Final answer:
To calculate the distance fallen by the watermelon, use the formula d = 0.5 * g * t^2. Ask the user for the number of seconds the watermelon falls and the height of the bridge. Use a loop to calculate the distance fallen for each second and check if the total distance is valid.
Explanation:
To calculate the distance fallen by the watermelon, we can use the formula d = 0.5 * g * t^2, where g is the acceleration due to gravity and t is the time in seconds. The user will be asked to input the number of seconds that the watermelon falls and the height h of the bridge above the water. We can then use a loop to calculate the distance fallen for each second from t = 0 until the value of t input by the user. If the total distance fallen is greater than the height of the bridge, the program should display a message indicating that the distance fallen is not valid. Here is an example code in Python:
import mathIn networking, what addressing type is used in sending an email to someone?
A) Broadcast B) Multicast C) Unicast
Answer: (C) Unicast
Explanation:
According to the question, if we sending an email to someone individually then, uni-cast addressing type is used. The unit addressing is basically used to represent the single local area network interface.
The unit-cast frame sent only to the specific devices not to the group of the devices. The unitcast basically use between the one source to the one destination.
On the other hand, multicast and broadcast are incorrect because the frame sent to the group of the devices not the specific devices. Therefore, Option (C) is correct.
Answer:
for edge users
a microsoft account
Explanation:
.Why is it common practice to use a boot loader?
Answer:
Bootloader is the program that helps in the revitalizing the micro-controller of the operating system .It makes the operating system self programmable.It's main purpose is loading the tasks or operations to ensure the working interface between software and hardware whenever the system gets booted up.
It is also known as the bootstrap loader.It is necessary and common because it is the first mechanism that works whenever the system gets initialized or booted. Without this feature the reloading of the programs will not be possible.
Using for loop . Input an integer and identify whether it's EVEN OR ODD ( without using modulo operator )
using only . C++ programming
Answer:
Following are the program in c++ language
#include<iostream> // header file
using namespace std; // namespace
int main()
{
int n1,i; // variable declaration
cout<<"Enter Number: ";
cin>>n1; // input number
for(i=n1;i>1;i=i-2) // check the condition
{
n1 = n1-2; // decrement the value of number by -2
}
if(n1==0) // check if it is 0
cout<<"number is EVEN"<<"\n"; // print even
else
cout<<"number is ODD"<<"\n"; // print odd
return 0;
}
Output:
Enter Number: 45
number is ODD
Again run the program
Enter Number:10
number is EVEN
Explanation:
In this program, we input the number by a user in variable n1. After that, we iterate the for loop and initialize the value of a variable" i" in for loop and check the condition.
In each iteration, the variable n1 is decrement by 2 and store it n1.
Finally, check if n1==0 then it print number is EVEN otherwise it print number is ODD.
Which of these is most closely associated with system control? (1 point) (Points : 1.5) boundary
environment
feedback
interface
Answer:C) Feedback
Explanation: System control is the controlling and managing activity of the system by commands ,regulations, management practices etc.It helps in the analyzation of the system and improving the ability of performing the tasks.Feedback is the component of the control system that is obtained as the output after the controlling technique is applied in the system.
Other options are incorrect because environment is the surrounding of the system ,interface is the connection between the components of the system and boundary is not a technical term of control system.Thus, the correct option is option(C).
A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest addressable memory unit is a word?
13
8
10
6
32
Answer:
The minimum number of bits necessary to address 8K words is 13.
Explanation:
You have the number of words to address that is 8000 words, a word is the smallest addressable memory unit.
8000 words can be addressed with [tex]2^{n}[/tex] units. Now you have to find the value of n that approximates to the number of words.
[tex]2^2=4\\2^4=16\\2^7=128\\2^{10}=1024\\2^{12}=4096\\2^{13}=8192[/tex]
So you can see that 13 bits are needed to address 8K words.
Two positive integers are said to be relatively prime if their only common divisor is 1. For example, 8 and 9 are relatively prime, whereas 1 25 and 15 are not (because they have 5 as a common divisor besides 1). Write a function that takes as parameters two positive integers and returns whether they are relatively prime or not. Basic python programming
Answer:
#code in python.
#function that calulate 2 numbers are relatively prime or not
def fun(x,y):
while(y):
x,y=y,x%y
return x
#user input
a=int(input("enter first number:"))
b=int(input("enter second number:"))
#call the function
if(fun(a,b)==1):
print(" Both numbers are Relatively prime")
else:
print("Both numbers are Not relatively prime")
Explanation:
Read two numbers from user.Call the function fun() with parameter "a" & "b". In the function, it will perform Euclid algorithm to find the greatest common divisor.If it is 1 then both are relatively prime else both are not relatively prime.
Output:
enter first number:5
enter second number:125
Both numbers are Not relatively prime
enter first number:8
enter second number:9
Both numbers are relatively prime
What is the difference between congestion control and flow control? Where are each managed in TCP?
Answer: The differences between the flow control and congestion control are as follows:-
Flow control's traffic is controlled in the direction from sender to receiver whereas traffic control in congestion control be handles from the entrance of the network.Sender is reason for the traffic in flow control while transport layer creates the traffic in congestion control.Transport layer and data link layer are used for managing the traffic whereas congestion control has transport and network layer for handling the traffic.The TCP for the congestion control works as elimination of the congestion in the sender's field in network layer and transport layer.Flow control is used in TCP to make surety about the non-overwhelming nature of sender towards receiver in the transport layer and data link layer.
.Consider the following sine wave: s(t) = 4sin(2π3t + π)
a.What is the amplitude?
b.What is the frequency?
c.What is the phase?
Answer:
a. 4
b. 3
c. pi
Explanation:
Generic formula of a sine wave: s(t) = Amp * sin ( 2*pi*freq*t + phase)
where, Amp => Amplitude
freq => frequency
phase => phase
Given sine wave: s(t) = 4sin(2π3t + π)
Comparing it with the generic form , we can identify that :
a. Amplitude : 4
b. Frequency : 3
c. Phase : pi
Amplitude measures peak displacement from origin, Frequency is the number of cycles per second and phase is the relative positioning of the wave with respect to the origin.
Answer:
1) Amplitude = 4
2) Frequency =[tex]1Hz[/tex]
3) Initial phase = [tex]\pi [/tex]
Explanation:
The general equation of wave is
[tex]y(t)=Asin(\omega t+\phi )[/tex]
where
A is the amplitude of the wave
[tex]\omega [/tex] is the angular frequency of the wave
[tex]\phi [/tex] is the initial phase of the wave
The given wave function is
[tex]s(t)=4sin(2\pi t+\pi )[/tex]
Comparing with the standard function we get
1) Amplitude = 4
2) Frequency =[tex]\frac{\omega }{2\pi }=\frac{2\pi }{2\pi }=1Hz[/tex]
3) Initial phase = [tex]\pi [/tex]
Write a program that takes an integer n as a parameter and sums all of the multiples of 2 or 5 from 1 to n. For example, if n = 11, the result would be 2 + 4 + 5 + 6 + 8 + 10 = 35.
Answer:
// here is code in c++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main() {
// variable
int num;
int tot_sum=0;
cout<<"enter a number: ";
// read the value of n
cin>>num;
// check the multiple of 2 or 5 from 1 to n
for(int x=1;x<=num;x++)
{
// if multiple of 2 or 5 then add them
if(x%2==0 ||x%5==0)
{
tot_sum=tot_sum+x;
}
}
// print the sum
cout<<"sum of multiple of 2 or 5 is:"<<tot_sum<<endl;
return 0;
}
Explanation:
Read the number "n" from user.Check every number from 1 to n, if it is a multiple of 2 or 5 then add them to "tot_sum".When the for loop end, "tot_sum" will have sum of all the number which are either multiple of 2 or 5.Print the sum.
Output:
enter a number:11
sum of multiple of 2 or 5 is:35
Create a program that will automatically add the fees and sales tax to a new car.Create a program to find the subtotal andd then total including sales tax. The program should receive a keyboard input representing the vale of the price of the car and the fees as well as the sales tax for the city the car is purchased in. San Francisco, Eurica, Concord California.
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
double price,fee,tax;
double total;
cout<<"enter the price of car:";
// read the price of car
cin>>price;
cout<<"enter the fee:";
// read the fee
cin>>fee;
cout<<"enter the tax (in %):";
// read the tax
cin>>tax;
a
// total cost
total=price+fee+(price*tax)/100;
// print the cost
cout<<"total cost is: "<<total<<endl;
return 0;
}
Explanation:
Read the price of the car from user and assign it to variable "price",read fee and assign it to variable "fee" and tax to variable "tax".Then calculate the total cost of the car by adding the fee and tax of car to the price of car.
