Answer:
The answer to this cipher is ....
Zoom, Zoom, Zoom We’re going to the moon. If you want to take a trip, Climb aboard my rocket ship.
Its only shifted by 3 so it didn't take long to find
Hope this helps!
- Quinn
What are the useful techniques in program design?
A broad question, with many answers.
When designing a program you can use:
Setting up requirements, possibly in a use-case form ("as a ... I want to ... so that ...")Mapping the verbs and nouns in your requirements to classes and operations Drawing UML diagrams of the subject matterCreating flow charts and sequence diagrams Identify component boundaries with thin interfaces to keep complexity organized and localDraw a truth table & logic circuit corresponding to the following logic statement
X = 1 if ( ( M is 1 OR N is 1 ) AND ( M is 1 AND N is 1 ) ) OR ( O is NOT 1 )
Answer:
The truth table, as well as the logic circuit of the given statement, is attached below.
Explanation:
Logical gates seem to be the essential building blocks of just about any computerized signal. It becomes a digital device with one or even more inputs and therefore only single output. The arrangement among outputs and inputs would be focused on this kind of logic. Upon that basis, logic gates were already called as AND, NOT, OR gate, etc.
_________ is the start up sequence a computer conducts.
Answer:
Booting
Explanation:
Booting is the start up sequence a computer conducts when it is being turned on. The booting is done by the operating system. The booting process is usually started when a hardware on the computer is pressed or by a software command. For a windows computer, the BIOS is used to start the booting sequence. These boot sequence is called boot order or BIOS boot sequence.
What is the value of the var variable after the execution of the following snippet of code:
int var;
var = -1;
var = var - 1;
var = var - var;
Answer:
The value of var is 0
Explanation:
Given:
The code snippet above
Required
Find the value of var after program execution
This line declares var as type integer
int var;
This line initializes var to -1
var = -1;
This line subtracts 1 from var; var - 1 = -1 -1 = -2
var = var - 1;
At this stage the value of var is -2
This line subtracts the value of var from var; i.e. -2 - (-2) = -2 + 2 = 0
var = var - var;
At this stage, the value of var is 0
What visual practice provides more information about logical relations when creating an ERD
Answer:
Logical Data Model
Explanation:
An Entity Relationship Diagram (ERD) is a model or a diagram designed to reveal the relationship between various entities such as people, places, objects, and so on within an institution. Entity relationship diagram is also known as Entity relationship model. This model is used to design relational database by various sectors such as education, engineering, business, etc.
ERD is designed using conceptual data model, logical data model, and physical data model.
The visual practice or model that gives more insight into the logical relations among the entity is the logical data model.
The logical data model is used to illustrate more detailed operational and relational data among the entities. It is more detailed than the conceptual data.
So, the correct answer is logical data model.
Consider the following code snippet: int score = 0; double price = 100; if (score > 0 && price < 200 && price / score > 10) { System.out.println("buy"); } Which of the following statements is true on the basis of this code snippet? The output is buy. The code snippet compiles and runs, but there is no output. The code snippet doesn't compile. The code snippet causes a divide-by-zero error.
Answer:
The code snippet compiles and runs, but there is no output.
Explanation:
The condition is
score > 0 && price < 200 && price / score > 10score = 0
price = 100
[(0) > 0] and [(100) < 200] and [100)/(0) > 10]
false and ........
Since the first condition is false, the program will not validate the other conditions because the conditional "and" is false when at least one of the conditions is false
What is the features of Mark 1
Answer:
Okay:
Mark I was enourmous in size, measuring 8 feet high, 51 feet long and three feet deep. It weighed 5 tons, used 530 miles of wire and 730,000 separate parts. The operation of these parts was powered and synchronized by a long horizontal rotating shaft. A four horsepower engine drives the mechanical parts.
Harvard Mark I, an early protocomputer, built during World War II in the United States. While Vannevar Bush was working on analog computing at the Massachusetts Institute of Technology (MIT), across town Harvard University professor Howard Aiken was working with digital devices for calculation. He had begun to realize in hardware something like the 19th-century English inventor Charles Babbage’s Analytical Engine, which he had read about. Starting in 1937, Aiken laid out detailed plans for a series of four calculating machines of increasing sophistication, based on different technologies, from the largely mechanical Mark I to the electronic Mark IV.
Explanation:
hope it is helpful to you
A user who has special security and access to a system, such as the right to assign passwords, is called a ____. a. technical user b. privileged user c. database administrator d. supervisor user
Answer:
C
Explanation:
This type of user would be called a privileged user.
What does DOS stand for?
Answer:
Disk Operating System
Explanation:
"DOS is a platform-independent acronym for Disk Operating System which later became a common shorthand for disk-based operating systems on IBM PC compatibles."
Technician A says backup sensors use LEDs to detect objects. Technician B says that a backup sensor won't work correctly if the paint is thicker than 0.002 inch. Which technician is correct
Answer:
Technician B
Explanation:
As in the question, it is mentioned that according to the Technician A the backup sensors used LED for tracking the objects and as per the technician B the backup sensor does not work correctly unless the paint is thicker than 0.002 inch
Therefore according to the above explanation, the technician B is correct as it provides the valid reason
What are examples of some Exotic currencies?
A) EURUSD, AUDUSD
B) GBPCHE, EURUSD
C) AUDCHF, NZDJPY
D) MXN, ZAR, HKD
Answer:
D) MXN, ZAR, HKD
Explanation:
Exotic currencies refer to currency that are used in countries with emerging economies therefore they lack liquidity, are extremely volatile and have very low volumes. The exchange rate of exotic currencies are usually very high because of its lack of liquidity, therefore trading these currencies are expensive. Examples of exotic currencies are South African rand (ZAR), Mexican peso (MXN), Hong Kong dollar (HKD), Chinese yuan (CYN), Turkish lira (TRY) and so on.
A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the integers 5215 and 7282. How many elements of the array would be examined by the algorithm to locate A). the integers 5215 stored in element 499 B.) the integers in 7282 stored
in element 686.
Answer:
The overview of the given scenario is described in the explanation section below.
Explanation:
BTS (Binary search tree) tends to be a tree with several nodes noting that perhaps the left sub-tree, along with its leaf, tends to have a key which is less than or equal to anything like the parental node value. The do-tree, including its leaf, seems to have a value greater than those of the key from it's own parent node.Binary search algorithm finds a general vicinity in the collection of O(log n) time complexity items whereby n represents the number of elements in the array.So the provided has never been the binary search trees of its algorithm.
A. 249
B. 342
A user is having a difficult time printing certain types of documents to her laser printer. When she sends complex, mult-page, multi-color PDF files to the printer, it refuses to print. What is most likely the solution
Answer:
Add RAM to the printer
Explanation:
Adding RAM to the printers gives the following advantages:
printer prints the documents faster with reduced print time. printer prints complex multi page, multi-color documents especially PDF files.Print server sends the job according to the capacity of the printer so when the RAM is added the print server can send more jobs and the printing process becomes faster and printer will not refuse to print large documents. As a result printer can accept more print jobs.It is also beneficial when the documents or files to be printed are of high resolution or are heavy files.An array of int named a that contains exactly five elements has already been declared and initialized. In addition, an int variable j has also been declared and initialized to a value somewhere between 0 and 3. Write a single statement that assigns a new
Answer:
a[j] = 2 * a[j+1];
Explanation:
The complete statement is to Write a single statement that assigns a new value to the element of the array indexed by j. This new value should be equal to twice the value stored in the next element of the array.
So lets say a is an array of type int which is already declared and initialized.
int a[] = {};
declare an int variable j as int j;
The element of array a indexed by j can be represented as a[j] This means the j-th index of array a
The value to be assigned to a[j] is 2 * a[j+1]; with an assignment operator "= " between a[j] and 2 * a[j+1]; in order to assign 2 * a[j+1]; to a[j]
According to the requirement this new value should be twice the value stored in next element of array. The next element of array is represented by a[j+1] which means j+1 index of array a. This means the element at j+1 index that comes after the element at j-th index a[j].
Value should be twice the value stored in next element of array means multiply the 2 with the next element of array i.e. a[j+1]
Now assign this new value 2 * a[j+1]; to a[j].
i want pizzzzzzzaaaaaaaaaaa
Mention 2 precautionary
measures to be observed
when using ICT tools
Answer:
ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.
Following are two precautionary measures which should be observed when using any kind of ICT:
Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storagewhich topology enables only one person, at one time, to send data to others on the network?
Question:
Which topology enables only one person, at one time, to send data to others on the network?
Answer:
Ring topology
Why would you want to hyperlink objects into your own Google Slides presentation? (Select all that apply.) Select All Correct Responses For extending the learning experience for students. To make sure the presentation is linear So students can use the Slides for review and can go to additional resources outside of the presentation. To make the presentation more graphically appealing
The correct answers are A. For extending the learning experience for students. C. So students can use the Slides for review and can go to additional resources outside of the presentation. D. To make the presentation more graphically appealing
Explanation:
The use of hyperlink objects in presentations means objects such as images, texts, or icons are associated with links or websites students can easily access by clicking on the specific image or element. This might be used in educational contexts to allow students to have a complete learning experience by providing alternative and external sources outside the presentation. For example, if the topic is space hyperlinks to NASA website can be included. This means, hyperlink objects extend learning experiences and provide additional resources (Option A and D).
Besides this, this resource can make a presentation more appealing as links to images, videos, and other visually interesting resources can be included (Option D). However, it also breaks the linearity of the presentation as students will need to move to other websites as they go through the presentation.
In the cases of int, byte, long, short (In Java) Can you give the heirachy in ascending order?
Answer:
Byte Short Int Long
Explanation:
Byte's 8 bit, short's 16, int's 32, and long's 65.
How to Fix 0xc000007b
Answer:
Method 1. Restart your computer
The first thing to try is restarting Windows. It sounds too simple, but it sometimes yields results.
Method 2. Update .NET framework
In most cases it's Microsoft .NET framework causing the issues. You can download the latest version of .NET Framework from Microsoft.
When it's installed (or re-installed) reboot and try your app or game again
Method 3. Enable Administrator rights
Try running the game or app with admin rights. To do that, right-click on the shortcut or the actual executable for the game, select Properties and open the Compatibility tab. Tick the 'Run this program as an administrator' box, and click on OK.
Method 4. Reinstall the app or game
You can uninstall and re-installing the game or program you're trying to run - simple but sometimes the quickest and most effective way to get rid of the error.
Method 5. Update Windows
Update Windows. In many cases Windows will automatically update, but to check, head to Control Panel and search for 'Windows Update'.
In later versions, including Windows 10, you can open the new Settings app (just search the Start menu or click the cog icon which appears just above the Windows logo when you click it in the bottom-left of the screen.
In the Settings app, click on Update & Security then you should see a button to check for updates:
Explanation:
Method 6. Run ChkDsk
Run chkdsk by opening cmd (search for it or press Win+R).
In the window type "chkdsk c: /f /r". If it is the primary windows disk, it will ask you to schedule it for next boot. When you restart, it will do a check before get to the login screen. Partitions or other drives can also be checked this way.
Method 7. Reinstall DirectX
This can be the fix for games that won't load. The way to do this depends on your version of Windows and which version of DirectX you need. There are full instructions on Microsoft's website
Hope it's help you. :-)