Answer:
IEEE stands for Institute of Electrical and Electronics Engineers.
Explanation:
The Institute of Electrical and Electronics Engineers or more popularly known as the IEEE is a professional body that is associated with the electrical engineering, electronics engineering and computer engineering discipline. It has its headquarters at New York city.
It is one of the the world’s largest professional technical organization that is dedicated to the advancing technology for the welfare of the society and humanity.
It has various committees and communities. These committees are expert committees and take active participation in conferences, research, authorship, etc.
There are committees such as IEEE Awards Board, IEEE Fellow Committee, IEEE Governance Committee, etc.
The Mac’s GUI set it apart from earlier operating systems.
True or False
Answer:
Its true
Explanation:
Just took the test.
Describe an algorithm that takes as input a list of n integers in nondecreasing order and produces the list of all values that occur more than once. (
Answer:
Input a series of integer numbers and split the string from the input to get a list. Then check and convert each string to integer with a list comprehension. Create a new variable with a value equal to the set of the list ( to get unique values) then check for the occurrence of each value in the original list.
Explanation:
This algorithm is used to check for the occurrence of values in a list that has been sorted in ascending order. This is faster if the items in the list is not converted to integer yet (still strings) before writing a for loop to check the value count in the list.
Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).
In python:
if 8 < user_grade < 13:
print("in high school")
You would just need to supply the value of the user_grade variable.
Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote
Answer:
tyafana
Explan
ation:n umbers
what program we write for nested if in c++ to print something after else part but before inner if else
if(condition){
}
else
//something we want to print
if(condition){
}
else{
}
Answer:
if(condition){
}
else {
// something we want to print
if(condition) {
// ...
}
else {
// ...
}
}
Explanation:
Create code blocks using curly braces { ... }.
Use proper indentation to visibly make it clear where code blocks start and end.
Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).
Answer:
C#
if(user_grade >=9 && user_grade <=12)
{
Console.WriteLine("In Highschool");
}
Python
if user_grade >= 9 & user_grade <= 12:
print("In Highschool")
Java
if(user_grade >=9 && user_grade <=12)
{
System.println("In Highschool");
}
Explanation:
What game is this? helpppppp
Answer:
the sims lol
Explanation:
References inserted initially as footnotes can be converted to endnotes through an option in the software.
A. True
B. False
The answer is: A) True
Bibliography
There are some formatting errors in this bibliography
page. Which corrections should be made? Check all
that apply
O The title should be in bold.
O There should be a double space between each
citation
Amber, Claire. "How Would Gandhi Respond?"
The World Post. TheHuffington Post.com,
16 Sept. 2011. Web. 28 Feb. 2014.
Wilkinson, Philip. Gandhi: The Young Protester
Who Founded a Nation. Washington, DC:
National Geographic Society, 2005. Print.
Eknath, Easwaran. Gandhi the Man: How One
Man Changed Himself to Change the World.
Tomales, CA: Nilgiri, 2011. Print.
O The citation entries should be in alphabetical order.
The web sources should be listed first.
The second and third lines of the last entry should
be indented
Answer:
There should be a double space between each citation
The citation entries should be in alphabetical order.
The second and third lines of the last entry should be indented
Explanation:
The bibliography page contains some formatting errors which should be corrected before it is standard and acceptable.
First of all, in MLA (and most other styles), it is important to double space each citation to make them easily readable and eliminate errors.
Next, the citation entries needs to be in alphabetical order and not random which makes it easy to find a source.
Also, there needs to be indentation in the second and third lines of the last entry.
Answer:
B,C,E is the answer
Explanation:
I got it right on test...
sorry if its too late
Hope it helps someone else :D
What is the best prediction she could make about this
semester's text?
Natalia's class read Shakespeare's Romeo and Juliet
last semester and took a field trip to see it performed
live in a community theater. Today, Natalia learned that
her class will read another work by Shakespeare this
semester
It is a play.
It is an adventure.
It is a fairy tale.
It is a fable.
Answer:its a play
Explanation:
Answer:
A. It is a play
Explanation:
Got the answer correct on the quiz
A network the size of the Internet requires DNS services in order to function. Discuss the advantages and disadvantages of implementing DNS relative to the size of the network.
Answer:
Advantages
Host Naming : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocolsDisadvantages
Host Naming : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local namingExplanation:
Advantages
Host Naming : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocolsDisadvantages
Host Naming : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naminganswer 1 question and get 10 points in return
Answer:
3
Explanation:
sorry if I'm wrong...it's been a while since I took a coding class.
Ask the user how many numbers for which they want to calculate the sum. Using a for loop, prompt the user to enter that many numbers, one-by-one, keeping track of the sum. At the end, after the user entered all numbers, output the sum.
n = int(input("How many numbers do you want to sum? "))
total = 0
for x in range(n):
total += int(input("Enter a number: "))
print("Sum: "+str(total))
I hope this helps!
Following are the program to the given question:
Program Explanation:
Defining a variable "Sum" that holds an integer value.In the next step, a variable "t" is defined that uses the input method to input a value from the user-end.After the input value, a for loop is declared that takes the range of the t variable.Inside the loop, another variable "n" is defined that inputs value from user-end and use the "Sum" variable to add its value.Outside the loop, a print method has been used that prints the sum variable in the string with the message.Program:
Sum = 0#defining a variable sum that hold an integer value
t= int(input("Enter the total number you want to add: "))#defining a t variable that input value from user-end
for i in range(t):#defining a loop that add inputs values from above user-input range
n= int(input("Enter value "+str(i+1)+": "))#defining loop that inputs n value
Sum += n; #defining sum variable that adds user-input value
print("Sum of entered number: "+str(Sum))#using print method that print added value
Output:
Please find the attached file.
Learn more:
brainly.com/question/16025032
describe PROM, EPROM and EEPROM memories
Answer:
Explanation:
PROM is a Read Only Memory (ROM) that can be modified only once by a user while EPROM is a programmable ROM that can be erased and reused. EEPROM, on the other hand, is a user-modifiable ROM that can be erased and reprogrammed repeatedly through a normal electrical voltage.
Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs will be most helpful?
A. counter module
B. while loop
C. for loop
D. mean module
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is A: counter module.
Counter module in python or Python counter is a container that holds the count of each of the elements present in the container. It is a sub-class available in the dictionary class. Jamal can use this module in Python to write a program that will find the 10 most common words in Romeo and Juliet.
Other options are not correct because:
While loop: while loop only iterates its body until a specific condition is met. For loop is used to iterate to a pre-specified condition and iterate until the condition is reached. While the mean module of Python is used to calculate mean and average.
Write a program that creates an integer array with 40 elements in it. Use a for loop to assign values to each element of the array so that each element has a value that is triple its index. For example, the element with index 0 should have a value of 0, the element with index 1 should have a value of 3, the element with index 2 should have a value of 6, and so on.
Answer:
public class Main
{
public static void main(String[] args) {
int[] numbers = new int[40];
for (int i=0; i<40; i++){
numbers[i] = i * 3;
}
for (int i=0; i<40; i++){
System.out.println(numbers[i]);
}
}
}
Explanation:
*The code is in Java.
Initialize an integer array with size 40
Create a for loop that iterates 40 times. Inside the loop, set the number at index i as i*3
i = 0, numbers[0] = 0 * 3 = 0
i = 1, numbers[1] = 1 * 3 = 3
i = 2, numbers[2] = 2 * 3 = 6
.
.
i = 39, numbers[39] = 39 * 3 = 117
Create another for loop that iterates 40 times and prints the values in the numbers array
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.
What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?
Answer:
You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.
It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.
Write a function named minMax() that accepts three integers arguments from the keyboard and finds the smallest and largest integers. Include the function minMax() in a working program. Make sure your function is called from main().Test the function by passing various combinations of three integers to it.
Answer:
public class Main
{
public static void main(String[] args) {
minMax(1, 2, 3);
minMax(100, 25, 33);
minMax(11, 222, 37);
}
public static void minMax(int n1, int n2, int n3){
int max, min;
if(n1 >= n2 && n1 >= n3){
max = n1;
}
else if(n2 >= n1 && n2 >= n3){
max = n2;
}
else{
max = n3;
}
if(n1 <= n2 && n1 <= n3){
min = n1;
}
else if(n2 <= n1 && n2 <= n3){
min = n2;
}
else{
min = n3;
}
System.out.println("The max is " + max + "\nThe min is " + min);
}
}
Explanation:
*The code is in Java.
Create a function named minMax() that takes three integers, n1, n2 and n3
Inside the function:
Declare the min and max
Check if n1 is greater than or equal to n2 and n3. If it is set it as max. If not, check if n2 is greater than or equal to n1 and n3. If it is set it as max. Otherwise, set n3 as max
Check if n1 is smaller than or equal to n2 and n3. If it is set it as min. If not, check if n2 is smaller than or equal to n1 and n3. If it is set it as min. Otherwise, set n3 as min
Print the max and min
Inside the main:
Call the minMax() with different combinations
write aemail to brother for laptop for vitrual classes
Answer:
If I were to ask my brother for a laptop, I would go:
Hey, can I have your laptop? I need it for online classes.
Sincerely, [my name]
What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control people. It was either on netflix or hulu
Answer:Raising Dion?
Explanation:
Was it Raising Dion?
how do you keep word from trying to capitalize every isolated letter "i"
Computer Architecture
1. Define what a "word" is in computer architecture:
A. The size (number of bits) of the address
B. The total number of bits of an instruction (e.g. 16 bits)
C. Word and width are synonymous.
D. A word is the contents of a memory register.
2. What is the difference between a register’s width and a register’s address? (choose all that apply - there may be more than one correct answer)
A. They are both the same!
B. Address is the same for all registers, width is unique for each register.
C. Width is the amount of data a single register holds, address is the location of the register within a larger chip.
D. The address bits of a register is a logarithm of its width.
3. Which of the following is NOT implemented by the Program Counter?
A. Set the counter to 0.
B. Increase the counter by 1.
C. Decrease the counter by 1.
D. Set the counter to any input value.
4. What is the relationship between the size of the address (number of bits) and the word size for memory registers?
A. address bits = 2^(word size)
B. address bits = word size ^ 2
C. address bits = word size
D. address bits = log2(word size)
E. address bits = (word size) / 2
Answer:
BADDA
Explanation:
BIIING
Dance dance1 = new Dance("Tango","Hernandos Hideaway");
Dance dance2 = new Dance("Swing","Hound Dog");
System.out.println(dance1.toString());
System.out.println(dance2.toString());
class Dance
{
private String name;
private String song;
public Dance(String name, String s)
{
this.name = name;
song = s;
}
public String toString()
{
return name + " " + song;
}
}
What is printed when the program is executed?
a
null null
null null
b
Hernandos Hideaway null
Hound Dog null
c
null null
Swing Hound Dog
d
Tango Hernados Hideaway
Swing Hound Dog
e
null Hernandos Hideaway
null Hound Dog
Answer:
The output of the program is (d)
Tango Hernados Hideaway
Swing Hound Dog
Explanation:
Analyzing the given code segment
In class Dance,
A method named dance was defined with an instance of two string variables/values
which are name and song
public Dance(String name, String s)
In the main of the program,
The first line creates an instance of Dance as dance1
dance1 is initialized with the following string values: "Tango","Hernandos Hideaway"
- The first string value "Tango" will be passed into the name variable of the Dance method
- The second string value "Hernandos Hideaway" will be passed into the song variable of the Dance method
Next, another instance of Dance is initialized as dance2
dance2 is initialized with the following string values: "Swing","Hound Dog"
- The first string value "Swing" will be passed into the name variable of the Dance method
- The second string value "Hound Dog" will be passed into the song variable of the Dance method
On line 3 of the main: System.out.println(dance1.toString());
The values of dance1, which are "Tango","Hernandos Hideaway" are printed
On line 4 of the main: System.out.println(dance2.toString());
The values of dance1, which are "Swing","Hound Dog" are printed
Hence, option d answers the question
Let f(w) = 2w^3 - 5. Let z = 2. What is f(z)?
Answer:
Hence f(z)=11
*This is what i think*
Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B
Answer:
The answer is D. A and B
Explanation:
I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.
Answer: The answer is D. A and B
Explanation: I took this test 5 mins ago and it was right.
Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
Answer:
Explanation:
public class RecursiveCalls {
public static void backwardsAlphabet(char currLetter) {
if (currLetter == 'a') {
System.out.println(currLetter);
}
else {
System.out.print(currLetter + " ");
backwardsAlphabet(--currLetter);
}
return;
}
public static void main (String [] args) {
char startingLetter = '-';
startingLetter = 'z';
// Your solution goes here
backwardsAlphabet(startingLetter);
return;
}
}
what is the CPU's role?
Answer:
The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program. The computer industry used the term "central processing unit" as early as 1955.
Answer:
The Cpu is like the brain of the computer it's responsible for everything from running a program to solving a complex math equation.
Which of the following server types is in the form of a single circuit board?
a. blade
b. tower
O c. rack
O d. dedicated
o
Answer:
A. Blade
Explanation:
Server Blade means a complete computer system on a single board which includes one or more CPUs, memory, operating system, network connections, and typically includes access to hard drives or other mass storage devices. A Server Blade is designed to be inserted into a space-saving rack, and each rack may contain a number of Server Blades served by one or more power supplies.
If this is multiple choice, a dedicated server can be too.
Consider an instruction within a certain instruction-set architecture (ISA): ADD R1, R2, R3. This instruction adds the value in Register R1 with the value in Register R2, and stores the result in Register R3. What is the maximum number of physical memory accesses that may be caused by this single instruction?
a) 1
b) 2
c) 3
d) 4
Answer:
C = 3
Explanation:
The maximum number of physical memory accesses that may be caused by this single instruction is ; 3
This is because In the case of loading two values into R2 and R3 there is need for their memories to be accessed and after execution R1 value there will be a write back into memory hence another memory is also accessed and that makes the number of Physical memories accessed to be three(3) in Total
Endnotes are indicated by
A. lowercase letters (a, b, c)
B. numbers (1, 2, 3)
C. Roman numerals (i, il, ill)
D. uppercase letters (A, B, C)
They
Answer:
The answer is D because u have the uppercase letter bold
Answer:
Endnotes are actually indicated by Roman Numerals so option C is correct.