Answer:
1.the program is moved from secondary storage to memory.
Explanation:
Secondary storage media generally have greater storage capacity than RAM (random access memory), for this reason the data and program are stored there.
but ram memories are much faster, for example, a solid state disk (SSD) with SATA III connection can have read and write speeds of approximately 500 MB/s, while a DDR III RAM can have speeds between 12 and 18 GB/S, that is, more than 20 times faster.
So that the flow of data at the time of running a program is optimal, the data from the secondary storage unit is copied to the RAM and this ensures that the speed at which the programs run is at least 20 times faster, and our processes run better.
Why is it difficult to tell whether a program is correct? How do you go about finding bugs in your code? What kinds of bugs are revealed by testing? What kinds of bugs are not?
Final answer:
Program correctness is difficult to ascertain due to the many variables and inputs that can affect a software's behavior. Bugs can be identified through methods like unit testing, and adhering to good programming practices can help prevent many common errors. Nevertheless, not all issues can be revealed by testing, especially those outside the test conditions or involving non-functional aspects of the code.
Explanation:
It is difficult to tell whether a program is correct for several reasons. First, a program might work fine for some inputs but fail for others, especially if those inputs were not considered during development. Furthermore, the complexity of modern software and the interactions between different pieces of code can introduce subtle bugs that only emerge under specific conditions. In order to find bugs, a developer engages in testing and debugging processes.
Finding Bugs in Code:
Unit testing is one effective way to find and fix bugs. This involves breaking down your program into small, testable parts and ensuring each part works correctly in isolation. By using small test files and scenarios that you can verify manually, you can more easily identify discrepancies between the expected and actual outcomes. Additionally, rapid cycling between coding and testing can help identify errors early on before they compound and become harder to isolate.
Types of Bugs Revealed by Testing:
Testing can reveal syntax errors, runtime errors, logical errors, and integration issues. However, some bugs might not be uncovered by testing, such as those that occur under rare or untested conditions, or bugs related to non-functional requirements like performance under load or security vulnerabilities.
Good Programming Practices to Avoid Bugs:
To avoid bugs, it is crucial to follow good programming practices such as writing clean, readable code, reviewing code with colleagues, and avoiding writing large chunks of code without testing. Developers should write a small amount of code, test it, and repeat this process instead of trying to develop the entire program at once.
Write a method which will take one number as an argument. (Feel free to use static method or instance method) Given a input number (integer) print the digits of the number. You must use while loop and modulus operator. This program must work for any positive integer. Negative integers are not cons idered as inputs.
Answer:
// here is code in java.
import java.util.*;
// class definition
class Main
{
// method that return the digits of number
public static void dig(int num)
{
// while loop
while(num>0)
{
// print the digits
System.out.println(num%10);
num=num/10;
}
}
//driver method
public static void main (String[] args) throws java.lang.Exception
{
try{
// scanner object to read input string
Scanner s=new Scanner(System.in);
// variable
int num;
System.out.print("please enter the number: ");
//read the number
num=s.nextInt();
// validate the input, read a positive number only
while(num<=0)
{
System.out.print("enter a positive number only:");
num=s.nextInt();
}
System.out.println("digit of number are:");
// call the function
dig(num);
}catch(Exception ex){
return;}
}
}
Explanation:
Read a number from user and assign it to variable "num".Check if it is positive or not.If input is negative then ask user to again enter a positive number till user enter a positive number.Then call the function with input number. In this method it will find the digits of the number in the while loop using modulus "%" operator.
Output:
please enter the number: -345
enter a positive number only:1234
digit of number are:
4
3
2
1
The question involves writing a method to print out the digits of a positive integer using a while loop and modulus operator, demonstrated through a simple Java example.
