Whats the point TL;DR
what two technologies below are fully-implemented, 64-bit processors for use in servers and workstations? (select all that apply)
Answer:
Itanium & Xeon
Explanation:
write an if statement that assigns deliverycomplete with 1 if bricksdelivered is equal to bricksexpected.\
Using the knowledge in computational language in python it is possible to write a code that write an if statement that assigns deliverycomplete with 1 if bricksdelivered is equal to bricksexpected.
Writting the code:%Define the function CheckDelivery()
function deliveryComplete = CheckDelivery( brickDelivered, bricksExpected)
%Start the if-else statements to check if delievery is completed.
%Delievery completed
if ( brickDelivered == bricksExpected)
deliveryComplete = 1;
%Delievery not completed.
else
deliveryComplete = 0;
%End of if-else
end
%Print the result.
fprintf("deliveryComplete: %d\n",deliveryComplete);
%End of the function.
end
%demo.m
%Call the function for the output 0.
CheckDelivery(10,11);
%Call the function for the output 1.
CheckDelivery(10,10);
function deliveryComplete = CheckDelivery(bricksDelivered, bricksExpected)
deliveryComplete = 0;
if bricksDelivered == bricksExpected
deliveryComplete = 1;
end
end
See more about python at brainly.com/question/18502436
#SPJ1
Given a line of text as input, output the number of characters excluding spaces, periods, or commas. You may assume that the input string will not exceed 50 characters. Use fgets() function to read in the input from stdin. You can then use strlen() to determine how many characters to process one by one. Ex: If the input is: Listen, Mr. Jones, calm down. the output is: 21 Note: Account for all characters that aren't spaces, periods, or commas (Ex: "/", "2", "!"). 355346.2168560.qx3zqy7 LAB ACTIVITY 12.7.1: LAB: Read and Analyze Input 0/50 main.c Load default template... 1 #include 2 #include 4 int main(void) { 5 /* Type your code here. */ 7 8 return 0; 93 101
C++ program demonstrating the use of the fgets() function to read in the input from stdin. It also shows the use of strlen(), malloc(), strncpy(), among other.
C++ code#include <string.h>
#include <stdlib.h>
#include <iostream>
using namespace std;
int main()
{
// Definir variableschar txt[50];
string chr;
int d, i, j, c;
c = -2;
// Input string of maximum 50 characterscout << "Entry line of text: ";
fgets(txt,50,stdin);
for (d=0;d<=strlen(txt);d++) {
i = d;
j = i+1;
char *to = (char*) malloc(j-i+1);
strncpy(to, txt+i, j-i);
chr= to;
if (!(chr==" " || chr=="." || chr==",")) {
c = c+1;
cout << chr;
}
}
// Outputcout << "Output: " << c << endl;
return 0;
}
To learn more about C++ char functions see: https://brainly.com/question/15397005
#SPJ4
define the following terms: disk, disk pack, track, block, cylinder, sector, interblock gap, and read/write head. 16.4. discuss the process of disk initializatio chapter 16
Your data may typically be recovered from an initialized disk. After dividing the drive, keep in mind that you must restore data to a new place to prevent data loss. If data recovery efforts are unsuccessful, you can try again by restoring a prior disk backup.
What process involves in disk initialization?Disk: A non-volatile data storage device is a computer hard disk drive (HDD).
Disk pack :Hard disk platters are arranged in a tiered pack called a disk pack.
Track: smaller than a road and frequently having an uneven surface, a track
Block: A solid object (such as a piece of stone or wood) that typically has one or more flat sides.
Cylinder: a Three-dimensional solid shape with two identical circular bases is known as a cylinder.
Sector:A sector is an economic area where enterprises engage in the same or similar types of operations, goods, or services.
Interlock gap; Concrete pavers that interlock are made with gaps between each stone as a special feature.
Read/write head; A hard disk's read/write head is a particular physical component that is in charge of both reading data from and writing data to the disk.
There are two different kinds of variable initialization: explicit and implicit. If a variable receives a value in the declaration statement, it has been explicitly initialized. Implicit initialization occurs when processing gives variables values.
So, Initialization prepares the hardware for an operating system to take over. An operating system manages the memory, processing time, and peripherals.
Learn more about disk here:
brainly.com/question/1483866
#SPJ1
you manage a firewall that connects your private network to the internet. you would like to see a record of every packet that has been rejected by the firewall in the past month. which tool should you use?
According to the statement, the tool you should use is Event log.
Because, event logs are the best way to monitor and track firewall activity. Thus, they will provide a comprehensive record of all packets that have been rejected.
The Value of Event Logs in Firewall ManagementFirewalls are essential components of any secure network, providing a first line of defense against malicious actors and unwanted connections. As such, it is important to have a reliable and comprehensive record of the traffic that passes through the firewall.
Event logs are one of the most effective tools for monitoring and tracking the activity of the firewall, allowing administrators to quickly identify any suspicious activity, potential threats, or blocked connections.
Learn more about Firewall Management:
https://brainly.com/question/12130487
#SPJ4
a technician is configuring rights and permissions in windows 7. which tool will the technician use?
The Windows Memory Diagnostic Tool is used to check the defect in the Memory RAM which is by default installed in the latest version.
What is Windows 7 and its uses?Mdsched is used to check the defected RAM which we need to repair otherwise our windows will be crashed, freeze and will start facing the BSOD (Blue Screen Of Death). For using this tool, we need to search mdsched and select Restart now and check for problems and after restarting the system the tool will automatically start detecting the memory and fix the problem. Based on the information provided within the question it can be said that the technician would most likely want to use mmc.exe . This is a Microsoft Management Console application which allows the user to display various different management plug-ins and tools that are found within the control panel of the operating system. This can be customized and sent to others as the technician wants to accomplish in this scenario. Windows 7 is an operating system that Microsoft has produced for use on personal computers. It is the follow-up to the Windows Vista Operating System, which was released in 2006. An operating system allows your computer to manage software and perform essential tasks.To learn more about windows 7 refer to:
https://brainly.com/question/14103767
#SPJ4
fill in the blank: a data analyst is creating the title slide in a presentation. the data they are sharing is likely to change over time, so they include the on the title slide. this adds important context. 1 point data analysts involved in the project name of the data source date of the presentation key findings of the presentation
On the title slide of the presentation, the data analyst includes the presentation's data. People can learn when the data was last updated by providing the date.
What is presentation?Presentation is defined as an approach to communication where the speaker informs the audience. The delivery method can be computer-based or conventional, using a slide or overhead.
The data for the presentation is presented by the data analyst on the presentation's title slide. By entering the date, users can find out when the data was last updated.
Thus, on the title slide of the presentation, the data analyst includes the presentation's data. People can learn when the data was last updated by providing the date.
To learn more about presentation, refer to the link below:
https://brainly.com/question/649397
#SPJ1
what basic database design strategies exist? describe top down and bottom up, centralized and decentralized design). explain how such strategies executed? and what are the consideration to know which strategy to choose?
Top-down and bottom-up are the two main methods used in database design.
Define the term database design.
Data organizing using a database model is known as database design. The designer decides what information must be kept on file and how the data elements interact. Now that they have this knowledge, they can start to match the data to the database model.
The data is managed in accordance with a database management system. Tables, indexes, views, constraints, triggers, stored procedures, and other database-specific components required to store, retrieve, and remove persistent objects must all be included in the thorough database architecture defined by the database designer.
Answer continued:
The first step in top-down design is to define each entity type's attributes and to identify the many entity types that exist. In other words, top-down design first defines the necessary data sets, and only then does it describe the data items for each of those data sets.
Bottom-up design first identifies the necessary properties, then groups them to create entities.
When the system's data component contains a sizable number of entities and intricate relationships on which highly sophisticated actions are carried out, centralized architecture may be applied.
The database design task is broken down into a number of modules inside the decentralized design framework. Following the establishment of the design requirements, the lead designer distributes design subsets or modules to design groups within the team.
To learn more about database design, use the link given
https://brainly.com/question/7145295
#SPJ4
Create a PercentPassing application that prompts the user for a set of scores and then calculates the percentage of scores above 70%. The user should have the option to enter as many scores as needed. (Hint: Use an if statement and another counter. i also need the algorithm and pseudocode in java
Simply put, an algorithm is a series of processes used to solve a problem. The steps are often a "case-type declaration," a "sequence," a "selection," and a "iteration."
An algorithm is a method for addressing a problem that specifies the activities to be taken and the order in which they should be taken. Simply put, an algorithm is a series of processes used to solve problems. The steps are often a "case-type declaration," a "sequence," a "selection," and a "iteration."
Sequence statements are imperatives in the C language. Iteration is satisfied by a number of statements, including "while," "do," and "for," while the case-type statement is satisfied by the "switch" statement. The "selection" is the "if then else" statement.
Pseudocode is a made-up, informal language that aids in the creation of algorithms by programmers. A "text-based" detail (algorithmic) design tool is pseudocode.
The Pseudocode rules are not too complicated. Statements that demonstrate "dependence" must all be indented.
To know more about Pseudocode click here:
https://brainly.com/question/13208346
#SPJ4
In this project you will build a database for a health clinic and load it with data. The database you build in this project will be used in later assignments. Class attendance on both November 5th and 17th is mandatory to earn full credit for this assignment.
Project requirements:
1) Write the SQL to build a database schema to support the following business operations:
CIS 3050 Health is a health clinic. Doctors of various specialties provide treatments to patients. A nurse is always attending the treatments along with the doctor. Patients schedule appointments for treatment with a receptionist. Doctors, nurses, and receptionists are all employees of the clinic. Each receptionist is assigned to a single doctor. A doctor is supported by multiple receptionists.
Use a specialization hierarchy for the various employee types (i.e., create an employee table that is a supertype for the doctor, nurse, and receptionist subtype tables). Also use patient, appointment, and a treatment tables.
Complete the schema with all seven of the required tables, all required relationships, and attributes for each table.
2) Using the completed health clinic schema from the previous step, load the database with the following data:
3 doctors
4 nurses
4 receptionists
4 patients
6 appointments
3 treatments
Each student must have their own unique data loaded into the database.
Demonstrate your data loads for all tables before the end of class on Tuesday November 17th by querying each table individually.
Using the knowledge in computational language in SQL it is possible to write a code that write the SQL to build a database schema to support the following business operations.
Writting the code:INSERT INTO EMPLOYEE values(1, 'Adam', 'Address1', 'Doctor');
INSERT INTO EMPLOYEE values(2, 'Denis', 'Address2', 'Doctor');
INSERT INTO EMPLOYEE values(3, 'Mancy', 'Address3', 'Doctor');
INSERT INTO EMPLOYEE values(4, 'DIana', 'Address4', 'Nurse');
INSERT INTO EMPLOYEE values(5, 'Kerry', 'Address5', 'Nurse');
INSERT INTO EMPLOYEE values(6, 'Losti', 'Address6', 'Nurse');
INSERT INTO EMPLOYEE values(7, 'Handin', 'Address7', 'Nurse');
INSERT INTO EMPLOYEE values(8, 'Gray', 'Address8', 'Receptionist');
INSERT INTO EMPLOYEE values(9, 'Sonny', 'Address9', 'Receptionist');
INSERT INTO EMPLOYEE values(10, 'Emy', 'Address10', 'Receptionist');
INSERT INTO EMPLOYEE values(11, 'Liza', 'Address11', 'Receptionist');
INSERT INTO DOCTOR values (1, 'Surgen', 'MAsters');
INSERT INTO DOCTOR values (2, 'Neologist', 'M Bsc');
INSERT INTO DOCTOR values (3, 'Gynic', 'MBBS');
INSERT INTO NURSE values(4, 'GNM', 1);
INSERT INTO NURSE values(5, 'ANM', 1);
INSERT INTO NURSE values(6, 'DenMB', 2);
INSERT INTO NURSE values(7, 'BSC', 3);
INSERT INTO RECEPTIONIST values(8, 'English', 5, 1);
INSERT INTO RECEPTIONIST values(9, 'English', 1, 2);
INSERT INTO RECEPTIONIST values(10, 'French', 15, 1);
INSERT INTO RECEPTIONIST values(11, 'English', 10, 3);
See more about SQL at brainly.com/question/19705654
#SPJ1
This type of software is used to create complex engineering drawings and geometric models.
Computer Aided Design (CAD) software is the category of programme used to produce intricate engineering diagrams and geometric models.
Describe software.
Software is a collection of computer software along with supporting information and files. Contrast this with hardware, which serves as the foundation for the system and really does the work. Executable code is the lowest level of coding and is made up of instructions in machine language that are supported by a single usually (CPU) or a graphics processor (GPU). Machine language is comprised of collections of binary values that correspond to processor instructions that alter the previous state of the machine.
To know more about software
https://brainly.com/question/28224061
#SPJ4
What type of malicious software is designed to replicate itself to other computers?.
Malicious software that replicates itself on other computers is known as a worm.
What is malicious software?Any program or file that purposefully harms a computer, network, or server is referred to as malicious software, commonly known as malware.
Malware can take the form of spyware, ransomware, worms, trojan horses, and computer viruses. These dangerous applications hack computers, take important data, encrypt it, and delete it. They also change or hijack essential computing operations and track end users' online behavior.
What is a worm? How do worms function?Worms are software applications that reproduce themselves from one machine to another without using a host file. As opposed to viruses, which propagate through the host file they infect. Although worms typically reside within other files, frequently Word or Excel documents, there is a difference between how worms and viruses use the host file.
The worm typically releases a document that already contains the worm macro. Since the complete page will spread from computer to computer, it should be regarded as the worm.
To know more about worms visit:
https://brainly.com/question/12980616
#SPJ4
what is hazard in microprocessor? what are the types of hazards that dominate the performance limit of a pipelined processor? how can those be overcome?
Answer:
A hazard is an error in the operation of microcontroller caused by the simultaneous execution of multiple stages in a pipelined processor. There are three classes of hazards Structural Data Branch Structural hazards
Explanation:
Algorithm Workbench 1. Write the first line of the definition for a Poodle class. The class should extend the Dog class. 2. Look at the following code, which is the first line of a class definition: public class Tiger extends Felis In what order will the class constructors execute? 3. Write the statement that calls a superclass constructor and passes the arguments x, y, and z.
The first line of the definition for a Poodle class is public class Poodle extends Dog{ //Describe the class's characteristics and behavior}.
In the main method when the constructor of the Tiger class is called, it will pass the call to its superclass Felis. As a result, the Felis constructor is called first, followed by the Tiger constructor.
What is Poddle class?Poddle class may be defined as a type of intelligent dog with a heavy curly solid-colored coat that is usually clipped. In more simple words, it is an old breed sometimes trained as sporting dogs or as performing dogs.
The statement that calls a superclass constructor and passes the arguments x, y, and z are as follows:
//demo class
public class B extends A{
public B(int x1, int y1, int z1){ //considering that there are types such as int
super(x1, y1, z1);//passing the values to the constructor of the superclass
} }
We can employ this superclass method by using the super keyword:
super.setValue(10);
To learn more about Constructor, refer to the link:
https://brainly.com/question/13267121
#SPJ1
If you were to design a website for a team, club, or other group that you belong to, which would you choose: code it yourself with HTML/CSS/JavaScript or use GUI web authoring tools? Why?
Answer:
i would join the swimming club
Explanation:
because i love swimming
does your internet connection work faster if you have a wireless and direct connection simultaneously
No, there won't be any kind of speed improvement.
What occurs when an Ethernet and wireless connection is made?Your internet connection could slow down if you use ethernet and Wi-Fi at the same time because your computer might duplicate, mix up, or receive data packets from the router out of order.Your computer won't be able to handle the information correctly, and the internet will be slow.If the computer (client device) is connected to the same source (router) via both WiFi and Ethernet, you are still using the same bandwidth.So, no, there won't be any boost in speed.To learn more about Ethernet and wifi are both linked refer to:
https://brainly.com/question/26956118
#SPJ4
dave has been assigned the task of deleting a custom object. after committing the destructive changes, he notices that no feature branch has been created. what could be the reason?
There was no flag in the Re-Create Feature Branch option.
What may cause a commit to show a status of "No changes"?Base brach was set to master branch and then component was not in production.After setting the base branch to the master branch, the component was not being produced.There was no flag in the Re-Create Feature Branch option.The new version will be added to an existing feature branch if the metadata obtained is different from what was previously obtained.Git does not generate a commit ID if there are no changes, and Copado will display the status No changes.After deploying the destructive modifications, the component must be manually uninstalled in the destination org.Before making any harmful modifications, Ana deleted a component from the source org and updated the metadata index. She can no longer locate the removed component.To learn more about deleting a custom object refer to:
https://brainly.com/question/29215750
#SPJ4
during your project, you monitor the timelines and efficiency of your team. you collect data on how many tasks they complete, their quality of work, and the time it takes to complete the tasks. all of these are examples of using data to .
c. understand performance
You gather data about how many tasks they complete, the quality of their work, and the time it takes to complete the tasks. All of these are examples of using data to understand performance during the monitoring of the timelines and efficiency of your team.
How to measure efficiency of a team?
Measuring the effectiveness of a team is not the same as measuring an individual's performance. Metrics must be established for each team project from the start, and each project must add value to the organization. Here are our top five methods for assessing team effectiveness:
Establish Metrics for Each Team Project Meet Frequently with the Team Talk to Other Company ManagersMeet with Team Members One-on-OneConsider whether the team's projects add value to the company.To know more about Metrics, visit: https://brainly.com/question/29023987
#SPJ4
A renewable future requires political ________ and new way of thinking
Renewable energy opens opportunities for democratic energy development. •. Tensions for energy democracy concern governance, technologies
what is occupational HEALTH and SAFETY?
Answer: occupational safety and health, also commonly referred to as occupational health and safety, occupational health, or occupational safety, is a multidisciplinary field concerned with the safety, health, and welfare of people at work.
for the network below, a sends a packet to b. when the frame is transmitted between a and r, what is the destination mac address?
The MAC address of Router R would be the destination MAC address.
Describe the router.
Among computer networks, a routers is a network device that routes data packets. On the Internet, routers takes care of traffic direction tasks. Data packets are the basic building blocks of information sent over the internet, including a website page or email. In order to reach its destination node, a packet is often forwarded through one router to some other router over the networks that make up an internetwork (such as the Internet). Two or more IP networks' data connections are connected to a router .
To know more about Router
https://brainly.com/question/13600794
#SPJ4
allowing the user to do too much and adding controls that most users haven't seen and won't use is called:
A preview is provided by thoughtful design, which is transparent and simple to understand and enables users to quickly fix their mistakes.
Describe feature creep ?Allowing the user to do too much and adding controls that the majority of users haven't seen and won't utilize is known as feature creepYou can restrict individual records while allowing certain users to view certain fields in a certain object to precisely control data access.Thoughtful design offers a preview, is clear and easy to understand, and allows users to easily correct their errors.Scope creep, often referred to as feature creep, is the process of adding too many features to a product that make it too complex or challenging to use.To learn more about feature creep refer to:
https://brainly.com/question/15220628
#SPJ4
which of the following is not an example of multi-factor authentication? a. entering a password and using a fingerprint reader b. entering a password and a chip card c. using your voice-print to access your phone d. receiving a single use password on your registered personal device e. a card swipe combined with an iris scan
The option is not an example of multi-factor authentication is option C: using your voice-print to access your phone.
What is multifactor authentication?Multi-factor authentication is a tiered strategy to protecting data and applications in which a system requests a user to login using a combination of two or more credentials.
A user is only permitted access to a website or application using the multi-factor authentication electronic authentication method after successfully submitting two or more pieces of evidence to an authentication mechanism, including knowledge, ownership, and inherence.
Therefore, These elements comprise:
Something you are familiar with, such a password, catchphrase, or PIN (PIN)a possession, such as a token or smartcard.a personal trait, like a fingerprint, or a biometric.Based on the option above, you can see that it is just one function and not two or three hence is the odd one out.
Learn more about multi-factor authentication from
https://brainly.com/question/14330595
#SPJ1
Write and register an event handler that changes the background color of the h1 tag to gold on mouseout.
CODE:
html:
Header 1
Paragraph
The HTML code for an event handler that changes the background color of the h1 tag to gold on mouseout is provided below:
Coding Part:
var h1Element = document.getElementsByTagName("h1")[0];
h1Element.addEventListener("mouseout", function() { h1Element.style.backgroundColor='gold'; };
What exactly is an event handler?
Events are signals that are sent from within the browser window to notify the user of changes in the browser or operating system environment. Programmers can write event handler code that runs when an event occurs, allowing web pages to respond appropriately to changes.
This page is intended to serve as a "reminder" of how to use events and event handlers.
Events are documented on the pages for the JavaScript objects that emit them as well as those that come after them.
To know more about Event handler, visit: brainly.com/question/20169706
#SPJ4
while working on a project, a developer spent a few weeks modeling the intended data schema before writing any code. this person was most likely working with a document database.
That's accurate. Before developing any code, document databases demand a lot more upfront work to set up the database schema and structure.
How do databases work?
A database is a structured collection of data that is electronically accessible and stored. Large databases are housed on multiple computers or cloud storage, whilst small databases can be stored on a file system. Data modelling, efficient information representation and storage, query languages, privacy and security of sensitive data, and cloud control challenges, such as providing access control and fault tolerance, are all a part of the creation of databases.
To know more about database
https://brainly.com/question/29412324
#SPJ4
which command is used to change the order in which the router looks for system bootstrap information?
IPv4 unicast routes are supported for static routing SVI configuration using the LAN Base routing template.
What is Lanbase routing?IPv4 unicast routes are supported for static routing SVI configuration using the LAN Base routing template. The memory allotted to unicast routing cannot be used by any other features thanks to the LAN Base routing template.Before using the routing template, your switch must have routing enabled. The switch supports any directly linked routes, default routes, 8 Routed SVIs, and 16 static routes (including user-configured routes and default routes) for the management interface. The switch's eight SVI slots can each get an IP address.We require two things to enable routing. Prior to enabling IP routing, turn on the Lanbase-routing feature that SDM prefers. To make the change, you must reload the page. You can use the show sdm prefer command to confirm the change after the system reload.To learn more about LAN Base routing refer
brainly.com/question/14294134
#SPJ4
config-register is the command used change the order of the router that looks for system bootstrap information.
What is system bootstrap information?The term bootstrap refers to the process of booting or loading a program into a computer by the use of smaller initial program to load in the desired program, which is usually an operating system.A bootstrap program is the program that starts the operating system (OS). The term bootstrapping first appeared in the early 1950s. It was a bootstrap load button that was used to start a hardwired bootstrap program, or a smaller program that executed a larger program, such as the operating system.Bootstrap enables designers and developers to quickly create fully responsive websites. It is widely regarded as the most popular CSS framework for creating responsive and mobile-first applications.To learn more about bootstrap refer to :
https://brainly.com/question/3521335
#SPJ4
a constructor is a method that: question 22 options: a) with the name classname.constructor. b) never receives any arguments. c) performs initialization or setup operations. d) returns an object of the class.
A constructor is a method that c: 'performs initialization or setup operations'.
In object-oriented programming, a constructor is a special type of method called to create an object. The constructor prepares the new object for use, often accepting arguments that are used by the constructor to set required member variables. Constructors have the same name as that of the declaring class. Constructors have the key task of initializing the data members of the object and setting up the operations to be performed on them.
You can learn more about constructor at
https://brainly.com/question/13267121
#SPJ4
what type of event is caused by applications or hardware from which the system is not able to recover?
what does the acronym reo mean? relayed electronic opengl real estate owned relayed electric online relayed electronic orb
Answer:
real estate owned
Explanation:
hope it helps!
apenetration tester is testing a network's vulnerability. one of the tests the penetration tester is checking is the ability to inject packets. which of the following tools allow for packet injection? (select all that apply.)
Answer:
- hping
- tcpreplay
Explanation: