Answer:
// here is code in C++ to demonstrate a 2-dimensional array.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
int r,c;
cout<<"enter the number of row:";
// read the value of row
cin>>r;
cout<<"enter the number of column:";
// read the value of column
cin>>c;
// create a 2-d array
int arr[r][c];
// read the value of array
cout<<"enter the elements of array:"<<endl;
for(int a=0;a<r;a++)
{
for(int b=0;b<c;b++)
{
cin>>arr[a][b];
}
}
cout<<"elements of the array are:"<<endl;
// print the array
for(int a=0;a<r;a++)
{
for(int b=0;b<c;b++)
{
cout<<arr[a][b]<<" ";
}
cout<<endl;
}
return 0;
}
Explanation:
Here we have demonstrate a 2- dimensional array. In which, how to read the elements and how to print elements of array.Read the value of row and column from user.Create a 2-d array of size rxc. then read the elements of array either row wise or column wise. Then print the elements.To print the elements, we can go either row wise or column.
Output:
enter the number of row:3
enter the number of column:3
enter the elements of array:
1 2 3
9 8 7
2 4 6
elements of the array are:
1 2 3
9 8 7
2 4 6
What is ‘verification’?
Answer: Verification in the terms of the computer field is defined as the process which is for testing of the consistency and the accuracy of the information, algorithm, data, etc. Verification is carried out by the approval or disapproval method after the checking process.
This techniques helps in verifying whether the function,algorithm ,data that has been accessed in the system is complete and precise or not so that it can properly function in the operating system.
While the concept of ____ has well served scientists who share scientific text files and application developers who exchange code, the greater use has been in downloading artistic files, such as music and video files.
VPNs
LANs
point-to-point file protocol
peer-to-peer (P2P) file sharing
Answer: peer-to-peer (P2P) file sharing
Explanation: Peer-to-peer file sharing is the technique in which networking technology is used for the sharing and distribution of the files digitally. The sharing of the files are in the form of movies, games music etc.
Peer are considered as the nodes which are the end-user so, the end-user to end-user file transfer is done through this technology.
Other options are incorrect because VPN(virtual private network) is the connection between network and client over less secure network,LAN (Local area network) is the network that can be established for single infrastructure to connect and point to point protocol is protocol for the routers for communication.Thus the correct option is P2P file sharing.
A __________ is an information system that produces all kind of reports and interprets information so it can be used by concerned people to make decisions.
DSS (Decision Support System)
MIS (Management Information system
EIS (Expert Information System)
TPS (Transaction Processing System)
2400
Answer: Decision support system (DSS)
Explanation:
Decision support system is the process in which the information model basically support the managers in the process of the decision making.
It is an information system and produces various reports and also interprets the data and information so that it help to make decisions.
The decision support system (DSS) is basically carried out by the management by reviewing all kinds of the report and then generate necessary data or information.
On the other hand, all the other options are incorrect as they are not related to the decision making process. Therefore, DSS is the correct option.
Explain what occurs when you synchronize computer and mobile devices.
Answer: The synchronization of the mobile and computer devices is termed as the merging of the information of the device with the other computer device.Synchronization action takes through the "sync" command .
The synchronization helps in updating the information or data that is present in both the devices .It also sends and receive the files and information from reach other through transferring activity.The act helps in keeping the same updated information in both the system.
What is the association rule of data mining?
Answer:
Association rules are usually referred as the if-then statements which help in order to show probability of association and relationships in between data items that are embedded within large data sets in several kinds of databases. Association rule mining also tends to have a several number of applications and thus is widely used in order to uncover sales relation in transactional data.
A use case model describes what a system does without describing how the system does it. (Points : 1.5) True
False
Answer:
The correct answer is true.
Explanation:
By definition, a use case is a list of events that defines the interactions between an actor and a system to achieve a goal. Generally, Use cases are used by functional analysts at a higher level to represent requirements, missions or stakeholder goals.
The parameters needed for a MySQL database connect string are
a
host name
b
user name
c
password
d
All of the above
Answer:
d. All of the above.
Explanation:
The parameters required to for a MYSQL database connect string are as following:-
Host Name.User Name.Password.New link.Client flags.So among the given options all of them are required and those are host name,user name,password.
Hence the answer to this question is option d all of the above.
Write a function called reverse() with this prototype:
void reverse(char dest[], char source[], int size);
Your function should copy all the elementsin the array source into the array dest, except in reverse order. The number of elements in the source array is give in the parameter size. Use a for loop to do the copying. Assume that dest is large enough to hold all of the elements. Please be thorough with commenting.
Answer:
void reverse(char dest[], char source[], int size)
{
for(int i=0;i<size;i++)//using for loop.
{
dest[i]=source[i];//assigning each element of source array to dest array.
}
int s=0,e=size-1;//initializing two elements s with 0 and e with size -1.
while(s<e){
char t=des[s]; //SWAPPING
dest[s]=dest[e]; //SWAPPING
dest[e]=t; //SWAPPING
s++;
e--;
}
}
Explanation:
I have used while loop to reverse the array.I have initialize two integer variables s and e with 0 and size-1.Looping until s becomes greater than e.
It will work as follows:
first s=0 and e=0.
dest[0] will be swapped with dest[size-1]
then s=1 and e=size-2.
then des[1] will be swapped with dest[size-2]
and it will keep on going till s is less than e.
Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it?
Answer:
The answer to the questions: Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it? Would be as follows:
1. Yes, Kennesaw State University, a university in Georgia, does have a computing ethical policy that regulates the proper use of the facilities and computing services within the facilities of the university and the use of computing equipment that belongs to the university. This policy is known as the KSU Computer Usage Policy.
2. As said before this policy establishes that the use of computing services are not the right of a person, but rather a privilege afforded to the students, faculty and other people who are present in the university and who may need to use its computing services. The use of the computing services would be whitin this policy as long as it stays inside the delimitations established by federal, state and University policies.
Explanation:
. Use one command to create a /sales directory with the permissions of 770
Answer:
mkdir -m 770 sales
Explanation:
The command mkdir is used to create a directory and the attribute or flag
-m is used to assign permissions on create a folder.
Example:
mkdir -m 770 sales
Create a folder with permissions 770 with name sales
What is pros and cons of Cleanroom Software Engineering Process?
Answer and Explanation:
Pros of cleanroom software
This helps in confirming the plan detail with the assistance of mathematically based evidence of rightness.This uses incremental development processes.This uses incremental development processes. The realistic expectation is considered as less than 5 failures per KLOC on the first program execution in the project.There are short advancement cycles and longer item life.Cons of cleanroom software
This exceptionally relies upon the statistical utilization of testing for revealing the high impact mistakes.The software is also not compiled or executed during the verification process hence it would become difficult to find the errors.From an IT perspective, which of the following best describes BI and BI apps?
a. Stand-alone
b. Support a specific objective
c. A collection of ISs and technologies
d. Web-based systems designed for for-profits
Answer:a)Stand-alone
Explanation: Stand-alone application is the application that is found on the system of every client.In accordance with the IT section, Business intelligence can be transferred into stand-alone application .This helps in the development of the essence of the system at an independent level.
Other options are incorrect because supporting a certain factor will not make it independent, cannot act as the group of ISs technology or web system for gaining profit.Thus,the correct option is option(a).
What is TCP/IP's Transport layer's primary duty?
Answer:
The TCP/IP is the transmission control protocol and internet protocol and in the TCP/IP model the transport layer is the second layer.
The primary responsibility of this layer is that it is basically used to deliver messages to the host and that is why it is known as end to end layer.
It basically provide the point to point connection between the destination to server host for delivering the various types of the services efficiently and reliably.
In the TCP/IP model the transport layer are basically responsible for transferring the data or service error free between the server to destination host.
Is spread spectrum transmission done for security reasons in commercial WLANs?
Answer: No
Explanation: Spread spectrum transmission is the wireless transmission technique for the wide channel that helps in decrement of the potential interference.The transmission of signal is based on the varying the frequency knowingly to achieve larger bandwidth.
The use of spread spectrum transmission in the WLAN(wireless local area network)is used for the regulatory purpose The regulation is the controlling of the area through policies.Thus,security is not the service that is provided to WLAN by spread spectrum transmission.
Which one is the fastest? (Points : 4) TTL
CMOS
ECL
They are the same
Answer: ECL
Explanation:
ECL is basically stand for the emitter coupled logic and it is the high speed integrated logic circuit. In this ECL logic circuit, the transistor does not enter in the saturation mode.
In the emitter coupled logic, the output resistance are low and the input emitter impedance are high so, the state of the transistor are get changes quickly. Hence, it is fastest device as compared to all other options.
Therefore, ECL is the correct option.
Writе thе dеclaration of a doublе pointеr namеd avеragе
Answer:
double *average; // declaration of a doublе pointеr .
Explanation:
A pointer is a variable that will store the address of another variable of the same datatype. Here average is a pointer type variable that means it will store the address of double datatype variable.
syntax of declaring double datatype variable
double *variable_name ;
double *average;
For example:
double *average;
//declaration of a doublе pointеr
double r=90.897;
// variable r of double datatype
average=&r;// storing the address of r
. Within data mining, what it it’s robustness?
Answer:
Data mining is the extraction/mining of the required/ actual data from the raw data .Rest of the data that is not required is eliminated in this process.It is used in the many field such as research, scientific, etc.
Robustness in the data mining field is for defining the strong nature of the data .This feature is responsible for stability of the data even at the occurrence of the error.The resistance shown by the data towards the problem makes the data robust .
To edit a form, use
datasheet view.
design view.
layout view.
layout view or design view.
Answer: Design view
Explanation:
We use design view for editing and modifying the forms. The design view is basically used to create the form and then also edit the form structure. It is also capable for reducing the scope in the particular structure.
In the design view, we can use the property sheet for modifying the properties in the form and also control its features in the particular section of the form structure.
It basically provide the wide variety of comprehensive form structure and it basically helped to organize the proper information in the form.
Answer: layout view
Explanation; on edge
"What does the list look like after this code executes?
colors = "red,orange,yellow,green,blue"
s = colors.split(",")
["red", "orange", ""yellow", "green", "blue"]
["red orange yellow green blue"]
[red,orange,yellow,green,blue]
red
Answer:
The list created by the split method in Python 3 will be ["red", "orange", ""yellow", "green", "blue"]
Explanation:
In Python 3, the split method takes the input string, in this case is colors = "red,orange,yellow,green,blue", and split it into a list and you can indicate the separator that the method will use.
The general syntax for this method is:
string.split(separator,max)
separator indicates the character that will be used as a delimiter of each list member and the max parameter indicates the maximum number of separations to make.
Since each color in your string is separated by the character "," the code will make a list in which every color is a separated string.
What is an operating system? What are the main functions of a modern general purpose operating system?
Answer:
An operating system is a software that allows a user to run other applications on a computing device. The applications generally are not designed to interface directly with hardware, almost all of the applications are written to run on an operating system, in order to become independent of the hardware design.
The main function of an operating system are:
manage the hardware resources of a computer: central processing unit, memory, disk drives, and printers. establish a user interface to facilitate the interaction human-computer. execute and provide services for software applications.In a typical configuration the total RAM capacity is less than total ROM capacity.
True
False
False
Explanation:The difference between RAM and RAM is as follows
(1) RAM (random access memory) is meant for temporary storage whereas ROM (read-only memory) is meant for permanent storage.
(2) RAM chip is volatile, means once the power is turned off, it loses the previously holding information, where as ROM is non-volatile it doesn't losses any information even though power is turned off.
(3) RAM chip is used in the normal operations of the computer, whereas the ROM chip is used mainly for the startup process of computer.
(4) Generally, A RAM can store several gigabytes (GB) of data that is up to 16 GB whereas a ROM chip can typically store that much data. It only stores several megabytes (MB) of data that is up to 4 MB.
hence, the given statement about RAM is false.
Another ball dropped from a tower A ball is again dropped from a tower of height h with initial velocity zero. Write a program that asks the user to enter the height in meters of the tower and then calculates and prints the time the ball takes until it hits the ground, ignoring air resistance. Use your program to calculate the time for a ball dropped from a 100 m high tower
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variable
double height;
// gravitational acceleration
double g=9.8;
cout<<"Please enter initial height:";
cin>>height;
// h=ut+(gt^2)/2
// here u, initial velocity is 0
// after simplification
double t=sqrt(2*height/g);
// print the time
cout<<"time taken by ball to hit the ground is:"<<t<<" seconds"<<endl;
return 0;
}
Explanation:
Read the initial height from user. Declare and initialize the earth gravitational acceleration "g=9.8" .Then the equation is h=ut+(gt^2)/2, here u is initial velocity which is 0.Then after simplify the equation t=sqrt(2*h/g). Put the values in the equation and find the time taken by ball to hit the ground.
Output:
Please enter initial height:100
time taken by ball to hit the ground is:4.51754 seconds
Final answer:
A Python program calculates the time a ball takes to reach the ground when dropped from a given height, illustrating basic principles of free fall in physics. For a 100 m tower, the time is approximately 4.51 seconds.
Explanation:
A student has asked to write a program that computes the time it takes for a ball to hit the ground when dropped from a tower of height h meters, assuming no air resistance. The formula to calculate the time t is derived from physics: t = √(2h/g), where g is the acceleration due to gravity, approximately 9.81 m/s². Using this formula, we candevelop a program in Python to ask the user for the height h and then compute and print the time t. To demonstrate, if the program is used with a tower height of 100 meters, the calculated time for the ball to reach the ground would be approximately 4.51 seconds.
Example Python Program
import math
def drop_time_from_height(height):
g = 9.81 # Gravity in m/s²
time = math.sqrt(2 * height / g)
return time
height = float(input("Enter the height of the tower in meters: "))
time = drop_time_from_height(height)
print("The ball takes", round(time, 2), "seconds to hit the ground.")
This program illustrates a straightforward approach to solving problems related to free fall and physics calculations, enhancing the understanding of concepts such as gravity and acceleration.
Which of the following is NOT a good idea to do after you change the root password?
(a) Restart the MySQL Service.
(b) Write down the new password in a safe place.
(c) Keep the change password file on the server in case you need to change the password again.
Answer:
C) Keep the change password file on the server in case you need to change the password again
____ coordinates activities related to the Internet’s naming system, such as IP address allocation and domain name management. National Center for Supercomputing Applications (NCSA) Web Consortium (W3C) ICANN (Internet Corporation for Assigned Names and Numbers) Internet Society (ISOC)
Answer: ICANN (Internet Corporation for Assigned Names and Numbers)
Explanation: ICANN (Internet Corporation for Assigned Names and Numbers) is the a US base government organization which runs on the non-profit scheme. The function of the ICANN is to maintain stability of internet operation and function,process based on consensus ,managing the domain name, naming internet components etc.
Other options are incorrect because National Center for Supercomputing Applications (NCSA) is for supporting and providing powerful computer, Web Consortium (W3C) is for development of standard of web and Internet Society (ISOC) works for internet based standard for development.
_________ is used in planning situations that involve much uncertainty, like that of IT in general and e-commerce in particular.
a. Key performance indicators (KPIs)
b. Scenario planning
c. Critical success factors (CSFs)
d. Balanced scorecard
Answer:b)Scenario planning
Explanation: Scenario planning is the strategy that is made for the generation of long term plan in an organization. It is also known as the scenario analysis . This is flexible technique in which helps the well structured and well managed future of organizations.
This tool considers the uncertainty and uncontrollable events that might happen in future and thus , these situation are analysed and acknowledged.
Other options are incorrect because Key performance indicator are for providing the key factor about the performance of organization, critical success factor are for achieving positive outcome and balanced scorecard is type of management plan framework.Thus the correct option is option(b).
What does it mean to 'instantiate' an object?
Explanation:
Instantiate an object means creating an instance of accessing the property of a class we can create instance or object for that class. The property of class means method and variable with the help of instance we can directly access the method and variable.
For example
class abc // class abc
{
public:
void sum1() // function definition
{
cout<<" hello "; // display hello
}
};
void main() // main method
{
abc ob; // creating an instance
ob.sum1(); // calling a function sum1
}
Output:
hello
Here we create a instance of class abc i.e ob which can access the method sum1().
Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if the user entered month 2 and year 2000, the program should display that February 2000 has 29 days. If the user entered month 3 and year 2005, the program should display that March 2005 has 31 days.Here is a sample run of this program:Enter a month in the year (e.g., 1 for Jan): 1Enter a year: 2009January 2009 has 31 daysExercise 3.11Liang, Y. Daniel. Introduction to Java Programming (8th Edition)
Answer:
Following are the program in JAVA language
import java.util.Scanner; // import package
import java.util.Calendar; // import package
public class Main // class main
{
public static void main(String[] args) // main function
{
Scanner input = new Scanner(System.in); // for user input
Calendar calendar = Calendar.getInstance(); //get calendar instance for methods
int nYear , nMonth , date =1 , nDays;
String MonthOfName = "";
System.out.print(" Enter a month in the year :");
nMonth = input.nextInt(); //input Month
System.out.print("Enter a year :");
nYear = input.nextInt(); //Input Year
switch (nMonth) //Find month name via 1-12
{
case 1:
MonthOfName = "January";
nMonth = Calendar.JANUARY;
break;
case 2:
MonthOfName = "February";
nMonth = Calendar.FEBRUARY;
break;
case 3:
MonthOfName = "March";
nMonth = Calendar.MARCH;
break;
case 4:
MonthOfName = "April";
nMonth = Calendar.APRIL;
break;
case 5:
MonthOfName = "May";
nMonth = Calendar.MAY;
break;
case 6:
MonthOfName = "June";
nMonth = Calendar.JUNE;
break;
case 7:
MonthOfName = "July";
nMonth = Calendar.JULY;
break;
case 8:
MonthOfName = "August";
nMonth = Calendar.AUGUST;
break;
case 9:
MonthOfName = "September";
nMonth = Calendar.SEPTEMBER;
break;
case 10:
MonthOfName = "October";
nMonth = Calendar.OCTOBER;
break;
case 11:
MonthOfName = "November";
nMonth = Calendar.NOVEMBER;
break;
case 12:
MonthOfName = "December";
nMonth =Calendar. DECEMBER;
}
calendar.set(nYear, nMonth, date); // set date to calender to get days in month
nDays=calendar.getActualMaximum(Calendar.DAY_OF_MONTH); // get no of days in month
System.out.println(MonthOfName + " " + nYear + " has " + nDays + " days."); //print output
}
}
Output:
Enter a month in the year : : 09
Enter a year : 2019
September 2019 has 30 days.
Explanation:
In this program we have take two user input one for the month and other for the year Also take two variables which are used for storing the month name and no of days in a month. with the help of switch we match the cases and store the month value .After that set the date to calender with help of calendar.set(nYear, nMonth, date) method and To get the number of days from a month we use calendar.getActualMaximum(Calendar.DAY_OF_MONTH); method and finally print year and days.
Give two separate print statements: one will print your name, the other will print your major. Ensure that both will print on the same line to the screen
Answer:
// here is code in java.
// import package
import java.util.*;
// class definition
class Main
{
// main method of the class
public static void main (String[] args) throws java.lang.Exception
{
try{
// print the name
System.out.print("my name is Sam. ");
// print the major
System.out.print("my major is CS.");
}catch(Exception ex){
return;}
}
}
Explanation:
In java, System.out.print() will print the statement but didn't go to the next line.If there is another System.out.print(), then it will also print into the same line.So here first the System.out.print() will print the name and second will print the major in the same line.
Output:
my name is Sam. my major is CS.
Business competition is no longer limited to a particular country or even a region of the world.
True
False
Answer:
The best answer to the question: Business competition is no longer limited to a particular country or even a region of the world:___, would be: True.
Explanation:
Globalization has changed the way that all aspects of human life, and human activities develop. Globalization has meant the erasing of limitations that were placed primarily on trade and economic activities, but it also extended to other aspects of life. Because of technology advancements, especially in communications, connectivity, and travelling, the world is now easily connected and limitations are only placed up to a certain level. Thus, and especially economically, business competition has become a global issue too, with now more and more presence of multinational businesses, companies that extend not necessarily to one country, or even one region of the world, but extend to any region that will allow them to enter for business exchanges.
According to the loyalty effect, a five percent reduction in customer attrition can improve profits by as much as __________ percent.
a. 5
b. 10
c. 15
d. 20
Answer:
d.20
Explanation:
A reduction of five percent in customer attrition can improve improve the profits of the company by as much as 20 percent.This is according to loyalty effect.
The Loyalty Effect is a book written by Fredrick Reichheld it is based on customer retention.It is one of the best books on customer retention.