The task is to write a method in a programming language that takes a positive integer input and prints out the digits of the number using a while loop and the modulus operator. Here's a simple example in Java:
public class DigitPrinter {
public static void printDigits(int number) {
while (number > 0) {
int digit = number % 10; // Get the last digit
System.out.println(digit);
number = number / 10; // Remove the last digit
}
}
public static void main(String[] args) {
// Example usage
printDigits(123);
}
}
This method uses the modulus operator (modulus operator) to obtain the last digit of the number by calculating the remainder when the number is divided by 10. It then prints this digit, divides the number by 10 to remove the last digit, and repeats these steps with the while loop (while loop) until all digits have been printed in reverse order.
A _____ occurs when one transaction reads data written by another transaction before the other transaction commits. dirty read lost column value collision uncommitted dependency
Answer: dirty read, uncommitted dependency
Explanation:
We have this problem of dirty read when we have many transactions running simultaneously and then one transaction reads a value which has not been committed by another transaction. If such a situation arises then it leads to problems as when it results in redundancy of data and we get a wrong result.
Uncommitted dependency also happens in this way by which it reads the value from a transaction which is in its intermediate stage.
The uncommitted value of the transaction is called as the dirty data and leads to redundancy in the final outcome of the transaction.
It takes 2.5 yards of material to make a dress harleys clothing design estimates that they can produce 48 dresses each week.if there are 52 weeks in a year how much material will they need to purchase to make dresses for a year?
Answer:
6240
Explanation:
if there is 48 each week thats basically 48×52 = 2496 which is how many dresses times how many yards per dress(2.5)I get 6240
Answer:
There will be requirement of 6240 yard of material in one year.
Explanation:
We have given that it takes 2.5 yard of a material to make a dress
And it can produce 48 dresses in each week
There are 52 weeks in a year
So total number of cloths in a year = 52 × 48 =2496
As it is given that 1 cloth takes 2.5 yard of material
So total material required = 2.5 × 2496 = 6240 yard
So there will be requirement of 6240 yard of material in one year.
Assume that x is a double variable that has been initialized. Write a statement that prints it out, guaranteed to have a decimal point, but without forcing scientific (also known as exponential or e-notation).
Answer:
cout <<showpoint << x; is the statement which prints the decimal point, but without forcing scientific.
Explanation:
The showpoint function in c++ print the decimal point number without forcing scientific.The showpoint function set the showpoint format flag for the str stream in c++.
Following are the program in c++
#include<iostream> //header file
using namespace std; // namespace
int main() // main function
{
double x=90.67; // double variable
cout <<showpoint << x; // display x without forcing scientific
return 0;
}
Output
90.6700
Write the pseudocode for a function named getFirstName that asks the user to enter his or her first name, and returns it. Write the main module that declares a variable called name, calls getFirstName (setting its return value into name), and displays that name with a user-friendly message.
Answer:
Function getFirstName(nameInput)
Declare nameInput
Display "Please enter your first name."
Input nameInput
Return nameInput
End function
Module main()
Declare name
Call getFirstName(name)
Display "Hi + 'name'!"
End module
Explanation:
First, we define the function getFirstName(nameInput) that has the parameter nameInput to get the input name a retrieve it to the module main. Then, we define the module main that declares the variable name, calls and retrieves the name variable of the function previously defined.
Function getFirstName():
Display "Enter your first name:"
Input firstName
Return firstName
Main module:
Declare name as String
Set name = getFirstName()
Display "Hello, " + name + "! Welcome!"
Here's the pseudocode for the `getFirstName` function and the main module:
plaintext
Function getFirstName():
Display "Please enter your first name:"
Input firstName
Return firstName
Main module:
Declare name as String
Set name = getFirstName()
Display "Hello, " + name + "! Welcome to the program."
1. **Function `getFirstName()`**:
- Prompts the user to enter their first name using `Display` (assuming it's a function to print to the console).
- Reads the input using `Input` and stores it in `firstName`.
- Returns `firstName` which contains the user's input.
2. **Main module**:
- Declares a variable `name` of type `String` to store the user's first name.
- Calls the `getFirstName()` function and assigns its return value to `name`.
- Displays a friendly message using `Display`, welcoming the user with their entered name concatenated with a greeting.
This pseudocode demonstrates a basic structure for obtaining user input and displaying output in a simple console-based program, focusing on clarity and functionality.
