Answer:
BX will hold 6444 in hex format.
Explanation:
From the given information:
We need to understand that AX is 64-bit hex number.
When performing ASM instruction (Assembly language instruction),
The addition of 2111 + 4333 = 6444 will be in BX.
This is because ADD, BX, AX will add bx and ax; and the final outcome will be stored in BX.
∴
BX will hold 6444 in hex format.
What does the top-level domain in a URL indicate?
A. the organization or company that owns the website
B. the organization or company that operates the website
C. the protocol used to access the website D. the type of website the URL points to
Answer:
b i think
Explanation:
A top-level domain (TLD) is the last segment of the domain name. The TLD is the letters immediately following the final dot in an Internet address. A TLD identifies something about the website associated with it, such as its purpose, the organization that owns it or the geographical area where it originates.
Answer:
The answer is D. The type of website the URL points to.
Explanation:
I got it right on the Edmentum test.
list and describe each of the activities of technology
Answer:
network has led to exposure of dirty things to young ones.
air transport has led to losing of lives
All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not been initialized properly Dereferencing a null pointer Dereferencing a pointer that has not been assigned to point to a specific address Dereferencing a variable that is not a pointer
Answer: Dereferencing a variable that is not a pointer
Explanation:
The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.
Some of the reasons for a fatal execution-time error include:
• Dereferencing a pointer that has not been initialized properly
• Dereferencing a null pointer
• Dereferencing a pointer that has not been assigned to point to a specific address.
It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.
Linda wants to change the color of the SmartArt that she has used in her spreadsheet. To do so, she clicks on the shape in the SmartArt graphic. She then clicks on the arrow next to Shape Fill under Drawing Tools, on the Format tab, in the Shape Styles group. Linda then selects an option from the menu that appears, and under the Colors Dialog box and Standard, she chooses the color she wants the SmartArt to be and clicks OK. What can the option that she selected from the menu under Shape Fill be
Answer: Theme colors
Explanation:
Based on the directions, Linda most probably went to the "Theme colors" option as shown in the attachment below. Theme colors enables one to change the color of their smart shape.
It is located in the "Format tab" which is under "Drawing tools" in the more recent Excel versions. Under the format tab it is located in the Shape Styles group as shown below.
Which of the following is NOT a computer hardware?
A) monitor
B) scanner
C) modem
D) Windows 10
How have technology and social media changed reading?
O A. Physical books can only be read on the web.
B. Now reading is a conversation of give and take.
O C. People no longer have to read anything at all.
D. Reading often takes much longer to undergo.
Answer:
B?
Explanation:
I'm super sorry if I get this wrong for you but after thinking so much I probably think it would be B
Answer:
the guy above is right it is B
Explanation:
because 2+2=4
Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly become ready at once, how many bit slots are needed to resolve the contention
Answer:
11 bit slot will be needed
Explanation:
The number of prime numbers between 1 through 16
= 2, 3 , 5, 7, 11 and 13
hence we can say 6 stations are to use the shared channel
Given that all the stations are ready simultaneously
The number of bit slots that will be needed to handle the contention will be 11 bits :
slot 1 : 2, 3, 5 , 7, 11 , 13
slot 2 : 2,3, 5, 7
slot 3 : 2, 3
slot 4 : 2 . slot 5 : 3 . slot 6 : 5,7. slot 7 : 5 . slot 8 : 7. slot 9: 11,13.
slot 10 : 11. slot 11 : 13
hello! can someone write a c++ program for this problem
Problema 2018.3.2 - Cheated dice
Costica is on vacation and his parents sent him to the country. There he gets terribly bored and looking through his grandfather's closet, he came across a bag full of dice. Having no one to play dice with, but it seemed to him that some of the dice were heavier than the others, Costica chose a dice and started to test it by throwing it with him and noting how many times each face fell. He then tries to figure out whether the dice are rolled or not, considering that the difference between the maximum number of appearances of one face and the minimum number of occurrences (of any other face) should not exceed 10% of the total number of throws.
Requirement
Given a number N of dice rolls and then N natural numbers in the range [1: 6] representing the numbers obtained on the rolls, determine whether the dice is tricked according to the above condition.