Output:
enter the price of car:1000
enter the fee:50
enter the tax (in %):10
total cost is: 1150
. What physical characteristic does a retinal scan biometric device measure?
A. The amount of light reaching the retina
B. The amount of light reflected by the retina
C. The pattern of light receptors at the back of the eye
D. The pattern of blood vessels at the back of the eye.
Answer: D)The pattern of blood vessels at the back of the eye.
Explanation: The retinal scan is the techniques which is used in the bio-metric mechanism.The scanning of the retina's blood vessel pattern is capture by the scanner is the unique technique which is used for bio-metric purpose.
Blood vessel pattern is capture because it is present in unique form for every person and will help in distinguishing a person from another person while scanning.
Other options are incorrect because light reflection or reaching near retina and light pattern are not the unique way for identification while scanning a person.Thus the correct option is option(D).
Placeholders are used to defend against what kind of hacking attack?
a
SQL Injection
b
Key stroke logging
c
Phishing
d
Denial of Service
Answer: (A) SQL injection
Explanation:
Th SQL ( Structured query language) injection is the code injection method or technique that is basically used in data driven attack various applications. The SQL injections are basically used by hackers for attacking on various websites.
The SQL injection are used by the hackers to insert the malicious structured query language statement in the input state for the execution process in the database.
When we use the SQL injection during that process, the attacker can easily access and modify the database.
Which of these software packages is not open source software (OSS)? (1 point) (Points : 1.5) Microsoft Windows
Mozilla Firefox Web browser
Apache Web server
a Linux operating system
Answer:
Microsoft Windows
Explanation:
Open Source Software is a software which is accessible to the public. we can modify or extend the code .In the given options Microsoft windows is not an open source operating system. User don't have access to source code where as Linux is an open source software where you can't limit to the functionality which they provided. you can control and extend the source code which they given for this OS
you need to extract data from the system your predecessor created. you discover tables have been created according to the third normal form. you find the needed data in three different tables. what SQL syntax allows you to garner this data?
a. union
b. join
c. Select
d. Having
Answer:
b. join
Explanation:
Correct answer:
Join: It allow join(paste) two tables by one or more commun columns
Example in the image attached
Bad answer:
Union: it only allow paste two tables with the same structure
select: it only allow get information from 1 table if not use join
having: it only allow get filtered information with a condition
Data aggregates
are used to perform calculations on individual records in a table or query.
cannot be used in a report.
perform calculations on entire columns of data.
return multiple values.
Answer: Perform calculations on entire columns of data
Explanation:
Data aggregate is the process that gather the information and express into the form of summary. It basically used in the statistical analysis for calculating the entire column of the data.
The main purpose pf the data aggregate is that it collect more data or information about the specific variable of the given data. The data is basically available in the form of aggregate.
The data aggregate function easily produced the summarized data in the database.
Only a third of all Americans have broadband service at home. Among telecommuters, the proportion is 87 percent.
True
False
Answer:
True.
Explanation:
The statement is true that only a third of all the Americans have broadband service present at their home and this percentage is 87 percent among the telecommuters.
America has made significant progress in the expansion of high -speed internet access in past several years but 19 million american still don't have broadband.
. Why use parallel processing for data mining?
Answer:
Parallel processing is the type of the processing in the computer program instruction by divide into the multiple processors unit. The parallel processing basically allow the interleaved execution the given program together.
The parallel processing basically uses the multiple element for processing the solution of the problems simultaneously. it basically divide the problem into independent parts so that the processing of the elements can execute simultaneously.
Its main objective of the parallel processing is that compile and run the program in short duration or time.
A confidential number used as an authentication factor to verify a user’s identity is called a:
a,PIN
b.User ID
c.Password
d.Challenge
Answer: (A) PIN
Explanation:
PIN is the personal identification number which is basically used to verify the identity of the users. It is confidential number which is used as the authenticating factor.
The PIN is the combination of the number that is also use to authenticate the banking system with the users.
On the other hand, the other given options are incorrect because these are not used to identify the users identification process.
Therefore, Option (A) is correct.
Are there any output differences between floats and doubles?
Explanation:
The precision in double values is twice as compared to float values.Hence double have smaller rounding errors as compared to float variables .A double is of 64 bits and float is of 32 bits usually hence floats have more rounding errors and on more number than doubles.Double has 15 decimal digits of precision and float has only 7 decimal digits for precision.
. Consider the problem of finding the largest element in a list of n elements. What will be the basic operation of an algorithm to solve this problem?
assignment
addition
looping
comparesn
Answer:
Comparison.
Explanation:
When we have to find a largest in a list of n elements.First we have to iterate over the list so we can access all the elements of the list in one go.Then to find the largest element in the list we have to initialize a variable outside the loop with the minimum value possible and in the loop compare each element with this value,if the element is greater than the variable assign the element to the variable.Then the loop will find the largest element and it will be the variable.
Rachel needs to include a new organizational chart in her project. Which type of illustration should she use?: *
a. ClipArt
b. Picture
c. SmartArt Graphic
d. WordArt
Answer:
Option C
Explanation:
The type of illustration used by Rachael to add a new organizational chart is SmartArt Graphic.
In this tool, the information or data or ideas a person uses in the project are represented visually.
The different layout choices like organizational charts, etc enables a person to select the one that fits the information provided in the project.
Some are design to convey particular form of messages or information while the others are used for simple purposes like highlighting the appearance of texts or bullets.
The if statement regards an expression with the value 0 as __________.
Answer:
The answer to this question is "false".
Explanation:
In this question, the answer is wrong because in computer science. Except for the binary language, It didn't understand any language. In computer 1 stands for true value and 0 stands for false value. In If-else statement if block executes true value is that is 1. and else block execute false value that is 0. In this question, if the value is 1 then the answer is true. But the answer to this question is false.
Write a paragraph on the orgin or development of ONE of the following elementss of the Internet:
a.) Usenet
b.) Listserv or mailing list
c.) BITNET
d.) IRC
e.) HYPERTEXT
f.) any computer hardware or device used to acces the Internet
Answer:
(C) BITNET :
BITNET is basically established in united state (US) in the 1981 and used in the cooperative world as wide area computer networking. The term BITNET is originally known as because it is time network.
It is also known as forward type of the networking and the BITNET can easily transfer the data of email and files from one network server to another server. The BITNET typically uses the RSCS protocol for the purpose of networking job and it is also use in the internal IBM, which is known as Virtual network (VNET).
The BITNET is basically developed by the city university of the new York. It is used in the mainframe operating system for implementation the virtual memory system (VMS).
A type of security control that takes measures to help restore a system is referred to as:
A.
preventative
B.
detective
C.
corrective
D.
all of the above
Answer:
C. corrective
Explanation:
Security controls
These are actions or measures taken to maintain and/ or restore the security of the system. Security controls are categorized as corrective, preventive and detective, which are discussed below.
Corrective
Security controls which help in taking the corrective steps after the malicious activity has done damage to the system or restoring the security of the system are called corrective security controls.
These controls also act as preventive measures for future risks.
These controls perform the healing and have remedial action for the damage done to the system.
Once the system has been recovered, appropriate measures are put in place to avoid further damage.
The damage can be done to the computer system, its hardware and software resources or the data.
Examples include restoring the database from the backup file.
Updating or renewing antivirus software rectifies the security against virus.
For example, once the database has been restored, access control, antivirus and other measures are employed to prevent the database from being corrupted and to prevent system from being affected.
Preventive
Security controls which help in stopping the malicious activity from harming the system are called preventive security controls.
As per the name, these measures are employed to prevent any security breach.
These measures prevent any suspicious activity from taking place which may cause harm to the system.
Firewalls prevent unauthorized access.
Antivirus prevents malicious applications from running.
Login feature to give access only to authorized user.
Detective
Security controls which help in detecting the malicious activities and alerting the security personnel are called detective security controls.
As per the name, these measures are used to identify any suspicious activity and report them. Detective controls do not prevent or correct any security breach.
Alarms are employed to detect and alert any suspicious activity.
Intrusion detection system (IDS).
In an ideal situation, security controls are a combination of all the types mentioned above.
The type of security control involving measures that restore a system is referred to as: c. corrective.
What is Corrective Security Control?A corrective security control can be defined as the type of security control measures that includes technical, administrative and physical measures which are initiated to help restore a system to its original state after a breach or an unauthorized activity has occurred.
Therefore, the type of security control involving measures that restore a system is referred to as: c. corrective.
Learn more about corrective security control on:
https://brainly.com/question/13484623
Who developed one of the first mathematical models of a multilevel security computer system?
A. Diffie and Hellman
B. Clark and Wilson
C. Bell and LaPadula
D. Gasser and Lipner
Answer:
C. Bell and LaPadula
Explanation:
The first mathematical models of multilevel security computer system was developed by Bell and Lapadula. Their full names are David Elliot Bell and Leonard J. Lapadula. Their model used to define the concept of modes of access,secure state machine and outlined the rules of access.
Polymorphism means (Points : 2) many forms
inheritance
driver
many birds
Answer:
many forms
Explanation:
Polymorphism is a construct in object oriented programming which means multiple forms.For example: Suppose I have a function which performs the add operation on two integers and another function with the same name which concatenates 2 given strings:
int add ( int a, int b);string add ( string a , string b)The two functions represent polymorphic forms of the add function. The function to be invoked at runtime is determined by the runtime argument type.
For example , add (2,3) will invoke int add ( int a, int b);
Similarly, add("hello","world") will invoke string add ( string a , string b);
What is a URN (include example)
Answer: URN(Uniform Resource Name) is the basically a subset of the Uniform Resource identifier(URL). It uses "urn"scheme for the working an implementation. Uniform resource name functions by identifying components uniquely through their name.
The most common example of URN is ISBN (International Standard Book Number)number which helps in the unique searching and identification of book.
The SORT statement is used in the ____________ to place records in a sort work file.
(Points : 2) IDENTIFICATION DIVISION
ENVIRONMENT DIVISION
DATA DIVISION
PROCEDURE DIVISION
Answer: Procedure division
Explanation:
The SORT statement is basically used in the procedure division for placing the various records in the sort file. The SORT statement easily accept the records from the different files and then sorting them accordingly to the specific file key in the database.
The SORT statements are used in the procedure division but it does not used in the declarative portion in the sorting file. The SORT statement is basically coded in the form of independent and fixed segment.
_________ Code that you write is called primary code, and code that the compiler produces after processing the primary code is called runtime code
Answer:
The correct answer for the given question is "source code"
Explanation:
When you writing a code in any programming language that code is known as source code.The source code is also known as primary code, when source code is compiles it produce runtime code.
The source code is created by the compiler it can be easily understood by the human being.
for example in c language we write a source code after compilation it produces object code .
Answer:
The correct answer for the given question is "source code"
Explanation:
When you writing a code in any programming language that code is known as source code.The source code is also known as primary code, when source code is compiles it produce runtime code.
The source code is created by the compiler it can be easily understood by the human being.
for example in c language we write a source code after compilation it produces object code .
Write a program that inputs the number of hours you are taking this semester and outputs how much time outside of class you should spend studying. (Hint: every 1 credit hour = 2-3 hours spent outside of class).
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
int a,b,c;
//ask to enter semester hours
cout<<"Enter the number of hours in the semester:";
// read the semester hours
cin>>a;
//print the semester hours
cout<<"You have taken "<<a<<" hours in semester."<<endl;
// find the time spend outside of the class
b=a*2;
c=a*3;
// print the time outside class
cout<<"you should spend "<<b<<"-"<<c<<" hours outside of class"<<endl;
return 0;
}
Explanation:
Read the hours taken in the semester from user and assign it to "a".
Then find its 2 and 3 time.This will be the time user should spend outside
of the class.
Output:
Enter the number of hours in the semester:15
You have taken 15 hours in semester.
you should spend 30-45 hours outside of class
If you were looking for the answer to this
A student is studying for a social studies test, and he is also writing a paper and reading a novel for his language arts class. Which statement represents a well-written SMART goal that the student has written for himself for one study session?
Spend time studying for social studies and language arts by the end of the semester.
Spend time today on social studies, and spend time tomorrow on language arts.
Spend one hour reviewing chapter six for social studies, one hour writing the paper, and four hours reading the novel.
Spend 30 minutes reviewing section one of chapter six for social studies, one hour writing an outline for language arts, and 30 minutes reading the novel by 9 p.m. today.
The answer is D :)Because when you look up this question this one pops up so im posting this so people can find the answer.