Coding in content analysis involves:
a. conceptualization and operationalization.
b. inductive methods.
c. selecting a level of measurement
d. deductive methods
e. all of these choices are involved in coding in content analysis.
Answer:
e. All of these choices are involved in coding in content analysis.
Explanation:
Content Analysis is a tool for research used to find the presence of certain themes,concepts or words in some given qualitative data.
When coding in content analysis it involves conceptualization and operationalization ,selecting a level of measurement , deductive methods and inductive methods.
Hence the correct answer is option e.
Convert the following binary numbers to decimal.
a. 00001001
b. 10000001
C. 11111110
d. 11000001
Answer:
a: 9
b: 129
c: 254
d: 193
Which statements about the enhanced for loop are true for arrays of primitive data? I. It is suitable for all array algorithms. II. It does not allow the contents of the array to be modified. III. It does not require the use of an index variable.
The enhanced for loop is not suitable for all array algorithms, does not allow the array's contents to be modified (especially in arrays of primitive data), and does not require an index variable, making it advantageous for iterating over arrays for reading purposes but limited for direct modifications.
Explanation:The question is asking about the characteristics of the enhanced for loop in the context of arrays containing primitive data types in Java. Let's examine each statement:
It is suitable for all array algorithms. This is false. While the enhanced for loop is a convenient way to traverse through an array for reading or processing each element, it is not suitable for algorithms that require modifying the array elements directly, or that need access to the array index while iterating, such as swapping elements.It does not allow the contents of the array to be modified. This is generally true when it comes to modifying the value of the elements directly via the variable provided in the loop, especially in the context of primitive data. You cannot change the original array content through the loop variable as it only provides a copy of each element rather than a reference. However, you can act on object elements in a way that modifies their state (in the case of arrays of objects) but not the array structure or the reference to the objects themselves.It does not require the use of an index variable. This is true. One of the main advantages of the enhanced for loop is that it abstracts away the need for an index variable when iterating through an array, making the code cleaner and less prone to errors related to indexing.In summary, the enhanced for loop provides a more readable and less error-prone way to iterate over an array of primitive types, but it has limitations, especially when modifications to the array itself are necessary.
Print "Censored' if userlnput contains the word "darn, else print userlnput. End with newline. Ex: If userinput is "That darn cat., then output is: Censored Ex: If userlnput is "Dang, that was scary!", then output is: Dang, that was scary! Note: If the submitted code has an out-of-range access, the system will stop running the code after a few seconds, and report Program end never reached. The system doesn't print the test case that caused the reported message. 1 import java.util.Scanner; 3 public class CensoredWords 4public static void main ( 1 test passed String args) Scanner scnr -new Scanner(System.in); String userInput; A tests passed userInput scnr.nextLine); 10 Your solution goes here 12 13 Run
Answer:
The code is given below in Java with appropriate comments
Explanation:
//Import the input.
import java.util.Scanner;
class CensoredWords
{
//Define the main method.
public static void main(String args[ ])
{
//Define the variables.
String userInput="" ;
//Define the scanner object
Scanner scobj = new Scanner(System.in);
//Accept the userInput.
System.out.print("Enter String: ");
userInput=scobj.nextLine();
//Check if the input contains darn.
//Print censored.
if(userInput.toUpperCase().indexOf("DARN") != -1)
System.out.printf("Censored");
//IF the input does not contains darn
//Print userInput.
else
System.out.printf(userInput)
return;
}
}
In the _____ phase of transferring data from a transactional database to a data warehouse, the builders create the files from transactional databases and save them on the server that will hold the data warehouse.
Answer: Extraction phase
Explanation: Transactional database is the data collection capable of undoing the transaction that has not been correctly done. Data warehouse id the place where transaction data is transmitted where different types of databases are stored.
The transmission of the information from transactional database to data warehouse is defined in the extraction phase.The extraction phase works by transforming the data into a particular format. It copes the transactional databases's data to the warehouse by making separate space for deposition of data
Write the definition of a function printAttitude, which has an int parameter and returns nothing. The function prints a message to standard output depending on the value of its parameter.If the parameter equals 1, the function prints disagreeIf the parameter equals 2, the function prints no opinionIf the parameter equals 3, the function prints agreeIn the case of other values, the function does nothing.Each message is printed on a line by itself.
Answer:
// code in C++.
#include <bits/stdc++.h>
using namespace std;
// function to print attitude
void printAttitude(int n)
{
// if input is 1
if(n==1)
cout<<"disagree"<<endl;
// if input is 2
else if(n==2)
cout<<"no opinion"<<endl;
// if input is 3
else if(n==3)
cout<<"agree"<<endl;
}
// main function
int main()
{ // variable
int n;
cout<<"Enter a number:";
// read the input number
cin>>n;
// call the function
printAttitude(n);
return 0;
}
Explanation:
Read a number from user and assign it to "n".Then call the function printAttitude() with parameter "n".In this function, if the input number is 1 then it will print "disagree", if the input number is 2 then it will print "no opinion" and if the input number is 3 then it will print "agree".function will do nothing if the input number is anything else.
Output:
Enter a number:2
no opinion
Late at night, some traffic signals change patterns and become _____.
A. WRONG WAY signs and DO NOT ENTER signs
B. flashing yellow or red lights
C. turn arrows
D. inactive
Answer:
Option (B) i.e., flashing yellow and red lights is the correct option to the given question.
Explanation:
Because there is very less traffic at the time of the late-night so, there is traffic police at that time that's why always or mostly flashing yellow or the red light at late night which indicates if any person is traveling than, firstly they will stop and look their left or right side, if all clear than go.
So, that' why this option is correct because it will reduce the chances of accidents.
You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting). A typical book has about 400 pages. How many such books can a 9-gig flash drive hold? _______________
Answer:
The flashdrive can hold 35389 400-pages-books
Explanation:
If [tex]\frac{2}{3}[/tex] of a page occupies 1 kB of memory, we can calculate how much memory a book will take
[tex]2/3kB=1 page\\ x kB=400 pages\\266.67 kB=400 pages[/tex]
Now that we know that a book average file size is about 266,67 kB, we calculate how many of them can a 9 GB flash drive hold.
To do the calculation, we have to know how many kilobytes are in 9 gigabytes.
There is 1024 kilobytes in a megabyte, and 1024 megabytes in a gigabyte, so:
[tex]Memory_{in _kilobytes}^{} =1024\frac{kilobytes}{megabytes} *1024\frac{megabytes}{gigabytes}*9=9437184 kilobytes[/tex]
Finally, knowing the average file size of a book and how much memory in kilobytes the 9 GB flash drive holds, we calculate how many books can it hold.
[tex]Books=\frac{Flash drive memory}{Filesize of a book} =\frac{9437184kilobytes}{266.67\frac{kilobytes}{book} } =35389,4 books[/tex]
The flashdrive can hold 35389 400-pages-books, or 14155776 pages of typical text.
__________ is a software package providing comprehensive coverage of all phases of the development process from writing Hypertext Markup Language (HTML) code to creating scripts for programs running on web servers.
Final answer:
A software package that covers all development process phases, from HTML coding to server-side scripting, is known as a web development tool or IDE. These tools are crucial for creating websites that balance various elements and aid users and developers in navigating complex human-software interactions.
Explanation:
A software package providing comprehensive coverage of all phases of the development process from writing Hypertext Markup Language (HTML) code to creating scripts for programs running on web servers is known as a web development tool or Integrated Development Environment (IDE). These tools are essential for developers to create and manage websites, incorporating the various elements of design and functionality that make up a modern website. When selecting an IDE or web development tool, it is crucial to consider factors like human-software interactions, how these tools support complex automated systems, and the decision-making processes of workers as they are supported by the software system.
Tim Berners-Lee's contribution to the development of HTML and the world's first web server on his NeXT computer set the foundation for these tools. Today's development environments aim to provide a balance of text, images, and careful formatting—elements that were central to the early web and continue to be pivotal in the creation of responsive and accessible websites. The ability to create a website that effectively conveys information without overwhelming the reader is a key objective of a well-designed software package in web development.
