Answer:
accept people for who they are instead of trying to change them
Explanation:
i don't know if this is right or wrong but i hope this helped you :)
Write a MY SQL query to display the name and hire date of all employees who were hired in 1992.
Answer:
Select * from Employees where LastName LIKE '%H%' or LastName LIKE '%A%' or LastName LIKE '%Z%' order by Hiredate(or whatever you put for your year name) desc;
Explanation:
What is the largest software application on a computer?
Answer:
Mac OS X I believe
Answer: Mac OS X is considered to be the largest operating system ever written. It contains over 85 million lines of codes.
Explanation:
Select the correct answer.
What should you keep in mind when picking a topic for a research paper?
ОА.
choosing a general topic
OB.
choosing a topic that is relatively new
O C.
choosing a specific topic rather than a broad one
OD. choosing a topic based on the most number of sources you can find
Reset
Next
Answer: The answer is C
Explanation: When it comes to research papers your topic shouldnt be too broad. Your topic should be broad enough you can find a good amount of information but not too focused that you can't find any information.
Write a function called csv_sum that takes a filename and returns the sum of all of the numbers in the file. The numbers are in csv format. For instance, if the contents of the file are: 12,3,2 -5 10,20,-10,8.3 Then the function should return 40.3.
Answer:
Explanation:
def csv_sum(filename):
total = 0
try:
f = open(filename)
for line in f:
words = line.strip().split(",")
for word in words:
total += float(word)
f.close()
except FileNotFoundError:
pass
return total
2. What is software conflict?
Answer:
A problem that occurs when two programs cannot run in the same computer at the same time. It is generally due to a programming bug and typically manifests when two programs compete for the same resource (memory, peripheral device, register, etc.).
Hope it helps out!
Explanation:
b) Set of strings of 0s and 1s whose 5th symbol from left is 1.
Answer:
...?
Explanation:
what is internet? explain help pliz
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
What is the default join type? inner self join left outer right outer
Answer: inner
Explanation: on edg
Answer:
inner
Explanation:
just did it on Edg
You designed a program to create a username using the first three letters from the first name and the first four letters of the last name. Usernames cannot have spaces. You are testing your program with a user whose name is Jo Wen. What step in the program plan do you need to revisit
Answer:
See Explanation
Explanation:
The question would be best answered if there are options to select from; since none is provided, I will provide a general explanation.
From the question, we understand that, you are to test for Jo Wen.
Testing your program with this name will crash the program, because Jo has 2 letters (3 letters are required), and Wen has 3 letters (4 letters are required)
So, the step that needs to be revisited is when the username is generated.
Since the person's name cannot be changed and such person will not be prevented from registering on the platform, you need to create a dynamic process that handles names whose lengths are not up to the required length.
An ISA specifies a word size of 8 bytes, byte addressability, and an address space of 256 K; it uses single-word instructions (i.e. each instruction is a single 8 byte word). What is the size of the MAR
Answer:
2 bytes
Explanation:
Size of the MAR ( memory address register ) = 18 bits = 2 bytes
Given that
address space = 256 K = 2^8
number of address location= 2^8 * 2^10 ( where 1K = 2^10 )
= 2^18
Given the number of address location = 2^18 ;
Hence 18 bits are required to store the address of the instruction
Question # 4 Dropdown Finish the code for this function.
if guess_____ correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
if guess < correct:
print("Guess higher.")
else:
print("Guess lower.")
a. !=
b. =
c. ==
Answer:
==
Explanation:
I did it on edge 2021
Answer:
The answer is ==. I hope this helps you out. Have a nice wonderful day. <3<3<3
Explanation:
Role and importance of internet in today's world
Explanation:
In today's world Internet is the main thing in our daily life. Without it there would be a lot of troubles and we use Internet for research, watching videos etc
A computer can manipulate symbols as if it understands the symbols and is reasoning with them, but in fact it is just following cut-and-paste rules without understanding why. This means that:
Answer:
The symbols may or may not have meaning, but the machine does not need to know how the symbols are interpreted in order to manipulate the symbols in the right way.
Explanation:
The computer can change the symbols in the case when the computer understand but in actual following the cut-paste rules without having any understanding this is because the symbols might be have meaning or not but if we talk about the machine so actually they dont know how the symbols are interpreted and how it can be used so that it can be change in the accurate way
You wish to traverse a binary search tree in sorted order using pre order traversal. Arrange the following actions in the correct order to accomplish this. I Print the right subtree recursively II Print the root III Print the left subtree recursively
Answer:
II Print the root
III Print the left subtree recursively
I Print the right subtree recursively
Explanation:
The question illustrates binary search in data structure.
When preorder is applied to a binary search, the search starts by visiting the root node, then proceed to the visiting the left most nodes and finally, the left nodes will be visited.
Using the above illustration, the arrangement of the actions in ascending order is: II, III and I
You work for a large company that has over 1000 computers. Each of these computes uses a wireless mouse and keyboard. Therefore, your company goes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you must decide what to do with them. Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries?
They must be sent to hazardous waste collection
a. They can be recharged.
b. They must be stored onsite until they expire
c. They can be thrown in the trash.
The answer to this question is, "They can be thrown in the trash."
Explanation: This is because it specifies how to get rid of them UNLESS local authorities have told you otherwise.
An OpenCL Device is composed of: Group of answer choices Command Queues Platforms Processing Elements Compute Units
Answer:
Compute Units
Explanation:
A platform can be defined as a computing environment for building and executing sets of code in a software application or program such as an application programming interface (API).
The two parts of the platform used to run an application software are both hardware and software (operating system).
Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but understandable to computers.
OpenCl is an abbreviation for open computing language that runs on CUDA-powered graphics processing units (GPUs). An OpenCL Device is composed of compute units and an OpenCl compute unit typically comprises of processing elements.
Create a program that allows the user to input a list of first names into one array and last names into a parallel array. Input should be terminated when the user enters a sentinel character. The output should be a list of email addresses where the address is of the following form:removed5e6e40a81ad00741739cde785028a13d28bca59a8d2d188bc192c2cc8f3ec362removed
Answer:
The program in Python is as follows:
firstName = []
lastName = []
while True:
fName = input("First Name: ")
lName = input("Last Name: (Enter to quit): ")
if not lName:
break
firstName.append(fName)
lastName.append(lName)
for i in range(len(firstName)):
print(firstName[i] . lower()+"."+lastName[i] . lower()+" mycollege . edu")
Explanation:
See attachment for complete source file where comments are used as explanation
Why do organizations need to tailor project management concepts, such as those found in the PMBOK® Guide, to create their own methodologies?
Explanation:
Although each project is different and unique, according to the Method Statement of PMBoK, customising is required. Not that every procedure, tool, methodology, input, or output listed in the PMBoK Guide is mandated for every project. Scope, timeline, cost, materials, quality, and danger should all be considered while tailoring.
What is a word processing program? Give examples of word processing programs.
Answer:
A word processor, or word processing program, does exactly what the name implies. It processes words. It also processes paragraphs, pages, and entire papers. Some examples of word processing programs include Microsoft Word, WordPerfect (Windows only), AppleWorks (Mac only), and OpenOffice.org.
Select all phrases that describe a server-based network. centralized network security easy to expand log-ins controlled by central server unlimited number of users network resources stored on individual workstations
Answer:
Client Server Network ... is the central computer that enables authorized users to access networked resources ... computers in this type of network are connected to a central hub ... why might a business choose a server based network (3) ... 2) easier to expand ... external hardware connected to and controlled by a computer.
Explanation:
Answer
Explanation:
what the other person said
Assume we have a computer where the clocks per instruction (CPI) is 1.0 when all memory accesses hit in the cache. The only data accesses are loads and stores, and these total take 40% of the instructions. If the miss penalty is 200 clock cycles and the miss rate is 2% for I-Cache and 5% for D-cache, how much faster would the computer be if all instructions were cache hits
Answer:
6.6 times faster considering I-cache
Explanation:
Given data :
CPI = 1
Data accesses ( loads and stores ) = 40% of instructions
Miss penalty = 200 clock cycles
Miss rate = 2% for I-cache , 5% for D-cache
Determine how much faster the computer will be if all instructions were Cache hits
In this condition the memory stall = 0
hence: CPU ideal time = ( Ic * CP1 + memory stall ) * clock cycle time --- ( 1 )
= ( Ic * 1 + 0 ) * clock cycle time
Note : Memory stall = Ic * ( 1 + load fraction ) * miss rate * miss penalty --- ( 2)
back to equation 1
Memory stall ( for I-cache ) = Ic * ( 1 + 40% ) * 2% * 200
= 5.6 Ic
Input value into equation 1
CPU ideal time = Ic * 1 + 5.6Ic * clock cycle time
= ( 6.6 Ic ) * clock cycle time
To determine how much faster we take the ratio of the CPU ideal time
= 6.6 Ic * clock cycle time / 1 Ic * clock cycle time
= 6.6 times faster
Imagine running a 64-bit system on a 32-bit system, where we simulate a single 64- bit memory location (register) using two atomic 32-bit memory locations (registers). A write operation is implemented by simply writing the first 32-bits of the simulated 64-bit register in the first real register, then the second 32-bits in the second real register. A read, similarly, reads the first half from the first register, then the second half from the second register, and returns the concatenation. What is the strongest property that this 64-bit register satisfies: safe, regular, or atomic
Answer:
It's not possible to ensure memory access occurs indivisibly when it has to broken into multiple operations. Unfortunately, the fact that your application is running on a 64-bit kernel does not change the equation any - it is actually running in a compatibility layer and has none of the benefits of x64
Explanation:
Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150, and the previous request was at cylinder 1,805. The queue of pending requests, in FIFO order, is:
Answer:
The queue pending requests of FIFO order is ;
86, 1470, 1774, 948, 1509, 1022, 1750, 130.
Explanation:
The FCFS schedule is 143, 86, 1470, 913, 1774, 948, 1509, 1022, 1750, 130.
Total seek distance is 7081.
The SSTF schedule is 143, 130, 86, 913, 948, 1022, 1470, 1509, 1750, 1774.
Total seek distance is 1745.
The LOOK schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774, 130, 86.
Total seek distance is 3319.
The SCAN schedule is 143, 913, 948, 1022, 1470, 1509, 1750, 1774, 4999, 130, 86.
Total seek distance is 9769.
help me guys plssssss
Answer The answer is
So hope this was helpful
Explanation:
Write the C++ code (NOT a full program) that prompts the user to enter 50 numbers and fills the array guestCount with these 50 numbers, so that the first number input is in the first element of the array, the second input in the second element, etc.
Answer:
The code is as follows:
int guestCount[50];
for(int i = 0; i<50;i++){
cout<<"guestCount "<<i+1<<": ";
cin>>guestCount[i];
}
Explanation:
This declares the array
int guestCount[50];
This iterates through the array (50 elements)
for(int i = 0; i<50;i++){
This prompts the user for each array element
cout<<"guestCount "<<i+1<<": ";
This gets the input from the user
cin>>guestCount[i];
}
George has a set of software programs installed on his computer to create a digital portfolio. He is not sure what each program does. Help George by matching the software to their purposes
Explanation:
I thinkcreating and edditing Images matchs to adobePhotoshop
Microsoft word is for adding and Creating text document
Creating andeditingpage layout -Adobe In Design
Desktop Publication-QuarkQuark Xpress
I hope thishelp and If wrong Inform me
Good luck
Answer:
This is the answer based off of the notes
Explanation:
Describe any FIVE features that make high level languages the preferred ones over machine languages
Explanation:
Machine language, or machine code, is the only language that is directly understood by the computer, and it does not need to be translated. All instructions use binary notation and are written as a string of 1s and 0s.
A high-level language is a programming language that uses English and mathematical symbols, like +, -, % and many others, in its instructions. When using the term 'programming languages,' most people are actually referring to high-level languages. High-level languages are the languages most often used by programmers to write programs.
Examples of high-level languages are C++, Fortran, Java and Python.
High level languages are called ‘high-level’ because they are closer to human languages and
are further removed from machine languages than assembly language.
There is no one-to-one relationship between the instructions in a high level language and
machine language as there is with assembly language.
Difference between Machine Language and High Level language -
In high level code instructions use words but In machine code instructions are in binary code. High-level code is designed to be read by human programmers but In Machine code is to be read/executed by the computer High level code can be portable/translated for different machines but Machine code is specific to a particular machine.1-How many moles of NazCOs are in 10.0 ml of a 2.0 M solution?
Answer:
A solution is a mixture in which the particles are so small that the components are indistinguishable from each other. The amount of the solute and the solvent in a solution can be expressed in terms of different concentration expressions such as molarity, morality, etc.
Explanation:
To calculate the number of moles of sodium carbonate, the volume in liters will be multiplied by the molar concentration of the solution.
moles Na2CO3 = 2.0 M x 0.0100 L = 0.020 moles Na2CO3
Hope it helps :)
Answer:
There are 20. mol of Na2CO3 in 10.0L of 2.0M solution.
Explanation:
Molarity is represented by this equation:
(look at attachment)
In our case, we already have the molarity and volume of solution, both of which have good units.
Let's rearrange the equation to solve for the number of moles. We can do this by multiplying by L solution on both sides of the equation. The L solution will cancel out on the right side, leaving the number of moles being equal to the molarity times volume:
Moles of solute
=Lsolution×Molarity
Now we just plug the known values in!
Moles of solute = (10.0 L) (2.0M) = 20. moles
Project: You are Tech Support
Answer:
no but call a big company
If a cache hit retrieves a value in 5ns, and retrieving a value from main memory requires 25ns, what is the average effective access time for this cache, assuming that all memory accesses exhibit the same hit rate of 0.8 and assuming the system uses a) A non-overlapped (sequential) access strategy
Answer:
10 ns
Explanation:
Determine the average effective access time for the Cache
Average effective access time for Non-overlapped access strategy
= ( Hit Rate * Cache Hit Time) + ( 1 - Hit Rate ) * ( Main Memory Access Time + Cache Hit Time ) ------ ( 1 )
Given that : Hit Rate = 0.8 , Cache Hit time = 5ns , Main Memory access time = 25ns ,
Equation 1 becomes
= ( 0.8 * 5 ) + ( 1 - 0.8 ) * (25 + 5)
= 4 + 0.2 * 30 = 4 + 6 = 10ns