Answer:
Answer is (d) value of 10
Explanation:
Usually when we write "int x=10;", a memory space is allocated for an integer variable with name x, and content 10.
Answer:
Option d is the correct answer for the above question.
Explanation:
In c,c++ or java programming language, when a user declares a variable then that means that a variable is used to take space in memory and When a user assigns the value on that variable then that value is stored on the location of variable in the memory and that variable addressed that value for compiler and memory.
The above question asked that if there are declaration and initialization of a variable then what is held by the variable in the memory. The answer is the value which stated by Option d, hence it is a correct option while other is not because--
Option 'a' states that the address holds the location of value but it holds the value.Option b states that the address holds the memory location of value but it holds the value only.Option c states that the address holds the reference value of a value but it holds the value only.Which of these are valid declarations for the main method?
?? public void main();
?? public static void main(String args[]);
?? static public void main(String);
?? public static int main(String args[]);
Answer:
The answer is option 2. public static void main(String args[]);
Explanation:
The answer is public static void main(String args[]); let's understand this line:-
public:-It is an access specifier that means whichever entity is public it will be accessible everywhere.static:-It means that there is only one copy of the method.void:-Void means that the method does not have any returning any value.main:-It is the name of the method.String args[]:-It is an array of strings which and it stores java command line arguments.User can use another name if the user want to.The expressionvecCont.empty() empties the vector container of allelements.
a. True
b. False
Answer:
False
Explanation:
vector is like a dynamic array that has a special ability to resize automatically when it required.
vector has several functions:
like, insert() to insert the element in the vector.
delete() for delete the one element at a time.
empty() is also the function used in the vector. It is used for checking the vector is empty or not.
it gives the Boolean value (TRUE or FALSE), if the vector is empty it gives the output TRUE if the vector is not empty it gives the output FALSE.
It is not used for empty or deletes all elements of the vector.
Therefore, the answer is False.
In a circular linked list the last node points to the____ node.
a. first
b. last
c. middle
d. new
Answer: option A) First
In a circular linked list the last node points to the first node.
Explanation: As in a circular linked list, the node will point to its next node. Since the node next to last node is the first node hence last node will point to first node in a circular way. The elements points to each other in a circular path which forms a circular chain.
True / False
Generally, a floating-point add instruction takes more clock cycles then a corresponding integer add instruction.
Answer:
True
Explanation:
A typical contemporary CPU knows two primary information classes: integer and floating point.
Floating point arithmetic instructions take more clock cycles than integer instructions.
Integer point generally takes 1 or 2 clock cycles for executing add instruction whereas floating point takes 3 or 4 instructions for executing add instruction.
"What is the running time of HEAPSORT on an array A of length n thatis already sorted in increasing order?
Answer:
The answer to this question is O(NlogN).
Explanation:
The time complexity of Heap Sort on an array A is O(NLogN) even if the array is already sorted in increasing order.Since the Heap Sort is implemented by creating the heap from the array and then heapifying and then repeatedly swapping first and last element and deleting the last element.The process will be done for the whole array.So the running time complexity is O(NLogN).
What will the following code display?
int number = 6
int x = 0;
x = --number;
cout << x << endl;
1. 7
2. 6
3. 5
4. 0
Answer:
5
Explanation:
The operator '--number', it is a pre decrement operator which decrement first and then assign. It decrement the value by 1.
initially the number is 6.
x is 0.
then, x = --number;
it decrement the number by 1 first and then assign to x.
so, x assign the value 5.
finally, print the value.
Therefore, the answer is 5.
Explain the security mechanisms available for a database and how the data will be protected.
Answer: Views, unauthorized access, encryption are some of the security mechanisms.
Explanation:
The database of any application or software contains all the important data, therefore it is utmost necessary to protect the data from falling into dangerous hands. Most databases use authentication measures in form of passwords or bio metrics to avail access. Besides these users can use views to see the data but cannot change anything into the database. Some databases also use encryption systems to encrypt the passwords for better safety. There are some databases which grants user with two types of privileges such as system and object privileges, whereby with system privileges one can change the system environment variables.
As it is a good practice that C# broughtback the concept of GOTO statement and Pointer? If your answer isyes then how C# control the worst effect of those features. Pleasebe brief?
Answer:
No for GOTO
Yes for Pointer
Explanation:
GOTO statement
This declaration is used to pass control to the program's marked declaration. The label is the valid identifier and is positioned just before the declaration from which the control is transmitted.
It becomes hard to trace a program's control flow, making it hard to comprehend the program logic. Any program in C language can be written without using a GOTO statement.
Pointers
A C # pointer is nothing but a variable holding another type of memory address. However, in C # pointer only the memory address of the value types and arrays can be declared.
C # supports pointers to a restricted extent. Unlike reference kinds, the default trash collection system does not track pointer kinds. Pointers are not allowed to point to a type of structure containing a type of reference or a type of reference.
During the garbage collection process, the C #garbage collector can move objects in memory as they wish. The C #offers a unique fixed keyword for telling Garbage Collector not to move an item. This implies that the place of the value kinds referred to is fixed in memory. This is called pinning in C #.
The GOTO statement and pointers in C# can simplify some coding tasks but can also make the code harder to read and C# controls these downsides by offering structured programming constructs and by restricting pointer usage to unsafe contexts.
The introduction of the GOTO statement and pointers in C# can be seen both positively and negatively. While the GOTO statement allows for easier navigation and breaking out of control structures, it often results in code that is hard to read and maintain. To mitigate such issues, C# provides structured programming constructs like loops, conditional statements, and methods to manage control flow more effectively.
C# also manages the risks of pointers by requiring explicit permissions and special contexts for their usage, thus limiting their misuse.
Control Mechanisms in C#
Instead of GOTO, use loops (for, while) and conditionals (if, switch) for better readability.Pointers are only allowed in unsafe contexts to highlight potential risks.The n modifier after the tilde forces the index variable to expand only to the ______
Answer: filename and extension.
Explanation:
Suppose we have %~nxa, where we have two modifiers n and x, and a single variable a.
So, the n modifier after the tilde forces the index variable to expand only to the filename(by the n modifier) and the extension(by the x modifier).
It produces the filename and extension instead of the full path.
To speed up item insertion and deletion in a data set, use ____.
A.
arrays
B.
linked lists
C.
classes
To speed up item insertion and deletion in a data set, use B. linked lists.
Hope this helps!
Final answer:
To enhance the speed of insertion and deletion in a data set, linked lists are superior to arrays as they allow for quick updates of references without needing to shift elements. Thus, option B is correct.
Explanation:
To speed up item insertion and deletion in a data set, the best choice would be B. linked lists. Unlike arrays, which require shifting elements when inserting or deleting an item particularly if it's not at the end, linked lists can efficiently add or remove items because they only need to update the references (or pointers) to the neighboring elements.
When working with a sorted linked list, the structure will maintain items in a sorted order. When inserting a new item, it determines the correct location within the order to insert, based on comparison operators like <. In Python, this can be implemented using special methods such as __lt__() and __eq__(). This comparison flexibility allows for the linked list to handle various data types including integers, floats, and strings, facilitating the sorted order efficiently.
Define a graph. Draw a directed and undirected graph with 8 vertices and explain all the terminologies associated with that graph Note: Terminologies are cycles, path, directed and undirected graph, circuit, loop, adjacency, degrees, Euler circuit, Hamiltonian circuit
Answer:
A graph is a collection of set of edges E and vertices V, where each edge joins pair of vertices.
A graph is undirected when the edges has no direction.
A graph is directed when the edges has confined direction.
An edge is directed if it is defined to come out from one vertex and goes to another fixed vertex.
A loop is an edge from a vertex to itself.
A path from a vertex x to another vertex y is a sequence of distinct edges that joins sequence of distinct vertices:
(x,[tex]x_{1}[/tex])→([tex]x_{1}[/tex], [tex]x_{2}[/tex])→([tex]x_{2}[/tex], [tex]x_{i}[/tex])→ .... → ([tex]x_{j}[/tex],y)
A cycle is path that starts and ends at same vertex.
A circuit is a path that starts and ends at same vertex, but not necessarily contain distinct vertices.
An Euler circuit is circuit that traverse each edge of the graph exactly once and covers all vertices.
An Hamiltonian circuit is a simple circuit that traverse each vertex of the graph exactly once and covers all edges.
Degree of a vertex is the number of edges incident on it.
In case of undirected graph the number of edges incident on the vertex is it's degree.but in case of directed graph the number of edges coming out of the vertex is it's out-degree and the number of edges going to the vertex is it's in-degree.Explanation:
Please explain external hashing, B-trees, and traversals. 3-5 sentences per
Answer: In external hashing the hash table is in disk where each slot of the page table holds multiple entries which refers to pages on the disk organised in the form of buckets.
B-trees are self balancing trees which contains sorted data and allows insertion, deletion, traversals
Traversal is the process of visiting the nodes of the tree data structure.
Explanation:
External hashing is different from internal hashing and it refers to concepts in database management systems. Internal hashing stores only single record maintained in page table format, whereas external hashing holds multiple entries.
B-trees are generalisation of binary trees where it can have more than 2 children.
Traversal of trees helps in insertion, deletion, modification of nodes in tree data structure
Where does the data go for the following instructions?
LDX #$2000
STAA $60,X
Answer: LDX copies the instruction pointed by the memory location into the accumulator. STAA stores the content of the accumulator in the memory location $
Explanation:
Here in LDA #$2000, copies the instruction pointed by the memory location $2000 into the Accumulator A, and it uses indirect addressing.
STA $60,X stores the content of A into the memory location assigned by $60 and assigns it to X.
How is ( a || b ) && c || ( a || b ) && ( ! c ) equal to ( a || b ) without simplification?
Answer: You can see the truth table in the image.
Explanation:We can do this question by using truth table.
As we can see in the truth table that there is no effect on the output of the expression by c if a and b both are false then the output is false and if any of them is True or both of them are True then the result is True.
Which ofthe following calls on human feelings, basing the argument onaudience needs or sympathies?
a- Emotional appeals
b- Logicalappeals
c- Irrational appeals
d- Unreasonableappeals
Answer: a) Emotional appeal
Explanation: Calls on feeling of human is referred as the emotion of the humans ,thus it is said to be an emotional appeal. Other appeals in the options are for the call on technical,logical or unexpected error reason and does not relate to the human audience needs or sympathies .But emotional appeal deals with these need on being called. So, option (a) is the correct option .
what are the forms of Hornclause?
Answer:
Hornclause is defines as, it is a logical formula for particular rule which gives a useful parameters for a logical programming. Hornclause is a clause with one positive literals.
Different form of hornclause are:
Null clause: Null clause is that with 0 negative and 0 positive literals which appears at the end of a resolution proof. A fact or unit clause: Unit clause is defined as literals, which contain 1 positive literals and 0 negative literals. A negated goal: It is defined as negated goal is the negation of the statements to be proved with at least 1 negative and one positive literals..The process of capturing the requirements includes all ofthe following with the exception of:
A.verification B.elicitation C.analysis D.validation
Answer: A) Verification
Explanation: Capturing of the requirements is the process of which the project is taken up to test the scope that project. The capturing of requirement process is divided into certain parts to conduct the procedure as
ElicitationAnalysisValidationSpecificationTherefore there is no part of verification in the process so capturing of requirements process has a exception of verification.
how the email system work??(
Answer:
Email is the electronic mail, basically it is in form of computer-based communication that consists of messages, which are sent and received using the Internet.
Email system works as:
The sender composed a message on their computer using the email client.When the user send the message, the email text and attachment are uploaded in Simple Mail Transfer Protocol(SMTP) server as the outgoing mail. All the messages wait in the outgoing email, while the SMTP server communicate with the Domain Name Server. If the SMTP server search the recipient’s email server, then it will transfer the attachments and the messages . When the next time recipient clicks on send and receive, then the client email download new message from their email server and then you got the mail.Give at least 5 indicators which help to identify systems andtables as potential de-normalizationcandidates.
Answer and Explanation:
The five indicators are
There is existence of repeating groups which needs to be processed in a single group not individuallymany reports exist which need to be processed onlinetables need to processed in different way by different users at the same time certain columns need very large time for the de normalization take 60% as the alarming numbermany calculations needs to be applied to columns before queries can be answered
Given the IP address and subnet mask 192.168.10.0 and255.255.255.224
a) What is the maximum number of subnets in the network?
b) What is the number of hosts?
c) What are the valid subnets?
It is requested pls.give details how u have calculated?
Answer:
a) Maximum subnets=8
b) if there is no subnet , no. of hosts will be 32-2 = 30. If there are 8 subnets as above, then no. of hosts will b 4-2=2.
c) Valid subnets are 6
192.168.10.32
192.168.10.64
192.168.10.96
192.168.10.128
192.168.10.160
192.168.10.192
Explanation:
a) Maximum number of sub nets in the network
For number of sub nets in a network , which class this ip address belongs to
IP address 192.168.10.0
subnet mask 255.255.255.224
192 in ip address means it is a class C address.
In class C address -
Network address-24 bits
Host address-8bits
For number of subnets we check last block of subnet mask.
224 -covert this into binary
11100000
From binary form ,we can conclude that 3 bits are used for sub network as only 3 are 1.
=2^n
= 2^3 =8
b) Number of hosts
In a network,
Number of hosts is (2^host no -2)
We have subtracted 2 because out of these hosts two are used in broadcasting and other purposes.
Host number is equal to the 0's in the Subnet mask
255.255.255.224
convert this into binary number i.e
11111111.11111111.11111111.11100000
So,5 0's are there
Number of valid hosts= 2^5 -2
= 32-2
= 30
c) The Valid subnets are
For valid we have to perform Logical AND with IP Address and subnet mask.
IP address 192.168.10.0
subnet mask 255.255.255.224
Convert these in binary -
IP address 11000000.10101000.00001010.00000000
Subnet mask 11111111.11111111.11111111.11100000
after performing And operation- 11000000.10101000.00001010.00000000
192.168.10.0
this is the host address
192.168.10.224 this is the broadcast address
These are the valid sub nets
192.168.10.32
192.168.10.64
192.168.10.96
192.168.10.128
192.168.10.160
192.168.10.192
write an algorithm that gets the price for item A plus the quantity purchased. The algorithm prints the total cost, including a 6% sales tax.
Answer:
Algorithm()
1. p = Enter the price of item A.
2. c = Enter the number of A’s purchased.
3. Now the price per item with tax is:
t= p+(p*6/100)
4. The total cost of c items:
ct= t * c.
5. Print ct.
In this algorithm, we are taking the price per item and counting it’s cost including tax. Then we are multiplying the price per item with tax with the number of items we purchase, to find the overall cost with tax.
You may calculate the overall cost without tax as (p*c). Then you can find the overall cost with tax as ((p*c)+(p*c*6/100)), as in both way, we will get the same result.
Final answer:
To calculate the total cost of an item including a 6% sales tax, multiply the price of item A by the quantity purchased to get the total price before tax. Then calculate the sales tax by multiplying the total price by 0.06 and add this to the total price to get the total cost.
Explanation:
To write an algorithm that calculates the total cost of an item including sales tax, you need to first find the price of the item A and the quantity purchased. Then, to calculate the sales tax, you will convert the percent to a decimal and multiply it by the total price (price multiplied by quantity). Lastly, you will add this sales tax to the total price to get the total cost.
Algorithm:
Get the price of item A.Get the quantity of item A purchased.Calculate total price without tax: total_price = price_of_item_A * quantity_purchased.Calculate sales tax: sales_tax = total_price * 0.06.Calculate total cost including sales tax: total_cost = total_price + sales_tax.Print the total_cost.For example, if the price of item A is $50 and the quantity purchased is 2, then the total cost before tax is $100. The sales tax at 6% would be $6. Therefore, the total cost including sales tax would be $106.
Why do cellular telephone systems only need seven sets of frequencies in metropolitan areas?
Answer: For frequency reuse, telephone systems use 7 sets of frequencies in metropolitan areas.
Explanation:
As the population is high in metropolitan cities it requires faster reuse of frequencies so that everyone within the network region is being able to use their cellular devices. It can be imagined in the form of a hexagon with 6 points and one at the center enabling faster reuse of free frequencies.
What is the most consistent item regardless of the software used in BI?
Answer Explanation:
Business intelligence is defined as the strategies and technologies used by companies for the data analysis of business information it tell us also about predictive views of business operation.
THE MOST CONSISTENT ITEMS REGARDLESS OF SOFTWARE USED IN BI ARE :
data analyst has the most responsibility of BI he is the most important part of BIIt is the interconnected process of inspection changing and modelingdata analysis is hugely aided by data miningIncomplete Configuration identification documents may resultin:
a) Defective Product
b) Higher Maintenance Costs
c) Schedule Product
d) Meet Software Quality
e) A,B,C
f) B,C,D
Answer: e) A,B,C
Explanation:
Incomplete configuration identification documents may result in defective product, higher maintenance costs and schedule product as, inaccurate document decreased the quality of the product and cause damage. If the configuration documentation are not properly identified, then it is impossible to control the changes in the configuration items, to established accurate reports and records or validate the configuration.
Give a recursive (or non-recursive) algorithm to compute the product of two positive integers, m and n, using only addition and subtraction ?
Answer:
Multiply(m,n)
1. Initialize product=0.
2. for i=1 to n
3. product = product +m.
4. Output product.
Explanation:
Here we take the variable "product" to store the result m×n. And in this algorithm we find m×n by adding m, n times.
An ____ is an object that produces each element of a container, such as a linked list, one element at a time.
A.
initiator
B.
iterator
C.
interpreter
Answer:
B. iterator
Explanation:
An iterator is an object that produces each element of a container, such as a linked list, one element at a time.
An iterator is an object that produces each element of a container, such as a linked list, one element at a time. Thus, the correct option for this question is B.
What is an element?An element may be characterized as the constituent parts of a work of computer that is an essential characteristic of all works of programming and spoken narrative fiction. These elements include plot, theme, character, and tone.
According to the context of this question, an iterator is an object that significantly enables a programmer in order to transverse a container, particularly lists. The various types of iterators considerably provide numerous interfaces to the programmer in order to develop program.
Therefore, an iterator is an object that produces each element of a container, such as a linked list, one element at a time. Thus, the correct option for this question is B.
To learn more about Iterator, refer to the link:
https://brainly.com/question/29313296
#SPJ5
The methods of the Character class that begin with ____ return a character that has been converted to the stated format.
a.
in
b.
to
c.
is
d.
for
Answer:
most probably the answer is 'to'
What are the different types of firewalls? Which one is best?
Why Java Script uses the prefix Java in itsname?
Answer:
Java in JavaScript does not correspond to any relationship with Java programming language.
Explanation:
The prefix Java in Javascript is there for historical reasons.
The original internal name of Javascript when it was created by Brendan Eich at Netscape was Mocha. This was released to public as Livescript in 1995. The name Livescript was eventually changed to Javascript in Netscape Navigator 2.0 beta 3 release in December 1995 after Netscape entered into an agreement with Sun Microsystem. The primary purpose of change of name seemed to be as a marketing aid to benefit from the growing popularity of Java programming language at that time.
When mathematicians use a two-dimensional array, they often call it a ____.
a.
matrix
b.
grid
c.
net
d.
mesh
Answer:
matrix
Explanation:
The two dimensional array store the value similar to matrix.
Two dimensional array contain row and column similar to matrix.
For example:
int arr[3][3], it means 3 rows and 3 column
and [tex][A]_{3*3}=\left[\begin{array}{ccc}1&2&3\\4&5&6\\7&8&9\end{array}\right][/tex]
and if we want to retrieve the data from array arr[1][2], it means first row and second column.
so, 2 dimensional array is basically a matrix.