Internally, computers are constructed from circuitry that consists of small on/off switches. What is the most basic circuitry-level language that computers use to control the operation of those switches called?
Answer:
Machine Language.
Explanation:
The most basic language that is used by computers so that they can control the operation of the on/off switches in the circuitry is Machine language.
Machine Language is a low level language is a collection of binary digits or bits that is understood by the computers.Computers are capable of understanding only machine language.
Final answer:
The most basic language that computers use to control the operation of their internal switches is called binary code, which is represented by ones and zeros. The controls are implemented by transistors within a microprocessor, an integrated circuit that performs a variety of tasks.
Explanation:
Internally, computers consist of intricate circuitry that functions through numerous tiny on/off switches called transistors. The most basic circuitry-level language that these computers use to control the operation of those switches is termed binary code. Binary code is represented by ones and zeroes, corresponding to the digital signals that turn transistors on and off. These transistors, whether in the on or off state, control the flow of electricity and data within the microprocessor, which is an integrated circuit that can perform various tasks. Indeed, the microprocessor is at the heart of modern computing, storing and manipulating data to execute a wide range of functions.
The integrated circuits that form the basis of most modern electronic devices, including computers and cell phones, contain millions of these switches that operate using binary code. This technology has progressed from larger mechanical parts to the microscale transistor-based integrated circuits we have today, enabling the wide use of personal computers and other digital technology.
During your research, you also come across a Web site on hybrid cars. The Web site explains buying incentives and offers several customer testimonials. What is the likely primary goal of this Web site?
The primary goal of the website about hybrid cars, which includes buying incentives and customer testimonials, is most likely to sell products or services. It aims to convince potential buyers by highlighting the economic and environmental benefits of hybrids, using both logical and emotional appeals.
Explanation:The likely primary goal of the website discussing hybrid cars, featuring buying incentives and customer testimonials, is to sell products or services. The presence of buying incentives is designed to make hybrids more attractive to potential buyers by highlighting benefits like fuel efficiency and reduced environmental impact. Customer testimonials serve as persuasive personal stories to build trust and convince potential buyers of the benefits and satisfaction associated with owning a hybrid car.
By offering these elements, the website strategically combines factual information with emotional appeal. This tends to create a compelling argument in favor of purchasing a hybrid car, leveraging both the economic savings on fuel and the desire to participate in environmentally responsible behavior. The overall strategy suggests that while the site may provide useful information, its ultimate aim is to influence consumer behavior towards making a purchase.
It is important for consumers to critically evaluate the validity of the information presented on such sites. Looking for unbiased sources and verifying claims through reputable sites can help in making informed decisions.
Which of the following is true about unstructured data? a. Computer logic programs can identify and extract patterns in it. b. It must be analyzed manually. c. It is more likely to come from direct sources than indirect sources. d. It is less valuable than structured data in terms of providing insights into customer behavior. e. It cannot be combined with other data sources.
Answer:
a. Computer logic programs can identify and extract patterns in it.
Explanation:
Unstructured data is the information that does not have the pre defined data model and not organized well.
We know that the computer programs have the capability of modifying the unstructured data and convert it into the structured data like python programs,r script programs.
Hence the correct option is option A.
The range of an area where users can access the Internet via high frequency radio signals transmitting an Internet signal from a wireless router is known as a _____.
A) Hotspot
B) PAN
C) Bluetooth
D) Bright Spot
I'll Give Brainlyest to first answer!!!!
Answer:
Option (A) is the correct answer of this question.
Explanation:
The main objective of the hotspot is to giving the internet access to the user or the people with the help Wifi and the hotspot is giving the internet with the help Router.
In the Hotspot, the user would have very high frequency connections to the Internet and relay the Internet signal from the wireless router.
Bluetooth is used for short distance that's why is the incorrect answer. PAN is Personal area networks (PANs) connect an individual's personal devices that's why is the incorrect answer.Bright Spot is used for the configuration purpose in the URL that 's why is the incorrect answer.A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following?A . PhishingB . Social engineeringC . Man-in-the-middleD . Shoulder surfing
Answer:
C . Man-in-the-middle
Explanation:
The man-in-the-middle technique is about the interference of a third party in the communication channel, without any of the extremes being able to notice its existence, in this way, for the user as well as for the destination page the communication will seem normal.
In this case, by redirecting traffic to a PROXY server, the attacker will have the possibility to read all the information that passes through it, being able to obtain all the desired data.
Other Malware can be used to configure the connection of the computer through the PROXY of the attacker and in this way the channel is open, until the PROXY is disabled and the malware that redirects is blocked or uninstalled.
A network administrator is noticing slow response times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. What should the network administrator do?
Answer:
change results in network
Steve is conducting research on the reach of mental health care to the youth. After gathering data on psychologists, he creates a pie chart to display the percentage of psychologists working in different fields. In this scenario, Steve uses _____ to display the collected data.
Answer:
Descriptive Statistics.
Explanation:
First Steve gathered the data and after that he created the pie chart displaying the percentage of psychologists working in different fields.Here Steve used descriptive statistics to display the data that he collected.
Descriptive statistics are the descriptive coefficients that give the abstract of the data collected.
What is the function of Google Analytics? web graphics website monitor website statistics programming
Answer:
Website monitor is the function of Google Analytics
Explanation:
It gives valuable insights about the usage of website and ways to improve the number of visitors and the way the data is needed.
Google Analytics provides this service as a free of cost and also it collects data automatically and it also gives customized report and many other facilities with respect to monitoring of the website.
It also provides important information about the gender, device and location of the customer and why customer often bouncing off, what kind of a data are they interested and so on.
Answer:
D) Website Statistics.
Explanation:
I took the Career Explorations II Instruction/Assignment, this is the answer!!
How many inputs are included in the following requirement? REQUIREMENT: Write a program that asks the employee for their age. The program must subtract the age from 65, and display the age, followed by the number of years left to retirement.
Answer:
The correct answer for the given question is 1
Explanation:
Following are the program in c language
#include<stdio.h> // header file
#include<conio.h> //header file
void main() // main method
{
int age,retiredAge; // variable
clrscr(); // clear screen
printf("Enter Age : ");
scanf("%d",&age); // input age
printf("************************");
retiredAge = (65-age); // calculating retired age
printf("\nYour Age is %d",age);
if(retiredAge<0) // checking condition
{
printf("\nYou are already cross the retired age. Or Enter Invalid Age.");
}
else
{
printf("\nNo of Years Left to retired is %d",retiredAge); // dsiplay age
}
getch();
}
Output:
Enter Age : 50
************************
Your Age is 50
No of Years Left to retired is 15
Here Age is the only required input to calculate the retirement age of employee. if entered age is greater than 65 then a message is printed " You are already cross the retired age. Or Enter Invalid Age. " if entered age is valid then retiredAge is calculated with the formula retiredAge = (65-age). and finally display the age,followed by the number of years left to retirement.
Therefore 1 input are required for the above program.
Which of the following statements is true?
a) Computer science tends to deal with data
b) Informaticians deal primarily with data
c) Information technology professionals deal mainly with information
d) Computer science tends to deal with knowledge
Answer: (A) Computer science trends to deal with the data.
Explanation:
The computer science basically tend to deal with the big data and data science as it is the emerging technologies with the upcoming years.
As, with the large amount of the data and high transmission rate we can easily developed new computing technologies with low budget.
Data is basically defined as simple facts and figures and contain information that is very useful for developing the computing technology for study and processing the system.
Therefore, Option (A) is correct.
Microsoft Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kinect motion sensor, play sounds, draw graphics, save files, and more. Without this, games would:
a) be more reliable.
b) be a lot easier to write.
c) cost more.
d) look same.
e) not be restricted to just Microsoft's platforms.
The correct answer is: e) not be restricted to just Microsoft's platforms.
The Microsoft X box operating system provides a set of common standards that are specific to Microsoft's platforms, which can limit the portability of games to other platforms.
Here's why the other options are incorrect:
be more reliable: While consistent standards can potentially contribute to reliability, the main benefit of standards is simplifying development, not directly impacting reliability.
cost more: Standardized tools and libraries often reduce development costs by making the process more efficient.
look same: Games built on the same framework might share some similarities, but creative developers can still create diverse visual experiences even within a standardized platform.
not be restricted to just Microsoft's platforms: Standards themselves are platform-agnostic, but Microsoft's specific implementation of those standards would be limited to their platform.
Therefore, the most significant benefit of a common set of standards for X box programmers is that it significantly reduces the complexity and effort involved in writing games for the platform. This makes game development more accessible and allows developers to focus on creative aspects rather than reinventing basic functionalities.
A customer asks you over the phone how much it will cost to upgrade memory on her desktop system to 16 GB. She is a capable Windows user and able to access BIOS/UEFI setup using the user power-on password you set up for her. Which actions can you ask the customer to perform as you direct her over the phone to get the information you need and develop an estimate of the upgrade's cost?
a. Use BIOS/UEFI to view how much memory is installed and how much memory the system can hold.
b. Enter info32.exe to determine how much memory is currently installed.
c.Use BIOS/UEFI to show which memory slots are used and how much memory is installed in each slot.
d.View the System Information window to determine how much memory is currently installed.
Answer:
C: Use BIOS/UEFI to show which memory slots are used and how much memory is installed in each slot.
Explanation:
Apart from disassembling the computer and physically examining the motherboard or installing third party software to show the memory slots used and the amount of RAM in each, you can use the information that is displayed on your system’s UEFI firmware or BIOS to check. However, the latter is best to determine. BIOS/UEFI setup is used especially when the OS is not working. Depending on the type of computer system this customer has, he or she will be required to shut the PC off and boot it up. He or She will then be required to use a particular keyboard shortcut to enter into the BIOS/UEFI setup and look for information about RAM.
Option A is wrong because the BIOS/UEFI setup will not show you the amount of RAM the PC can hold
Running info32.exe on most windows computer will give you an error dialog box
Which of the following lines of code is syntactically correct?
a. DECLARE order NUMBER; departure DATE; BEGIN ---- executable statements --- END
b. DECLARE order NUMBER; departure DATE BEGIN ---- executable statements --- END
c. DECLARE order NUMBER(3); departure DATE; BEGIN ---- executable statements --- END;
d. DECLARE order NUMBER(2); departure DATE; BEGIN; ---- executable statements --- END
Answer:
The answer is:
c.
DECLARE
order NUMBER(3);
departure DATE;
BEGIN
---- executable statements ---
END;
Explanation:
SQL Commands must close with a semicolon to be correctly parsed by the server. This is the cause why the syntax is wrong in:
A. DATE; BEGIN ---- executable statements --- END lacks semicolon in END.
B. DECLARE order NUMBER; departure DATE lacks semicolon after DATE.
D. A. DATE; BEGIN ---- executable statements --- END lacks semicolon in END.
Your organization’s network has multiple layers of security devices. When you attempt to connect to a service on the Internet. However, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause?
a. The IP address of the service is blocked by an intrusion detection system (IDS)
b. The service is blocked by the Internet Service Provider (ISP)
c. The proxy firewall on the network is blocking the service.
d. The host-based firewall settings are blocking the service.
Answer:
B.
Explanation:
An organization is deploying a new system to the production environment. A security analyst discovers the system is not properly hardened or patched. Which of the following BEST describes the scenario?
A. A secure baseline was not established early in the process.
B. User acceptance testing was not completed.
C. Integrity checks were not conducted to ensure it was the correct system.
D. An application code error was introduced during the development phase.
Answer:
The best answer is A) A secure baseline was not established early in the process.
Explanation:
If the organization is deploying to the production environment and the security analyst discovers this risk at this point, then a secure baseline was not established, because it is impossible to successfully pass the coding and peer review instances by programmers and testing instances by the QA team without any warning to correct this problem.