jobs
Q: Explain why a 3-layer neural network having a hidden layer can solve the deficiencies of the percept...
A: This is an equivalent situation confronting the essential perceptron when handling the XOR problem. ...
Q: Complete the diagram
A: Here we will complete the diagram
Q: write c++ program
A: Sample Response: //C++ programming language, tested on CodeBlock IDE#include<iostream>using na...
Q: Question
A: Ans:) In order to find 3-frequent sets. We create all the possible 3 item sets and then select only ...
Q: requires that each station first listen to the medium before sending. MA CSMA FDMA CDMA
A: Ans:) MA stands for multiple access. it is the use of multiplexing techniques to provide communicat...
Q: What is a sentence? Also discuss its type with examples.
A: Given : what is a sentence ? also discuss its type with example.
Q: Write a c++ program to print fibonacci series without using recursion and using recursion. Input: 10...
A: Given: Write a c++ program to print fibonacci series without using recursion and using recursion. In...
Q: Fill the insertCommas method to recursively construct and return a string representation of the para...
A: The recursive approach to this problem is simple. But since sometimes the number given is too large ...
Q: Problem2. Is it possible to design an expanding opcode to allow the following to be encoded in a 12-...
A: Instruction: Is it possible to design an expanding opcode to allow the following to be encoded in a ...
Q: Explain why the intangibility of software systems poses special problems for software projectmanagem...
A: SOLUTION:
Q: What is the Floating point form of 5/e using 5 digit rounding ? O None O fl(7/e) = 0.18393 × 10' O f...
A: Floating point
Q: For an 8-bit word, determine the range of values that it represents in floating point and the accura...
A: Range for 3 bit assigned to exponents Range for 4 bit assigned to exponents
Q: A network technician is able to connect the switches between two offices, but the offices cannot com...
A: Given: A network technician is able to connect the switches between two offices, but the offices can...
Q: What do you know about Pro/Engineer software and its applications in the field of Mechanical Enginee...
A: Pro/ENGINEER: Pro/ENGINEER could be a camera work system for modeling numerous mechanical styles and...
Q: Create a class with two static and two non-static functions. Call these functions in allcombinations...
A: Static and non-static: A static technique may be a technique that belongs to a category, however, it...
Q: Describe the difference between: A - CSS position of fixed and absolute B - HTML and HTML5
A: The type of positioning mechanism utilised for an element is specified by the position property. Dif...
Q: Write a java class that with multiple constructors(default constructor, 1 parameter and 2 parameter ...
A: Write a java class that with multiple constructors(default constructor, 1 parameter and 2 paramete...
Q: Write for Learning Management System In Software Engineering That Must Include: Project Scheduling ...
A: Write for Learning Management System In Software Engineering That Must Include: Project Scheduling ...
Q: Write an assembly language program to perform 8 bit addition. 1AH 4EH Discuss the xeffect of the add...
A: data segment a db 09h b db 02h c dw ? data ends
Q: in c++ solve the following picture :
A: #include <iostream>using namespace std;int main (){int value = 30;if (value > 20) throw val...
Q: To ensure privacy and accuracy, organisations should allow users to review and collect data.
A: To ensure privacy and accuracy : The privacy and accuracy of the data collection process can be impr...
Q: Correct and detailed answer will be Upvoted else downvoted. Thank you!
A: Sample Response: //C++ Program#include<bits/stdc++.h> using namespace std;class A{ public: ...
Q: Write HTML code to insert an image using <img> tag and use this image as a link
A: Image tag <img> is used to insert an image in web page. It has two main attributes. They are: ...
Q: sk is to inser s a decimal che nearest i porary stack
A: Q
Q: Create a function func_1.m to analyze the following function: The function needs to ask for x and ...
A: Given : Create a function func_1.m to analyze the following function: The function needs to ask f...
Q: Write the SQL sentence that provides an 8% increase in the salaries of all employees working in the ...
A: SQL Code: BEGIN TRANSACTION; /* Create a table called NAMES */CREATE TABLE EMPLOYEES(Id integer PRIM...
Q: Q1. (i) Using the following passwords “ABCefg12” and “KojoGiggs12” asexamples, discuss the strengths...
A: A strong password is one that is difficult for a computer or a human to guess, making it more conven...
Q: 1. Consider the following structure of a procedure in a certain programming language procedure Big i...
A: Static scoping is followed in most programming languages such as C++, and Java. Here, by merely look...
Q: Q2) 1) Is the following HTML fileis valid? test page 2) What does DOCTYPE mean?
A: Given : a) Is the following HTML file is valid ? <!DOCTYPE HTML> <html><head><t...
Q: Make a program that generates the output. (using array)n n^41 ...
A: Make a program that generates the output. (using array)n n^41 ...
Q: Write C Program of the following. Make the number guessing program with switch case.Make an alphabet...
A: Given: Write C Program of the following. Make the number guessing program with switch case.Make an a...
Q: Create a Pseudocode and a C++ program for a number guessing game. Your program is required to guess ...
A: #include <iostream> #include <cstdlib> #include <ctime> using namespace std; int...
Q: Use suitable examples that will distinguish the three important aspects of computer and network secu...
A: Confidentiality: Confidentiality define is the ability of the networks that hides the identity of th...
Q: Create a class called ship that incorporates a ship’s serial number and location. Create another cla...
A: Given : Create a class called ship that incorporates a ship’s serial number and location. Create ano...
Q: Explain one application of hashing in detail. Do you know any built in java library that can be used...
A: Given: Explain one application of hashing in detail. Do you know any built in java library that can ...
Q: Write a C# or a python program that creates an integer array of size 10 and fills the array with val...
A: Explanation: Step 1: Start Step 2: Declare Array with Elements Step 3: Find Prime Numbers in Array a...
Q: State the differences between SPACE and DCD directives.
A: In computer programming, a directive is a language command that states how a compiler should route ...
Q: Draw a flowchart that takes 20 numbers from the user and returns the count of numbers that can be di...
A: Sample Response
Q: 8. Under which condition will a comparator have a =' output? a. The largest bit is equal b. The smal...
A: Given:-
Q: (b) Good Programming practices help in improving programs readabilityand understandability both for ...
A: the question is: Good Programming practices help in improving programs readabilityand understandabil...
Q: Add Fractions problem: create in a sandbox environment. Directions: In this program you will ask th...
A: Sample Response: import java.util.*;public class MyProgram{ //main method definition public stati...
Q: Using the Laplace Principle of Indifference to know the uncertainty, solve the following; In a tour ...
A: Given: 40 times food trip, 25 times clothing and 15 times grocery. The probability of food trip only...
Q: **Java Programming** Consider a system which manages a library for the students and books details. T...
A: Code: public methods function. public abstract class Account { private String id; private String p...
Q: List the three general categories of unethical and illegal behavior. Give an example on each categor...
A: Given: List the three general categories of unethical and illegal behavior. Give an example on each ...
Q: Write a recursive C function that finds the factorial of a given integer. Use this function to n! fi...
A: Given data is shown below:
Q: Write a code on the pic using the following MODULE (CCP) MODULE + (MSSP) with no more than 300 instr...
A: Write a code on the pic using the following MODULE (CCP) MODULE + (MSSP) with no more than 300 instr...
Q: attached question
A: Given:-
Q: Think Critically 1-1: Recommending a Network Model. You're installing a new network for CSM Tech Pub...
A: Network model: Tcp: TCP/IP model is used in this scenario because it requires standard protocols fo...
Q: Write a programme to index the elements of an array using array subscripting and pointer arithmetic ...
A: Pointer is a variable that stores the address of a variable. Pointers are denoted by the *(operator)...
Q: With the help of using Boolean laws; Find the Minterms and Maxterms of the function, F (a,b,c) = a’+...
A: MINTERMS: Given the function:F(a, b, c) = a'+bc'The expression is:a'+bc'Using a=a.1;= a'.1 + bc'.1Us...
Assume that the followings are the outputs of ps and jobs commands and answer the following questions according to these outputs. |
ps |
jobs |
PID TTY TIME CMD 6417 pts/0 00:00:00 bash 6458 pts/0 00:00:00 sleep 6459 pts/0 00:00:00 bash 6460 pts/0 00:00:00 sleep 6468 pts/0 00:00:00 cat 6469 pts/0 00:00:00 ps |
[1] Running sleep 5000 & [2]- Running (sleep 250; echo "Hello") & [3]+ Stopped cat >list.txt |
2. |
What are the process ID no, job number, and status of the command “sleep 5000” |
|||||
|
Process ID: |
|
Job no: |
|
Status: |
|
|
|
|||||
3. |
Write the necessary command line to restart (foreground) the third job in the job list. |
|||||
|
|
Step by step
Solved in 2 steps
- Which of the following describes the below picture? Register-User > Sending-Confirmation-Mail Register-User extends Sending-Confirmation-Mail Register-User includes Sending-Confirmation-Mail Sending-Confirmation-Mail includes Register-User Sending-Confirmation extends Register-UserI have the following data in my JSON file: [{"username":"Juan","date":"Sat, 1 Apr 2023","time in":"02:36:46 PM"","time out":"02:36:48 PM"},{"username":"DelaCruz","date":"Sat, 1 Apr 2023","time in":"12:26:48 AM","time out":"12:26:49 AM"} ...] Please make a JAVA CODE that will lcompute how many hours each employee has rendered according to a date range I will select.A certain computer password consists of 3 through 5 uppercase letters chosen from the 26 letters in the Roman alphabet, with repetitions allowed. a, How many different passwords can be formed? b) How many different passwords have no repeated letter? c) What is the value of p after exiting the nested loop? p:= 1 for i:= 1 to 3 for j := 1 to 3 p:= p · i ·j next j next i
- Use the Bash shell for the completion of this project. Develop a shell scripting application that allows the user to perform some advanced mathematical operations. Your application should allow the user to perform these tasks: Task 1: Find the even multiples of any number chosen by the user in a given range – the user should specify the multiples of which number they want to print and a minimum and maximum value. The multiples printed should be within the [minimum, maximum] range. For example, if the user chooses the number 7 and would like to print all even multiples in the [15, 60] range, the program should print all the even multiples that are bigger than or equal to 15 (minimum), but smaller than or equal to 60 (maximum). The program should keep a count of how many numbers were printed and should output that count, as well as the numbers. The output then, for the example given, should be 28, 42, 56, and the count should be 3.Week 4- In Class Coding Packet Instructions: For each Exercise below, write your code in an IDE and run your code within the IDE as well. Once you have satisfied the Exercise requirements, paste your code below under the corresponding Exercise. Exercise 1 please write in C++ Create a temperature conversion program! To convert from Fahrenheit to Celsius or Celsius to Fahrenheit. ● ● ● Convert C to F (Formula): temp = (1.8 * temp) + 32.0; Convert F to C (Formula): temp = (temp - 32) / 1.8; HINT: what does every temperature have? (number and unit right?)A Tul 1eave Command line arguments are passed to int main(int argc, char** argv) as arguments argc and argv. You should assume that argc is at ebp+8 and argv is at ebp+12. Ox401050 : push šebp Ox401051 : mov šesp, šebp Soxc, sesp Ox8 (Sebp),šeax 0x401053 : sub Ox401056 : mov Ox401059 : add S0x4, šeax Sear Seax, Oxfffffffc (sebp) Ox40105c : mov Ox40105I : Ox8 (Sebp), $eax mov Oxc (sebp), seax Seax, OxffffffE8 (tebp) Ox401062 : imul ょううく、. Ox401066 : mov Oxc (tebp), tedx Ox8 (tebp), teax Ox401069 : mov Ox40106c : mov Ox40106f : sub šedx, teax Ox401071 : šeax, Oxfffffff4 (sebp) mov Ox401074 Oxfffffff8 (sebp), teax Oxfffffffc (tebp), teax Oxfffffff4 (Sebp), teax : mov Ox401077 : add Ox40107a : add Ox40107d : leave Ox40107e : ret tebp tesp, tebp Ox401089 : push Ox40108a : ;くT+UTRU> sub לווב mov Ox40108c : S0x18, šesp S0xfffffff0, tesp $0x0, šeax Ox40108f : and Ox401092 : mov Ox401097 Ox40109a : seax, Oxfffffff0 (sebp) OxfffffEEO (tebp), $eax mov : mov Ox40109d : call Ox401420 Ox4014b0 Oxc…
- Someone has modified the utils.asm file to insert a PrintTab subprogram immediatelyafter the PrintNewLine subprogram as shown below (changes are highlighted in yellow).The programmer complains that the PrintTab command cannot be called using the "jalPrintTab" instruction. What is wrong, and how can this be fixed? Explain all theproblems in the code this programmer has written.# subprogram: PrintNewLine# author: Charles Kann# purpose: to output a new line to the user console# input: None# output: None# side effects: A new line character is printed to the# user's console.textPrintNewLine: li $v0, 4 la $a0, __PNL_newline syscall jr $raSomeone has modified the utils.asm file to insert a PrintTab subprogram immediatelyafter the PrintNewLine subprogram as shown below (changes are highlighted in yellow).The programmer complains that the PrintTab command cannot be called using the "jalPrintTab" instruction. What is wrong, and how can this be fixed? Explain all theproblems in the code this programmer has written.# subprogram: PrintNewLine# author: Charles Kann# purpose: to output a new line to the user console# input: None# output: None# side effects: A new line character is printed to the# user's console.textPrintNewLine: li $v0, 4 la $a0, __PNL_newline syscall jr $ra .data __PNL_newline: .asciiz "\n"PrintTab: li $v0, 4 la $a0, tab syscall jr $ra.data tab: .asciiz "\t"Topic: Server Side Development How do you tell the server that session variables are being used? You do not have to add any special code. The server handles session variables automatically. Include the code: $_SESSION['sessionVarName'] = $varName; exchanging varName with the name of the variables for your program. Include the code: session_start(); as the first line in each function that uses a session variable. Include the code: session_start(); at the very top of the Web page.
- Command line arguments are passed to int main(int argc, char** argv) as arguments argc and argv. You should assume that argc is at ebp+8 and argv is at ebp+12. 00000000 <what>: 0: push %ebp 1: mov %esp,%ebp 3: sub $0x10,%esp 6: mov 0x8(%ebp),%eax 9: add $0x4,%eax c: mov %eax,-0x4(%ebp) f: mov 0x8(%ebp),%eax 12: imul 0xc(%ebp),%eax 16: mov %eax,-0x8(%ebp) 19: mov 0x8(%ebp),%eax 1c: sub 0xc(%ebp),%eax 1f: mov %eax,-0xc(%ebp) 22: mov -0x4(%ebp),%edx 25: mov -0x8(%ebp),%eax 28: add %eax,%edx 2a: mov -0xc(%ebp),%eax 2d: add %edx,%eax 2f: leave 30: ret00000031 <main>: 31: lea 0x4(%esp),%ecx 35: and $0xfffffff0,%esp 38: pushl -0x4(%ecx) 3b: push %ebp 3c: mov %esp,%ebp 3e: push %ebx 3f: push %ecx 40: sub $0x10,%esp 43: mov %ecx,%ebx 45: mov 0x4(%ebx),%eax 48: add $0x4,%eax 4b: mov (%eax),%eax 4d: sub…Exercise Exercise 4: Repeat the example scripts, and run them. • Exercise 5: Write script that take two arguments, and output the every number between from arg1 to arg2.A security analyst is running a tool against an executable of an unknown source. The input supplied by the tool to the executable program and the output from the executable are shown below: Input supplied by tool Output from executable asdfnerlajnvjanjkdfnvkjanakjdv asdfnerlajnvjanjkdfnvkjanakjdv klrejfkalsdjfklasdjffjladsf892 klrejfkalsdjfklasdjffjladsf892 ADSFQEDVASDASDFASDF; ADSFAS DWDF command not found qscTRGvcaDFcaDCasDC23rdcasdfAS qscTRGvcaDFca DC as DC23rdcasdfAS 1qkejfc934ejcjvsad: cmaoiwefasd lqkejfc934ejcj vsad: cmaoiwefasd Which of the following should the analyst report after viewing this information? A dynamic library that is needed by the executable missing. A. B. Input can be crafted to trigger an injection attack in the executable. C. The tool caused a buffer overflow in the executable's memory. D. The executable attempted to execute a malicious command.