Input data
From the input (stdin stream) on the first line reads the natural number N, representing the number of rolls. On the following N lines there is a natural number in the range [1: 6] representing the numbers obtained on throws.
Output data
At the output (stdout stream) a single number will be displayed, 0 or 1, 0 if the dice are normal, and 1 if it is cheated.
ATTENTION to the requirement of the problem: the results must be displayed EXACTLY in the way indicated! In other words, nothing will be displayed on the standard output stream in addition to the problem requirement; as a result of the automatic evaluation, any additional character displayed, or a display different from the one indicated, will lead to an erroneous result and therefore to the qualification "Rejected".
Restrictions and clarifications
1. 10 ≤ N ≤ 100
2. Caution: Depending on the programming language chosen, the file containing the code must have one of the extensions .c, .cpp, .java, or .m. The web editor will not automatically add these extensions and their absence makes it impossible to compile the program!
3. Attention: The source file must be named by the candidate as: . where name is the last name of the candidate and the extension (ext) is the one chosen according to the previous point. Beware of Java language restrictions on class name and file name!
Input data
10
6
6
6
6
6
6
6
6
6
6
Output data
1
Roll the dice 10 times, all 10 rolls produce the number 6. Because the difference between the maximum number of rolls (10) and the minimum number of rolls (0) is strictly greater than 10% of the total number of rolls (10% of 10 is 1), we conclude that the dice are oiled.
Input data
10
1
4
2
5
4
6
2
1
3
3
Output data
0
Throw the dice 10 times and get: 1 twice, 2 twice, 3 twice, 4 twice, 5 and 6 at a time. Because the difference between the maximum number of appearances (two) and the minimum number of occurrences (one) is less than or equal to 10% of the total number of throws (10% of 10 is 1), we conclude that the dice are not deceived.
Answer:
f0ll0w me on insta gram Id:Anshi threddy_06 (no gap between I and t)
Which of the following tools helps ensure your document will open in older versions of word
Answer:
Compatibility Check
Explanation:
Select File > Info.In the Inspect Document section, select Check for Issues > Check Compatibility.Click Select versions to show. A check mark that appears next to the name of the mode that the document is in.Which of the following is true? a. There are RFCs that describe challenge-response authentication techniques to use with email. b. Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam. c. Spam relies heavily on the absence of email authentication. d. All of the above.
The option that is true is option b. Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam.
How is spam filtration carried out?The processing of email to organize it in accordance with predetermined criteria is known as email filtering. The word can allude to the use of human intelligence, although it most frequently describes how messages are processed automatically at SMTP servers, sometimes using anti-spam tactics.
Therefore, Email filtering operates as previously stated by scanning incoming messages for red flags that indicate spam or phishing content and then automatically transferring such messages to a different folder. Spam filters evaluate an incoming email using a variety of criteria.
Learn more about Filtering for spam from
https://brainly.com/question/13058726
#SPJ1
4. Write a program to calculate square root and
cube root of an entered number .
Answer:
DECLARE SUB SQUARE (N)
CLS
INPUT “ENTER ANY NUMBER”; N
CALL SQUARE(N)
END
SUB SQUARE (N)
S = N ^ 2
PRINT “SQUARE OF NUMBER “; S
END SUB
Given a member function named set_age() with a parameter named age in a class named Employee, what code would you use within the function to set the value of the corresponding data member if the data member has the same name as the parameter
Answer:
Explanation:
This would be considered a setter method. In most languages the parameter of the setter method is the same as the variable that we are passing the value to. Therefore, within the function you need to call the instance variable and make it equal to the parameter being passed. It seems that from the function name this is being written in python. Therefore, the following python code will show you an example of the Employee class and the set_age() method.
class Employee:
age = 0
def __init__(self):
pass
def set_age(self, age):
self.age = age
As you can see in the above code the instance age variable is targeted using the self keyword in Python and is passed the parameter age to the instance variable.
Write a program to implement problem statement below; provide the menu for input N and number of experiment M to calculate average time on M runs. randomly generated list. State your estimate on the BigO number of your algorithm/program logic. (we discussed in the class) Measure the performance of your program by given different N with randomly generated list with multiple experiment of Ns against time to draw the BigO graph (using excel) we discussed during the lecture.
Answer:
Explanation:
#include<iostream>
#include<ctime>
#include<bits/stdc++.h>
using namespace std;
double calculate(double arr[], int l)
{
double avg=0.0;
int x;
for(x=0;x<l;x++)
{
avg+=arr[x];
}
avg/=l;
return avg;
}
int biggest(int arr[], int n)
{
int x,idx,big=-1;
for(x=0;x<n;x++)
{
if(arr[x]>big)
{
big=arr[x];
idx=x;
}
}
return idx;
}
int main()
{
vector<pair<int,double> >result;
cout<<"Enter 1 for iteration\nEnter 2 for exit\n";
int choice;
cin>>choice;
while(choice!=2)
{
int n,m;
cout<<"Enter N"<<endl;
cin>>n;
cout<<"Enter M"<<endl;
cin>>m;
int c=m;
double running_time[c];
while(c>0)
{
int arr[n];
int x;
for(x=0;x<n;x++)
{
arr[x] = rand();
}
clock_t start = clock();
int pos = biggest(arr,n);
clock_t t_end = clock();
c--;
running_time[c] = 1000.0*(t_end-start)/CLOCKS_PER_SEC;
}
double avg_running_time = calculate(running_time,m);
result.push_back(make_pair(n,avg_running_time));
cout<<"Enter 1 for iteration\nEnter 2 for exit\n";
cin>>choice;
}
for(int x=0;x<result.size();x++)
{
cout<<result[x].first<<" "<<result[x].second<<endl;
}
}
Select the correct term to complete the sentence.
The
file format is used for video files.
A. .pptx
B. .mp3
C. .jpeg
D. .mp4
Answer: D. mp4
its mp4 because its always on video files
What will the declaration below do to its target?
animation-direction: reverse;
The animation steps will play backward.
The animation steps will play forward, then backward.
The animation steps will play forward.
The animation steps will play backward, then forward.
Write a program that will create an array of random numbers and output the values. Then output the values in the array backwards. SPECIFICATIONS: File name: ArrayBackwards.java Your program must make use of at least one method other than main()to receive full credit (methods can have a return type of void). Suggestion: create and populate the array in the main() method. Make a method for Step 3 below and send in the array as a parameter. Make another method for Step 4 and send in the array as a parameter.
Answer:
The program is as follows:
import java.util.*;
public class Main{
public static void backward(int [] Rndarray, int lnt){
System.out.print("Reversed: ");
for(int itm = lnt-1;itm>=0;itm--){
System.out.print(Rndarray[itm]+" "); } }
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int lnt = input.nextInt();
Random rd = new Random();
int [] Rndarray = new int[lnt];
for (int itm = 0; itm < lnt; itm++) {
Rndarray[itm] = rd.nextInt();
System.out.print(Rndarray[itm]+" ");
}
System.out.println();
backward(Rndarray,lnt); }}
Explanation:
This defines the backward() method
public static void backward(int [] Rndarray, int lnt){
This prints string "Reversed"
System.out.print("Reversed: ");
This iterates through the array
for(int itm = lnt-1;itm>=0;itm--){
Each element is then printed, backwards
System.out.print(Rndarray[itm]+" "); } }
The main begins here
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
This gets the array length
int n = input.nextInt();
This creates a Random object
Random rd = new Random();
This declares the array
int [] Rndarray = new int[lnt];
This iterates through the array for input
for (int itm = 0; itm < lnt; itm++) {
This generates a random number for each array element
Rndarray[itm] = rd.nextInt();
This prints the generates number
System.out.print(Rndarray[itm]+" ");
}
This prints a new line
System.out.println();
This passes the array and the length to backward() method
backward(Rndarray,lnt); }}
What is the function of the NOS? Select all that apply.
•network management
•connects network nodes
•network security
•provides MACs
•gives access to privileges
•data protection
Answer:
.network management
Explanation:
pls need brainliest
Answer:
gives access privileges
network management
network security
data protection
Explanation: