on a rheostat the first terminal is connected to a
A ground return path
fined contact
Ceramic heat sink

Answers

Answer 1
on a rheostat the first terminal is connected to a
A ground return path
fined contact
Ceramic heat sink
Bbbbncnennanxkcndkfnrnenwn77819’cjchopeithlps they

Related Questions

Question Statement: Explain the steps needed to the display all the items in a linked list

Answers

Answer:

A list of linked data structures is a sequence of linked data structures.

The Linked List is an array of links containing items. Each link contains a link to a different link. The second most frequently used array is the Linked List.

Explanation:

Create a node class with 2 attributes: the data and the following. Next is the next node pointer.

Create an additional class with two attributes: head and tail.

AddNode() adds to the list a new node:

Make a new node.

He first examines if the head is equal to zero, meaning that the list is empty.

The head and the tail point to the newly added node when this list is vacant.

If the list isn't empty, the new node will be added at the end of the list to point to the new node of tail. This new node is the new end of the list.

Show() will show the nodes in the list:

Set a node current that first points to the list header.

Cross the list until the current null points.

Show each node by referring to the current in each iteration to the next node.

A file system uses a bitmap to keep track of free disk space. One bit represents a 512-byte block. The disk contains 3 files, in the order: A, B, C, with the respective sizes of 1040, 700, 2650 bytes. Which one below is the correct bitmap?

A. 0111000111111 ....
B.1111111100110 ...
C.1011101101100...
D. 1111111111100

Answers

Answer:

B. 1111111100110

Explanation:

Bitmap is the technique for mapping from some domain bits. This is particularly referred to as pix-map which is actually map of pixels and this contains more than two colors. it used more than one bit per pixel. Pixels lesser than 8 will represent gray scale.

Write a program that reads in 10 numbers and displays the number of distinct numbers and the distinct numbers in their input order and separated by exactly one space (i.e., if a number appears multiple times, it is displayed only once). After the input, the array contains the distinct numbers. Here is a sample run of the program.

Answers

Answer:

Explanation:

The following code is written in Python. It creates a for loop that iterates 10 times, asking the user for a number every time. It then checks if the number is inside the numArray. If it is not, then it adds it to the array, if it is then it skips to the next iteration. Finally, it prints the number of distinct numbers and the list of numbers.

numArray = []

for x in range(10):

   num = input("Enter a number")

   if int(num) not in numArray:

       numArray.append(int(num))

print("Number of Distince: " + str(len(numArray)))

for num in numArray:

   print(str(num), end = " ")

Both symmetric and asymmetric encryption methods have their places in securing enterprise data. Compare and contrast where each of these are used in real-life applications. Use at least one global example in identifying the differences between applications.

Answers


Symmetric Encryption:

Same key is used for Encryption and Decryption

Both server and client should have same key for encryption

Vulnerable to attack

Examples: Blowfish, AES, RC4, DES, RC5, and RC6

Asymmetric encryption:

Server generates its own public and private key

Client generates its own public and private key

Server and client exchanges their public keys

Server uses client’s public key to encrypt data

Client uses server ‘s public key to encrypt data

Server uses its private key to decrypt data sent by client

Client uses its private key to decrypt data sent by server

example: EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.

Hi there , Hope I helped !

Calculate the total capacity of a disk with 2 platters, 10,000 tracks, an average of
400 sectors per track, and 512 bytes per sector?

Answers

Answer:

[tex]Capacity = 2.048GB[/tex]

Explanation:

Given

[tex]Tracks = 10000[/tex]

[tex]Sectors/Track = 400[/tex]

[tex]Bytes/Sector = 512[/tex]

[tex]Platter =2[/tex]

Required

The capacity

First, calculate the number of Byte/Tract

[tex]Byte/Track = Sectors/Track * Bytes/sector[/tex]

[tex]Byte/Track = 400 * 512[/tex]

[tex]Byte/Track= 204800[/tex]

Calculate the number of capacity

[tex]Capacity = Byte/Track * Track[/tex]

[tex]Capacity= 204800 * 10000[/tex]

[tex]Capacity= 2048000000[/tex]  --- bytes

Convert to gigabyte

[tex]Capacity = 2.048GB[/tex]

Notice that the number of platters is not considered because 10000 represents the number of tracks in both platters

how data transform into information?​

Answers

Information is when you take the data you have and analyze it or manipulate it by combining it with other data, trending it over time, assessing or analyzing the outliers that need to be dealt with, and, most important, applying your own experience and knowledge to transform that data into something you can use to make

I have been working on this python program for a hour now, and I am trying to figure out what I an doing wrong in the loop. I have attached the code and screenshot of my work. I need help to figure out how to loop the rest of the years for a calculation. The calculation has looped the same result for all years.
This is the assignment:
In 2017, the tuition for a full time student is $6,450 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your python program using a loop that displays the projected semester tuition for the next 7 years. You should display the actual year (2018, 2019, through 2024) and the tuition amount per semester for that year.
Here is my code:
# declare global constant variables
startingTuition = 6450.00;
starting_tuitionYear = 2018;
ending_tuitionYear = 2025;
increment = 1;
rate = .035;
tuition = 0;
tuitionRate = 0;
#loop for the next 7 years
for year in range(starting_tuitionYear, ending_tuitionYear, increment):
# calculate rate per year
tuitionRate = (rate)*startingTuition;
# add rate per year to the tuition fee
tuition = startingTuition + tuitionRate;
print('Tuition for the year of ' + str(year)+ ' is ' + str(tuition));

Answers

Answer:

The correct loop is as follows:

for year in range(starting_tuitionYear, ending_tuitionYear, increment):

   tuition = startingTuition + rate * startingTuition

   startingTuition = tuition

   print('Tuition for the year of ' + str(year)+ ' is ' + str(tuition));

Explanation:

Required

The correction to the attached program

Some variables are not needed; so, I've removed the redundant variables.

The main error in the program is in the loop;

After the tuition for each year has been calculated, the startTuition of the next year must be set to the current tuition

See attachment for complete program

Suppose that a file named sensor.dat contains information collected from a set of sensors. Each row contains a set of sensor readings, with the first row containing values collected at 0 seconds, the second row containing values collected at 1.0 sec-onds, and so on.11.Write a program to read the data file and print the number of sensors and the number of seconds of data contained in the file. (Hint: use the sizefunction.)

Answers

Answer:

The program in Python is as follows:

myfile = open("sensor.dat", "r")

for line in myfile:

   print(line)

myfile.close()

Explanation:

This opens the file for read operation

myfile = open("sensor.dat", "r")

This iterates through the file

for line in myfile:

Print record on each row

   print(line)

Close file

myfile.close()

Forms often allow a user to enter an integer. Write a program that takes in a string representing an integer as input, and outputs yes if every character is a digit 0-9. Ex: If the input is: 1995 the output is: yes Ex: If the input is: 42,000 or any string with a non-integer character, the output is: no

Answers

Answer:

Following are the program to the given question:

def check_digit(number): #defining a method check_digit that takes number variable in parameter  

   if(numumber.isdigit()): #use if to check value is digit  

       return "yes"; #use return to return string value "yes"  

   else:  #else block

       return "no";#use return to return string value "no"  

string=input("Enter the numbers 0-9: ") #defining a variable string that input value from the user

print(check_digit(string)) #use print that call the method and print its return value

Output:

Please find the attached file.

Explanation:

In this code a method "check_digit()", which accepts an argument "number" in its parameter inside the function.

A conditional statement is used if it checks the number used "isdigit()" method that checks value is a digit and return value "yes" and in the else block it will return value "no".

Outside the method, a  variable "string" is declared that input the value from the user-end and call the check_digit and print its value.

Security monitoring has detected the presence of a remote access tool classified as commodity malware on an employee workstation. Does this allow you to discount the possibility that an APT is involved in the attack

Answers

Answer:

No it doesn't

Explanation:

Targeted malware can be linked to such high resource threats as APT. Little or nothing can be done to stop such advanced persistent threats. It is necessary to carry out an evaluation on other indicators so that you can know the threat that is involved. And also to know if the malware is isolated or greater than that.

Which language will report a compilation error for the following snippet of code? int i = 3; double n, j = 3.0; n = i + j; Group of answer choices All of the above C++ Java C

Answers

Answer:

None of the programming languages

Explanation:

Given

[tex]int\ i = 3; double\ n, j = 3.0;[/tex]

[tex]n = i + j;[/tex]

Required

Which will produce a compilation error

The given code snippet will pass the syntax test and the semantic test for the three programming languages (C++, Java and C)

In other words, it will compile without error.

The reason is that (for the three programming languages);

Variables (i, n and j) were declared properlyVariables i and j were initialized properlyLastly, the arithmetic operation was also done properly

Hence, none of the programming languages will return an error

Create a static method that: - is called appendPosSum - returns an ArrayList - takes one parameter: an ArrayList of Integers This method should: - Create a new ArrayList of Integers - Add only the positive Integers to the new ArrayList - Sum the positive Integers in the new ArrayList and add the Sum as the last element For example, if the incoming ArrayList contains the Integers (4,-6,3,-8,0,4,3), the ArrayList that gets returned should be (4,3,4,3,14), with 14 being the sum of (4,3,4,3). The original ArrayList should remain unchanged.

Answers

Answer:

The method in Java is as follows:

public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {

   int sum = 0;

   ArrayList<Integer> newArr = new ArrayList<>();

   for(int num : nums) {

       if(num>0){

           sum+=num;

           newArr.add(num);        }    }

   newArr.add(sum);

   return newArr;

 }

Explanation:

This defines the method; it receives an integer arraylist as its parameter; nums

public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {

This initializes sum to 0

   int sum = 0;

This declares a new integer arraylist; newArr

   ArrayList<Integer> newArr = new ArrayList<>();

This iterates through nums

   for(int num : nums) {

If current element is greater than 0

       if(num>0){

This sum is taken

           sum+=num;

And the element is added to newArr

           newArr.add(num);        }    }

At the end of the iteration; this adds the calculated sum to newArr  

newArr.add(sum);

This returns newArr

   return newArr;

 }

A ___________ consists of a large number of network servers used for the storage, processing, management, distribution, and archiving of data, systems, web traffic, services, and enterprise applications.

Answers

Answer:

Data center

Explanation:

A network service provider can be defined as a business firm or company that is saddled with the responsibility of leasing or selling bandwidth, internet services, infrastructure such as cable lines to both large and small internet service providers.

Generally, all network service providers, internet service providers and most business organizations have a dedicated building or space which comprises of a large number of computer systems, security devices, network servers, switches, routers, storage systems, firewalls, and other network associated devices (components) typically used for remote storage, processing, management, distribution, and archiving of large amount of data, systems, web traffic, services, and enterprise applications.

Furthermore, there are four (4) main types of data center and these includes;

I. Managed services data centers.

II. Cloud data centers.

III. Colocation data centers.

IV. Enterprise data centers.

A External hackers have some access to a company's website and made some changes. Customers have submitted multiple complaints via email for wrong orders and inappropriate images on the website. The Chief Information Officer (CIO) is now worried about the distribution of malware. The company should prepare for which of the following other issues or concerns?
A. Domain reputation
B. Domain hijacking Confirm
C. URL redirections
D. DNS poisoning

Answers

Answer:

Option A (Domain reputation) and Option C (URL redirections) is the correct answer.

Explanation:

Domain reputation:

Receipts examine how almost every communication uses one's domain as well as how the communication or transaction will finish up throughout the box.

URL redirections:

A component of webhosting that transfers a consumer across one towards the very next URL. Redirects are usually typically self-directed redirect which always utilizes several of the hypertext protocol's set Site Observations.

Other options are not related to the given scenario. So the above two are the correct ones.

The issues or Concerns that the company should prepare for are;

A; Domain reputation

C; URL redirections

We are told that the external hackers have some access to a company's website and made some changes.

We are also told that Customers have submitted multiple complaints via email for wrong orders and inappropriate images on the website.

Thus, if the chief information Officer (CIO) is now worried about the distribution of malware, then the other issue to be worried about are domain reputation and URL redirections.

This is because;

Domain reputation receipts are used to thoroughly check how almost every communication are used by a one domain and also the way that the communication will end throughout the box.

Due to the hacker issues, it is likely that there will be URL redirections because a component of webhosting could transfer a consumer from one URL to the very next one.

Read more about Hackers at; https://brainly.com/question/23294592

Write a program with a function that accepts a string as an argument and returns the number of uppercase, lowercase, vowel, consonants, and punctuation that the string contains. The application should let the user enter a string and should display the number of uppercases, lowercases, vowels, consonants, and punctuations that the string contains.

Answers

Answer:

Explanation:

The following code is written in Python. It is a function called checkString that takes in a string as an argument and loops through each char in that string and checking to see if it is lowercase, uppercase, vowel, consonant, or punctuations. It adds 1 to the correct variable. At the end of the loop it prints out all of the variables. The picture below shows a test output with the string "Brainly, Question."

def checkString(word):

   uppercase = 0

   lowercase = 0

   vowel = 0

   consonants = 0

   punctuation = 0

   vowelArray = ['a', 'e', 'i', 'o','u', 'y' ]

   consonantArray = ['b', 'c', 'd', 'f', 'g', 'h', 'j', 'k', 'l', 'm', 'n', 'p', 'q', 'r', 's', 't', 'v', 'w', 'x', 'y', 'z']

   punctuationArray = ['.', '!', '?', ',', ';', '(', ')']

   for char in word:

       if char.isupper():

           uppercase += 1

       else:

           lowercase += 1

       if char.lower() in vowelArray:

           vowel += 1

       elif char.lower() in consonantArray:

           consonants += 1

       if char in punctuationArray:

           punctuation += 1

   print('Uppercase: ' + str(uppercase))

   print('Lowercase: ' + str(lowercase))

   print('Vowels: ' + str(vowel))

   print('Consonants: ' + str(consonants))

   print('Punctuations: ' + str(punctuation))

True or false a mirrorless camera has a pentaprism

Answers

Answer:

No the pentaprism or pentamirror are both optical viewfinder viewing systems and are not part of the mirrorless camera. Some thing the pentaprism actually operates better than the electronic viewfinder of mirrorless cameras.

Explanation:

False, I think it’s false

For each of the following application areas state whether or not the tree data structure appears to be a good fit for use as a storage structure, and explain your answer: a. chess game moves b. public transportation paths c. relationship among computer files and folders d. genealogical information e. parts of a book (chapters, sections, etc.) f. programming language history g. mathematical expression

Answers

Answer:

a) Chess game moves:- Tree data structure is not a good fit.

b) Public transportation paths:- Tree data structure is not a good fit.

c) Relationshi[p among computer files and folders:- Tree data structure is a good fit.

d) Genealogical information:- Tree data structure is a good fit.

e) Parts of books:- Tree data structure is a good fit.

f) Programming language history:- Tree data structure is not a good fit.

g) Mathematical expression:- Tree data structure is a good fit.

Explanation:

a) Chess game moves:- Tree data structure is not a good fit. Since in tree data structure moving backward or sharing the node is not that much easy. Presume, In chess, you have to check any box is empty or not. Here, Graph is the best fit.

b) Public transportation paths:- Tree data structure is not a good fit. whenever shortest path, routes, broadcast come always graph is a good option. Because in the tree you don't know how many time you visit that node

c) Relationshi[p among computer files and folders:- Tree data structure is a good fit. Since they have a predefined route. Go to 'c' drive. Open a particular folder and open a particular file.

d) Genealogical information:- Tree data structure is a good fit. Since genealogical information also has a predefined route. Here, the Graph is not suitable.

e) Parts of books:- Tree data structure is a good fit. Since manages the chapters and topics are not that much complex. You can see any book index which is in a very pretty format.

f) Programming language history:- Tree data structure is not a good fit. To store the history of the programming language we need some unconditional jumps that's why the tree is not suitable.

g) Mathematical expression:- Tree data structure is a good fit. The tree is suitable in some cases. We have an expression tree for postfix, prefix.

How much data do sensors collect?

Answers

Answer:

2,4 terabits (TB) of data every minute. Sensors in one smart-

Mining safety sensors may create up to 2.4 terabits (TB) of data every minute.

What is the significance of sensors?

Sensors can help to improve the world by improving diagnostics in medical applications, the performance of energy sources such as fuel cells, batteries, and safety, solar power, people's health, and security, sensors for exploring space and the known university, and improved environmental monitoring.

Sensors play an important role in industrial applications such as process control, monitoring, and safety. The change in sensor output compared to a unit change in input is measured as sensitivity.

It provides several advantages, including increased sensitivity during data gathering, practically lossless transmission, and continuous, real-time analysis.

Real-time feedback and data analytics services ensure that processes are operational and being carried out optimally. Sensors in a single smart-connected house may generate up to 1 gigabit (GB) of data every week.

Learn more about the sensors, refer to:

https://brainly.com/question/15396411

#SPJ2

Here is a nested loop example that graphically depicts an integer's magnitude by using asterisks, creating what is commonly called a histogram: Run the program below and observe the output. Modify the program to print one asterisk per 5 units. So if the user enters 40, print 8 asterisks.num = 0while num >= 0: num = int(input('Enter an integer (negative to quit):\n')) if num >= 0: print('Depicted graphically:') for i in range(num): print('*', end=' ') print('\n')print('Goodbye.')

Answers

Answer:

Please find the code in the attached file.

Output:

Please find the attached file.

Explanation:

In this code a "num" variable is declared that use while loop that check num value greater than equal to 0.

Inside the loop we input the "num" value from the user-end and use if the value is positive it will define a for loop that calculates the quotient value as integer part, and use the asterisks to print the value.

If input value is negative it print a message that is "Goodbye".

Please find the code link:   https://onlinegdb.com/7MN5dYPch2

Mainframe computers are multi-programming, high-performance computers, and multi-user, which means it can handle the workload of more than 100 users at a time on the computer.

a. True
b. False

Answers

Answer:

a. True

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user. Computers can be classified on the basis of their size and capacity as follows;

I. Supercomputers.

II. Mainframe computers.

III. Mini computers.

IV. Micro computers.

Mainframe computers were developed and introduced in the early 1950s.

Mainframe computers are specifically designed to be used for performing multi-programming because they are high-performance computers with the ability to handle multiple users. As a result, it simply means that mainframe computers can be used to effectively and efficiently perform the work of over one hundred (100) users at a time on the computer. Some examples of mainframe computers include the following; IBM Es000 series, CDC 6600 and ICL39 Series.

Furthermore, mainframe computers are mostly or commonly used by large companies, business firms or governmental institutions for performing various complex tasks such as census, financial transactions, e-commerce, data sequencing, enterprise resource planning, etc.

Answer:

a. True

Explanation:

A mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications, bulk data processing (such as the census and industry and consumer statistics, enterprise resource planning, and large-scale transaction processing).

You are required to make a carrier with the following details:

Frequency-1 hz/sec

Amplitude - 2

Phase - O degree

Once this carrier has been drawn, please perform the following on the data:

10110010

1. FSK

2. ASK

3. PSK​

Answers

Ok so cool I just saw your post and orange sue

how to shutdow computer

Answers

Answer:

well if your on windows you click the start button then click the power button then click shutdown if your on mac you click apple menu then shutdown if on a chromebook just hold the power button for 3 to 5 seconds

Explanation:

Scenario: The Development group in a company wants to setup theirown Child Domain to have full control on managing their accounts and policies. The Main IT group is recommending they are setup with an Organizational Unit, and delegating the appropriate access.Make your case supporting either the Development group or the Main IT group.Computer ScienceEngineering & TechnologyNetworkingIFT 220

Answers

Answer:

(:

Explanation:

HOW DO I HACK PUBG MOBILE WITH PROOF
GIVE ME LINK​

Answers

Why are you asking that here lol

write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​

Answers

Answer:

The program in C# is as follows:

using System;

class Prog {

 static void Main() {

   int n;

   Console.WriteLine("Number of integers: ");

   n = Convert.ToInt32(Console.ReadLine());

   int evensum = 0, oddsum = 0; int inpt;

   for(int i = 0;i<n;i++){

       inpt = Convert.ToInt32(Console.ReadLine());

       if(inpt%2==0){            evensum+=inpt;        }

       else{            oddsum+=inpt;        }

   }

    Console.WriteLine(evensum);

    Console.WriteLine(oddsum);

 }

}

Explanation:

This declares n, the number of integer inputs

   int n;

This prompts for n

   Console.WriteLine("Number of integers: ");

This gets input for n

   n = Convert.ToInt32(Console.ReadLine());

This declares and initializes the even and odd sum.

   int evensum = 0, oddsum = 0; int inpt;

This iterates through n

   for(int i = 0;i<n;i++){

This gets each input

       inpt = Convert.ToInt32(Console.ReadLine());

Check for even numbers and add,if even

       if(inpt%2==0){            evensum+=inpt;        }

Otherwise, add input as odd

       else{            oddsum+=inpt;        }

   }

Print even sum

    Console.WriteLine(evensum);

Print odd sum

    Console.WriteLine(oddsum);

 }

spreadsheet feature that can be used to arrange data from highest to lowest based on average

Answers

Answer:

RANK.AVG

Explanation:

Required

Arrange data in descending order based on average

The feature to do this is to use the RANK.AVG() function.

By default, the function will return the ranks of the selected data in descending order (i.e. from highest to lowest); though, the sort order can be changed to ascending order.

The syntax is:

=RANK.AVG (number, ref, [order])

Where

number [tex]\to[/tex] The number to use as rank

ref [tex]\to[/tex] The cell range

order [tex]\to[/tex] 0 represents descending order while 1 represents ascending order

on a client server network clients and servers usually require what to communicate?​

Answers

Answer:

A connectivity device. Your colleague, in describing the benefits of a client/server network, mentions that it's more scalable than a peer-to-peer network.

Explanation:

What term refers the built-in redundancy of an application's components and the ability of the application to remain operational even if some of its components fail

Answers

Answer:

Fault tolerance.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Fault tolerance is an ability of the component of a software application or network to recover after any type of failure. Thus, it is the redundancy of an application's components built-in by default and the ability of this software application to remain functional or operational even if some of its components fail or it encounter some code blocks.

Basically, fault tolerance makes it possible for a software application or program to continue with its normal operations or functions regardless of the presence of hardware or system component failure.

Hence, it is an important requirement for any software application that should be incorporated by software developers during the coding stage of the software development life cycle (SDLC).

Calculate the boiling point of 3.42 m solution of ethylene glycol, C2H602, in water (Kb =0.51°C/m, the normal boiling point of water is 100°C):​

Answers

Answer:

128.10 degree Celsius

Explanation:

The boiling point is given by

[tex]T_b = \frac{1000*K_b * w}{M*W}[/tex]

Substituting the given values, we get -

[tex]T_b = \frac{1000*0.51 * 3.42}{62.07}\\T_b = 28.10[/tex]

Tb is the change in temperature

T2 -T1 = 28.10

T2 = 28.10 +100

T2 = 128.10 degree Celsius

Calculate the total capacity of a disk with 2 platters, 10,000 tracks, an average of
400 sectors per track, and 512 bytes per sector?

Answers

Answer:

[tex]Capacity = 2.048GB[/tex]

Explanation:

Given

[tex]Tracks = 10000[/tex]

[tex]Sectors/Track = 400[/tex]

[tex]Bytes/Sector = 512[/tex]

[tex]Platter =2[/tex]

Required

The capacity

First, calculate the number of Byte/Tract

[tex]Byte/Track = Sectors/Track * Bytes/sector[/tex]

[tex]Byte/Track = 400 * 512[/tex]

[tex]Byte/Track= 204800[/tex]

Calculate the number of capacity

[tex]Capacity = Byte/Track * Track[/tex]

[tex]Capacity= 204800 * 10000[/tex]

[tex]Capacity= 2048000000[/tex]  --- bytes

Convert to gigabyte

[tex]Capacity = 2.048GB[/tex]

Notice that the number of platters is not considered because 10000 represents the number of tracks in both platters

Other Questions