwise it store harder in variable comments of type string.
What value will be stored in the Boolean variable t after each of the following statements executes?
A) t = (12 > 1);
B) t = (2 < 0);
C) t = (5 == (3 * 2)); D) t = (5 == 5);
Answer:
A) True
B) False
C) False
D) True
Explanation:
In the following expressions we are evaluating whether a value is greater than (>), less than (<) or equal (==) to another value.
A) The expression is pointing out that 12 is greater than 1, which is True.
B) The expression is pointing out that 2 is less than 0, which is False
C) The expression is pointing out that 5 is equal to (3*2); 3*2=6 therefore 5 is not equal to 6. The answer is False
D) The expression is pointing out that 5 is equal to 5, which is True.
What Will Social Media Look Like in the Future?
Final answer:
Social media in the future is likely to continue evolving and impacting how we interact with the world. It may integrate virtual reality and augmented reality technologies, utilize advanced algorithms and AI, and prioritize privacy and security.
Explanation:
Social media in the future is likely to continue evolving and impacting how we interact with the world. It will likely become more integrated into our daily lives, affecting various aspects such as communication, entertainment, and information dissemination.
One possibility is the increased use of virtual reality (VR) and augmented reality (AR) technologies in social media. Users might be able to experience virtual environments and interact with others in a more immersive way. Social media platforms could also utilize advanced algorithms and artificial intelligence (AI) to provide more personalized content and recommendations based on user preferences and behavior.
Additionally, social media may see advancements in privacy and security features to address concerns over data protection and online safety. New regulations could be implemented to ensure the responsible use of social media and protect users from harmful or misleading content.
Define the keywords final and static.
Answer:
Final Keyword:-It is defined in the class that has the property of non-inheritance and can declare the constant variables. It has no re-initialization function.At the time of the final declaration,it is required that the variable should be initialized.
Static Keyword:-It is used in a particular class for defining it's member so that it can used for any object of the class.Static method in a class can call this keyword. It can has the property of being re-initialized.
The World Wide Web (not the Internet) went live in this decade:
Select one:
a. 1960s
b. 1970s
c. 1980s
d. 1990s
Answer:
d. 1990s
Explanation:
The World Wide Web is a kind of friendly information system that uses hypertext, and since its creation has made Internet available for most people.
The Internet already existed quite before the World Wide Web: the first computer network was ARPANET (created in 1969), a project of the Advanced Research Projects Agency of the United States Department of Defense.
Further developments in computers' protocols (ways in which computers communicate with each other) resulted in a network of networks, or the Internet, in 1983.
Although the World Wide Web was a proposal first published on March 12, 1989, by Tim Berners-Lee of the European Nuclear Research Center (CERN) --this is why it is considered that the World Wide Web was created in 1989-- the idea came into life at the end of the year 1990, for the following reasons:
After that proposal of 1989, Berners-Lee wrote another on May 1990, and in September 1990 he received support to develop those ideas.Some of the essential technologies needed to create the World Wide Web were already available by October 1990, that is, the HTTP (Hypertext Transfer Protocol), the HTML (Hypertext Markup Language) and the URI (Universal Resource Identifier), all considered been developed by Berners-Lee.On November 12, 1990, with the Belgian engineer Robert Cailliau, who was working in similar ideas, wrote a more formal proposal of such a system to share information across the CERN where they mentioned: "build a Hypertext project called WorldWideWeb" [Wikipedia, 2019].Well, by the end of December 1990, in a NeXT computer, and after the creation of the first web server and the first web page browser, the first web site, running at CERN, appeared on December 20, 1990.
This idea was rapidly adopted outside the CERN in 1991 and, by the end of the 1990s, more than 130 million people could access the Internet using the World Wide Web technology.
In conclusion, the World Wide Web went live in the decade of 1990s: was a project, a proposal by the end of 1989 and started to work as a fast-adopted technology at the beginning, and throughout, the 1990s.
Answer:
b
Explanation:
In what respects does a UML state diagram differ from a state transition diagram?
Answer: The difference between the UML state diagram and state transition diagram are as follow:-
State-transition diagrams display the states of the object where the change takes place whereas the UML(Unified modeling language) state diagrams are representation of parts of system at certain time instance. State-transition diagram requires the condition to be accomplished before the transition happens whereas the dynamic behavior of the states are expressed by transitions in UML state diagrams.