Answer:
22
is Tom's age.
Explanation:
Since userAge is initialized as 22, 22 will be displayed in a line. Then, since there is a "\n" which means go the new line, the program will display in the new line. is will be displayed. Since userName is initialized as Tom, Tom will be displayed. Then 's age. will be displayed in the same line.
Oops, we made a mistake: we created a key "short" and gave it the value "tall", but we wanted to give it the value "long" instead. Write the line of code that will change the value associated with the key "short" to "long". Be consistent in whether you use single or double quotes to declare your strings: our autograder assumes you'll be consistent.
Answer:
Using java
//assuming that hashmap object name is ChangeMap
ChangeMap. replace("short", "long");
System.out.println("New HashMap: "
+ ChangeMap.toString());
Explanation:
From the above we have used the replace method to replace the value of the "short" key in the hashtable with "long" instead of the previous value "tall". We have used the printed the hashtable to the console using println and the ".toString()" method that we added to the function's parameter.
A large population of ALOHA users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in units of 40 msec.
Required:
a. What is the chance of success on the first attempt?
b. What is the probability of exactly k collisions and then a success?
c. What is the expected number of transmission attempts needed?
Answer:
The answer is below
Explanation:
Given that:
Frame transmission time (X) = 40 ms
Requests = 50 requests/sec, Therefore the arrival rate for frame (G) = 50 request * 40 ms = 2 request
a) Probability that there is success on the first attempt = [tex]e^{-G}G^k[/tex] but k = 0, therefore Probability that there is success on the first attempt = [tex]e^{-G}=e^{-2}=0.135[/tex]
b) probability of exactly k collisions and then a success = P(collisions in k attempts) × P(success in k+1 attempt)
P(collisions in k attempts) = [1-Probability that there is success on the first attempt]^k = [tex][1-e^{-G}]^k=[1-0.135]^k=0.865^k[/tex]
P(success in k+1 attempt) = [tex]e^{-G}=e^{-2}=0.135[/tex]
Probability of exactly k collisions and then a success = [tex]0.865^k0.135[/tex]
c) Expected number of transmission attempts needed = probability of success in k transmission = [tex]e^{G}=e^{2}=7.389[/tex]
Boolean expressions control _________________ Select one: a. recursion b. conditional execution c. alternative execution d. all of the above
Answer:
Option D, all of the above, is the right answer.
Explanation:
A Boolean expression is an expression in Computer Science. It is employed in programming languages that create a Boolean value when it is evaluated. There may be a true or false Boolean value. These expressions correspond to propositional formularies in logic. In Boolean expression, the expression 3 > 5 is evaluated as false while 5 > 3 is evaluated as true
Boolean expressions control all of the above method execution and as such option d is correct.
What is Boolean expressions?A Boolean expression is known to be a kind of logical statement that is said to be one of the two options that is it can be TRUE or FALSE .
Conclusively, Note that Boolean expressions are used to compare two or more data of any type only if both parts of the expression have equal basic data type. Boolean expressions control recursion, conditional execution and alternative execution.
Learn ore about Boolean expressions from
https://brainly.com/question/25039269
If the current date is Monday, February 26, 2017, what will be displayed by the alert dialog box after the following code executes? var thisDay = new Date(); alert(thisDay.toDateString());
Answer:
Mon Feb 26 2017
Explanation:
Since the current date is considered as Monday, February 26, 2017, thisDay will be set to that value.
The toDateString() method returns the first three letters of the name of the day (The first letter is capitalized), the first three letters of the name of the month (The first letter is capitalized), the day of the month as an integer, and the year as an integer (There are spaces between all)
Assuming a Stop-and-Wait system, if the bandwidth-delay product of a channel is 500 Mbps and 1 bit takes 25 milliseconds to make the roundtrip, what is the bandwidth-delay product? If the data packets are 2500 bits in length, what is the utilization?
Answer:
Bandwidth delay product = 2500 Kbits
Utilization = 0.02%
Explanation:
We proceed as follows;
From the question, we are given that
band width = 500 Mbps
The bandwidth-delay product is = 500 x 10^6 x 25 x 10^-3
= 2500 Kbits
The system can send 12500 Kbits during the time it takes for the data to go from the sender to the receiver and then back again.
However, the system sends only 2500 bits.
The the link utilization =
2500/(12500 x 10^3) = 0.02%
If distances are recorded as 4-bit numbers in a 500-router network, and distance vectors are exchanged 3 times/second, how much total bandwidth (in bps) is used by the distributed routing algorithm
Answer:
A total of 6,000 bps of bandwidth is used by the distributed routing algorithm
Explanation:
This is a bandwidth requirement question.
We proceed as follows;
To calculate the total number of bits for a routing table, we use the following formula;
Routing table=Number of routers * length of cost
we are given the following parameters from the question;
Number of routers = 500
length of cost = 4 bits
Routing table = 500*4
=2000
Hence, a routing table is 2000 bits in length.
Now we proceed to calculate the bandwidth required on each line using the formula below;
Bandwidth = no.of seconds * no.of bits in routing table
Bandwidth required on each line = 3*2000
=6000
Do Exercise 6.4 from your textbook using recursion and the is_divisible function from Section 6.4. Your program may assume that both arguments to is_power are positive integers. Note that the only positive integer that is a power of "1" is "1" itself. After writing your is_power function, include the following test cases in your script to exercise the function and print the results: print("is_power(10, 2) returns: ", is_power(10, 2)) print("is_power(27, 3) returns: ", is_power(27, 3)) print("is_power(1, 1) returns: ", is_power(1, 1)) print("is_power(10, 1) returns: ", is_power(10, 1)) print("is_power(3, 3) returns: ", is_power(3, 3))
Answer:
Here is the python method:
def is_power(n1, n2): # function that takes two positive integers n1 and n2 as arguments
if(not n1>0 and not n2>0): #if n1 and n2 are not positive integers
print("The number is not a positive integer so:") # print this message if n1 and n2 are negative
return None # returns none when value of n1 and n2 is negative.
elif n1 == n2: #first base case: if both the numbers are equal
return True #returns True if n1=n2
elif n2==1: #second base case: if the value of n2 is equal to 1
return False #returns False if n2==1
else: #recursive step
return is_divisible(n1, n2) and is_power(n1/n2, n2) #call divisible method and is_power method recursively to determine if the number is the power of another
Explanation:
Here is the complete program.
def is_divisible(a, b):
if a % b == 0:
return True
else:
return False
def is_power(n1, n2):
if(not n1>0 and not n2>0):
print("The number is not a positive integer so:")
return None
elif n1 == n2:
return True
elif n2==1:
return False
else:
return is_divisible(n1, n2) and is_power(n1/n2, n2)
print("is_power(10, 2) returns: ", is_power(10, 2))
print("is_power(27, 3) returns: ", is_power(27, 3))
print("is_power(1, 1) returns: ", is_power(1, 1))
print("is_power(10, 1) returns: ", is_power(10, 1))
print("is_power(3, 3) returns: ", is_power(3, 3))
print("is_power(-10, -1) returns: ", is_power(-10, -1))
The first method is is_divisible method that takes two numbers a and b as arguments. It checks whether a number a is completely divisible by number b. The % modulo operator is used to find the remainder of the division. If the remainder of the division is 0 it means that the number a is completely divisible by b otherwise it is not completely divisible. The method returns True if the result of a%b is 0 otherwise returns False.
The second method is is_power() that takes two numbers n1 and n2 as arguments. The if(not n1>0 and not n2>0) if statement checks if these numbers i.e. n1 and n2 are positive or not. If these numbers are not positive then the program prints the message: The number is not a positive integer so. After displaying this message the program returns None instead of True of False because of negative values of n1 and n2.
If the values of n1 and n2 are positive integers then the program checks its first base case: n1 == n2. Suppose the value of n1 = 1 and n2 =1 Then n1 is a power of n2 if both of them are equal. So this returns True if both n1 and n2 are equal.
Now the program checks its second base case n2 == 1. Lets say n1 is 10 and n2 is 1 Then the function returns False because there is no positive integer that is the power of 1 except 1 itself.
Now the recursive case return is_divisible(n1, n2) and is_power(n1/n2, n2) calls is_divisible() method and is_power method is called recursively in this statement. For example if n1 is 27 and n2 is 3 then this statement:
is_divisible(n1, n2) returns True because 27 is completely divisible by 3 i.e. 27 % 3 = 0
is_power(n1/n2,n2) is called. This method will be called recursively until the base condition is reached. You can see it has two arguments n1/n2 and n2. n1/n2 = 27/3 = 9 So this becomes is_power(9,3)
The base cases are checked. Now this else statement is again executed return is_divisible(n1, n2) and is_power(n1/n2, n2) as none of the above base cases is evaluated to true. when is_divisible() returns True as 9 is completely divisible by 3 i.e. 9%3 =0 and is_power returns (9/3,3) which is (3,3). So this becomes is_power(3,3)
Now as value of n1 becomes 3 and value of n2 becomes 3. So the first base case elif n1 == n2: condition now evaluates to true as 3=3. So it returns True. Hence the result of this statement print("is_power(10, 2) returns: ", is_power(10, 2)) is:
is_power(27, 3) returns: True
Following are the program to the given question:
Program Explanation:
Defining a method "is_divisible" that takes two variable "a,b" inside the parameter.Usinge the return keyword that modulas parameter value and checks its value equal to 0, and return its value.In the next step, another method "is_power" is declared that takes two parameter "a,b".Inside the method, a conditional statement is declared, in which three if block is used. Inside the two if block it checks "a, b" value that is "odd number" and return bool value that is "True, False".In the last, if block is used checks "is_power" method value, and use multiple print method to call and prints its value.Program:
def is_divisible(a, b):#defining a method is_divisible that takes two parameters
return a % b == 0#using return keyword that modulas parameter value and checks its value equal to 0
def is_power(a, b):#defining a method is_power that takes two parameters
if a == 1:#defining if block that checks a value equal to 1 or check odd number condition
return True#return value True
if b == 1:#defining if block that checks b value equal to 1 or check odd number condition
return False#return value False
if not is_divisible(a, b):#defining if block that check method is_divisible value
return False##return value False
return is_power(a/b, b)#using return keyword calls and return is_power method
print("is_power(10, 2) returns: ", is_power(10, 2))#using print method that calls is_power which accepts two parameter
print("is_power(27, 3) returns: ", is_power(27, 3))#using print method that calls is_power which accepts two parameter
print("is_power(1, 1) returns: ", is_power(1, 1))#using print method that calls is_power which accepts two parameter
print("is_power(10, 1) returns: ", is_power(10, 1))#using print method that calls is_power which accepts two parameter
print("is_power(3, 3) returns: ", is_power(3, 3))#using print method that calls is_power which accepts two parameter
Output:
Please find the attached file.
Learn more:
brainly.com/question/24432065
A byte addressable direct-mapped cache has 1024 blocks/lines, with each block having eight 32-bit words. How many bits are required for block offset, assuming a 32-bit address
Answer and Explanation:
"The inquiry as presented is not necessarily responsible. A word has been states as 32-bit. We need to ask if the frame is "byte-addressable" (From this we can access to get an 8-bit piece of information) or "text-addressable" (the smallest open lump is 32-bit) or maybe "half-word-addressable" (the tiny bundle of information it could reach to 16-bit).
To understand what the smallest request bit of a position is to let anyone know, you have to remember this.
You operate from base up at that stage. We will agree with the byte-addressable structure. Every reserved square at a certain point contains 8 words * (4 bytes/word) = 32 = 25 bytes, so the counterbalance seems to be 5 bits.
The history in a direct-mapped stored is the squares in reserves (12 bits for this position due to 212 = 4096). at a certain point, as you have seen, the tag is also one of the bits left behind.
As the reserve becomes increasingly cooperative. And a similar size remains. These are lesser bits on the list and more bits on the mark.'
1. Two TCP entities communicate across a reliable network. Let the normalized time to transmit a fixed length segment equal 1. Assume that the end-to-end propagation delay is 3 and that it takes 2 to deliver data from a received segment to the transport user. The receiver initially grants a credit of 7 segments. The receiver uses a conservative flow control policy and updates its credit allocation at every opportunity. What is the maximum achievable throughput
Answer:
The answer is "0.77"
Explanation:
The fixed-length segment value = 1
The propagation time of one end to another end is = 3
The Transfer power to move the consumer from the obtained segment = 2
The second last sender assigns a loan = 7 segments
The overall transmission time = 3+2+3 = 8
The maximum throughput value is:
[tex]\to \frac{7}{(1 + 8)}\\\\ \to \frac{7}{9}\\\\\to 0.77[/tex]
A security administrator is investigating a report that a user is receiving suspicious emails. The user's machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Select TWO).
a) Vishing
b) Whaling
c) Spear phishing
d) Pharming
e) War dialing
f) Hoaxing
Answer:
Spear Phishing and War Dialing
Explanation:
So let's tackle these one at a time.
Vishing is simply any type of message (i.e., email, text, phone call, etc.) that appears to be from a trusted source but is not.
Whaling is simply a spear phishing attack of a high-value target such as a CEO or someone with high-level access at a company.
Spear phishing is simply a targeted phishing attack, usually towards a specific person or group of people. (Phishing attack is simply a social attack to try and gain unauthorized access to a resource).
Pharming is an attack that attempts to redirect website traffic to a fake site.
War dialing is a technique to automatically scan a list of numbers in an area in attempt to search for exposed modems, computers, board systems, or fax machines, in order to breach the network.
Hoaxing is simply a social attack that describes a serious threat in attempts to retrieve unauthorized access or money from a victim. (Think microsoft tech support scams)
Now that we have defined these things, let's identify the possible threats that need to be reported.
(a) Vishing? The sec admin report doesn't mention the source of the message so we cannot associate this one
(b) Whaling? The sec admin report says a user, implying someone not high up in the company, but doesn't say it's not someone high up. This is possible.
(c) Spear phishing? The sec admin report says a user, implying that only this user is being targeted so this is definitely valid.
(d) Pharming? The sec admin report says nothing about site redirection.
(e) War dialing? The sec admin report doesn't say anything about unauthorized scanning; however, it mentions the user has an old functioning modem, so this is possible.
(f) Hoaxing? The sec admin report doesn't mention a pop up in the email or the content of the email so we are uncertain.
Thus with these considerations, the two threats that are identified and need mitigation are Spear phishing and War Dialing/Whaling. Note that we aren't positive of the war dialing or whaling, but a case could be made for either; however, given the modem information, the question seems to indicate war dialing.
Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work from home twice a month. Its major concern is the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop. Which of the following would help the firm enforce access controls and storage guidelines on its laptops?
a. Anenterprise search software
b. A binary search tool
c. A perceptive software pack
d. A Domain search engine
Answer:
a. An enterprise search software.
Explanation:
In this scenario, Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work from home twice a month. In order to prevent the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop, Rosetta technologies should use an enterprise search software.
Enterprise search software is a computer application which is typically used to make relevant data from sources, such as a database, file system and intranet searchable to a specific or defined group of people.
An enterprise search software would help the firm enforce access controls and storage guidelines on its laptops.
On enterprise search software, there are basically two (2) ways to enforce access controls as a security policy on users;
1. Early binding: at the index stage, permissions are analyzed and ascribed to each document in the enterprise search software.
2. Late binding: it involves the process of analyzing permissions and ascribing them to each document at the query stage in the enterprise search software.
How I to turn this ''loop while'' in ''loop for''?
var i = 0;
while (i < 20) {
var lineY = 20 + (i * 20);
line(0, lineY, 400, lineY);
i++;
}
Answer:
for (var i = 0; i <20; i++)
{
var lineY = 20 + (i * 20);
line(0, lineY, 400, lineY);
}
Explanation:
To turn the loop while to for loop, you start by considering the iterating variable i and its iterating operations which are;
var i = 0; while (i < 20) and i++;
Where var i = 0; is the initializing statement
(i < 20) is the conditional statement
i++ is the increment
The next is to combine these operations to a for loop; using the following syntax: for(initializing; condition; increment){}
This gives: for(var i = 0; i<20; i++)
Hence, the full code snippet is:
for (var i = 0; i <20; i++)
{
var lineY = 20 + (i * 20);
line(0, lineY, 400, lineY);
}
Consider these functions:_________.
def f(x) :
return g(x) + math.sqrt(h(x))
def g(x):
return 4 h(x)
def h(x):
return x x + k(x)-1
def k(x):
return 2 (x + 1)
Without actually compiling and running a program, determine the results of the following function calls.
a. x1 = f(2)
b. x2 = g(h(2)
c. x3 = k(g(2) + h(2))
d. x4 - f(0) + f(l) + f(2)
e. x5 - f{-l) + g(-l) + h(-1) + k(-l)
Answer:
x1 = 39
x2 = 400
x3 = 92
x4 = 62
x5 = 0
Explanation:
a. x1 = f(2)This statement calls the f() function passing 2 to the function. The f(x) function takes a number x as parameter and returns the following:
g(x) + math.sqrt(h(x))
This again calls function g() and h()
The above statement calls g() passing x i.e. 2 to the function g(x) and calls function h() passing x i.e. 2 to h() and the result is computed by adding the value returned by g() to the square root of the value returned by the h() method.
The g(x) function takes a number x as parameter and returns the following:
return 4*h(x)
The above statement calls function h() by passing value 2 to h() and the result is computed by multiplying 4 with the value returned by h().
The h(x) function takes a number x as parameter and returns the following:
return x*x + k(x)-1
The above statement calls function k() by passing value 2 to k() and the result is computed by subtracting 1 from the value returned by k() and adding the result of x*x (2*2) to this.
The k(x) function takes a number x as parameter and returns the following:
return 2 * (x + 1)
As the value of x=2 So
2*(2+1) = 2*(3) = 6
So the value returned by k(x) is 6
Now lets go back to the function h(x)
return x*x + k(x)-1
x = 2
k(x) = 6
So
x*x + k(x)-1 = 2*2 + (6-1) = 4 + 5 = 9
Now lets go back to the function g(x)
return 4*h(x)
As x = 2
h(x) = 9
So
4*h(x) = 4*9 = 36
Now lets go back to function f(x)
return g(x) + math.sqrt(h(x))
As x=2
g(x) = 36
h(x) = 9
g(x) + math.sqrt(h(x)) = 36 + math.sqrt(9)
= 36 + 3 = 39
Hence
x1 = 39b. x2 = g(h(2) )The above statement means that first the function g() calls function h() and function h() is passed a value i.e 2.
As x=2
The function k() returns:
2 * (x + 1) = 2 * (2 + 1) = 6
The function h() returns:
x*x + k(x)-1 = 2*2 + (6-1) = 4 + 5 = 9
Now The function g() returns:
4 * h(x) = 4 * h(9)
This method again calls h() and function h() calls k(). The function k() returns:
2 * (x + 1) = 2 * (9 + 1) = 20
Now The function h() returns:
x*x + k(x)-1 = 9*9 + (20-1) = 81 + 19 = 100
h(9) = 100
Now The function g() returns:
4 * h(x) = 4 * h(9) = 4 * 100 = 400
Hence
x2 = 400c. x3 = k(g(2) + h(2))g() returns:
return 4 h(x)
h() returns:
return x*x + k(x)-1
k(2) returns:
return 2 (x + 1)
= 2 ( 3 ) = 6
Now going back to h(2)
x * x + k(x)-1 = 2*2 + 6 - 1 = 9
Now going back to g(2)
4 h(x) = 4 * 9 = 36
So k(g(2) + h(2)) becomes:
k(9 + 36 )
k(45)
Now going to k():
return 2 (x + 1)
2 (x + 1) = 2(45 + 1)
= 2(46)
= 92
So k(g(2) + h(2)) = 92
Hence
x3 = 92d. x4 = f(0) + f(1) + f(2)Compute f(0)
f() returns:
return g(0) + math.sqrt(h(0))
f() calls g() and h()
g() returns:
return 4 * h(0)
g() calls h()
h() returns
return 0*0 + k(0)-1
h() calls k()
k() returns:
return 2 * (0 + 1)
2 * (0 + 1) = 2
Going back to caller function h()
Compute h(0)
0*0 + k(0)-1 = 2 - 1 = 1
Going back to caller function g()
Compute g(0)
4 * h(0) = 4 * 1 = 4
Going back to caller function f()
compute f(0)
g(0) + math.sqrt(h(0)) = 4 + 1 = 5
f(0) = 5
Compute f(1)
f() returns:
return g(1) + math.sqrt(h(1))
f() calls g() and h()
g() returns:
return 4 * h(1)
g() calls h()
h() returns
return 1*1 + k(1)-1
h() calls k()
k() returns:
return 2 * (1 + 1)
2 * (1 + 1) = 4
Going back to caller function h()
Compute h(0)
1*1 + k(1)-1 = 1 + 4 - 1 = 4
Going back to caller function g()
Compute g(1)
4 * h(1) = 4 * 4 = 16
Going back to caller function f()
compute f(1)
g(1) + math.sqrt(h(1)) = 16 + 2 = 18
f(1) = 18
Compute f(2)
f() returns:
return g(2) + math.sqrt(h(2))
f() calls g() and h()
g() returns:
return 4 * h(2)
g() calls h()
h() returns
return 1*1 + k(2)-1
h() calls k()
k() returns:
return 2 * (2+1)
2 * (3) = 6
Going back to caller function h()
Compute h(2)
2*2 + k(2)-1 = 4 + 6 - 1 = 9
Going back to caller function g()
Compute g(2)
4 * h(2) = 4 * 9 = 36
Going back to caller function f()
compute f(2)
g(2) + math.sqrt(h(2)) = 36 +3 = 39
f(1) = 13.7
Now
x4 = f(0) + f(l) + f(2)
= 5 + 18 + 39
= 62
Hence
x4 = 62e. x5 = f(-1) + g(-1) + h(-1) + k(-1)Compute f(-1)
f() returns:
return g(-1) + math.sqrt(h(-1))
f() calls g() and h()
g() returns:
return 4 * h(-1)
g() calls h()
h() returns
return 1*1 + k(-1)-1
h() calls k()
k() returns:
return 2 * (-1+1)
2 * (0) = 0
Going back to caller function h()
Compute h(-1)
-1*-1 + k(-1)-1 = 1 + 0 - 1 = 0
Going back to caller function g()
Compute g(-1)
4 * h(-1) = 4 * 0 = 0
Going back to caller function f()
compute f(-1)
g(-1) + math.sqrt(h(-1)) = 0
f(-1) = 0
Compute g(-1)
g() returns:
return 4 * h(-1)
g() calls h()
h() returns
return 1*1 + k(-1)-1
h() calls k()
k() returns:
return 2 * (-1+1)
2 * (0) = 0
Going back to caller function h()
Compute h(-1)
-1*-1 + k(-1)-1 = 1 + 0 - 1 = 0
Going back to caller function g()
Compute g(-1)
4 * h(-1) = 4 * 0 = 0
g(-1) = 0
Compute h(-1)
h() returns
return 1*1 + k(-1)-1
h() calls k()
k() returns:
return 2 * (-1+1)
2 * (0) = 0
Going back to caller function h()
Compute h(-1)
-1*-1 + k(-1)-1 = 1 + 0 - 1 = 0
h(-1) = 0
Compute k(-1)
k() returns:
return 2 (x + 1)
k(-1) = 2 ( -1 + 1 ) = 2 ( 0 ) = 0
k(-1) = 0
x5 = f(-1) + g(-1) + h(-1) + k(-1)
= 0 + 0 + 0 + 0
= 0
Hence
x5 = 0A company wants a recruiting app that models candidates and interviews; displays the total number of interviews on each candidate record; and defines security on interview records that is independent from the security on candidate records. What would a developer do to accomplish this task? Choose 2 answers
a. Create a roll -up summary field on the Candidate object that counts Interview records.
b. Create a master -detail relationship between the Candidate and Interview objects.
c. Create a lookup relationship between the Candidate and Interview objects.
d. Create a trigger on the Interview object that updates a field on the Candidate object.
Answer:
c. Create a lookup relationship between the Candidate and Interview objects.
d. Create a trigger on the Interview object that updates a field on the Candidate object.
Explanation:
Objects relationships is considered a form of field type that joins two or more objects together such that, after understanding objects and fields, it creates some form of bonding known as object relationships. This helps define security on interview records that is independent from the security on candidate records.
For an example, in a standard object like Account, where a sales representative opens an account, and has had interviews or chats with a few people at that account’s company, and as well made contacts with the likes of executives or IT managers and still stored those contacts’ information in salesforce.
Hence, what would a developer do to accomplish this task is to:
1. Create a lookup relationship between the Candidate and Interview objects.
2. Create a trigger on the Interview object that updates a field on the Candidate object.
Velma is graduating from Ashford at the end of next year. After she completes her final class, she will reward herself for her hard work with a week-long vacation in Hawaii. But she wants to begin saving money for her trip now. Which of the following is the most effective way for Velma to save money each month?
This question is incomplete because the options are missing; here are the options for this question:
Which of the following is the most effective way for Velma to save money each month?
A. Automatically reroute a portion of her paycheck to her savings account.
B. Manually deposit 10% of her paycheck in her savings account.
C. Pay all of her bills and then place the remaining money in her savings account.
D. Pay all of her bills and then place the remaining money in her piggy bank.
The correct answer to this question is A. Automatically reroute a portion of her paycheck to her savings account.
Explanation:
In this case, Velma needs to consistently save money for her vacation as this guarantees she will have the money for the trip. This means it is ideal every month she contributes consistently to her savings for the vacation.
This can be better be achieved by automatically rerouting a part of her paycheck for this purpose (Option A) because in this way, every month the money for the vacations will increase and the amount of money will be consistent, which means Velma will know beforehand the money she will have for the vacation. Moreover, options such as using a piggy bank or paying the bills and using the rest for her savings, do not guarantee she will contribute to the savings every month, or she will have the money she needs at the end.
Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an attacker to redirect targets to malicious webservers. C. It allows an attacker to remotely controle your computer. D. It affects any clients querying the poisoned DNS server.
Answer:
(B) It allows an attacker to redirect targets to malicious webserver.
(D) It affects any clients querying the poisoned DNS server.
Explanation:
DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.
Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.
The computer browser then get to the intended website through the IP address.
Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.
Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.
Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.
Lily is in her first year of undergraduate coursework and has not yet declared a major. She has attended a lot of career fairs and undergraduate major "open house" events to investigate her options. Marcia's theory of identity status suggests that the dimension Lily is most concerned with is the_____of 1 dimension.
Answer:
exploration
Explanation:
According to Marcia's theory of identity, the status suggests that the dimension Lily is most concerned with is the exploration dimension.
James E. Marcia who came up with the Marcia's theory of identity is a clinical and developmental psychologist. He also once taught at Simon Fraser University which is located in British Columbia, Canada and also in the State University of New York at Buffalo in Upstate, New York City.
James E. Marcia is also very much involved in clinical private practice, community consultation, clinical psychology supervision, and also in international clinical-developmental research and teaching.
Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences of every word in the file. You function should be case-insensitive so 'Hello' and 'hello' are treated as the same word. You should ignore words of length 2 or less. Also, be sure to remove punctuation and digits.
>>>wordcount('frankenstein.txt')
artifice 1
resting 2
compact 1
service 3
Answer:
I am writing a Python program. Let me know if you want the program in some other programming language.
import string #to use string related functions
def wordcount(filename): # function that takes a text file name as parameter and returns the number of occurrences of every word in file
file = open(filename, "r") # open the file in read mode
wc = dict() # creates a dictionary
for sentence in file: # loop through each line of the file
sentence = sentence.strip() #returns the text, removing empty spaces
sentence=sentence.lower() #converts each line to lowercase to avoid case sensitivity
sentence = sentence.translate(sentence.maketrans("", "", string.punctuation)) #removes punctuation from every line of the text file
words = sentence.split(" ") # split the lines into a list of words
for word in words: #loops through each word of the file
if len(word)>2: #checks if the length of the word is greater than 2
if word in wc: # if the word is already in dictionary
wc[word] = wc[word] + 1 #if the word is already present in dict wc then add 1 to the count of that word
else: #if the word is not already present
wc[word] = 1 # word is added to the wc dict and assign 1 to the count of that word
for w in list(wc.keys()): #prints the list of words and their number of occurrences
print(w, wc[w]) #prints word: occurrences in key:value format of dict
wordcount("file.txt") #calls wordcount method and passes name of the file to that method
Explanation:
The program has a function wordcount that takes the name of a text file (filename) as parameter.
open() method is used to open the file in read mode. "r" represents the mode and it means read mode. Then a dictionary is created and named as wc. The first for loop, iterates through each line (sentence) of the text file. strip() method is used to remove extra empty spaces or new line character from each sentence of the file, then each sentence is converted to lower case using lower() method to avoid case sensitivity. Now the words "hello" and "Hello" are treated as the same word.
sentence = sentence.translate(sentence.maketrans("", "", string.punctuation)) statement uses two methods i.e. maketrans() and translate(). maketrans() specifies the punctuation characters that are to be deleted from the sentences and returns a translation table. translate() method uses the table that maketrans() returns in order to replace a character to its mapped character and returns the lines of text file after performing these translations.
Next the split() method is used to break these sentences into a list of words. Second for loop iterates through each word of the text file. As its given to ignore words of length 2 or less, so an IF statement is used to check if the length of word is greater than 2. If this statement evaluates to true then next statement: if word in wc: is executed which checks if the word is already present in dictionary. If this statement evaluates to true then 1 is added to the count of that word. If the word is not already present then the word is added to the wc dictionary and 1 s assigned to the count of that word.
Next the words along with their occurrences is printed. The program and its output are attached as screenshot. Since the frankenstein.txt' is not provided so I am using my own text file.
g Write a program that asks for the weight of a package and the distance it is to be shipped. This information should be passed to a calculateCharge function that computes and returns the shipping charge to be displayed . The main function should loop to handle multiple packages until a weight of 0 is entered.
Answer:
I am writing a C++ program:
#include <iostream> //to use input output functions
#include<iomanip> // to format the output
using namespace std; // to identify objects like cin cout
void calculateCharge(double weight, double distance); // function prototype
int main(){ //start of main() function body
double w = 0.0, t = 0.0; // w variable is for weight and t is for total
unsigned int d = 0; // d variable is to hold the value of distance
calculateCharge(w, d); } //calls calculateCharge method by passing weight and distance values to this method
void calculateCharge(double weight, double distance){ //method that takes weight and distance as parameters and compute the shipping charge
double charge = 0.0; //to store the value of shipping charges
do { // do while loop to handle multiple packages until a weight of 0 is entered
cout << "Enter weight: " << endl; //prompts user to enter weight
cin >> weight; //reads the input weight value
if (weight == 0){ // if the value of weight is equal to 0
break; } // the loop breaks if value of weight is 0
cout << "Enter distance: " << endl; // if value of weight is not zero then the program precedes by prompting user to enter the value of distance
cin >> distance; //reads the input distance value
cout << fixed << setprecision(2) << endl; //set the precision to 2 means the sets the number of digits of an output to 2 decimal places
if(weight <= 2) //if the value of weight is less than or equals to 2
charge = (distance/500) * 3.10; //compute the charge by this formula
else if(weight > 2 && weight <= 6) //if weight is over 2 kg but not more than 6 kg
charge = (distance/500) * 4.20; //charge is computed by multiplying value of distance to that of weight and if distance is greater than 500 then it is divided by 500 first
else if(weight > 6 && weight <= 10) // if weight is over 6 kg but not more than 10 kg
charge = (distance/500) * 5.30; //compute shipping charges by this formula
else //if weight is over 10 kg
charge = (distance/500) * 6.40; // compute shipping charge by multiplying value of distance to that of 6.40 weight value and if distance is greater than 500 then distance is divided by 500 first
cout << "Shipping charges: $" << charge << "\n"; //display the computed shipping charge
} while (weight != 0); //the loop continues to execute until weight 0 is entered
}
Explanation:
The program is explained in the comments mentioned above. The program has a main() function that declares variable for weight, distance and total and then calls calculateCharge() method passing weight and dsitance in order to compute and return the shipping charge.
In calculateCharge() the user is prompted to enter the values for weight and distance. Then the based on the value of weight , the shipping charge is computed. Shipping charge is computed by multiplying the weight with distance. The distance is assumed to be 500 but if the distance entered by user exceeds 500 then the distance value is divided by 500 and then multiplied by the specified weight (according to if or else if conditions) in order to compute shipping charge. The program has a do while loop that keeps taking input from user until the user enters 0 as the value of weight.
The screenshot of the program and its output is attached.
Some network applications defer configuration until a service is needed. For example, a computer can wait until a user attempts to print a document before the software searches for available printers.
What is the chief advantage of deferred configuration?
Answer:
The drivers wont be loaded and the deamons will not be running in the background unnecessarily, that makes the processes to run more faster
Explanation:
The chief advantage of deferred configuration or the advantage when some network applications defer configuration until a service is needed is that the drivers won't be loaded and the deamons will not be running in the background unnecessarily or when idle, that makes the processes to run more faster.
Network configuration is the activity which involves setting up a network's controls, flow and operation to assist the network communication of an organization or network owner.
Start with the following Python code. alphabet = "abcdefghijklmnopqrstuvwxyz" test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"] test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"] # From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press. def histogram(s): d = dict() for c in s: if c not in d: d[c] = 1 else: d[c] += 1 return d Copy the code above into your program but write all the other code for this assignment yourself. Do not copy any code from another source. Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False. Implement has_duplicates by creating a histogram using the histogram function above. Do not use any of the implementations of has_duplicates that are given in your textbook. Instead, your implementation should use the counts in the histogram to decide if there are any duplicates. Write a loop over the strings in the provided test_dups list. Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string. For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups. Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string. The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet. It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter. The function missing_letters should combine the list of missing letters into a string and return that string. Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters. For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz If the string has all the letters in alphabet, the output should say it uses all the letters. For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters Print a line like one of the above for each of the strings in test_miss. Submit your Python program. It should include the following. The provided code for alphabet, test_dups, test_miss, and histogram. Your implementation of the has_duplicates function. A loop that outputs duplicate information for each string in test_dups. Your implementation of the missing_letters function. A loop that outputs missing letters for each string in test_miss. Also submit the output from running your program. Your submission will be assessed using the following Aspects. Does the program include a function called has_duplicates that takes a string parameter and returns a boolean? Does the has_duplicates function call the histogram function? Does the program include a loop over the strings in test_dups that calls has_duplicate on each string? Does the program correctly identify whether each string in test_dups has duplicates? Does the program include a function called missing_letters that takes a string parameter and returns a string parameter? Does the missing_letters function call the histogram function? Does the missing_letters function use the alphabet global variable directly? Does the program include a loop over the strings in test_miss that calls missing_letters on each string? Does the program correctly identify the missing letters for each string in test_miss, including each string that "uses all the letters"?
Answer:
alphabet = "abcdefghijklmnopqrstuvwxyz"
test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"]
test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"]
# From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press.
def histogram(s):
d = dict()
for c in s:
if c not in d:
d[c] = 1
else:
d[c] += 1
return d
#Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False.
def has_duplicates(stringP):
dic = histogram(stringP)
for key,value in dic.items():
if value>1:
return True
return False
# Implement has_duplicates by creating a histogram using the histogram function above. Write a loop over the strings in the provided test_dups list.
# Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string.
# For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups.
print("***Implementation of has_duplicates fuction***")
for sTr in test_dups:
if has_duplicates(sTr):
print(sTr+": has duplicates")
else:
print(sTr+": has no duplicates")
#Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string.
#The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet.
#It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter.
#The function missing_letters should combine the list of missing letters into a string and return that string.
def missing_letters(sTr):
missingLettersList = []
dic = histogram(sTr)
for l in alphabet:
if l not in dic:
missingLettersList.append(l)
missingLettersList.sort()
return "".join(missingLettersList)
#Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters.
#For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz
#If the string has all the letters in alphabet, the output should say it uses all the letters.
#For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters
#Print a line like one of the above for each of the strings in test_miss.
print("\n***Implementation of missing_letters fuction***")
for lTm in test_miss:
sTr = missing_letters(lTm.replace(" ",""))
if sTr!="":
print(lTm+" is missing letters "+sTr)
else:
print(lTm +" uses all the letters")
A signal travels from point A to point B. At point A, the signal power is 100 W. At point B, the power is 90 W. What is the attenuation in decibels?
Answer:
[tex]Attenuation = 0.458\ db[/tex]
Explanation:
Given
Power at point A = 100W
Power at point B = 90W
Required
Determine the attenuation in decibels
Attenuation is calculated using the following formula
[tex]Attenuation = 10Log_{10}\frac{P_s}{P_d}[/tex]
Where [tex]P_s = Power\ Inpu[/tex]t and [tex]P_d = Power\ outpu[/tex]t
[tex]P_s = 100W[/tex]
[tex]P_d = 90W[/tex]
Substitute these values in the given formula
[tex]Attenuation = 10Log_{10}\frac{P_s}{P_d}[/tex]
[tex]Attenuation = 10Log_{10}\frac{100}{90}[/tex]
[tex]Attenuation = 10 * 0.04575749056[/tex]
[tex]Attenuation = 0.4575749056[/tex]
[tex]Attenuation = 0.458\ db[/tex] (Approximated)
Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0 otherwise. Assume that x, y and n are all of type int.
Answer:
See comments for line by line explanation (Lines that begins with // are comments)
The function written in C, is as follows:
//The function starts here
int check(x,y,n)
{
//This if condition checks if x and y are within range of 0 to n - 1
if((x>=0 && x<=n-1) && (y>=0 && y<=n-1))
{
//If the if conditional statement is true, the function returns 1
return 1;
}
else
{
//If the if conditional statement is false, the function returns 0
return 0;
}
//The if condition ends here
}
//The function ends here
Explanation:
#Write a function called after_second that accepts two #arguments: a target string to search, and string to search #for. The function should return everything in the first #string *after* the *second* occurrence of the search term. #You can assume there will always be at least two #occurrences of the search term in the first string. # #For example: # after_second("11223344554321", "3") -> 44554321 # #The search term "3" appears at indices 4 and 5. So, this #returns everything from the index 6 to the end. # # after_second("heyyoheyhi!", "hey") -> hi! # #The search term "hey" appears at indices 0 and 5. The #search term itself is three characters. So, this returns #everything from the index 8 to the end. # #Hint: This may be more complicated than it looks! You'll #have to look at the length of the search string and #either modify the target string or take advantage of the #extra arguments you can pass to find(). #Write your function here!
Answer:
Following are the code to this question:
def after_second(s,sub):#defining a method a fter_second
first = s.find(sub)#defining a variable first that hold method find value
if first != -1:#defining if block to check first variable value not equal to -1 using slicing
s = s[len(sub)+first:]#defining s variable to calculate sub parameter length of parameter and use slicing
second = s.find(sub)#defining second variable to calculate find method value
if second != -1:#defining if block to calculate second variable slicing
return s[len(sub)+second:]#return s variable value
print(after_second("heyyoheyhi","hey"))#defining print method to call after_second method
print(after_second("11223344554321","3"))#defining print method to call after_second method
Output:
hi
44554321
Explanation:
In the above python code a method "after_second" is declared, that accepts two-variable "s, and sub" as the parameter inside the method a first variable is declared that uses the inbuilt method "find" to find the value and stores it value. In the next step, two if blocks are used, in which both if blocks use the slicing to checks its value is not equal to "-1".
In the first, if block the first variable is declared that uses the s variable to calculate subparameter length by using slicing and defines the second variable that finds its value and stores its value. In the next, if block the s variable is used to return its calculated value, and at the end of the print, the method is used to call the method by passing parameter value and prints its return value.Which of the following statements represents the number of columns in a regular two-dimensional array named values?
A) values[0].length
B) values.length
C) values.length)
D) values[0].length0
E) values.getColumnLength0)
Answer:
(a) values[0].length
Explanation:
In programming languages such as Java, an array is a collection of data of the same type. For example, a and b below are an example of an array.
a = {5, 6, 7, 9}
b = {{2,3,4}, {3,5,4}, {6,8,5}, {1,4,6}}
But while a is a one-dimensional array, b is a regular two-dimensional array. A two-dimensional array is typically an array of one-dimensional arrays.
Now, a few thing to note about a two-dimensional array:
(i) The number of rows in a 2-dimensional array is given by;
arrayname.length
For example, to get the number of rows in array b above, we simply write;
b.length which will give 4
(ii) The number of columns in a 2-dimensional array is given by;
arrayname[0].length
This is with an assumption that all rows have same number of columns.
To get the number of columns in array b above, we simply write;
b[0].length which will give 3
Therefore, for a regular two-dimensional array named values, the number of columns is represented by: values[0].length
Create an application in Java that asks a user for a number of hours, days, weeks, and years. It then computes the equivalent number of minutes (ignoring leap years).
Answer:
//import the Scanner class
import java.util.Scanner;
//Begin class definition
public class NumberOfMinutes{
//Begin main method
public static void main(String []args){
//Create an object of the Scanner class
Scanner input = new Scanner(System.in);
//initialize a variable nm to hold the number of minutes
int nm = 0;
//Prompt the use to enter the number of hours
System.out.println("Please enter the number of hours");
//Receive the input using the Scanner object and
//Store the entered number of hours in a variable nh
int nh = input.nextInt();
//Prompt the user to enter the number of days
System.out.println("Please enter the number of days");
//Receive the input using the Scanner object and
//Store the entered number of days in a variable nd
int nd = input.nextInt();
//Prompt the user to enter the number of weeks
System.out.println("Please enter the number of weeks");
//Receive the input using the Scanner object and
//Store the entered number of weeks in variable nw
int nw = input.nextInt();
//Prompt the user to enter the number of years
System.out.println("Please enter the number of years");
//Receive the input using the Scanner object and
//Store the entered number of years in a variable ny
int ny = input.nextInt();
//Convert number of hours to minutes and
//add the result to the nm variable
nm += nh * 60;
//Convert number of days to minutes and
//add the result to the nm variable
nm += nd * 24 * 60;
//Convert number of weeks to minutes and
//add the result to the nm variable
nm += nw * 7 * 24 * 60;
//Convert number of years to minutes and
//add the result to the nm variable
nm += ny * 52 * 7 * 24 * 60;
//Display the number of minutes which is stored in nm
System.out.println("The number of minutes is " + nm);
} //End main method
} //End of class definition
Sample Output:Please enter the number of hours
>>12
Please enter the number of days
>>2
Please enter the number of weeks
>>4
Please enter the number of years
>>5
The number of minutes is 2664720
Explanation:
The code contains comments explaining every line of the program. Please go through the comments. The actual lines of executable code are written in bold face to distinguish them from comments.
A sample output has also been provided above. Also, a snapshot of the program file, showing the well-formatted code, has been attached to this response.
Description:
Create a program that converts the number of miles that you walked on a hike to the number of feet that you walked.
Console:
Hike Calculator
How many miles did you walk?: 4.5
You walked 23760 feet.
Continue? (y/n): y
How many miles did you walk?: 2.5
You walked 13200 feet.
Continue? (y/n): n
Bye!
Specifications:
The program should accept a float value for the number of miles.
Store the code that gets user input and displays output in the main function.
There are 5280 feet in a mile.
Store the code that converts miles to feet in a separate function. This function should return an int value for the number of feet.
Assume that the user will enter a valid number of miles.
Answer:
The programming language is not stated (I'll answer using C++)
#include <iostream>
using namespace std;
int convert(float miles)
{
return miles * 5280;
}
int main() {
cout<<"Console:"<<endl;
cout<<"Hike Calculator"<<endl;
float miles;
char response;
cout<<"How many miles did you walk?. ";
cin>>miles;
cout<<"You walked "<<convert(miles)<<" feet"<<endl;
cout<<"Continue? (y/n): ";
cin>>response;
while(response == 'y')
{
cout<<"How many miles did you walk?. ";
cin>>miles;
cout<<"You walked "<<convert(miles)<<" feet"<<endl;
cout<<"Continue? (y/n): ";
cin>>response;
}
cout<<"Bye!";
return 0;
}
Explanation:
Here, I'll explain some difficult lines (one after the other)
The italicized represents the function that returns the number of feet
int convert(float miles)
{
return miles * 5280;
}
The main method starts here
int main() {
The next two lines gives an info about the program
cout<<"Console:"<<endl;
cout<<"Hike Calculator"<<endl;
float miles;
char response;
This line prompts user for number of miles
cout<<"How many miles did you walk?. ";
cin>>miles;
This line calls the function that converts miles to feet and prints the feet equivalent of miles
cout<<"You walked "<<convert(miles)<<" feet"<<endl;
This line prompts user for another conversion
cout<<"Continue? (y/n): ";
cin>>response;
This is an iteration that repeats its execution as long as user continue input y as response
while(response == 'y')
{
cout<<"How many miles did you walk?. ";
cin>>miles;
cout<<"You walked "<<convert(miles)<<" feet"<<endl;
cout<<"Continue? (y/n): ";
cin>>response;
}
cout<<"Bye!";
The dramatic growth in the number of power data centers, cell towers, base stations, recharge mobiles, and so on is damaging the environment because Radio Frequency Interference (RFI) is overcrowding specific areas of the electromagnetic spectrum.
A. True
B. False
Answer:
A. True
Explanation:
Radio frequency interference abbreviated RFI is radio interference that occurs as a result of radiation in radio frequency energy that usually causes electronic devices to malfunction. Radio frequency interference or RFI is given out or emitted by electrical devices or centres such as mobile phones, satellites or data centres which affects the environment by increasing heat and bringing about increased body temperature in humans
When Windows deletes the driver package and driver files, in what situation might it not delete driver files used by the device that is being uninstalled?
Answer:
when there is no junk
Explanation:
If you choose the checkbox next to “Delete the driver software from this device,” your computer will no longer contain the driver or any associated registry keys. Either method will prevent you from using the device until you reinstall the device driver.
What is situation deletes driver files used by the device?To connect and communicate with particular devices, a computer needs device drivers.
It may be taken out without any trouble. However, it also comes with the installers for your PC's drivers. You will need to go to the manufacturer's website to download them again if you accidentally delete them.
Therefore, No, unless your new driver is broken and corrupts data. Install the driver if it comes from a reliable source. It is not intended to. Having a backup system that keeps your data safe in case of issues is a good idea.
Learn more about driver files here:
https://brainly.com/question/10608750
#SPJ5
A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) ________________ printer, and Computer2 considers the printer to be a(n) ________________ printer.
Answer:
A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) _____local___________ printer, and Computer2 considers the printer to be a(n) _____network___________ printer.
Explanation:
Any printer installed directly to Computer 1 is a local printer. If this printer is then shared with computers 2 and 3 in a particular networked environment, it becomes a shared printer. For these other computers 2 and 3, the shared printer is a network printer, because it is not locally installed in each of them. There may be some features which network computers cannot use on a shared printer, especially if the printer can scan documents.