The memory hierarchy of a computer system organizes storage by using small, fast, expensive memories at the top of the hierarchy and supplementing them with larger, slower, cheaper memories at each successive level. Explain how the principle of memory locality makes such a system capable of providing efficient access to the data and instructions needed for executing programs.

Answers

Answer 1

Answer:

Following are the responses to this question:

Explanation:

The computer system's memory hierarchy arranges space through tiny, fast, costly stocks only at top of the pyramid and complements them through big, lighter, cheap storage facilities at every representation made. It is needed to limit the time for data access for application executes. A very design of the main memory allows a system to have easy access to the information and instructions necessary to execution time. A traditional technique of system memory works like:

[tex]Level\ 0 (Top Level) \to CPU \ Registers\\\\Level \ 1 \to Cache\ Memory \ (SRAMs)\\\\Level\ 2 \to Main \ Memory \ (DRAMs)\\\\Level \ 3 \to Magnetic \ Disk\ (Disk \ Storage)\\\\Level \ 4 \to Optical \ Disk\\\\Level \ 5 \to Magnetic\ Tape\\\\[/tex]

Because as memory cost rises below level 5 to level 0. CPU registers become costly as the cache memory, which then, in turn, is much more costly than for the memory.

Whenever the access time of CPU registries becomes reduced from level 5 to level 0, its time complexity between reading/write transactions is much more swift than Cache Memory Access period which in turn is quicker than that of the main memory Communication cost and so forth.

So, we need a memory hierarchy to analyze the information (read/write requests) efficiently, in turn for all the top-level to read the information more quickly and thoroughly. Therefore, the architecture of the computer program's Main memory enables a system to provide secure access to information and guidance for running programs.


Related Questions

3. Carmen Villa runs a cooking blog, where she posts a new recipe each day. She wants to get a sense
of where her visitors are from, so she can choose recipes from the areas where her website visitors
live. What other site usage information might she be able to gather, and how can she use it to
improve the cooking blog for her visitors?

Answers

Answer:

im kinda confused on this question is ther a answer key

Explanation:

When is blue for when the instance in which the directory of compulsion in the air!

Answers

I think it’s what the other person said

I need them on this question

Answers

Answer:

Extended wear contacts. ...

Toric contacts. ...

Colored (tinted) contacts

Explanation: hope this helps

Consider the following class definitions. public class Computer { private String memory; public Computer) { memory = "RAM"; } public Computer (String m) { memory = m; } public String getMemory () { return memory; ) } public class Smartphone extends Computer private double screenWidth, screenHeight; public Smart Phone (double w, double h) super("flash"); screenWidth = w; screenHeight = h; } public double get ScreenWidth() { return screenWidth; } public double getScreenHeight() { } return screenHeight; } The following code segment appears in a class other than Computer or Smartphone. + Computer myPhone = new Smart Phone (2.55, 4.53); System.out.println("Device has memory: " + myPhone.getMemory () ", screen area: " + myPhone.getScreenWidth()* myPhone.getScreenHeight() + " square inches."); The code segment is intended to produce the following output. Device has memory: flash, screen area: 11.5515 square inches. Which of the following best explains why the code segment does not work as intended?A. An error occurs during compilation because a Smartphone object cannot be assigned to the Computer reference variable myPhone. B. An error occurs during compilation because the Smartphone class has no getMemory method. C. An error occurs during compilation because the getScreenWidth and getScreenHeight methods are not defined for the Computer object myPhone. D. An error occurs at runtime because the Smartphone class has no getMemory method. E. An error occurs at runtime because the getScreenWidth and getScreenHeight methods are not defined for the Computer object myPhone.

Answers

Answer:

C.

Explanation:

The code provided in the question has many syntax errors. I have pasted a fixed version of the code below that fixes all the syntax errors but leaves the code as is. Using this code you can see that the error that is preventing the code from running properly is that

C. An error occurs during compilation because the getScreenWidth and getScreenHeight methods are not defined for the Computer object myPhone.

As you can see from the attached photo below, the code is failing to compile because the methods themselves are not able to be accessed by the myPhone object. This is happening during the compilation and thus causing the compilation to fail.

class Computer {

   private String memory;

   public Computer() {

       memory = "RAM";

   }

   public Computer(String m) {

       memory = m;

   }

   public String getMemory() {

       return memory;

   }

}

   class Smartphone extends Computer {

       private double screenWidth, screenHeight;

       public Smartphone(double w, double h) {

           super("flash");

           screenWidth = w;

           screenHeight = h;

       }

       public double getScreenWidth() {

           return screenWidth;

       }

       public double getScreenHeight() {

           return screenHeight;

       }

   }

   public class Main{

       //The following code segment appears in a class other than Computer or Smartphone

       

       public static void main(String[] args) {

           Computer myPhone = new Smartphone(2.55, 4.53);

           System.out.println("Device has memory: " + myPhone.getMemory() + ", screen area: " + (myPhone.getScreenWidth()*myPhone.getScreenHeight()) +" square inches.");

       }

   }

The choice is "The getScreenWidth and getScreenHeight methods again for Computer object myPhone aren't declared, resulting in an error during compilation".

Class Description:

In Options D and E errors would not occur since only compile-time errors, not run-time errors, would happen.

Computer myPhone = new Smartphone(2.55,4.55);

A computer class was referenced by myPhone in this line. As a consequence, it's solely useful for computer students. Therefore, if you try to use the "getScreenwidth" and "getScreenHeight" functions of both the Smartphone class, which would be a sub-class of the Smartphone, you'll get an error. So, because the scope of the myPhone is limited to the parent class, the computer, it complies.Choices A and B will not produce an error since they are inside the scope of the myPhone.As a result, option C is the best argument for why the code section isn't working as it should.

Find out more about the class here:

brainly.com/question/17001900

Subtraction + Decision and Loop
This is a twist on the previous exercise that will help you review loops and decision structures. You will again ask the user to enter two numbers. However, you will ALWAYS subtract the smaller number from the larger number to ensure that you never get a negative number for an answer. You do this by checking the numbers and switching them if they are not in the right order (larger then smaller). All of this checking, switching, subtracting, and output of the answer should occur in a function.
((( THIS WAS THE PREVIOUS EXERCISE
Function Basics - Arguments and Parameters
This is another easy exercise to test your knowledge of the fundamentals. In main(), ask the user to enter two integers. Pass those two integers to a function that will subtract one number from another. This function must also output the answer to the user.
Output:
Enter two integers (separated by a space) and this program will subtract them: [user enters: 5 7]
5 - 7 = -2
Notes and Hints:
1) From now on, you must use a function prototype for all programs that use functions. Don't expect me to ask for it in each exercise. )))
Finally, ask the user if they would like to run the program again. By now, you should know exactly what type of loop to use.
Output:
Enter two integers (separated by a space) and this program will subtract the smaller from the larger: [user enters: 7 5]
7 - 5 = 2
Do you want to run this program again? [user enters: y]
Enter two integers (separated by a space) and this program will subtract the smaller from the larger: [user enters: 5 7]
7 - 5 = 2
Do you want to run this program again? [user enters: n]
Notes and Hints:
1) As always, make sure you accept an upper or lower case 'Y'

Answers

Answer:

In Python:

def subsmall(num1,num2):

   if num1 > num2:

       return num1 - num2

   else:

       return num2 - num1

   

repeat = True

while(repeat):

   num = input("Enter two integers: ")

   nums = num.split(" ")

   print(subsmall(int(nums[0]),int(nums[1])))

   runagain = input("Run program again? ").lower()

   if  runagain == "y":

       repeat=True

   else:

       repeat = False

Explanation:

The function begins here

def subsmall(num1,num2):

This subtracts num2 from num1 if num2 is smaller

   if num1 > num2:

       return num1 - num2

If otherwise, subtract num1 from num2

   else:

       return num2 - num1

The main begins here

This initialiazes a boolean variable to true    

repeat = True

This loop is repeated until the boolean variable is false

while(repeat):

Prompt to enter two integers

   num = input("Enter two integers: ")

Split the string by space

   nums = num.split(" ")

This passes the two integers to the function and also prints the differences

   print(subsmall(int(nums[0]),int(nums[1])))

Prompt to run the program again

   runagain = input("Run program again? ").lower()

If input is Y or y, the loop repeats

   if  runagain == "y":

       repeat=True

The program ends if otherwise

   else:

       repeat = False

Select the correct word to complete the sentence.
Bandwidth represents the _____ of a connection.

capacity
speed
distance
security

Answers

Distance is the answer!

Answer:

Capacity

Explanation:

i got it wrong and it showed this to be the answer on edge

Create a program which takes two integers as input from the command line. In your code, allocate space for a 2D array dependent on user input. For example, if they enter 30 40 then your program should allocate space using double **. Once the memory is allocated, initialize the data by setting the value at index (i, j) equal to its position a

Answers

Answer:

In C:

#include <stdio.h>

#include <stdlib.h>

int main() {

int r,c;

printf("Row: "); scanf("%d", &r);

printf("Cols: "); scanf("%d", &c);  

double *myarr = (int *)malloc(r * c * sizeof(int));

double inputs = 0.0;

for (int rww = 0; rww < r; rww++){

for (int ccl = 0; ccl < c; ccl++){

 inputs= inputs+1.0;

 *(myarr + rww*ccl + ccl) = inputs; }}

return 0;}

Explanation:

This declares the rows and columns as integers

 int r,c;

This gets the number of rows

printf("Row: "); scanf("%d", &r);

This gets the number of columns

printf("Cols: "); scanf("%d", &c);  

This dynamically allocate space for array myart

double *myarr = (int *)malloc(r * c * sizeof(int));

This initializes the inputs to the array to 0.0

double inputs = 0.0;

This iterates through the array and initializes each element of the array by its index

for (int rww = 0; rww < r; rww++){

for (int ccl = 0; ccl < c; ccl++){

 inputs= inputs+1.0;

 *(myarr + rww*ccl + ccl) = inputs; }}

The Binary Search algorithm works by testing a mid-point, then eliminating half of the list.

a. True
b. False

Answers

Answer:

a. True

Explanation:

The Binary Search algorithm works by testing a mid-point, then eliminating half of the list.

13. Which statement is valid?
1 KB = 1024 bytes.
1 MB = 2048 bytes
1 MB = 1000 kilobytes
1 KB = 1000 bytes​

Answers

Answer:

1 KB = 1024 bytes is correct

Explanation:

Answer:

1 KB = 1000 bytes

Is valid.

Hope it will help :)❤

Monster Collector
Write this program using an IDE. Comment and style the code according to the CS 200 Style Guide. Submit the source code files (.java) below. Make sure your source files are encoded in UTF-8. Some strange compiler errors are due to the text encoding not being correct.
Monster collector is a game of chance, where the user tries to collect monsters by guessing the correct numbers between 1 and 5. If the user doesn't guess the incorrect number, you catch the monster, otherwise, it gets away!
Example output:
Welcome to Monster Collector, collect 2 monsters to win!
A wild pikamoo appears! Guess a number between 1 and 5
5
You almost had it, but the monster escaped.
A wild bulbaroar appears! Guess a number between 1 and 5
1
Congratulations, you caught bulbaroar!
There are no more monsters to encounter!
You caught i monsters of 2
Keep training to be the very best!
Welcome to Monster Collector, collect 2 monsters to win!
A wild pikamoo appears! Guess a number between 1 and 5
3
Congratulations, you caught pikamoo !
A wild bulbaroar appears! Guess a number between 1 and 5
1
Congratulations, you caught bulbaroar!
There are no more monsters to encounter!
You caught 2 monsters of 2
You're the monster collector master!
A more detailed explanation of the requirements for each method will be in the method header comments - please follow these closely. Suggested order of completion:getMonster(), catchMonster(), printResult() then main(). Config.java contains an array of monsters, and the seed for your random number generator.

Answers

Answer:

In java:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 int monsternum, usernum;

 int count = 0;

 Random rand = new Random();

 String [] monsters = {"wild pikamoo","wild bulbaroar"};

 for(int i =0;i<2;i++){

     monsternum = rand.nextInt(5);  

     System.out.print("A "+monsters[i]+" appears! Guess a number between 1 and 5: ");

     usernum = input.nextInt();

     if(monsternum == usernum){      count++;      System.out.println("Congratulations, you caught a "+monsters[i]+"!");  }

 else{      System.out.println("You almost had it, but the monster escaped.");  }

 

 }

 System.out.println("There are no more monsters to encounter!");

 System.out.println("You caught "+count+" monsters of 2");

 if(count!=2){      System.out.print("Keep training to be the very best!");  }

 else{      System.out.print("You're the monster collector master!");  }

}

}

Explanation:

This declares monster and user number as integers

 int monsternum, usernum;

Initialize count to 0

 int count = 0;

Call the random object

 Random rand = new Random();

Create a string array to save the monster names

 String [] monsters = {"wild pikamoo","wild bulbaroar"};

Iterate for the 2 monsters

 for(int i =0;i<2;i++){

Generate a monster number

     monsternum = rand.nextInt(5);  

Prompt the user to take a guess

     System.out.print("A "+monsters[i]+" appears! Guess a number between 1 and 5: ");

Get user guess

     usernum = input.nextInt();

If monster number and user guess are equal, congratulate the user and increase count by 1

     if(monsternum == usernum){      count++;      System.out.println("Congratulations, you caught a "+monsters[i]+"!");  }

If otherwise, prompt the user to keep trying

 else{      System.out.println("You almost had it, but the monster escaped.");  }  

 }

Print no monsters again

 System.out.println("There are no more monsters to encounter!");

Print number of monsters caught

 System.out.println("You caught "+count+" monsters of 2");

Print user score

 if(count!=2){      System.out.print("Keep training to be the very best!");  }

 else{      System.out.print("You're the monster collector master!");  }

You have just started a new job as the administrator of the eastsim domain. The manager of the accounting department has overheard his employees joke about how many employees are using "password" as their password. He wants you to configure a more restrictive password policy for employees in the accounting department. Before creating the password policy, you open the Active Directory Users and Computers structure and see the following containers and OU: eastsim Builtin Users Computers Domain Controllers Which steps must you perform to implement the desired password policy? (Select three. Each correct answer is part of the complete solution.)

Answers

Explanation:

To implement the desired password policy, you have to carry out these steps

1. An organizational unit, OU has to be created for these employees in east-sim.com

2. Since there is an organizational unit created for the accounting employees, you have to put the employees user objects in this Organizational unit.

3. Then as the administrator the next step that i would take is the configuration of the password policy, then i would link this to the already created organizational unit for these employees

What can you think of as a box or container that holds a value and has a label?
a conditional
b variable
c algorithm
d paradigm​

Answers

Answer:

I think its B

Explanation:

none of the answers make that much sense to me but i did the quiz and that was what it was.

Answer:its b

Explanation:

PLS HELP <3 Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.

var a = 0;

var b = 1;

var c

for(i = 1; I <= 5; i++)

{

C = a +b;

a = b;

b = c;

}

document. write(c);

The output of the document. write statement is ____?

Answers

Answer:

The output of the document. write statement is

Explanation:

Initially: [tex]a = 0[/tex] and [tex]b = 1[/tex]

The iteration is repeated 5 times and the calculation is as follows:

First iteration:

[tex]c = a + b =0 + 1 = 1[/tex]:=> [tex]c = 1[/tex]

[tex]a = b[/tex]:=> [tex]a= 1[/tex]

[tex]b = c[/tex]:=>[tex]b = 1[/tex]

Second iteration:

[tex]c = a + b =1 + 1 = 2[/tex]:=> [tex]c = 2[/tex]

[tex]a = b[/tex]:=> [tex]a= 1[/tex]

[tex]b = c[/tex]:=>[tex]b = 2[/tex]

Third iteration:

[tex]c = a + b =1 + 2= 3[/tex]:=> [tex]c = 3[/tex]

[tex]a = b[/tex]:=> [tex]a= 2[/tex]

[tex]b = c[/tex]:=>[tex]b = 3[/tex]

Fourth iteration:

[tex]c = a + b =2 + 3= 5[/tex]:=> [tex]c = 5[/tex]

[tex]a = b[/tex]:=> [tex]a= 3[/tex]

[tex]b = c[/tex]:=>[tex]b = 5[/tex]

Fifth iteration:

[tex]c = a + b =3 + 5= 8[/tex]:=> [tex]c = 8[/tex]

[tex]a = b[/tex]:=> [tex]a= 5[/tex]

[tex]b = c[/tex]:=>[tex]b = 8[/tex]

End of iteration

document. write(c) prints the value of c which is 8

Jason works for a restaurant that serves only organic , local produce . What trend is this business following?

Answers

Answer: Green

Explanation:

what is Windows software​

Answers

Answer:

window software is a platform made by windows that is written in JavaScript and visual basic ,c

Explanation:

window software is a platform made by windows that is written in JavaScript and visual basic ,c .

Microsoft Windows, commonly referred to as Windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry

Consider the following class declarations.

public class Dog
{
private String name;
public Dog()
{
name = "NoName";
}
}
public class Poodle extends Dog
{
private String size;
public Poodle(String s)
{

size = s;
}
}

The following statement appears in a method in another class.
Poodle myDog = new Poodle("toy");
Which of the following best describes the result of executing the statement?

a. The Poodle variable myDog is instantiated as a Poodle. The instance variable size is initialized to "toy". The instance variable name is not assiged a value.
b. The Poodle variable myDog is instantiated as a Poodle. The instance variable size is initialized to "toy". An implicit call to the no-argument Dog constructor is made, initializing the instance variable name to "NoName".
c. The Poodle variable myDog is instantiated as a Poodle. The instance variable size is initialized to "toy". An implicit call to the no-argument Dog constructor is made, initializing the instance variable name to "toy".
d. A runtime error occurs because super is not used to call the no-argument Dog constructor.
e. A runtime error occurs because there is no one-argument Dog constructor.

Answers

Answer:

The poodle variable myDog is intentioned as a Poodle. The instance variable size is initialized to “toy”. The instance variable name is not assigned a value.

D have a good one pal let me know

What is meant by the term text?
A. Printed information only
B. Printed, visual, and audio media
C. Any words conveyed by media
D. Content found only in books and mag

Answers

It’s d pick d because it correct

The term text means content found only in books and mag. Thus, option D is correct.

What is a text?

It is a set of statements that allows a coherent and orderly message to be given, either in writing or through the word of a written or printed work. In this sense, it is a structure made up of signs and a certain writing that gives space to a unit with meaning.

A video is a recording of a motion, or television program for playing through a television. A camcorder is a device or gadget that is used to record a video. audio is the sounds that we hear and mix media is a tool used to edit the video.

Digital camcorders are known to have a better resolution. The recorded video in this type of camcorder can be reproduced, unlike using an analog which losing image or audio quality can happen when making a copy. Despite the differences between digital and analog camcorders, both are portable, and are used for capturing and recording videos.

Therefore, The term text means content found only in books and mag. Thus, option D is correct.

Learn more about text on:

https://brainly.com/question/30018749

#SPJ5


10. List three adaptations of wind-pollinated plants to promote pollination.

Answers

Answer:

No bright colors, special odors, or nectar.

Small.

Most have no petals.

In the garden, the ratio of roses to daisies is 2:5. There are 40 roses. How many daisies are there?
help me plz
thx if you do

Answers

Answer: There are 16 daisies.

Explanation: In order to find this number, multiply 5 by 8. This will get you 40. Then, multiply 2 by 8. This will get you 16. Hope this helps. :)

You should always keep a backup of data stored in the cloud because the cloud provider does not automatically do this True or false???

Answers

Answer:

False

Explanation:

please help me with this coding problem :)

Consider the following field and incomplete method of some class. The method calcTotal is intended to return the sum of all values in vals.

private int[] vals;

public int calcTotal()
{
int total = 0;

/* missing code */

return total;
}
Which of the code segments shown below can be used to replace /* missing code */ so that calcTotal will work as intended?

I.
for (int i : vals)
{
total += i;
}
II.
for (int pos = vals.length; pos > 0; pos--)
{
total += vals[pos];
}
III.
int pos = 0;
while (pos < vals.length)
{
total += vals[pos];
pos++;
}


I only
II only
I and III
II and III
III only

Answers

Answer:

ll and lll

Explanation:

list dont be a looser

What is the data type of the following expression?
5/1

a) bool

b) str

c) float

d) int

Answers

Answer:

What do u mean by 5/1... And Sry for disturbing

D Integer

Since 5/1 = 5 that’s no float. Maybe if it was 5/1.0 then it would be 5.0 which is a float. So int is the answer.

During what stage of problem solving is information gathered in order to see if the plan produced the intended outcome?
A. implement the solution
B. Define the problem
C. Identify solutions
D. evaluate results ​

Answers

Identify solutions is  to see if the plan produced the intended outcome.

Hence, option C is correct answer.

What is problem solving?

Diagnose the circumstance to keep your attention on the issue and not merely its symptoms. Use cause-and-effect diagrams to establish and examine root causes, and flowcharts to show the anticipated steps of a process while solving problems.

Key problem-solving steps are explained in the sections that follow. These actions encourage the participation of interested parties, the use of factual information, the comparison of expectations with reality, and the concentration on a problem's underlying causes. You ought to start by:

reviewing and capturing the functioning of current processes (i.e., who does what, with what information, using what tools, communicating with what organisations and individuals, in what time frame, using what format).

assessing the potential effects of new resources and updated regulations on the creation of your "what should be"

Read more about problem solving:

https://brainly.com/question/23945932

#SPJ1

This program reads a file called 'test.txt'. You are required to write two functions that build a wordlist out of all of the words found in the file and print all of the unique words found in the file. Remove punctuations using 'string.punctuation' and 'strip()' before adding words to the wordlist.
Write a function build_wordlist() that takes a 'file pointer' as an argument and reads the contents, builds the wordlist after removing punctuations, and then returns the wordlist. Another function find_unique() will take this wordlist as a parameter and return another wordlist comprising of all unique words found in the wordlist.
Example:
Contents of 'test.txt':
test file
another line in the test file
Output:
['another', 'file', 'in', 'line', 'test', 'the']
This the skeleton for 1:
#build_wordlist() function goes here
#find_unique() function goes here
def main():
infile = open("test.txt", 'r')
word_list = build_wordlist(infile)
new_wordlist = find_unique(word_list)
new_wordlist.sort()
print(new_wordlist)
main()

Answers

Answer:

Explanation:

The following code has the two requested functions, fully working and tested for bugs. It is written in Python as is the sample code in the question and a sample output can be seen in the picture attached below.

import string

def build_wordlist(file_pointer):

   words = file_pointer.read()

   words = [word.strip(string.punctuation) for word in words.split()]

   return words

def find_unique(word_list):

   unique_words = []

   for word in word_list:

       if word not in unique_words:

           unique_words.append(word)

   return unique_words

def main():

   infile = open("test.txt", 'r')

   word_list = build_wordlist(infile)

   new_wordlist = find_unique(word_list)

   new_wordlist.sort()

   print(new_wordlist)

main()

evaluate the arithmetic expression 234+567​

Answers

Answer:

801

Explanation:

234 + 567 = 801

Which term best describes these lines?

count = 0

loop through list

if “basketball” is found

add one to count

output count

Python 3 code
selection program
pseudocode
sequential program

Answers

The term best describing these lines is called pseudocode. Essentially a “text-based” detail (algorithmic) design tool.

An entrepreneur wants to make an app to show what breeds of dogs are similar to each other. She wants to look at factors such as weight and energy level in her comparison. In the end, she wants each breed of dog to belong to a certain category based on these characteristics. What would be a sensible approach to solving this problem using clustering?

Answers

Answer

Dog breeds = observations, Average weight and energy level for each breed = variables. Each cluster is a category.

Explanation:

Using a method of clustering, she would be putting the dog breeds that are more similar together and in order to do this she has to look at various factors such as observation which are the dog breeds, and the average weight and energy level of the breeds, which represents variables. Every one of these clusters would be a category.

Aliah finds an old router that does not support channel bonding. What frequency are the channels limited to?

A.
10 MHz
B.
20 MHz
C.
40 MHz
D.
80 MHz

Answers

A because it’s slower

PLEASE HELP WILL MARK BRAINLEST!!


What are some inadvertent effects of technology?

Answers

Answer:

Industrialization increased our standard of living, but has led to much pollution and arguably, even some social ills. The benefits brought by the internet are too many to mention, yet viral misinformation, vast erosion of privacy, and the diminishing patience of society as a whole were all unintended consequences.

Answer:

It has also increased idle time of workers

It is also true that we are now spending more time visiting social networking sites, rather than our friends and family

Explanation:

please help me on this coding problem :)

Consider the following code segment.

int a = 0;
int b = 3;

while ((b != 0) && ((a / b) >= 0)
{
a = a + 2;
b = b - 1;
}
What are the values of a and b after the while loop completes its execution?

a = 4, b = 1
a = 0, b = 3
a = 6, b = 0
a = 8, b = -1

Answers

Answer:

a=4 , b=1

Explanation:

I'm not a computer science major at all but I think I can help you with this code.

Our program wants us to add 2 to a get new a value while also subtracting 1 from b value to obtain new b value. We we want to for for as long b is not 0 and a/b is nonnegative.

One round we get:

New a=0+2=2

New b=3-1=2

Let's see if we can go another round:

New a=2+2=4

New b=2-1=1

We can't go another round because b would be negative while a is positive which would make a/b negative. So our loop stops at this 2nd round.

a=4 , b=1

Other notes:

2nd choice makes no sense because a is always going to increase because of the addition on a and b was going to decrease because of the subtraction on it.

Third choice makes no sense because a/b doesn't even exist.

Fourth choice a/b is negative not nonnegative.

Other Questions
I smiled and shook my head. I can quite understand your thinking so, I said. Of course, in your position of unofficial adviser and helper to everybody who is absolutely puzzled, throughout three continents, you are brought in contact with all that is strange and bizarre. But hereI picked up the morning paper from the groundlet us put it to a practical test. Here is the first heading upon which I come. A husbands cruelty to his wife. There is half a column of print, but I know without reading it that it is all perfectly familiar to me. There is, of course, the other woman, the drink, the push, the blow, the bruise, the sympathetic sister or landlady. The crudest of writers could invent nothing more crude. In this excerpt, the author depicts the characters as - a Friends b Rivals c Family d Hostile Alex made a rectangular blanket that has an area of 8 square feet the length of his blanket is 8 feet what is the width in feet of his blanket Okay answer this question (pls dont delete) if the sky is yellow and the alphabet tastes like oranges what is the color of the letter R? Will give brainliest!The principal objectives of the Populists were to _____.raise the debts of farmerslimit the countrys populationraise farm pricestry to get cheaper labor Trey is solving his equation, and the last line of his work is "-2 = 2". What does this mean? An experiment must be controlled in order for a scientist to_________________________. Predict the outcome rely on his or her personal feelings ignore findings that do not fit his or her ideas interpret results accurately what is world Unity explain sentence in details True or false: autosomes are sex chromosomes A proton moves at a speed of 0.12 x 10^7 m/sat right angles to a magnetic field with amagnitude of 0.58 T.Find the magnitude of the acceleration ofthe proton. The elemental charge is 1.60 x10^-19 C.Answer in units of m/s?. Describe the general characteristics of each of the gasesa) airb) water vapourc) carbon dioxided) methane gas How does the bully pulpit enhance the presidency beyond its expressed powers? Jo's house is located at (-4,-2), Elenas house is a reflection of Jo's house across the x-axis. What is the coordinate of Elenas house? How does thinking out loud build self-efficacy?A) It helps to motivate you to do your best.B) It slows your thoughts so that you can reason deliberately.C) It allows you to analyze your failures so that you improve.D) It is a way to give yourself feedback. 5/8(6496) simplify 3. Infer Do all elements have half-lives? Why or why not? HELP HELP HELP HELP HELP Calculate the number of grams of nitrogen dioxide that are produced from 4 moles of nitric oxide Suppose a student visited 81 websites while conducting research. If 9 of the websites were "us.gov" websites, what percentage of the websites visited were NOT "us.gov" websites? Round your answer to the nearest whole percent. ANSWER THIS! Which of these statements about the Sun is the result of its closeness to Earth? A) It is the only star with a gravitational pull. B) It is the largest star in the Milky Way Galaxy. C) It appears (from Earth) to be the brightest star. D) It has the lowest temperature of any star seen from Earth. Which of the following statements is FALSE?a.Before secession, most Texans in Southeast Texas had come from the Old South.b.In 1861, Texans voted overwhelmingly in favor of secession.c.Most Texans who opposed secession were from North or West Texas.d.Texans who opposed secession spoke out in large numbers across the state.Please select the best answer from the choices providedABCD