Answer:
[tex]Capacity = 2.048GB[/tex]
Explanation:
Given
[tex]Tracks = 10000[/tex]
[tex]Sectors/Track = 400[/tex]
[tex]Bytes/Sector = 512[/tex]
[tex]Platter =2[/tex]
Required
The capacity
First, calculate the number of Byte/Tract
[tex]Byte/Track = Sectors/Track * Bytes/sector[/tex]
[tex]Byte/Track = 400 * 512[/tex]
[tex]Byte/Track= 204800[/tex]
Calculate the number of capacity
[tex]Capacity = Byte/Track * Track[/tex]
[tex]Capacity= 204800 * 10000[/tex]
[tex]Capacity= 2048000000[/tex] --- bytes
Convert to gigabyte
[tex]Capacity = 2.048GB[/tex]
Notice that the number of platters is not considered because 10000 represents the number of tracks in both platters
How much data do sensors collect?
Answer:
2,4 terabits (TB) of data every minute. Sensors in one smart-
Mining safety sensors may create up to 2.4 terabits (TB) of data every minute.
What is the significance of sensors?Sensors can help to improve the world by improving diagnostics in medical applications, the performance of energy sources such as fuel cells, batteries, and safety, solar power, people's health, and security, sensors for exploring space and the known university, and improved environmental monitoring.
Sensors play an important role in industrial applications such as process control, monitoring, and safety. The change in sensor output compared to a unit change in input is measured as sensitivity.
It provides several advantages, including increased sensitivity during data gathering, practically lossless transmission, and continuous, real-time analysis.
Real-time feedback and data analytics services ensure that processes are operational and being carried out optimally. Sensors in a single smart-connected house may generate up to 1 gigabit (GB) of data every week.
Learn more about the sensors, refer to:
https://brainly.com/question/15396411
#SPJ2
Security monitoring has detected the presence of a remote access tool classified as commodity malware on an employee workstation. Does this allow you to discount the possibility that an APT is involved in the attack
Answer:
No it doesn't
Explanation:
Targeted malware can be linked to such high resource threats as APT. Little or nothing can be done to stop such advanced persistent threats. It is necessary to carry out an evaluation on other indicators so that you can know the threat that is involved. And also to know if the malware is isolated or greater than that.
At one college, the tuition for a full-time student is $6,000 per semester. It has been announced that the tuition will increase by 2 percent each year for the next five years. Design a program with a loop that displays the projected semester tuition amount for the next five years.
Answer:grhgrt
Explanation:
The program is an illustration of loops;
Loops are program statements used to perform repetition
The tuition programThe program written in Python, where comments are used to explain each action is as follows:
#This initializes the fee
fee = 6000
#The following loop is repeated 5 times
for i in range(5):
#This calculates the fee, each year
fee *= 1.02
#This prints the calculated fee
print(round(fee,2),end=" ")
Read more about loops at:
https://brainly.com/question/24833629
#SPJ6
Write a program whose inputs are three integers, and whose output is the smallest of the three values. Ex: If the input is: 7 15 3 the output is: 3
Answer:
The program in Python is as follows:
nums = []
for i in range(3):
num = int(input(""))
nums.append(num)
print(min(nums))
Explanation:
This initializes a list of numbers
nums = []
This loop is repeated 3 times
for i in range(3):
For each repetition, this prompts the user for input
num = int(input(""))
This appends the input to the list
nums.append(num)
This gets the smallest of the three inputs using the min() function. The smallest is also printed
print(min(nums))
The Answer is in Bold:
#include <iostream>
using namespace std;
int main() {
int a, b, c; //NOTE: you don't have to put a, b, c. you can put it as x, y, z
//or you can make it as num1, num2, num3 etc.
cin >> a;
cin >> b;
cin >> c;
if (a < b && a < c) {
cout << a <<endl;
}
else if(b < a && b < c) {
cout << b << endl;
}
else {
cout << c <<endl;
}
return 0;
}
how data transform into information?
A file system uses a bitmap to keep track of free disk space. One bit represents a 512-byte block. The disk contains 3 files, in the order: A, B, C, with the respective sizes of 1040, 700, 2650 bytes. Which one below is the correct bitmap?
A. 0111000111111 ....
B.1111111100110 ...
C.1011101101100...
D. 1111111111100
Answer:
B. 1111111100110
Explanation:
Bitmap is the technique for mapping from some domain bits. This is particularly referred to as pix-map which is actually map of pixels and this contains more than two colors. it used more than one bit per pixel. Pixels lesser than 8 will represent gray scale.
What aspect should you consider before adding pictures to a document?
You should structure the BLANK first before you search for a relevant picture.
Answer:
You should structure the text first before you search for a relevant picture.
Explanation:
When adding a picture or pictures to a text document, the structure of the text must be considered.
Structure as used in the above sentence means (but is not limited to), the headings, the layouts, the spacing, paragraphs and word formatting in the document.
In other words, the way the document is organized
All these must be put in to place before one adds pictures into the document.
True or false a mirrorless camera has a pentaprism
Answer:
No the pentaprism or pentamirror are both optical viewfinder viewing systems and are not part of the mirrorless camera. Some thing the pentaprism actually operates better than the electronic viewfinder of mirrorless cameras.
Explanation:
You are required to make a carrier with the following details:
Frequency-1 hz/sec
Amplitude - 2
Phase - O degree
Once this carrier has been drawn, please perform the following on the data:
10110010
1. FSK
2. ASK
3. PSK
Waygate's residential Internet modem works well but is sensitive to power-line fluctuations. On average, this product hangs up and needs resetting every 200 hours. On average about 45 minutes is needed to reset this product. What is this product's availability
Answer:
The answer is "In excess of 0.95 "
Explanation:
[tex]MTBF= 200\ hours (12,000\ minutes)\\\\MTR= 45\ minutes (0.75\ hours)[/tex]
Availability equation [tex]=\frac{ MTBF}{(MTBF+MTR)}[/tex]
Calculating the minutes as the common units:
[tex]= \frac{12,000}{(12,000+45)}\\\\= \frac{12,000}{(12,045)}\\\\= 0.9962\\\\= In\ excess\ of\ 0.95[/tex]
Calculating the hours as the common units:
[tex]= \frac{200}{(200+0.75)}\\\\= \frac{200}{200.75}\\\\= 0.9962\\\\= In \ excess\ of\ 0.95[/tex]
computer __ is any part of the computer that can be seen and touched
Calculate the boiling point of 3.42 m solution of ethylene glycol, C2H602, in water (Kb =0.51°C/m, the normal boiling point of water is 100°C):
Answer:
128.10 degree Celsius
Explanation:
The boiling point is given by
[tex]T_b = \frac{1000*K_b * w}{M*W}[/tex]
Substituting the given values, we get -
[tex]T_b = \frac{1000*0.51 * 3.42}{62.07}\\T_b = 28.10[/tex]
Tb is the change in temperature
T2 -T1 = 28.10
T2 = 28.10 +100
T2 = 128.10 degree Celsius
Here is a nested loop example that graphically depicts an integer's magnitude by using asterisks, creating what is commonly called a histogram: Run the program below and observe the output. Modify the program to print one asterisk per 5 units. So if the user enters 40, print 8 asterisks.num = 0while num >= 0: num = int(input('Enter an integer (negative to quit):\n')) if num >= 0: print('Depicted graphically:') for i in range(num): print('*', end=' ') print('\n')print('Goodbye.')
Answer:
Please find the code in the attached file.
Output:
Please find the attached file.
Explanation:
In this code a "num" variable is declared that use while loop that check num value greater than equal to 0.
Inside the loop we input the "num" value from the user-end and use if the value is positive it will define a for loop that calculates the quotient value as integer part, and use the asterisks to print the value.
If input value is negative it print a message that is "Goodbye".
Please find the code link: https://onlinegdb.com/7MN5dYPch2
Which language will report a compilation error for the following snippet of code? int i = 3; double n, j = 3.0; n = i + j; Group of answer choices All of the above C++ Java C
Answer:
None of the programming languages
Explanation:
Given
[tex]int\ i = 3; double\ n, j = 3.0;[/tex]
[tex]n = i + j;[/tex]
Required
Which will produce a compilation error
The given code snippet will pass the syntax test and the semantic test for the three programming languages (C++, Java and C)
In other words, it will compile without error.
The reason is that (for the three programming languages);
Variables (i, n and j) were declared properlyVariables i and j were initialized properlyLastly, the arithmetic operation was also done properlyHence, none of the programming languages will return an error
on a client server network clients and servers usually require what to communicate?
Answer:
A connectivity device. Your colleague, in describing the benefits of a client/server network, mentions that it's more scalable than a peer-to-peer network.
Explanation:
Write a program that tells what coins to give out for any amount of change from 1 cent to 99 cents. For example, if the amount is 86 cents, the output would be something like the following:
86 cents can be given as 3 quarters 1 dime and 1 penny
Use coin denominations of 25 cents (quarters), 10 cents (dimes), and 1 cent (pennies). Do not use nickel and half dollar coins. Your program will use the following function (among others):
void computeCoin(int coinValue, int& number, int& amountLeft);
For example, suppose the value of the variable amountleft is 86. Then, after the following call, the value of number will be 3 and the value of amountLeft will be 11 (because if oyu take three quarters from 86cents, that leaves 11 cents):
computecoins (25, number, amountLeft);
Include a loop that lets the user repeat this computation for new input values until the suer says he or she wants to end the program (Hint: use integer division and the % operator to implement this function.)
Add all numbers up
and you will get your sum
Calculate the total capacity of a disk with 2 platters, 10,000 tracks, an average of
400 sectors per track, and 512 bytes per sector?
Answer:
[tex]Capacity = 2.048GB[/tex]
Explanation:
Given
[tex]Tracks = 10000[/tex]
[tex]Sectors/Track = 400[/tex]
[tex]Bytes/Sector = 512[/tex]
[tex]Platter =2[/tex]
Required
The capacity
First, calculate the number of Byte/Tract
[tex]Byte/Track = Sectors/Track * Bytes/sector[/tex]
[tex]Byte/Track = 400 * 512[/tex]
[tex]Byte/Track= 204800[/tex]
Calculate the number of capacity
[tex]Capacity = Byte/Track * Track[/tex]
[tex]Capacity= 204800 * 10000[/tex]
[tex]Capacity= 2048000000[/tex] --- bytes
Convert to gigabyte
[tex]Capacity = 2.048GB[/tex]
Notice that the number of platters is not considered because 10000 represents the number of tracks in both platters
A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output is the miles walked. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value)) Ex: If the input is: 5345 the output is: 2.67 Your program must define and call the following function. The function should return the amount of miles walked. def steps_to_miles(user_steps)
Answer:
Follows are the code to the given question:
def steps_to_miles(user_steps):#defining a method steps_to_miles that takes a variable user_steps
return user_steps/2000#use return to calculate the steps
user_steps = int(input())#defining a variable user_steps that holds value from the user-end
print('%0.2f' % steps_to_miles(user_steps))#defining print that calls the steps_to_miles method
Output:
5345
2.67
Explanation:
In this code a method "steps_to_miles" that takes "user_steps" in the parameter inside the method a return keyword is used that calculates the user steps and return its values.
Outside the method, a "user_steps" variable is declared that inputs the value from the user-end pass into the method and prints its value.
Create a static method that: - is called appendPosSum - returns an ArrayList - takes one parameter: an ArrayList of Integers This method should: - Create a new ArrayList of Integers - Add only the positive Integers to the new ArrayList - Sum the positive Integers in the new ArrayList and add the Sum as the last element For example, if the incoming ArrayList contains the Integers (4,-6,3,-8,0,4,3), the ArrayList that gets returned should be (4,3,4,3,14), with 14 being the sum of (4,3,4,3). The original ArrayList should remain unchanged.
Answer:
The method in Java is as follows:
public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {
int sum = 0;
ArrayList<Integer> newArr = new ArrayList<>();
for(int num : nums) {
if(num>0){
sum+=num;
newArr.add(num); } }
newArr.add(sum);
return newArr;
}
Explanation:
This defines the method; it receives an integer arraylist as its parameter; nums
public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {
This initializes sum to 0
int sum = 0;
This declares a new integer arraylist; newArr
ArrayList<Integer> newArr = new ArrayList<>();
This iterates through nums
for(int num : nums) {
If current element is greater than 0
if(num>0){
This sum is taken
sum+=num;
And the element is added to newArr
newArr.add(num); } }
At the end of the iteration; this adds the calculated sum to newArr
newArr.add(sum);
This returns newArr
return newArr;
}
In python
Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day.
Ex: If the input is:
April
11
Then the output is:
spring
In addition, check if the string and int are valid (an actual month and day).
Ex: If the input is invalid, the output is:
invalid
The dates for each season are:
spring: March 20 - June 20
summer: June 21 - September 21
autumn: September 22 - December 20
winter: December 21 - March 19
Answer:
The program in Python is as follows:
mnths = ["january","february","march","april","may","june","july","august","september","october","november","december"]
days = int(input("Day: "))
month = input("Month: ")
if not(month.lower() in mnths):
print("Invalid")
else:
month_index = mnths.index(month.lower())
if month_index == 0:
if days<1 or days>31: print("Invalid")
else: print("Winter")
elif month_index == 1:
if days<1 or days>28: print("Invalid")
else: print("Winter")
elif month_index == 2:
if days<1 or days>31: print("Invalid")
elif days<= 19: print("Winter")
else: print("Spring")
elif month_index == 3:
if days<1 or days>30: print("Invalid")
else: print("Spring")
elif month_index == 4:
if days<1 or days>31: print("Invalid")
else: print("Spring")
elif month_index == 5:
if days<1 or days>30: print("Invalid")
elif days<= 20: print("Spring")
else: print("Summer")
elif month_index == 6:
if days<1 or days>31: print("Invalid")
else: print("Summer")
elif month_index == 7:
if days<1 or days>31: print("Invalid")
else: print("Summer")
elif month_index == 8:
if days<1 or days>31: print("Invalid")
elif days<= 21: print("Summer")
else: print("Autumn")
elif month_index == 9:
if days<1 or days>31: print("Invalid")
else: print("Autumn")
elif month_index == 10:
if days<1 or days>30: print("Invalid")
else: print("Autumn")
elif month_index == 11:
if days<1 or days>31: print("Invalid")
elif days<21: print("Autumn")
else: print("Winter")
Explanation:
See attachment for complete source file, where comments are used to explain difficult lines
Mainframe computers are multi-programming, high-performance computers, and multi-user, which means it can handle the workload of more than 100 users at a time on the computer.
a. True
b. False
Answer:
a. True
Explanation:
A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user. Computers can be classified on the basis of their size and capacity as follows;
I. Supercomputers.
II. Mainframe computers.
III. Mini computers.
IV. Micro computers.
Mainframe computers were developed and introduced in the early 1950s.
Mainframe computers are specifically designed to be used for performing multi-programming because they are high-performance computers with the ability to handle multiple users. As a result, it simply means that mainframe computers can be used to effectively and efficiently perform the work of over one hundred (100) users at a time on the computer. Some examples of mainframe computers include the following; IBM Es000 series, CDC 6600 and ICL39 Series.
Furthermore, mainframe computers are mostly or commonly used by large companies, business firms or governmental institutions for performing various complex tasks such as census, financial transactions, e-commerce, data sequencing, enterprise resource planning, etc.
Answer:
a. True
Explanation:
A mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications, bulk data processing (such as the census and industry and consumer statistics, enterprise resource planning, and large-scale transaction processing).
Help please! Really need to find this out rn
Both symmetric and asymmetric encryption methods have their places in securing enterprise data. Compare and contrast where each of these are used in real-life applications. Use at least one global example in identifying the differences between applications.
Implement a program that manages shapes. Implement a class named Shape with a method area() which returns the double value 0.0. Implement three derived classes named Rectangle, Square, and Circle. Declare necessary properties in each including getter and setter function and a constructor that sets the values of these properties. Override the area() function in each by calculating the area using the defined properties in that class.
Answer:
Explanation:
The following code is written in Python. It creates the parent class Shape and the three subclasses Rectangle, Square, and Circle that extend Shape. Shape has the constructor which is empty and the area method which returns 0.0, while the three subclasses take in the necessary measurements for its constructor. Each subclass also has getter and setter methods for each variable and an overriden area() method which returns the shapes area.
class Shape:
def __init__(self):
pass
def area(self):
return 0.0
class Square(Shape):
_length = 0
_width = 0
def __init__(self, length, width):
self._width = width
self._length = length
def area(self):
area = self._length * self._width
return area
def get_length(self):
return self._length
def get_width(self):
return self._width
def set_length(self, length):
self._length = length
def set_width(self, width):
self._width = width
class Rectangle(Shape):
_length = 0
_width = 0
def __init__(self, length, width):
self._width = width
self._length = length
def area(self):
area = self._length * self._width
return area
def get_length(self):
return self._length
def get_width(self):
return self._width
def set_length(self, length):
self._length = length
def set_width(self, width):
self._width = width
class Circle(Shape):
_radius = 0
def __init__(self, radius):
self._radius = radius
def area(self):
area = 2 * 3.14 * self._radius
return area
def get_radius(self):
return self._radius
def set_radius(self, radius):
self._radius = radius
Question Statement: Explain the steps needed to the display all the items in a linked list
Answer:
A list of linked data structures is a sequence of linked data structures.
The Linked List is an array of links containing items. Each link contains a link to a different link. The second most frequently used array is the Linked List.
Explanation:
Create a node class with 2 attributes: the data and the following. Next is the next node pointer.
Create an additional class with two attributes: head and tail.
AddNode() adds to the list a new node:
Make a new node.
He first examines if the head is equal to zero, meaning that the list is empty.
The head and the tail point to the newly added node when this list is vacant.
If the list isn't empty, the new node will be added at the end of the list to point to the new node of tail. This new node is the new end of the list.
Show() will show the nodes in the list:
Set a node current that first points to the list header.
Cross the list until the current null points.
Show each node by referring to the current in each iteration to the next node.
what are the missing letters _A_TO_ ( 6 letters) a type of computer.
Explanation:
its a laptop ☺️. . . . . .. . .
A ___________ consists of a large number of network servers used for the storage, processing, management, distribution, and archiving of data, systems, web traffic, services, and enterprise applications.
Answer:
Data center
Explanation:
A network service provider can be defined as a business firm or company that is saddled with the responsibility of leasing or selling bandwidth, internet services, infrastructure such as cable lines to both large and small internet service providers.
Generally, all network service providers, internet service providers and most business organizations have a dedicated building or space which comprises of a large number of computer systems, security devices, network servers, switches, routers, storage systems, firewalls, and other network associated devices (components) typically used for remote storage, processing, management, distribution, and archiving of large amount of data, systems, web traffic, services, and enterprise applications.
Furthermore, there are four (4) main types of data center and these includes;
I. Managed services data centers.
II. Cloud data centers.
III. Colocation data centers.
IV. Enterprise data centers.
What is the key stroke combination for BOLD text?
O Ctrl + B
O Ctrl + D
O Ctrl + H
O Ctrl + M
Answer:
Ctrl + B.....................
Paravirtualization is ideal for
Answer:to allow many programs, through the efficient use of computing resources including processors and memory, to operate on a single hardware package.
Explanation:
Which of the following is true of horror films like Insidious and The Conjuring?
Answer:
Those movies have inapropirate parts and it is really scary. Also, those movies are not meant for little kids.
Explanation: