A packet switch has 5 users, each offering packets at a rate of 10 packets per second. The average length of the packets is 1,024 bits. The packet switch needs to transmit this data over a 56-Kbps WAN circuit. Calculate the load and utilization of the link.

Answers

Answer 1

The load and utilization of the link will be, respectively, 51200bps and 91,4%.

What is a WAN circuit?

Wide Area Network (WAN) is a communication network that covers a large geographic area, such as cities, states and even countries. This type of connection is usually the result of joining smaller networks, such as several LANs (Local Area Networks).

While LANs are able to integrate devices, documents, data, software and hardware in a geographically small space, to facilitate the exchange of information wide area networks (WAN) are able to integrate multiple local area networks. In this way, the integration between devices, documents and important data of a company or institution can take place even between geographically very distant regions.

That being said, to calculate the load it is necessary to multiply users, packets and bits. So:

[tex]5.10.1024 = 51200bps[/tex]

And to calculate the utilization it is necessary to divide load per transmission. So:

[tex]51200/561000 = 0,914[/tex] or 91,4%

See more about WAN circuit at: brainly.com/question/621746

#SPJ1


Related Questions

TensorFlow and Pytorch are examples of which type of machine learning platform?

Answers

Both TensorFlow and PyTorch are examples of a robust machine learning library.

Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel value. The salaries should be floating point numbers Salaries should be input in even hundreds. For example, a salary of 36,510 should be input as 36.5 and a salary of 69,030 should be entered as 69.0. Find the average of all the salaries of the employees. Then find the names and salaries of any employee who's salary is within 5,000 of the average. So if the average is 30,000 and an employee earns 33,000, his/her name would be found. Display the following using proper labels. Save your file using the naming format LASTNAME_FIRSTNAME_M08 FE. Turn in your file by clicking on the Start Here button in the upper right corner of your screen. 1.Display the names and salaries of all the employees. 2. Display the average of all the salaries 3. Display all employees that are within 5,000 range of the average.

Answers

Using the knowledge in computational language in JAVA it is possible to write the code being Input a list of employee names and salaries and store them in parallel arrays

Writting the code in JAVA:

BEGIN

DECLARE

employeeNames[100] As String

employeeSalaries[100] as float

name as String

salary, totalSalary as float

averageSalary as float

count as integer

x as integer

rangeMin, rangeMax as float

INITIALIZE

count = 0;

totalSalary =0

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

//Read Employee data

WHILE name != “*” AND count < 100

employeeNames [count] = name

DISPLAY“Enter salary for “ + name + “.”

READ salary

employeeSalaries[count] = salary

totalSalary = totalSalary + salary

count = count + 1

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

END WHILE

//Calculate average salary with mix , max range

averageSalary = totalSalary / count

rangeMin = averageSalary - 5

rangeMax = averageSalary + 5

DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”

For (x = 0; x < count; x++)

IF (employeeSalaries[x] >= rangeMin OR employeeSalaries[x] <= rangeMax )

DISPLAY employeeNames[x] + “\t” + employeeSalaries[x]

END IF

END FOR

END

See more about JAVA at brainly.com/question/12978370

#SPJ1

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

An external website permitting users to browse and purchase widgets

An internal intranet website for employees to use

Secure remote access for engineering employees

Reasonable, basic firewall rules

Wireless coverage in the office

Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:

Authentication system

External website security

Internal website security

Remote access solution

Firewall and basic rules recommendations

Wireless security

VLAN configuration recommendations

Laptop security configuration

Application policy recommendations

Security and privacy policy recommendations

Intrusion detection or prevention for systems containing customer data

Answers

The authentication can be done by using user id and password, social sign-in or by using the biometrics.  

How to explain the information?

Authentication works as follows:  

Prompting the user to enter the credentials.  Send credentials to the authentication server.  Match the credentials.  Authorize the user and grants the acces

External Website security:  

Use of firewall.  Implement the access control.  Use of MVC (Model View Controller) Use of encryption.  Use of SSL certificate.Use of security plugins.  Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  Use of authorization to provide different user with the specific privileges and access.  Encrypt or hide sensitive web pages.  By implementing IT policies.  Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  Rules to prevent SQL injection and XSS.  Allow only the specific type of traffic.  Use access rules for IP security.  Implement certain IT policies.  

Wireless Security:  

Wifi is being used in every organization and it prevents the network from malicious access.  

Wireless security can be provided by usin encryption, decryption, and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

VLAN can be configured between router and firewall that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and the registering the laptop will provide laptop security. .  

Application policy recommendations:  

Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind firewall and it matches the incoming traffic against the security policies.

Learn more about security infrastructure on:

https://brainly.com/question/5939963

#SPJ1

Even if we reached the state where an AI can behave as a human does, how do we measure if Al is acting like a human? and how can we be sure it can continue to behave that way? We can base the human-likeness of an AI entity with the: Turing Test, the Cognitive Modelling Approach, The Law of Thought Approach, and the Rational Agent Approach. Explain in detail these terms with suitable examples.​

Answers

We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.

What test tells you if an AI can think like a human?

The Turing Test is known to be the tool or the method that is unused in regards to the inquiry in artificial intelligence (AI) for a person to be able to known if or not a computer have the ability of thinking like a human being.

Note that the test is said to be named after Alan Turing, who was known to be the founder of the Turing Test and he was also known to be an English computer scientist, a cryptanalyst, a mathematician and also a theoretical biologist.

Therefore, in regards to the issues with AI, a person or We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.

Learn more about Al  from

https://brainly.com/question/20463001

#SPJ1

Question 1
Write C# code which generates and displays 10 random (integer) numbers between 0 and
50, note that each time this program runs the results are different.

Question 2
Repeat your code from the previous exercise.
In addition to generating the 10 random numbers, display the lowest of the 10 numbers.

Question 3
Repeat your code from the previous exercise.
In addition to the lowest number, display the highest and the average of the 10
numbers.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that generates and displays 10 random (integer) numbers between 0 and 50.

Writting the code in C++

 class SecureRandom : Random

   {

       public static byte[] GetBytes(ulong length)

       {

           RNGCryptoServiceProvider RNG = new RNGCryptoServiceProvider();

           byte[] bytes = new byte[length];

           RNG.GetBytes(bytes);

           RNG.Dispose();

           return bytes;

       }

       public SecureRandom() : base(BitConverter.ToInt32(GetBytes(4), 0))

       {

       }

       public int GetRandomInt(int min, int max)

       {

           int treashold = max - min;

           if(treashold != Math.Abs(treashold))

           {

               throw new ArithmeticException("The minimum value can't exceed the maximum value!");

           }

           if (treashold == 0)

           {

               throw new ArithmeticException("The minimum value can't be the same as the maximum value!");

           }

           return min + (Next() % treashold);

       }

       public static int GetRandomIntStatic(int min, int max)

       {

           int treashold = max - min;

           if (treashold != Math.Abs(treashold))

           {

               throw new ArithmeticException("The minimum value can't exceed the maximum value!");

           }

           if(treashold == 0)

           {

               throw new ArithmeticException("The minimum value can't be the same as the maximum value!");

           }

           return min + (BitConverter.ToInt32(GetBytes(4), 0) % treashold);

       }

   }

See more about C++ code at brainly.com/question/19705654

#SPJ1

Question 4 of 10
Which action takes place in the Define step of the game development cycle?
A. Looking for errors and determining how best to fix them
B. Choosing a color scheme and overall theme for the game
OC. Determining the goals of the game
D. Releasing the game and collecting feedback from users
SUBMIT

Answers

An action which takes place in the Define step of the game development cycle is: C. determining the goals of the game.

What is GDLC?

GDLC is an acronym for game development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages that are associated with the design, development and implementation of high quality gaming software programs (applications).

In Computer science, there are seven (7) phases involved in the development of a gaming software program and these include the following;

DefinePlanningDesignDevelopment (coding)TestingDeploymentMaintenance

In this context, we can infer and logically deduce that determining the goals of the game is an action which takes place in the Define step of the game development cycle.

Read more on software here: brainly.com/question/26324021

#SPJ1

Which action takes place in the Deploy stop of the game development cycle?

Answer: is D. Releasing the game and collecting feedback from users

fill in the blanks

a:………was the main component in the first generation computer

Answers

Answer:

vaccum tube

Explanation:

mark me brainlist!!

Write a program to demonstrate doubly linked list using pointers – insert (beginning, end,
middle), delete(beginning, end, middle),view)

Answers

A program to demonstrate doubly linked list using pointers – insert (beginning, end, middle), delete(beginning, end, middle),view) is:

/* Initialize nodes */

struct node *head;

struct node *one = NULL;

struct node *two = NULL;

struct node *three = NULL;

/* Allocate memory */

one = malloc(sizeof(struct node));

two = malloc(sizeof(struct node));

three = malloc(sizeof(struct node));

/* Assign data values */

one->data = 1;

two->data = 2;

three->data = 3;

/* Connect nodes */

one->next = two;

one->prev = NULL;

two->next = three;

two->prev = one;

three->next = NULL;

three->prev = two;

/* Save address of first node in head */

head = one;

What is a Doubly Linked List?

This refers to the linked data structure that contains of a set of sequentially linked records called nodes.

The requested program is given above.

Read more about doubly linked list here:

https://brainly.com/question/13326183

#SPJ1

Question One
a) The research department of De-mod Limited has developed a software at a cost of ten million cedi that is a game changer. In other to ensure total ownership and control of the software, you have been consulted to provide an advice on what De-mod Limited can do to maintain absolute ownership and control of the newly developed software.
With the knowledge you have acquired in this course, examine at least three protections for developers of computer software, stating the merits and demerits of each EV(7Marks)

Answers

The three protections for developers of computer software, are:

Patents Copyright and Trade secretsTrademarks.

What are the different kinds of protection of computer software?

The principal modes of protection of software is known to be copyright and patents. Copyright is said to be used a lot so as to protect computer program, this is due to the fact that writing of a code is one that tends to be similar to any other kinds of literary work.

Patents are known to be exclusive right of a person to make or produce, use their  invention and thus The three protections for developers of computer software, are:

Patents Copyright and Trade secretsTrademarks.

Note that the use of patent and copyright benefits a person as it tends to give them the power over their products and services.

Learn more about computer software from

https://brainly.com/question/1538272

#SPJ1

For a computer, it is a minimum system requirement that the video card supports directx 9 graphics with ____________________ 1.0 or higher driver.

Answers

Answer:

With 0.5,0.7,0.9 drivers

What is the output of the
given program if the user
enters 20?
A. A lot of fun
B. some fun
C. no fun
Consider the following
segment:
Scanner
Scanner(System.in);
input
System.out.print("Please
value");
int value =
fun");
}
else
{
input.nextInt();
if (value >= 30 )
{
program
enter
System.out.println("A
lot
new
a
of
5

Answers

if(value_ 30)

Explanation:

es igual 30 espero que te sirva

c) In business, an ethical issue is identifiable problem, situation, or opportunity that requires a person to choose from among several actions that may be evaluated as ethical or unethical. Such a choice often involves weighing monetary profit against what a person considers appropriate conduct. The best way to judge the ethics of a decision is to look at a situation from a customer or competitor’s viewpoint.
As a professional ethics consultant, you are required to discuss in detail, ethical issues in business in the context of their relation to conflicts of interest, fairness and honesty, communications, and business associations.

Answers

The ethical issues in business in the context of their relation to conflicts of interest, fairness and honesty, communications are:

The case of Harassment and Discrimination in regards to the Workplace. The issue of Health and Safety in the Workplace. Ethics in regards to Accounting Practices. The issue of Nondisclosure and that of Corporate Espionage.The issues in regards to Technology and Privacy Practices.

What are Ethical issues?

The term  Ethical issues is known to be if a given decision, event or activity is said to have made a conflict with a society's moral principles.

Note that Both individuals and businesses are known to be one that can be involved in all of the conflicts, since any of those activities can be put to question from the point of ethical view.

Hence, The ethical issues in business in the context of their relation to conflicts of interest, fairness and honesty, communications are:

The case of Harassment and Discrimination in regards to the Workplace. The issue of Health and Safety in the Workplace. Ethics in regards to Accounting Practices. The issue of Nondisclosure and that of Corporate Espionage.The issues in regards to Technology and Privacy Practices.

Learn more about ethical issues from

https://brainly.com/question/13969108

#SPJ1

what are web site and web page?​

Answers

Answer:

Website: a set of related web pages located under a single domain name, typically produced by a single person or organization

Webpage: a hypertext document on the World Wide Web

Web site

The term “web site” is commonly used to describe a collection of web pages and related content published simultaneously on at least one server and identified by a common domain name. A web site is a collection of many web pages that are linked together under the domain name of the same company.

Web page

Web pages are a type of hypertext document which can be found on the World Wide Web. In a web browser, a user can view a web page that has been delivered by a web server to their computer. It is the name “web page” itself that is a metaphor for the binding of paper pages together to make a book.

Hope this helps :)

Please solve this in JAVA

Please see the attachment

Answers

Answer:

I'm going to do it but you should try these things for yourself or else you won't learn.

Explanation:

-First create a project (I'm using Netbeans 14 and the project is a Maven, but the code should work on any IDE)


-Name the project 'ShoppingCartPrinter' and leave the package name as it is. This is the main class so the main method is gonna be there already.

-Then you will create a second class named 'ItemToPurchase'. So I'll leave the code in the attachment (at the bottom of my answer it's written 'Download txt') or else brainly will think it's some sort of redirection to another websites because of the 'dots' and won't let me post it.






Capgemini
Which among the following statements are not true?
RPA automates business process service activities by utilising the
presentation layer.
ITPA involves connecting the application servers, databases, operating
system and other components at the IT layer and automates the
process flow and creates the scripts and schedule them at the
scheduler in the Orchestrator.
RPA is completely rule based and works on structured data . It isn't
compatible to be applied on unstructured data.
Cognitive systems self learn from the processes based on historical
patterns.

Answers

Answer:

RPA is completely rule based

You are investigating a problem between two wireless bridges and you find that signal strength is lower than expected. Which of the following could cause the problem?

A. Wrong SSID

B. Incorrect 802.11 standard

C. Incorrect encryption key

D. Wrong antenna type

Answers

The most likely problem that led to the signal strength is lower than expected is a D. Wrong antenna type

What is a Computer Network?

This refers to the inter-connectivity between wireless bridges to connect a computer system to the world wide web.

Hence, we can see that based on the fact that there is troubleshooting going on about two wireless bridges where the signal strength is lower than expected, the most likely problem that led to the signal strength is lower than expected is a D. Wrong antenna type

Read more about computer networks here:

https://brainly.com/question/1167985

#SPJ1

write a pseudocode to accept the item name , price and quantity from a user and display the item name and its total value​

Answers

A pseudocode to accept the item name , price and quantity from a user and show the item name and its total value​

1. start

2. get item title, price, quality

3. set total weight = price * quality

4. print total value, item name

5. stop

What is a pseudocode with example?

Pseudocode is an unnatural and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) configuration tool. The rules of Pseudocode are reasonably clear. All statements showing "dependency" are to be indented.

How is pseudocode used in programming?

Pseudocode is an everyday way of programming description that does not require any strict programming language syntax or underlying technology reviews. It is used for making an outline or a rough draft of a program. Pseudocode outlines a program's flow, but bans underlying details.

To learn more about Pseudocode, refer

https://brainly.com/question/24953880

#SPJ9

Write a program in c# that simulates the roll of two six sided dice.
The program should ask the user to guess the total sum of the dice. The user has to
keep guessing until they get the total correct, and the program should tell them how
many tries it took.

An example of the expected output is shown below.
What do you think the total of two six-sided die will be? 6
The total was 8. Try again!
What do you think the total of two six-sided die will be? 4
The total was 11. Try again!
What do you think the total of two six-sided die will be? 10
The total was 10. Congratulations! It took you 3 tries to guess successfully.

Answers

Answer:

using System;

class Program

{

   public static void Main(string[] args)

   {

       Random rnd = new Random();

       int tries = 0;

       while (true)

       {

           tries++;

           Console.Write("What do you think the total of two six-sided die will be? ");

           int guess = int.Parse(Console.ReadLine());

           int total = rnd.Next(1, 7) + rnd.Next(1, 7);

           Console.Write($"The total was {total}. ");

           if (total == guess)

           {

               Console.WriteLine($"Congratulations! It took you {tries} tries to guess successfully.");

               break;

           }

           else

           {

               Console.WriteLine("Try again!");

           }

       }

   }

}

Explanation:

Worst case you could be guessing forever...

How artifical intelligence will have more effect on our day to day life ? ​

Answers

Answer:

Artificial intelligence can dramatically improve the efficiencies of our workplaces and can augment the work humans can do. When AI takes over repetitive or dangerous tasks, it frees up the human workforce to do work they are better equipped for—tasks that involve creativity and empathy among others.

You are in process of writing a class definition for the class Book. It has three data attributes:
book_title, book_author, and book_publisher. The data attributes should be private.
In Python, write an initializer method that will be part of your class definition. The attributes will
be initialized with parameters that are passed to the method from the main program.
Note: You do not need to write the entire class definition, only the initializer method

Answers

Using the knowledge in computational language in python it is possible to write a code that uses  process of writing a class definition for the class Book.

Writting the code in python:

class Book:

   # a constructor for this class.

   # The constructor should accept an argument for each of the fields.

   def __init__(self, book_title, book_author, book_publisher):

       self.book_title = book_title

       self.book_author = book_author

       self.book_publisher = book_publisher

def main():

   b = Book("title1", "author1", "publisher1")

   print(b.book_title)

   print(b.book_author)

   print(b.book_publisher)

main()

See more about python at brainly.com/question/18502436

#SPJ1

Help!

Write the declaration for a gradient. It may be either gradient type, and consist of any colors.

Answers

Answer:

it may be linear gradient.

How serious are the risks to your computer security?
Why is it important to protect a Wi-Fi network? What should you do to protect your Wi-Fi network?

Answers

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

What are the risk results for information and computer security?

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

https://brainly.com/question/12010892

#SPJ1

How to enter Data into cells in excel

Answers

Answer:

u can enter data into excel by either copy pasting by right clicking or typing It manually in the Fx box located at the top

Write the function definition for a function called list_total that accepts a list of integers
as a parameter. The function should sum all the numbers in the list and return the total.

Answers

Answer:

def list_total(numbers):

   sum_of_numbers = 0

   for number in numbers:

       sum_of_numbers += number

   return sum_of_numbers

Explanation:

So, to define a function, the syntax is simply:

def functionName(arguments here):

   # code

So to define a function called "list_total" which accepts a list of integers, you write:

"

def list_total(numbers):
   # code

"

any the "numbers" is a parameter, and it's just like any variable, so you can name it anything besides keywords. I just named it "numbers" since it makes sense in this context, you could also write "integers" instead and it would be just as valid, and may be a bit more specific in this case.

Anyways from here, the initial sum should be equal to 0, and from there we add each number in the list to that initial sum. This can be done by initializing a variable to the value "0" and then traversing the list using a for loop. This can be done as such:

"

def list_total(numbers):

   sum_of_numbers = 0

   for number in numbers:

       # code

"

So for each element or integer in the list "numbers" the for lop will run, and the variable "number" will contain the value of the current element it's on.

So we can add the "number" to the sum_of_numbers as such:

sum_of_numbers = sum_of_numbers + number

but there is a shorter way to do this, and it's represented as:

sum_of_numbers += sum_of_numbers

which will do the same exact thing. In fact this works for any mathematical operation for example:

a *= 3

is the same thing as

a = a * 3

and

a /= 3

is the same thing as

a = a / 3

It's the same thing, but it's a much shorter and more readable notation.

Anyways, this code will go in the for loop to almost finish the code

"

def list_total(numbers):

   sum_of_numbers = 0

   for number in numbers:

       sum_of_numbers += number

"

The last thing is to return this value, and this is simply done by using the syntax:

"return {value here}"

and since the sum_of_numbers has the value, we write

"return sum_of_numbers"

at the end of the function, which is very very important, because when you use the return keyword, you end the function, and return whatever value is next to the return to the function call

So to finish the code we just add this last piece to get:

"

def list_total(numbers):

   sum_of_numbers = 0

   for number in numbers:

       sum_of_numbers += number

   return sum_of_numbers

"

Find a regular grammar that generates the language L(aa*(ab+a)*)

Answers

Answer:

S → aAB

A → a | ɛ

B → abB | aB | ɛ

Explanation:

Long time ago I did this, but I think this does the job?

Regular grammar for language L(aa*(ab+a)*):

S -> aA, A -> aA | B, B -> ab | a | ε.

We have,

To construct a regular grammar that generates the language

L(aa*(ab+a)*), we need to break it down into its basic components and then define the production rules for each part.

The language L(aa*(ab+a)) consists of strings that start with one or more 'a's (aa), followed by either the string "ab" or just "a" (ab+a)*.

Note that the "ab+a" part can repeat zero or more times.

Here is the regular grammar:

- Start with the initial non-terminal S.

- The production rules are as follows:

S -> aA

A -> aA | B

B -> ab | a | ε

- Explanation of the production rules:

S -> aA: The string starts with an 'a', followed by A.

A -> aA: If the string contains more 'a's, it remains in A and continues adding 'a's.

A -> B: If the string contains "ab" or just "a", it goes to B.

B -> ab: The string contains "ab".

B -> a: The string contains only "a".

B -> ε: The string is empty.

This grammar generates strings in the language L(aa*(ab+a)*).

The notation "ε" represents an empty string (i.e., the production rule does not add any symbols to the string).

Thus,

Regular grammar for language L(aa*(ab+a)*):

S -> aA, A -> aA | B, B -> ab | a | ε.

Learn more about regular grammar for languages here:

https://brainly.com/question/31423942

#SPJ3

Explain the unique reasons why assembly language is preferred to high level language

Answers

The special reason why assembler language is preferred to high level language is that  It is said to be memory efficient and it is one that requires less memory.

Why is assembly language better than other kinds of high level?

It implies means that the programs that one uses to write via the use of high-level languages can be run easily on any processor that is known to be independent of its type.

Note that it is one that has a lot of  better accuracy and an assembly language is one that carries out a lot of better functions than any high-level language, in all.

Note also that the advantages of assembly language over high-level language is in terms of its Performance and accuracy as it is better than high-level language.

Hence, The special reason why assembler language is preferred to high level language is that  It is said to be memory efficient and it is one that requires less memory.

Learn more about assembler language from

brainly.com/question/13171889

#SPJ1

Task 03
Write C# code which starts with the number 1 and then displays the result of halving
the previous number until the result is less than 0.001.
The expected output should be:
1.0
0.5
0.25
0.125
0.0625
0.03125
0.015625
0.0078125
0.00390625
0.001953125

Answers

Answer:

class Program {

 public static void Main (string[] args) {

   double number = 1.0;

   while(number >= 0.001) {

     Console.WriteLine (number);

     number /= 2;

   }    

 }

}

Explanation:

Always think carefully about what is in the condition of the while statement. In this case, you want the loop to be executed as long as the number is larger than or equal to 0.001.

How can structure of a table change in sql. What general types of changes are possible

Answers

One can structure of a table change in sql and the general types of changes that are possible is that:

One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

How can we modify the structure of a table in SQL?

The SQL ALTER TABLE command is known to be the tool that is often used to alter the structure of an existing table.

Note that it is one that can helps to add or delete columns, make or destroy indexes, alter the type of existing columns, and others.

Hence, One can structure of a table change in sql and the general types of changes that are possible is that:

One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

Learn more about table structure from

https://brainly.com/question/26125587

#SPJ1

In python please:

Assume the variable definitions references a dictionary. Write an ig statement that determined whether the key ‘marsupial’ exist in the dictionary. If so, delete ‘marsupial’ and it’s associated value. If the key is not the dictionary, display a message indicating so.

Answers

Answer:

"

if 'marsupial' in dictionary:

   del dictionary['marsupial']

else:

   print("The key marsupial is not in the dictionary")

"

Explanation:

So you can use the keyword "in" to check if a certain key exists.

So the following code:

"

if key in object:

   # some code

"

will only run if the value of "key" is a key in the object dictionary.

So using this, we can check if the string "marsupial' exists in the dictionary.

"

if 'marsupial' in dictionary:

   # code

"

Since you never gave the variable name for the variable that references a dictionary, I'm just going to use the variable name "dictionary"

Anyways, to delete a key, there are two methods.

"

del dictionary[key]

dictionary.pop(key)

"

Both will raise the error "KeyError" if the key doesn't exist in the dictionary, although there is method with pop that causes an error to not be raised, but that isn[t necessary in this case, since you're using the if statement to check if it's in the dictionary first.

So I'll just use del dictionary[key] method here

"

if 'marsupial' in dictionary:

   del dictionary['marsupial']

else:

   print("The key marsupial is not in the dictionary")

"

The last part which I just added in the code is just an else statement which will only run if the key 'marsupial' is not in the dictionary.

In cell N2, enter a formula using the IF function and structured references as follows to determine which work tier Kay Colbert is qualified for:
a. The IF function should determine if the student's Post-Secondary Years is greater than or equal to 4, and return the value 2 if true or the value 1 if false.

Answers

The IF Function based formula that can be entered into cell N2 that will return 2 if true, and 1 if false is =IF(M2 >=4, 2, 1).

How is the IF function used?

An IF function allows us to be able to sort through data by analyzing data to find out if it conforms to a certain characteristic that we are looking for.

If the data corresponds, the IF function will return a value that means True, but if it doesn't, the value returned would be false.

After typing in the IF function, the next thing to do is specify the cell where the data you want to analyze is. In this case that data is in cell M2. You immediately follow this up by the parameter being compared.

In this case, we want to know if the figure in cell M2 is greater or equal to 4 so the next entry is M2>=

The next entry is the return if the comparison is true. In this case, the number for true is 2 and the one for false is 1. The full formula becomes:

=IF(M2 >=4, 2, 1).

In conclusion, the function is =IF(M2 >=4, 2, 1).

Find out more on the spreadsheets at https://brainly.com/question/1429504.

#SPJ1

Other Questions
The area of a circle is 9pi cm. Find its radius. Please do this question with full solution:) Find the value of Theta in these diagrams (a and b) Help me, 50 pts, I'll give brainliest, *take your time answering if you need *1. how many groups of 5/7 are in 12. 8 divided by 5/73. The tape diagram shows that Ehecatl's hair, which is now 12cm long is 60% as long as it was before his haircut. Complete the table to show different percentages of Ehecatl's hair length before the haircut. (table is the file) Which social policy mentioned in the video is usually thought of as a state and local issue, but has seen the federal government get more involved? A ventilation fan with a moment of inertia of 0.034 kgm2 has a net torque of 0.11 nm applied to it. if it starts from rest, what kinetic energy will it have 8.0 s later? QUESTION 1 Consider the following diagram that shows liquid water evaporating to form water vapour. Evaporation 1.1. Use chemical formulae to represent the process in the diagram above and indicate the phases of the substance undergoing this process (2) 1.2. Give three separation methods that can be used to reverse a physical change. (3) Predict how a drug-free lifestyle will support the achievement of short- and long-term goals. What is the slope of the line represented by the equation y = x-3?O-3 helpp once again~ 20 points + brainlistHave you ever noticed how the colors of the environment change as seasons change throughout the year? Have you ever noticed how the activities people participate in change as seasons change? People often notice the change of seasons because the temperature of the air begins to change, or the amount of rain that falls becomes less or more. They also notice the change of seasons because the types of things they do changes.Plants also change with the seasons. Plants change how they look and the things they do in response to a change in season, just as people do. As spring changes to summer, the amount of daylight, the temperature, and the level of precipitation increase. As a result of more sun, more water, and warmer temperatures, plants are able to grow and produce flowers. In this season, you'll notice a lot of vibrant greens, reds, pinks, and more. You'll also notice more people outside. People plant flower and vegetable gardens, and play outdoor sports, like soccer and baseball.As summer changes to fall, the amount of daylight, the temperature, and the level of precipitation decrease. Temperatures begin to cool, and there is less sunlight available for the plants to make food. Leaves on the trees start to change color as they prepare for winter. You will notice a lot of yellows, oranges, and reds. You'll also notice the things people do changing. People still spend time outdoors, but instead of planting gardens, they rake leaves, and prepare their gardens for winter. They also collect colorful fall leaves or go for hikes to enjoy the variety of colors in nature.As fall turns to winter, plants prepare for the coldest months of the year. Since there is less daylight and colder temperatures, some plants respond by dropping their leaves and going into a period of dormancy. This ensures the survival of the plant over the winter. Some people do the same thing. They participate in fewer outdoor sports and spend much of the winter indoors keeping warm. Some people enjoy the winter and the things they can do because of it. These people often spend time during the winter skiing, snowboarding, snowshoeing, or ice skating. In this season, you will notice the bright white snow and people dressed warmly when spending time outdoors.Select a key point that the author makes in the article. A business wants to acquire new customers and increase sales. Which strategy should the business select? 5.A section of a tessellated plane is shown. Which type of symmetry does the tessellated plane have? Consider the following reaction at 298K.Pb2+ (aq) + Cu (s) Pb (s) + Cu2+ (aq)Which of the following statements are correct?Choose all that apply.The reaction is product-favored.delta G^o < 0n = 4 mol electronsK < 1Eo cell < 0 what is - 1/5 ( -2 1/4) ? Employee _______________ more readily occurs when employees are informed of the change and are educated on the reason for the change. Jim got a $3,000 savings account at 5 percent interest compounded annually. what will his balance be after four years? How does the author develop the idea that flying is an exciting passion? by mentioning that he was not eligible to fly for the military, the author highlights his determination to fulfill his dream of flying anyway. by explaining that he became a flight instructor, the author highlights his desire to help people follow their passion for flight. by providing his family history, the author highlights why he was so determined to learn to fly. by describing the freedom to fly wherever he wants, the author highlights the thrill he feels when he flies. Katalin drove 300 miles on her vacation. She drove an average of 1.9 times faster on the second 150 miles of her trip than she did on the first 150 miles of her trip. Which expression represents the time she spent driving? Let x = her speed on the first half of the trip. Can someone explain how to get the answer? I am very confused Cabinet members have two major jobs. in one, they are advisors; in the other, they are__________. An ellipse has a center at the origin, a vertex along the major axis at (10, 0), and a focus at (8, 0).Which equation represents this ellipse? Dr. ross believes that principles of natural selection help explain why infants come to fear strangers about the time they become mobile. Dr. ross is most likely a(n)?