Answer:
hold down CTRL + Z and it will reverse to the last action
An integrated circuit RAM chip has a capacity of 512 words of 8 bits each where the words are organized using a one-dimensional layout.a) How many address lines are there on the chip?b) How many such chips would be needed to construct a 4Kx16 memory?c) How many address and data lines needed for a 4Kx16 memory?#addresss lines = #data lines =
Answer:
A. 9
B. 16
C. Number of addresses = 12 number of data lines = 16
Explanation:
The capacity of this chip is 512 x 8
That is 512 words and these words have 8 bits
A. The number of the address lines would be
log2(512) = 2⁹
So the answer is 9
B. The total number of chips required
= 512 x 8 = 4096
(4096 x 2)/ 512 = 16
C. Number of address = log4092 = 2¹²
= 12
The number of data lines = 8x2 = 16
Thank you!
The Painting Company has determined that for every 112 square feet of wall space:
One gallon of paint at $9.53 per gallon is required if total square feet is 2000 or less. If square footage is greater than 2000, paint is $10.50 per gallon.
8 hours of labor at $35 per hour is required.
A hazardous material disposal fee of 7.5% of the total paint cost is required.
Create a function called paintJobCost which allows the user to provide the total number of square feet for the paint job and produces an itemized list of charges that includes:
Number of gallons of paint required.
Total Cost of the Paint (Paint Cost x Gallons Required)
Hours of labor required to paint (8 hrs per 112 sq ft)
Total Cost of the Labor.
The hazardous material fee.
The total cost of the paint job. (Paint Cost + Labor Cost + Hazardous Material fee)
Your function, when called, must display all the above information exactly as shown below.
Expected Output
Call the paintJobCost function where the total square footage of the paint job is 1800. Square Footage Paint Required Paint Cost 16.07 gal $153.16 Labor Hours 128.57 hrs Labor Cost $4,500.00 Hazard Fee $11.49 TOTAL COST OF PAINT JOB $4,664.65 Call the paintjobCost function where the total square footage of the paint job is 2700. Square Footage Paint Required 2700 24.11 gal Paint Cost $253.12 Labor Hours 192.86 hrs Labor Cost $6,750.00 Hazard Fee $18.98 TOTAL COST OF PAINT JOB $7,022.11 Call the paintJobCost function where the total square footage of the paint job is 3200. Square Footage Paint Required Paint Cost 3200 28.57 gal $300.00 Labor Hours 228.57 hrs Labor Cost $8,000.00 Hazard Fee $22.50 TOTAL COST OF PAINT JOB $8,322.50
Answer:
Answered below
Explanation:
#Program is written in Python.
sq_feet = int(input ("Enter paint area by square feet: ")
gallons = float(input (" Enter number of gallons: ")
paint_job_cost(sq_ft, gallons)
#Function
def paint_job_cost(sq_ft, gal){
gallon_cost = 0
cost_per_hour = 35
if sq_ft <= 2000:
gallon_cost = 9.53
else:
gallon_cost = 10.50
paint_cost = gal * gallon_cost
labour_hours = 8 * (sq_ft/112)
total_labour_cost = labour_hours * cost_per_hour
hazard_fee = 0.075 * paint_cost
total_cost = paint_cost + total_labour_cost + hazard fee
print (paint_cost)
print(labour_hours)
print (total_labour_cost)
print (hazard_fee)
print(total_cost)
}
jo.in Goo.gle meet the code/rhk-rvet-tdi
Answer:
nah
Explanation:
cuz ion wanna
Suppose a byte-addressable computer using set-associative cache has 2 16 bytes of main memory and a cache size of 32 blocks and each cache block contains 8 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache; that is, what are the size of the tag, set, and offset fields
Answer:
Following are the responses to these question:
Explanation:
The cache size is 2n words whenever the address bit number is n then So, because cache size is 216 words, its number of address bits required for that cache is 16 because the recollection is relational 2, there is 2 type for each set. Its cache has 32 blocks, so overall sets are as follows:
[tex]\text{Total Number of sets raluired}= \frac{\text{Number of blocks}}{Associativity}[/tex]
[tex]=\frac{32}{2}\\\\ =16\\\\= 2^4 \ sets[/tex]
The set bits required also are 4. Therefore.
Every other block has 8 words, 23 words, so the field of the word requires 3 bits.
For both the tag field, the remaining portion bits are essential. The bytes in the tag field are calculated as follows:
Bits number in the field tag =Address Bits Total number-Set bits number number-Number of bits of words
=16-4-3
= 9 bit
The number of bits inside the individual fields is therefore as follows:
Tag field: 8 bits Tag field
Fieldset: 4 bits
Field Word:3 bits
the device that store data and program for current purpose
Answer:
A computer, what you are using. smh.
Answer:
Podría ser el teléfono porque puedes almacenar imágenes de datos depende del almacenamiento interno que pueda contener el dispositivo no.
Explanation:
Por ejemplo en este tiempo depende mío puede almacenar la clases miércoles y 3 cosas de aprendizaje y la formación de nuevas personas con valores y virtudes en el ámbito social político y económico.
Gracias.
#cuidemonosdesdecasa.
Many companies use telephone numbers like 555-GET-FOOD so the number is easier for their customers to remember. On a standard telephone, the alphabetic letters are mapped to numbers in the following fashion: A, B, and C = 2 D, E, and F = 3 G, H, and I = 4 J, K, and L = 5 M, N, and O = 6 P, Q, R, and S = 7 T, U, and V = 8 W, X, Y, and Z = 9 Write a program that asks the user to enter a 12-character telephone number in the format: XXX-XXX-XXXX. Acceptable characters (X's) are A-Z and a-z. Your program should check for: The length of the phone number is correct. The dashes are included and are in the correct positions. There are no characters in the illegal characters in the string. The application should display the telephone number with any alphabetic characters that appeared in the original translated to their numeric equivalent. If the input string is not entirely correct then you should print an error message. For example, if the user enters 555-GET-FOOD the program should display 555-438-3663. If the user enters 123-456-7890, the program should display 123-456-7890. Rules: You must have one function (in addition to main()) that converts an alphabetic character to a digit. Or you can have one function that coverts all characters to digits. You can make your own function or use a built-in function if one exists.
Answer:
The program in Python is as follows:
def convertt(phone):
splitnum = phone.split ('-')
valid = True
count = 0
err = ""
numphone = ""
if len(phone) != 12:
err = "Invalid Length"
valid = False
elif phone[3] != '-' or phone[7] != '-':
err = "Invalid dash [-] location"
valid = False
while valid== True and count < 3:
for ch in splitnum[count]:
if ch.isdigit():
numphone += ch
elif ch.upper()in 'ABC':
numphone += '2'
elif ch.upper()in 'DEF':
numphone += '3'
elif ch.upper()in 'GHI':
numphone += '4'
elif ch.upper() in 'JKL':
numphone += '5'
elif ch.upper()in 'MNO':
numphone += '6'
elif ch.upper()in 'PQRS':
numphone += '7'
elif ch.upper()in 'TUV':
numphone += '8'
elif ch.upper()in 'WXYZ':
numphone += '9'
else:
valid = False
err = "Illegal character in phone number"
if count!=2:
numphone += '-'
count += 1
if valid == False:
print (err)
else:
print ("Phone Number", numphone)
phone = input("Phone number: ")
convertt(phone)
Explanation:
See attachment for complete source code where comments are used for explanation
"Why do the linked stack and queue implementations not include iterators, as in the linked list classes of Chapter 16? Are there cases in which a stack or queue might need to be traversed privately, even if access cannot be provided publicly? If so, should an iterator be used for these cases?"
Answer:
Explanation:
A linked stack is a LIFO (last in, first out) while a queue is a FIFO (first in, first out) data structure. This means that you can only access and modify the first or last elements of the stack or queue repectively. Therefore, there is no use for iterators in such a data structure which is why they do not exist. Iterators are mainly for traversing sequential access or random access within the given data structure which is not possible with these data structures, but is possible with lists. A stack or queue would either be made automatic so that it is completely private or simply made public so that it can be accessed by other methods and classes, regardless iterators would not be used.
10.11 LAB: Pet information (derived classes) The base class Pet has private data members petName, and petAge. The derived class Dog extends the Pet class and includes a private data member for dogBreed. Complete main() to: create a generic pet and print information using PrintInfo(). create a Dog pet, use PrintInfo() to print information, and add a statement to print the dog's breed using the GetBreed() function.
Answer:
Answered below.
Explanation:
//Program in Java
Class Test{
public static void main (String[] args){
//create a pet object
Pet pet = new Pet();
//call pet object's printInfo method
pet.printInfo();
//create a new Dog object
Dog dog = new Dog();
//dog can access the printInfo method of the Pet class because it derives from it
dog.printInfo();
//dog can also call it's private method.
dog.getBreed();
}
}
ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP ASAP NEED HELP
Answer:
10.b
11.c
12.c
13.a
14.d
15.b
16.c
Explanation:
please brainleist please ♨️❤☺️☻
Name 4 components of a components system
If you were able to earn interest at 3% and you started with $100, how much would you have after 3 years?
109
A= Amount+ interest *sb
interest=P×r×t/100
100×3×3/100
100 cancel 100=3×3=$9
100+9=109
Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language - Java. Complete the Avengers Registry class. Ex. if input is Steven Rogers Captain America 105 4 Then output should be: Name: Steven Rogers, Age: 105, Alias: Captain America, Security Clearance Level: 4 2892227722684 3z0y7 LAB ACTIVITY 11.6.1: miniLab: Avengers Initiative 0/10 Current file: Avengers Registry.java Load default template... 1 import java.util.Scanner; 2 Current file Avengers Registry.java Load de 1 import java.util.Scanner; 2 3 public class Avengers Registry { 4 5 6 7 8 public static Avenger createAvenger (Scanner scnr){ String name; int age; String alias, int clearance; 9 10 Avenger avenger = new Avenger(); name = scnr.nextLine(); alias = scnr.nextLine(); age = scnr.nextInt(); clearance = sonr.nextInt(); // your code here 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 return avenger; } public static void main(String[] args) { Scanner scnr = new Scanner(System.in); // your code here } File is marked as read only Current file: IndividualData.java 1 public class IndividualData { 2 private String name; 3 private int age; 4 5 public void setIndividualName(String individualName) { 6 name = individualName; 7 8 9 public String getIndividualName() { 10 return name; 11 } 12 13 14 public void setIndividualAge (int inYears) { 15 age = inYears; 16 } 17 18 public int getIndividualAge() { 19 return age; 20 } 21 22 public void printDetails() { 23 System.out.print("Name: + name); 24 System.out.print(", Age: + age) 25 } 26 H File is marked as read only Current file: Avenger.java 1 public class Avenger extends IndividualData { 2. private int securityClearance; 3 private String alias; 4 5 public void setSecurityClearance(int secLevel) { 6 securityClearance = secLevel; } 8 9 public int getSecurityClearance(){ 10 return securityClearance; 11 12 13 public void setAlias (String a) { 14 15 } 16 17 public String getAlias() { 18 return alias; 19 3 20 21 } alias = a;
eh I think yes I think. Maybe
Create a map using the Java map collection. The map should have 4 entries representing students. Each entry should have a unique student ID for the key and a student name for the element value. The map content can be coded in directly, you do not have to allow a user to enter the map data. Your program will display both the key and the value of each element.
Answer:
In Java:
import java.util.*;
public class Main{
public static void main(String[] args) {
Map<String, String> students = new HashMap<>();
students.put("STUD1", "Student 1 Name");
students.put("STUD2", "Student 2 Name");
students.put("STUD3", "Student 3 Name");
students.put("STUD4", "Student 4 Name");
for(Map.Entry m:students.entrySet()){
System.out.println(m.getKey()+" - "+m.getValue()); }
}}
Explanation:
This creates the map named students
Map<String, String> students = new HashMap<>();
The next four lines populates the map with the ID and name of the 4 students
students.put("STUD1", "Student 1 Name");
students.put("STUD2", "Student 2 Name");
students.put("STUD3", "Student 3 Name");
students.put("STUD4", "Student 4 Name");
This iterates through the map
for(Map.Entry m:students.entrySet()){
This prints the details of each student
System.out.println(m.getKey()+" - "+m.getValue()); }
HLOOKUP is used for Horizontal Data look ups while VLOOKUP is for Vertical Data look ups
Select one:
True
False
Answer:
True
Explanation:
Both HLOOKUP and VLOOKUP are excel functions used for searching through tables for a specified lookup value to either get an exact or approximate match. The VLOOK and HLOOKUP functions have identical syntax which only differs with the HLOOKUP requiring the row index number to search through the rows while, VLOOKUP requires the column index number to search through the columns. Other than this difference, the other syntax values are the same.
VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])
HLOOKUP(lookup_value, table_array, row_index_num, [range_lookup])
which benefit does the cloud provide to star-up companies without access to large funding?
Explanation:
Start-up companies can store, manage, process data and use programs through a web-based interface – something that greatly reduces costs. Data stored in the cloud can be accessed from anywhere through various devices with web connectivity, which is an advantage for small companies that don't have a huge IT budget.
Cloud provides storage access and management for files and information using a the cloud computing provider. This could help reduce the cost expended on physical content storage devices.
The cost of purchasing storage devices to habor information and data may be daunting for new startups with little capital. The cloud computing framework is a cheaper alternative, yet provides easier accessibility at all times.Hence, the cloud could in the cost expended on physical storage.
Learn more : https://brainly.com/question/22841107
Mathilda’s computer has been running slow the past few months. She observed that the system unit becomes too hot. What does she need to do to fix this issue?
A.
She needs to make sure that the keyboard and mouse are properly connected.
B.
She needs to install antivirus software.
C.
She needs to delete unwanted files from her hard disk.
D.
She needs to clean the dust from the system unit fan.
Answer:
The answer is D
Explanation:
For a single CPU core system equipped wiith addditional hardware modes (besides user and kernel), choose those items that are examples of the possible usage of the additional modes.
1. Data parallelism
2. Enhanced user security policy, such as user groups, so that group members may execute other group members' programs
3. Task parallelism
4. USB device driver support outside of kernel mode
Answer:
Task parallelism
Explanation:
The Task parallelism is most popularly known as the function parallelism and the control parallelism. In the computer codes, it is the form of a parallelism across the multiple processors in a parallel computing environments. It focusses on distributing the task that are concurrently performed by the threads or the processors.
For the single CPU core system that is equipped with an additional hardware modes, the task parallelism is one of the example of the usage oh a additional modes.
1. What are the main features of IEEE 802.3 Ethernet standard?
Answer:
Single byte node address unique only to individual network. 10 Mbit/s (1.25 MB/s) over thick coax. Frames have a Type field. This frame format is used on all forms of Ethernet by protocols in the Internet protocol suite.
Explanation:
802.3 is a standard specification for Ethernet, a method of packet-based physical communication in a local area network (LAN), which is maintained by the Institute of Electrical and Electronics Engineers (IEEE). In general, 802.3 specifies the physical media and the working characteristics of Ethernet.
Which of the following are examples where AI is now used in daily life? Select all that apply.
Group of answer choices
professional wrestling
video game development
banking and financial services
postal and shipping services
customer service industry
Yoga
Answer:
Video game development .
Banking and financial services.
Postal and shipping services.
Customer service industry.
Explanation:
Artificial Intelligence is called the set of computer programs that, inserted in certain objects or systems, automate processes in such a way that they carry out certain actions in an "intelligent" way, that is, processing different variables through algorithms to respond correctly to the user need.
A clear example of artificial intelligence occurs in the case of homebanking, where a person can transfer money from their bank account through a mobile application that manages their bank account remotely.
5.10 (Find the highest score) Write a program that prompts the user to enter the number of students and each student's score, and displays the highest score.
Please help me!
Answer:
Python Program for the task.
#Ask the user to input the number of students
n = int(input("Please enter the number of students:\n"))
print()
#Get students' scores
for i in range(n):
score_list = [ ] #placeholder for score
i = float(input("Please enter student's score:"))
score_list.append(i) # append student score
#print the highest score
print("The highest score is",max(score_list))
When adding delegates to his mailbox, which role should Joel use if he would like the user to be able to read and create items in a particular folder?
- editor
- publishing editor
- author
- manager
Answer:
publishing editor
Explanation:
In this scenario, the role that he should choose for the delegates would be publishing editor. This role will allow them to create, read, modify, and delete all items within a given folder, and create subfolders. The other options listed either do not give access to create/modify existing files or simply only give all these rights with files that the user creates but not files that already existed in the folder. Therefore, this would be the best role for what Joel wants to accomplish.
how can you hack on a cumputer witch one chrome hp
Answer:
http://www.hackshop.org/levels/basic-arduino/hack-the-chromebook
Explanation:
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
Describe a problem you’ve solved or a problem you’d like to solve. It can be an intellectual challenge, a research query, an ethical dilemma — anything of personal importance, no matter the scale. Explain its significance to you and what steps you took or could be taken to identify a solution.
Answer:
Explanation:
I run an online e-commerce store and lately its been very difficult keeping track of customer detail, incoming orders, keyword generation etc. One solution that I thought about would be an application that controls all of that for me. In order to accomplish this I would first need to design and create a GUI that contains all of the necessary buttons and displays for the information. Then I would need to code a webscraper using Python to grab all of the data from e-commerce store as soon as it becomes available, organize it, and display it within the GUI.
As of Spring 2020, in otder to get into the CS major, you must have a 3.0 GPA or better in cs120, cs210, and cs245. In this problem, you should write one function named get_gpa, which will calculate this GPA. This function should have one parameter, which will be a dictionary of grades in computer science courses. You can assume that the dictionary will always have the keys 'cs120', 'cs210', and 'cs245', but it also might contain some names of other courses too. The values associated with each key will be a float representeing the GPA-style grade for that class. For instance, the parameter dictionary might look like: {'cs120':4.0 'cs245':3.0, 'cs210':2.0}. Some examples:
get_gpa({'cs110': 4.0, 'cs245':3.0, 'cs335':4.0, 'cs120':3.0, 'cs210':3.0}) should return 3.0.
get_gpa({'cs110': 4.0, 'cs120':3.0, 'cs245':2.0, 'cs210':1.0}) should return 2.0.
get_gpa({'cs245':4.0, 'cs120':3.0, 'cs245':2.0}) should return 3.0.
Make sure to include only the one function in your file.
Answer:
The function is as follows:
def get_gpa(mydict):
gpa = 0
kount = 0
for course_code, gp in mydict.items():
if course_code == 'cs120' or course_code == 'cs210' or course_code == 'cs245':
gpa += float(gp)
kount+=1
return (gpa/kount)
Explanation:
This defines the function
def get_gpa(mydict):
This initializes gpa to 0
gpa = 0
This initializes kount to 0
kount = 0
This iterates through the courses
for course_code, gp in mydict.items():
If course code is cs120 or cs210 or cs245
if course_code == 'cs120' or course_code == 'cs210' or course_code == 'cs245':
The gpa is added
gpa += float(gp)
And the number of courses is increased by 1
kount+=1
This returns the gpa
return (gpa/kount)
What is the codebook?
Python dictionary of code shortcuts
Standard survey shorthand codes
Documentation of the survey questions, the design of the study and the encoding of the responses
General term for development code books
Answer:
Option C
Explanation:
A codebook gives following information
a) Content
b) Structure of the codebook
c) Layout of the data collected
In general it is a document that contain information about the purpose and format of the codebook along with the methodological details.
Hence, Option C is correct
what is this....... Iam booking train to patna.
Log onto the Internet and use a search engine to find three Web sites that can be models for the new site. (At least one should sell sporting goods.) For each site you selected, list the URLs in your document. Tell why you chose them. Navigate to the three sites you choose and take notes about at least three things you like and don’t like about the sites.
Please see the following file for your required answer, thank you.
Which of these skills are used in game design?
Writing, Project Management, Drawing and artistic visualization, all of the above
Answer:
I think the answer is Writing but am not sure
Scenario
You are the IT administrator for a small corporate network. You're repairing the computer in the Support Office, which appears to have a failed power supply. After testing the power supply and confirming the failure, you removed it from the computer. Now you need to select a replacement power supply. In this lab, your task is to complete the following: Install a power supply based on the following requirements:
The power supply must have the appropriate power connectors for the motherboard and the CPU. Make sure the power supply you select will support adding a graphics card that requires its own power connector.
Make the following connections from the power supply:
Connect the motherboard power connector.
Connect the CPU power connector.
Connect the power connectors for the SATA hard drives.
Connect the power connector for the optical drive.
Plug the computer in using the existing cable plugged into the power strip.
Turn on the power supply. Start the computer and boot into Windows.
Answer:
Explanation:
The following connections will need to be done once the power supply is fully installed inside the case and make sure to discharge any built up electricity from you body by using an anti-static bracelet if available.
Connect the motherboard power connector: This requires a 20 pin + 4 pin connector and is usually located in the middle right side of the motherboard.
Connect the CPU power connector: This requires a 4-pin connector and is located in the top right corner on most motherboards
Connect the power connectors for the SATA hard drives: These require sata cables which are small thin and flat cables and whose motherboard connectors are usually located near the motherboard power connector.
Connect the power connector for the optical drive: The power connectors are thick flat and have 4 round entry pins inside, connect this to the back of the cd-drive which should be located in the drive bay of the pc-case.
Plug the computer in using the existing cable plugged into the power strip: simply plug the computer power connector into the case and then the powerstrip
Turn on the power supply. Start the computer and boot into Windows: turn on the pc by pressing the power button and then press the F8 key on the keyboard to enter the boot options. From here choose the drive that has Windows installed on it in order to enter the Windows OS.
Consider the following incomplete method. Method findNext is intended to return the index of the first occurrence of the value val beyond the position start in array arr. I returns index of first occurrence of val in arr /! after position start; // returns arr.length if val is not found public int findNext (int[] arr, int val, int start) int pos = start + 1; while condition '/ ) pos++ return pos; For example, consider the following code segment. int [ ] arr {11, 22, 100, 33, 100, 11, 44, 100); System.out.println(findNext (arr, 100, 2)) The execution of the code segment should result in the value 4 being printed Which of the following expressions could be used to replace /* condition */ so that findNext will work as intended?
(A) (posarr.length) &&(arr [pos]- val)
(B) (arr [pos] != val) && (pos < arr. Îength)
(C) (pos
(D) (arr [pos} == val) && (pos < arr. length)
(E) (pos
Answer:
B)
Explanation:
The while loop runs as long as two conditions are satisfied, as indicated by the && logical operator.
The first condition- arr[pos] != val
checks to see if the value in the array index, pos, is equal to the given value and while it is not equal to it, the second condition is checked.
The second condition(pos < are.length), checks to see if the index(pos) is less than the length of the array. If both conditions are true, the program execution enters the while loop.
The while loop is only terminated once arr[pos] == Val or pos == arr.length.