Answer:
19.71 ms
Explanation:
The disk rotates at 3600 rpm, hence the time for one revolution = 60 / 3600 rpm = 16.67 ms.
Hence time to read or write on a sector = time for one revolution / number of sectors per track = 16.67 ms / 32 sectors = 0.52 ms
Head movement time from track 8 to track 9 = seek time = 2 ms
rotation time to head up sector 1 on track 8 to sector 1 on track 9 = 16.67 * 31/32 = 16.15 ms
The total time = sector read time +head movement time + rotational delay + sector write time = 0.52 ms + 2 ms + 16.15 ms + 0.52 ms = 19.19 ms
It will take 19.19 ms to transfer sector 1 on track 8 to sector 1 on track 9
The given parameters are:
[tex]d_r = 3600 rpm[/tex] --- the disk rotation
[tex]s=32[/tex] --- the sectors in a track
Calculate the time (t) to complete one revolution
[tex]t = \frac{60}{d_r}[/tex]
[tex]t = \frac{60}{3600}[/tex]
[tex]t = \frac{1}{6}[/tex]
So, the time to read/write to a sector is:
[tex]T = \frac{t}{s}[/tex]
This gives
[tex]T = \frac{1/6}{32}[/tex]
[tex]T = \frac{1}{192}[/tex]
Convert to ms
[tex]T = \frac{100}{192}[/tex]
[tex]T = 0.52ms[/tex]
Next, calculate the rotation time to head up sector 1 on track 8 to sector 1 on track 9
This is calculated as:
[tex]r_t = t \times \frac{s-1}{s}[/tex]
So, we have:
[tex]r_t = \frac 16 \times \frac{32-1}{32}[/tex]
[tex]r_t = \frac 16 \times \frac{31}{32}[/tex]
[tex]r_t = 0.1615[/tex]
Convert to ms
[tex]r_t = 0.1615 \times 100[/tex]
[tex]r_t = 16.15[/tex]
So, the required time to transfer sectors is:
Time = 2 * Time to read/write to a sector + Seek time + Rotation time
This gives
[tex]Time = 2 \times 0.52 + 2 + 16.15[/tex]
[tex]Time = 19.19[/tex]
Hence, it will take 19.19 ms to transfer sector 1 on track 8 to sector 1 on track 9
Read more about disk rotation at:
https://brainly.com/question/8139268
Online privacy and data security are a growing concern. Cybercrime is rampant despite the various security measures taken.
-Mention five tools to safeguard users against cybercrime. How do these tools help decrease crime?
-Provide the details of how each of these tools work.
-Describe how these tools are helping to restrict cybercrime.
Answer:
The SANS Top 20 Critical Security Controls For Effective Cyber Defense
Explanation:
Password/PIN Policy
Developing a password and personal identification number policy helps ensure employees are creating their login or access credentials in a secure manner. Common guidance is to not use birthdays, names, or other information that is easily attainable.
Device Controls
Proper methods of access to computers, tablets, and smartphones should be established to control access to information. Methods can include access card readers, passwords, and PINs.
Devices should be locked when the user steps away. Access cards should be removed, and passwords and PINs should not be written down or stored where they might be accessed.
Assess whether employees should be allowed to bring and access their own devices in the workplace or during business hours. Personal devices have the potential to distract employees from their duties, as well as create accidental breaches of information security.
As you design policies for personal device use, take employee welfare into consideration. Families and loved ones need contact with employees if there is a situation at home that requires their attention. This may mean providing a way for families to get messages to their loved ones.
Procedures for reporting loss and damage of business-related devices should be developed. You may want to include investigation methods to determine fault and the extent of information loss.
Internet/Web Usage
Internet access in the workplace should be restricted to business needs only. Not only does personal web use tie up resources, but it also introduces the risks of viruses and can give hackers access to information.
Email should be conducted through business email servers and clients only unless your business is built around a model that doesn't allow for it.
Many scams and attempts to infiltrate businesses are initiated through email. Guidance for dealing with links, apparent phishing attempts, or emails from unknown sources is recommended.
Develop agreements with employees that will minimize the risk of workplace information exposure through social media or other personal networking sites, unless it is business-related.
Encryption and Physical Security
You may want to develop encryption procedures for your information. If your business has information such as client credit card numbers stored in a database, encrypting the files adds an extra measure of protection.
Key and key card control procedures such as key issue logs or separate keys for different areas can help control access to information storage areas.
If identification is needed, develop a method of issuing, logging, displaying, and periodically inspecting identification.
Establish a visitor procedure. Visitor check-in, access badges, and logs will keep unnecessary visitations in check.
Security Policy Reporting Requirements
Employees need to understand what they need to report, how they need to report it, and who to report it to. Clear instructions should be published. Training should be implemented into the policy and be conducted to ensure all employees understand reporting procedures.
Empower Your Team
One key to creating effective policies is to make sure that the policies are clear, easy to comply with, and realistic. Policies that are overly complicated or controlling will encourage people to bypass the system. If you communicate the need for information security and empower your employees to act if they discover a security issue, you will develop a secure environment where information is safe.
Answer:
anyone know if the other answer in right?
Explanation:
PLEASE HELP
This graph shows the efficiencies of two different algorithms that solve the same problem. Which of the following is most efficient?
Answer:
D is correct
Explanation:
Think of it by plugging in values. Clearly the exponential version, according the graph, is more efficient with lower values. But then it can be seen that eventually, the linear will become more efficient as the exponential equation skyrockets. D is the answer.
What is block chain?
Answer:
Block Chain is a system of recording information that makes it difficult or impossible to change, hack, or cheat the system.
A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.
Hope this helps.
x
python program A year with 366 days is called a leap year. Leap years are necessary to keep the calendar in sync with the sun, because the earth revolves around the sun once very 365.25 days. As a result, years that are divisible by 4, like 1996, are leap years. However, years that are divisible by 100, like 1900, are not leap years. But years that are divisible by 400, like 2000, are leap years. Write a program named leap_year.py that asks the user for a year and computes whether that year is a leap year
Answer:
In Python:
year = int(input("Year: "))
if (year % 4) == 0:
if (year % 100) == 0:
if (year % 400) == 0:
print("Leap year")
else:
print("Not a leap year")
else:
print("Leap year")
else:
print("Not a leap year")
Explanation:
This line prompts user for year
year = int(input("Year: "))
This condition checks if input year is divisible by 4
if (year % 4) == 0:
If yes, this condition checks if input year is divisible by 100
if (year % 100) == 0:
If yes, this condition checks if input year is divisible by 400
if (year % 400) == 0:
If divisible by 4, 100 and 400, then it is a leap year
print("Leap year")
else:
If divisible by 4 and 100 but not 400, then it is not a leap year
print("Not a leap year")
else:
If divisible by 4 but not 100, then it is a leap year
print("Leap year")
else:
If it is not divisible by, then it is not a leap year
print("Not a leap year")
magine that you are designing an application where you need to perform the operations Insert, DeleteMaximum, and Delete Minimum. For this application, the cost of inserting is not important, because itcan be done off-line prior to startup of the time-critical section, but the performance of the two deletionoperations are critical. Repeated deletions of either kind must work as fast as possible. Suggest a datastructure that can support this application, and justify your suggestion. What is the time complexity foreach of the three key operations
Answer:
Use the stack data structure with both best-case and worst-case time complexity of O(1) for insertion and deletion of elements.
Explanation:
The stack data structure is used in programs to hold data for which the last data in the stack is always popped out first when retrieving the data sequentially, that it, first-in, last-out.
The elements in the stack are located in an index location, which means that they can be retrieved directly by choice with constant time complexity of 1 or O(1) for best and worst-case.
So inserting, and deleting the minimum and maximum elements in the stack data structure executes at a speed of the constant 1 (big-O notation, O(1) ).
The Clean Air Act Amendments of 1990 prohibit service-related releases of all ____________. A) GasB) OzoneC) MercuryD) Refrigerants
Answer:
D. Refrigerants
Explanation:
In the United States of America, the agency which was established by US Congress and saddled with the responsibility of overseeing all aspects of pollution, environmental clean up, pesticide use, contamination, and hazardous waste spills is the Environmental Protection Agency (EPA). Also, EPA research solutions, policy development, and enforcement of regulations through the resource Conservation and Recovery Act .
The Clean Air Act Amendments of 1990 prohibit service-related releases of all refrigerants such as R-12 and R-134a. This ban became effective on the 1st of January, 1993.
Refrigerants refers to any chemical substance that undergoes a phase change (liquid and gas) so as to enable the cooling and freezing of materials. They are typically used in air conditioners, refrigerators, water dispensers, etc.
Answer:
D
Explanation:
most of the answers for this test is wrong.
Write a program that prompts the user to enter a fraction in the following format (x/y). You may assume that the user will input numbers and a slash, but your program should deal with spaces. Use String methods to parse out the numerator and denominator (e.g. indexOf(), trim(), substring() etc.) Once you have the numerator and denominator, your program will determine whether the number is a proper fraction or an improper fraction. If it is a proper fraction, display the number. If not, reduce it to a mixed fraction or to an integer (see sample output below).
Answer:
fraction = input("enter fraction x/y: ")
if len(fraction) == 3:
if fraction[1] == "/":
try:
num = int(fraction[0])
den = int(fraction[2])
if num < den:
print(f"{num}/{den} is a proper fraction")
else:
if num% den == 0
print(f"{num}/{den} is an improper fraction and can be reduced to {num/den}")
else:
print(f"{num}/{den} is an improper fraction and can be reduced to {num//den} + {num - (den * (num//den))}/{den}")
except ValueError:
print("numerator and denominator must be integer numbers")
Explanation:
The try and except statement of the python program is used to catch value error of the input fraction of values that are not number digits. The program converts the numerator and denominator string values to integers and checks for the larger value of both.
The program prints the fraction as a proper fraction if the numerator is lesser and improper if not.
Mark is a stockbroker in New York City. He recently asked you to develop a program for his company. He is looking for a program that will calculate how much each person will pay for stocks. The amount that the user will pay is based on:
The number of stocks the Person wants * The current stock price * 20% commission rate.
He hopes that the program will show the customer’s name, the Stock name, and the final cost.
The Program will need to do the following:
Take in the customer’s name.
Take in the stock name.
Take in the number of stocks the customer wants to buy.
Take in the current stock price.
Calculate and display the amount that each user will pay.
A good example of output would be:
May Lou
you wish to buy stocks from APPL
the final cost is $2698.90
ok sorry i cant help u with this
Instructions
An object's momentum is its mass multiplied by its velocity. Write a program that accepts an object's mass (in kilograms) and velocity (in meters per second) as inputs, and then outputs its momentum. Below is an example of the progam input and output:
Mass: 5
Velocity: 2.5
The object's momentum is 12.5
Answer:
mass = float(input("Mass: "))
velocity = float(input("Velocity: "))
momentum = mass * velocity
print("The object's momentum is ", momentum)
Explanation:
*The code is in Python.
Ask the user to enter the mass and velocity. Since both of the values could be decimal numbers, cast them as float
Calculate the momentum using given information, multiply mass by velocity
Print the momentum as example output
In this programming assignment, you will write a simple program in C that outputs one string. This assignment is mainly to help you get accustomed to submitting your programming assignments here in zyBooks. Write a C program using vim that does the following. Ask for an integer input from the user. Do not print any prompt for input. If the number is divisible by 3, print the message CS If the number is divisible by 5, print the message 1714 If the number is divisible by both 3
Answer:
In C:
#include <stdio.h>
int main() {
int mynum;
scanf("%d", &mynum);
if(mynum%3 == 0 && mynum%5 != 0){
printf("CS"); }
else if(mynum%5 == 0 && mynum%3 != 0){
printf("1714"); }
else if(mynum%3 == 0 && mynum%5 == 0){
printf("CS1714"); }
else {
printf("ERROR"); }
return 0;
}
Explanation:
This declares mynum as integer
int mynum;
This gets user input
scanf("%d", &mynum);
This condition checks if mynum is divided by 3. It prints CS, if true
if(mynum%3 == 0 && mynum%5 != 0){
printf("CS"); }
This condition checks if mynum is divided by 5. It prints 1714, if true
else if(mynum%5 == 0 && mynum%3 != 0){
printf("1714"); }
This condition checks if mynum is divided by 3 and 5. It prints CS1714, if true
else if(mynum%3 == 0 && mynum%5 == 0){
printf("CS1714"); }
This condition checks if num cannot be divided by 3 and 5. It prints ERROR, if true
else {
printf("ERROR"); }
What is media framing?
Answer:
media frame all news items by specific values, facts, and other considerations, and endowing them with greater apparent for making related judgments
Explanation:
PHP is based on C rather than ______.
Select one:
a. PEARL
b. JAVA
c. PERL
d. COBOL
Answer:
The answer is "option b and option d"
Explanation:
In this question, both choice "b and c" is correct because Java is compiled and run on a JVM and it uses the byte code. On the other hand, PHP has interpreted language, that compiled into the bytecode after that the output engine interpreted. Similarly, the COBOL is used for enterprise, finance, and administrative systems, and PHP is used in web creation.
Please select the word from the list that best fits the definition Asking for review material for a test
Answer:
B
Explanation:
Answer:
B is the answer
Explanation:
You are creating a mobile version of a community discussion site for busy moms. Users post questions and other topics for discussion. Some days there are as many as 20 new discussion threads. Considering your audience, what might be the best way to lay out navigation elements on the home page
Answer:
Create a small, collapsible navigation bar at the top of the home page so users can see new topics without scrolling
Explanation:
By so doing the user experience on the website would be improved because, instead of struggling through several pages to read through discussion threads, they can simply click on the navigation bar and pick a discussion topic that interests them.
What is the relationship between an object and class in an OOP program?
The object contains classes.
The object and class are the same thing.
The object is used to create a class.
The object in a program is called a class.
Answer:
D. The object in a program is called a class.
Explanation:
Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995. Java was designed by a software engineer called James Gosling and it is originally owned by Oracle.
In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.
Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.
Hence, the relationship between an object and class in an OOP program is that the object in a program is called a class.
For example, if you declare a class named dog, the objects would include barking, color, size, breed, age, etc. because they are an instance of a class and as such would execute a method defined in the class.
Write a function that receives three StaticArrays where the elements are already i n sorted order and returns a new Static Array only with those elements that appear i n all three i nput arrays. Original arrays should not be modified. If there are no elements that appear i n all three i nput arrays, return a Static Array with a single None element i n i t.
Answer:
Explanation:
The following code is written in Python. It is a function that takes the three arrays as parameters. It loops over the first array comparing to see if a number exists in the other arrays. If it finds a number in all three arrays it adds it to an array called same_elements. Finally, it prints the array.
def has_same_elements(arr1, arr2, arr3):
same_elements = []
for num1 in arr1:
if (num1 in arr2) and (num1 in arr3):
same_elements.append(num1)
else:
continue
print(same_elements)
A structure that organizes data in a list that is commonly 1-dimensional or 2-
dimensional
Linear Section
Constant
No answertet provided
It intro technology
Answer:
An array.
Explanation:
An array can be defined as a structure that organizes data in a list that is commonly 1-dimensional or 2-dimensional.
Simply stated, an array refers to a set of memory locations (data structure) that comprises of a group of elements with each memory location sharing the same name. Therefore, the elements contained in array are all of the same data type e.g strings or integers.
Basically, in computer programming, arrays are typically used by software developers to organize data, in order to search or sort them.
Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements. Binary search applies the principles of divide and conquer.
In order to do a binary search on an array, the array must first be sorted in an ascending order.
Hence, array elements are mainly stored in contiguous memory locations on computer.
What are the two basic functions (methods) used in classical encryption algorithms?
substitution and transport
(1) Prompt the user for an automobile service. Output the user's input. (1 pt) Ex: Enter desired auto service: Oil change You entered: Oil change (2) Output the price of the requested service. (4 pts) Ex: Enter desired auto service: Oil change You entered: Oil change Cost of oil change: $35 The program should support the following services (all integers): Oil change -- $35 Tire rotation -- $19 Car wash -- $7 If the user enters a service that is not l
Answer:
In Python:
#1
service = input("Enter desired auto service: ")
print("You entered: "+service)
#2
if service.lower() == "oil change":
print("Cost of oil change: $35")
elif service.lower() == "car wash":
print("Cost of car wash: $7")
elif service.lower() == "tire rotation":
print("Cost of tire rotation: $19")
else:
print("Invalid Service")
Explanation:
First, we prompt the user for the auto service
service = input("Enter desired auto service: ")
Next, we print the service entered
print("You entered: "+service)
Next, we check if the service entered is available (irrespective of the sentence case used for input). If yes, the cost of the service is printed.
This is achieved using the following if conditions
For Oil Change
if service.lower() == "oil change":
print("Cost of oil change: $35")
For Car wash
elif service.lower() == "car wash":
print("Cost of car wash: $7")
For Tire rotation
elif service.lower() == "tire rotation":
print("Cost of tire rotation: $19")
Any service different from the above three, is invalid
else:
print("Invalid Service")
g n this program, you will prompt the user for three numbers. You need to check and make sure that all numbers are equal to or greater than 0 (can use an if or if/else statement for this). You will then multiply the last two digits together, and add the result to the first number. The program should then start over, once again asking for another three numbers. This program should loop indefinitely in this way. If the user enters a number lower than 0, remind the user that they need to enter a number greater than or equal to 0 and loop the program again.
Answer:
In Python:
loop = True
while(loop):
nm1 = float(input("Number 1: "))
nm2 = float(input("Number 2: "))
nm3 = float(input("Number 3: "))
if (nm1 >= 0 and nm2 >= 0 and nm3 >= 0):
result = nm2 * nm3 + nm1
print("Result: "+str(result))
loop = True
else:
print("All inputs must be greater than or equal to 0")
loop = True
Explanation:
First, we set the loop to True (a boolean variable)
loop = True
This while loop iterates, indefinitely
while(loop):
The next three lines prompt user for three numbers
nm1 = float(input("Number 1: "))
nm2 = float(input("Number 2: "))
nm3 = float(input("Number 3: "))
The following if condition checks if all of the numbers are greater than or equal to 0
if (nm1 >= 0 and nm2 >= 0 and nm3 >= 0):
If yes, the result is calculated
result = nm2 * nm3 + nm1
... and printed
print("Result: "+str(result))
The loop is then set to true
loop = True
else:
If otherwise, the user is prompted to enter valid inputs
print("All inputs must be greater than or equal to 0")
The loop is then set to true
loop = True
Python (and most programming languages) start counting with 0.
True
False
Answer:
yes its true :)
Explanation:
Write a program that accepts two numbers R and H, from Command Argument List (feed to the main method). R is the radius of the well casing in inches and H is the depth of the well in feet (assume water will fill this entire depth). The program should output the number of gallons stored in the well casing. For your reference: The volume of a cylinder is pi;r2h, where r is the radius and h is the height. 1 cubic foot
Answer:
Answered below.
Explanation:
#Answer is written in Python programming language
#Get inputs
radius = float(input("Enter radius in inches: "))
height = float(input("Enter height in feet: "))
#Convert height in feet to height in inches
height_in_inches = height * 12
#calculate volume in cubic inches
volume = 3.14 * (radius**2) * height_to_inches
#convert volume in cubic inches to volume in gallons
volume_in_gallons = volume * 0.00433
#output result
print (volume_in_gallons)
Consider the definition of the Person class below. The class uses the instance variable adult to indicate whether a person is an adult or not.
public class Person
{
private String name;
private int age;
private boolean adult;
public Person (String n, int a)
{
name = n;
age = a;
if (age >= 18)
{
adult = true;
}
else
{
adult = false;
}
}
}
Which of the following statements will create a Person object that represents an adult person?
a. Person p = new Person ("Homer", "adult");
b. Person p = new Person ("Homer", 23);
c. Person p = new Person ("Homer", "23");
d. Person p = new Person ("Homer", true);
e. Person p = new Person ("Homer", 17);
Answer:
b. Person p = new Person ("Homer", 23);
Explanation:
The statement that will create an object that represents an adult person would be the following
Person p = new Person ("Homer", 23);
This statement creates a Person object by called the Person class and saving it into a variable called p. The Person method is called in this object and passed a string that represents the adult's name and the age of the adult. Since the age is greater than 18, the method will return that adult = true.
The other options are either not passing the correct second argument (needs to be an int) or is passing an int that is lower than 18 meaning that the method will state that the individual is not an adult.
You've created a new programming language, and now you've decided to add hashmap support to it. Actually you are quite disappointed that in common programming languages it's impossible to add a number to all hashmap keys, or all its values. So you've decided to take matters into your own hands and implement your own hashmap in your new language that has the following operations:
insert x y - insert an object with key x and value y.
get x - return the value of an object with key x.
addToKey x - add x to all keys in map.
addToValue y - add y to all values in map.
To test out your new hashmap, you have a list of queries in the form of two arrays: queryTypes contains the names of the methods to be called (eg: insert, get, etc), and queries contains the arguments for those methods (the x and y values).
Your task is to implement this hashmap, apply the given queries, and to find the sum of all the results for get operations.
Example
For queryType = ["insert", "insert", "addToValue", "addToKey", "get"] and query = [[1, 2], [2, 3], [2], [1], [3]], the output should be hashMap(queryType, query) = 5.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 2, 2: 3}
3 query: {1: 4, 2: 5}
4 query: {2: 4, 3: 5}
5 query: answer is 5
The result of the last get query for 3 is 5 in the resulting hashmap.
For queryType = ["insert", "addToValue", "get", "insert", "addToKey", "addToValue", "get"] and query = [[1, 2], [2], [1], [2, 3], [1], [-1], [3]], the output should be hashMap(queryType, query) = 6.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 4}
3 query: answer is 4
4 query: {1: 4, 2: 3}
5 query: {2: 4, 3: 3}
6 query: {2: 3, 3: 2}
7 query: answer is 2
The sum of the results for all the get queries is equal to 4 + 2 = 6.
Input/Output
[execution time limit] 4 seconds (py3)
[input] array.string queryType
Array of query types. It is guaranteed that each queryType[i] is either "addToKey", "addToValue", "get", or "insert".
Guaranteed constraints:
1 ≤ queryType.length ≤ 105.
[input] array.array.integer query
Array of queries, where each query is represented either by two numbers for insert query or by one number for other queries. It is guaranteed that during all queries all keys and values are in the range [-109, 109].
Guaranteed constraints:
query.length = queryType.length,
1 ≤ query[i].length ≤ 2.
[output] integer64
The sum of the results for all get queries.
[Python3] Syntax Tips
# Prints help message to the console
# Returns a string
def helloWorld(name):
print("This prints to the console when you Run Tests")
return "Hello, " + name
Answer:
Attached please find my solution in JAVA
Explanation:
long hashMap(String[] queryType, int[][] query) {
long sum = 0;
Integer currKey = 0;
Integer currValue = 0;
Map<Integer, Integer> values = new HashMap<>();
for (int i = 0; i < queryType.length; i++) {
String currQuery = queryType[i];
switch (currQuery) {
case "insert":
HashMap<Integer, Integer> copiedValues = new HashMap<>();
if (currKey != 0 || currValue != 0) {
Set<Integer> keys = values.keySet();
for (Integer key : keys) {
copiedValues.put(key + currKey, values.get(key) + currValue);
}
values.clear();
values.putAll(copiedValues);
currValue = 0;
currKey = 0;
}
values.put(query[i][0], query[i][1]);
break;
case "addToValue":
currValue += values.isEmpty() ? 0 : query[i][0];
break;
case "addToKey":
currKey += values.isEmpty() ? 0 : query[i][0];
break;
case "get":
copiedValues = new HashMap<>();
if (currKey != 0 || currValue != 0) {
Set<Integer> keys = values.keySet();
for (Integer key : keys) {
copiedValues.put(key + currKey, values.get(key) + currValue);
}
values.clear();
values.putAll(copiedValues);
currValue = 0;
currKey = 0;
}
sum += values.get(query[i][0]);
}
}
return sum;
}
what if an html code became cracked and formed a bug how can i repair that
Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this document. Save the file in a directory named homeworks that you would have created. Set the permissions for this file such that only you can edit the file while anybody can only read. Find and list (on the command prompt) all the statements that contain the word POINTS. Submit your answer as a description of what you did in a sequential manner
Answer:
mkdir homeworks // make a new directory called homeworks.
touch homework_instructions.txt //create a file called homework_instruction
sudo -i // login as root user with password.
chmod u+rwx homework_instructions.txt // allow user access all permissions
chmod go-wx homework_instructions.txt // remove write and execute permissions for group and others if present
chmod go+r homework_instructions.txt // adds read permission to group and others if absent.
grep POINTS homework_instructions.txt | ls -n
Explanation:
The Linux commands above first create a directory and create and save the homework_instructions.txt file in it. The sudo or su command is used to login as a root user to the system to access administrative privileges.
The user permission is configured to read, write and execute the text file while the group and others are only configured to read the file.
b) Develop a truth table for expression AB+ C.
Consider an entity set Person, with attributes social security number (ssn), name, nickname, address, and date of birth(dob). Assume that the following business rules hold: (1) no two persons have the same ssn; (2) no two persons have he same combination of name, address and dob. Further, assume that all persons have an ssn, a name and a dob, but that some persons might not have a nickname nor an address.
A) List all candidate keys and all their corresponding superkeys for this relation.
B) Write an appropriate create table statement that defines this entity set.
Answer:
[tex]\pi[/tex]
Explanation:
Write a program, named NumDaysLastNameFirstName.java, which prompts the user to enter a number for the month and a number for the year. Using the information entered by the user and selection statements, display how many days are in the month. Note: In the name of the file, LastName should be replaced with your last name and FirstName should be replaced with your first name. When you run your program, it should look similar to this:
Answer:
Explanation:
The following code is written in Java and uses Switch statements to connect the month to the correct number of days. It uses the year value to calculate the number of days only for February since it is the only month that actually changes. Finally, the number of days is printed to the screen.
import java.util.Scanner;
public class NumDaysPerezGabriel {
public static void main(String args[]) {
int totalDays = 0;
Scanner in = new Scanner(System.in);
System.out.println("Enter number for month (Ex: 01 for January or 02 for February): ");
int month = in.nextInt();
System.out.println("Enter 4 digit number for year: ");
int year = in.nextInt();
switch (month) {
case 1:
totalDays = 31;
break;
case 2:
if ((year % 400 == 0) || ((year % 4 == 0) && (year % 100 != 0))) {
totalDays = 29;
} else {
totalDays = 28;
}
break;
case 3:
totalDays = 31;
break;
case 4:
totalDays = 30;
break;
case 5:
totalDays = 31;
break;
case 6:
totalDays = 30;
break;
case 7:
totalDays = 31;
break;
case 8:
totalDays = 31;
break;
case 9:
totalDays = 30;
break;
case 10:
totalDays = 31;
break;
case 11:
totalDays = 30;
break;
case 12:
totalDays = 31;
}
System.out.println("There are a total of " + totalDays + " in that month for the year " + year);
}
}