what is memory? explain types of memory?​

Answers

Answer 1
Memory is the electronic holding place for the instructions and data a computer needs to reach quickly. It's where information is stored for immediate use. Memory is one of the basic functions of a computer, because without it, a computer would not be able to function properly. Memory is also used by a computer's operating system, hardware and software.
Answer 2

Answer:

Memory is the taking personal record of computer of past experience. The types of memory are 1)Read Only Memory 2)Random Access memory


Related Questions

Which of the following terms best describes the product development life cycle process?
descriptive
iterative
Static
evaluative

Answers

Answer:

D

Explanation:

Evaluative

.extern printf

.extern clock


.data

format: .asciz "x^n = %d\nTime: %ld microseconds\n"

x: .word 3 // İstediğiniz x değerini burada değiştirebilirsiniz

n: .word 4 // İstediğiniz n değerini burada değiştirebilirsiniz


.text

.global main


pow_iterative:

push {r4, lr}

mov r4, r0 /* Store x in r4 */

mov r0, #1 /* Initialize the result to 1 */

cmp r1, #0 /* Check if n is 0 */

beq iterative_end /* If n = 0, skip the loop */


iterative_loop:

mul r0, r4, r0 /* Multiply the result by x */

subs r1, r1, #1 /* Decrement n by 1 */

bne iterative_loop /* Continue the loop if n != 0 */


iterative_end:

pop {r4, lr} /* Restore registers r4 and lr from the stack */

bx lr /* Return from the function */


pow_recursive:

push {r4, lr}

cmp r1, #0 /* Check if n is 0 */

beq recursive_end /* If n = 0, return 1 */


mov r4, r0 /* Store x in r4 */

mov r0, #1 /* Initialize the result to 1 */

mov r2, r1 /* Save the value of n in r2 */

bl pow_recursive /* Recursive call with n/2 */

mov r1, r0 /* Store the result of recursive call in r1 */

mov r0, r1 /* Move the result to r0 */

mul r0, r1, r0 /* Square the result */


and r2, r2, #1 /* Check if n is odd */

cmp r2, #1

bne recursive_end /* If n is even, skip the multiplication */


mul r0, r4, r0 /* Multiply by x if n is odd */


recursive_end:

pop {r4, lr} /* Restore registers r4 and lr from the stack */

bx lr /* Return from the function */


main:

push {r0, lr} /* Save registers r0 and lr on the stack */


ldr r0, =x /* Load address of x */

ldr r0, [r0] /* Load value of x into r0 */


ldr r1, =n /* Load address of n */

ldr r1, [r1] /* Load value of n into r1 */


bl pow_iterative /* Call pow_iterative to calculate xn iteratively */

mov r2, r0 /* Move the result to r2 */


bl clock /* Call clock to measure the time */

mov r3, r0 /* Move the time to r3 */


ldr r0, =format /* Load address of the format string */

mov r1, r2 /* Move the result to r1 */

mov r2, r3 /* Move the time to r2 */

bl printf /* Call printf to print the result and time */


bl pow_recursive /* Call pow_recursive to calculate xn recursively */

mov r2, r0 /* Move the result to r2 */


bl clock

mov r3, r0 /* Move the time to r3 */

ldr r0, =format /* Load address of the format string */

mov r1, r2 /* Move the result to r1 */

mov r2, r3 /* Move the time to r2 */

bl printf /* Call printf to print the result and time */


pop {r0, lr} /* Restore registers r0 and lr from the stack */

bx lr /* Return from the function */

I WROTE SUCH A CODE TO CALCULATE X^N AND THE RUN TIME. NORMALLY IT SHOULD GIVE X^N= 81 AS AN OUTPUT BUT IT GIVES

x^n = 309565952

Time: 72247 microseconds
WHERE DID I DO WRONG CAN U CORRECT IT PLEASE

Answers

The corrected code is given as follows

nilslauluan

3 days ago

Computers and Technology

College

.extern printf

.extern clock

.data

format: .asciz "x^n = %d\nTime: %ld microseconds\n"

x: .word 3 // Change the desired x value here

n: .word 4 // Change the desired n value here

.text

.global main

pow_iterative:

   push {r4, lr}

   mov r4, r0 /* Store x in r4 */

   mov r0, #1 /* Initialize the result to 1 */

   cmp r1, #0 /* Check if n is 0 */

   beq iterative_end /* If n = 0, skip the loop */

iterative_loop:

   mul r0, r4, r0 /* Multiply the result by x */

   subs r1, r1, #1 /* Decrement n by 1 */

   cmp r1, #0 /* Check if n is 0 */

   bne iterative_loop /* Continue the loop if n != 0 */

iterative_end:

   pop {r4, lr} /* Restore registers r4 and lr from the stack */

   bx lr /* Return from the function */

pow_recursive:

   push {r4, lr}

   cmp r1, #0 /* Check if n is 0 */

   beq recursive_end /* If n = 0, return 1 */

   mov r4, r0 /* Store x in r4 */

   mov r0, #1 /* Initialize the result to 1 */

   mov r2, r1 /* Save the value of n in r2 */

   bl pow_recursive /* Recursive call with n/2 */

   mov r1, r0 /* Store the result of recursive call in r1 */

   mov r0, r1 /* Move the result to r0 */

   mul r0, r1, r0 /* Square the result */

   and r2, r2, #1 /* Check if n is odd */

   cmp r2, #1

   bne recursive_end /* If n is even, skip the multiplication */

   mul r0, r4, r0 /* Multiply by x if n is odd */

recursive_end:

   pop {r4, lr} /* Restore registers r4 and lr from the stack */

   bx lr /* Return from the function */

main:

   push {r0, lr} /* Save registers r0 and lr on the stack */

   ldr r0, =x /* Load address of x */

   ldr r0, [r0] /* Load value of x into r0 */

   ldr r1, =n /* Load address of n */

   ldr r1, [r1] /* Load value of n into r1 */

   bl pow_iterative /* Call pow_iterative to calculate xn iteratively */

   mov r2, r0 /* Move the result to r2 */

   bl clock /* Call clock to measure the time */

   mov r3, r0 /* Move the time to r3 */

   ldr r0, =format /* Load address of the format string */

   mov r1, r2 /* Move the result to r1 */

   mov r2, r3 /* Move the time to r2 */

   bl printf /* Call printf to print the result and time */

   bl pow_recursive /* Call pow_recursive to calculate xn recursively */

   mov r2, r0 /* Move the result to r2 */

   bl clock

   mov r3, r0 /* Move the time to r3 */

   ldr r0, =format /* Load address of the format string */

   mov r1, r2 /* Move the result to r1 */

   mov r2, r3 /* Move the time to r2 */

   bl printf /* Call printf to print the result and time */

   pop {r0, lr} /* Restore registers r0 and lr from the stack */

   bx lr /* Return from the function */

How   is this so?

In the provided code, there are a few areas that need correction  -

The iterative loop in the pow_iterative function should use b iterative_loop instead of bne iterative_loop to continue the loop.

The recursive call in the pow_recursive function should pass r4 (value of x) instead of r0 as the first argument.

The recursive_end label should come before the multiplication by x in the pow_recursive function.

The printf format specifier for the time value should be %ld instead of %d.

Learn more about code at:

https://brainly.com/question/26134656

#SPJ1

When should programmers use variables to store numeric data?

Answers

Programmers should use variables to store numeric data when they need to reference and use the same data multiple times throughout a program.

What is program?

A program is a set of instructions that can be executed by a computer to perform a specified task. It can be written in any of a number of programming languages, such as C, Java, Python or Visual Basic. Programs can range from simple scripts that automate a task, to complex applications with many features. Programs are designed to solve a particular problem or provide a specific benefit to the user.

Variables are a convenient way to store and access data that may be needed in multiple different places.

To learn more about program
https://brainly.com/question/28028491
#SPJ1

what is the entity relationship model?

Answers

also known as an entity relationship model, its a graphical representation that depicts relationships among people, objects, places, concepts or events within an information technology (IT) system.

A Quicksort (or Partition Exchange Sort) divides the data into 2 partitions separated by a pivot. The first partition contains all the items which are smaller than the pivot. The remaining items are in the other partition. You will write four versions of Quicksort:
• Select the first item of the partition as the pivot. Treat partitions of size one and two as stopping cases.
• Same pivot selection. For a partition of size 100 or less, use an insertion sort to finish.
• Same pivot selection. For a partition of size 50 or less, use an insertion sort to finish.
• Select the median-of-three as the pivot. Treat partitions of size one and two as stopping cases.
As time permits consider examining additional, alternate methods of selecting the pivot for Quicksort.

Merge Sort is a useful sort to know if you are doing External Sorting. The need for this will increase as data sizes increase. The traditional Merge Sort requires double space. To eliminate this issue, you are to implement Natural Merge using a linked implementation. In your analysis be sure to compare to the effect of using a straight Merge Sort instead.

Create input files of four sizes: 50, 1000, 2000, 5000 and 10000 integers. For each size file make 3 versions. On the first use a randomly ordered data set. On the second use the integers in reverse order. On the third use the
integers in normal ascending order. (You may use a random number generator to create the randomly ordered file, but it is important to limit the duplicates to <1%. Alternatively, you may write a shuffle function to randomize one of your ordered files.) This means you have an input set of 15 files plus whatever you deem necessary and reasonable. Files are available in the Blackboard shell, if you want to copy them. Your data should be formatted so that each number is on a separate line with no leading blanks. There should be no blank lines in the file. Even though you are limiting the occurrence of duplicates, your sorts must be able to handle duplicate data.

Each sort must be run against all the input files. With five sorts and 15 input sets, you will have 75 required runs.

The size 50 files are for the purpose of showing the sorting is correct. Your code needs to print out the comparisons and exchanges (see below) and the sorted values. You must submit the input and output files for all orders of size 50, for all sorts. There should be 15 output files here.

The larger sizes of input are used to demonstrate the asymptotic cost. To demonstrate the asymptotic cost you will need to count comparisons and exchanges for each sort. For these files at the end of each run you need to print the number of comparisons and the number of exchanges but not the sorted data. It is to your advantage to add larger files or additional random files to the input - perhaps with 15-20% duplicates. You may find it interesting to time the runs, but this should be in addition to counting comparisons and exchanges.

Turn in an analysis comparing the two sorts and their performance. Be sure to comment on the relative numbers of exchanges and comparison in the various runs, the effect of the order of the data, the effect of different size files, the effect of different partition sizes and pivot selection methods for Quicksort, and the effect of using a Natural Merge Sort. Which factor has the most effect on the efficiency? Be sure to consider both time and space efficiency. Be sure to justify your data structures. Your analysis must include a table of the comparisons and exchanges observed and a graph of the asymptotic costs that you observed compared to the theoretical cost. Be sure to justify your choice of iteration versus recursion. Consider how your code would have differed if you had made the other choice.

Answers

The necessary conditions and procedures needed to accomplish this assignment is given below. Quicksort is an algorithm used to sort data in a fast and efficient manner.

What is the Quicksort?

Some rules to follow in the above work are:

A)Choose the initial element of the partition as the pivot.

b) Utilize the same method to select the pivot, but switch to insertion sort as the concluding step for partitions that contain 100 or fewer elements.

Lastly,  Utilize the same method of pivot selection, but choose insertion sort for partitions that are of a size equal to or lesser than 50 in order to accomplish the task.

Learn more about Quicksort  from

https://brainly.com/question/29981648

#SPJ1

What kind of operating system is Windows? I

Answers

Huh? I don’t understand
computer operating system

PLEASE HELP
Which of the following best describes the existence of undecidable problems?

PLEASE HELP Which of the following best describes the existence of undecidable problems?

Answers

Answer:

D.

Explanation:

Its the exact definition of an undecidable problem. Plus I have my notebook open next to me and that's what it says, trust bro.

An undecidable problem is a problem for which no algorithm can be constructed that always produces a correct output. The correct option is D.

What is undecidable problem?

Problems that cannot be solved by an algorithm are known as undecidable problems since no computer program can come up with a solution that works for every scenario.

This is a key drawback of computing systems, and it has been analytically shown that some issues are intractable from the start.

Decision issues that lack an algorithmic solution are referred to as undecidable.

A issue that cannot be solved by a computer or computer software of any type has never been solved by a computer. There is no such thing as a Turing machine that can solve an insoluble problem.

Thus, the correct option is D.

For more details regarding undecidable problems, visit:

https://brainly.com/question/30187947

#SPJ6

Help me with this digital Circuit please

Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please

Answers

A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Thus, These circuits receive input signals in digital form, which are expressed in binary form as 0s and 1s. Logical gates that carry out logical operations, including as AND, OR, NOT, NANAD, NOR, and XOR gates, are used in the construction of these circuits.

This format enables the circuit to change between states for exact output. The fundamental purpose of digital circuit systems is to address the shortcomings of analog systems, which are slower and may produce inaccurate output data.

On a single integrated circuit (IC), a number of logic gates are used to create a digital circuit. Any digital circuit's input consists of "0's" and "1's" in binary form. After processing raw digital data, a precise value is produced.

Thus, A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Learn more about Digital circuit, refer to the link:

https://brainly.com/question/24628790

#SPJ1

Press CTRL+W to save the document.
True
False

Answers

Answer:

False.

Explanation:

Pressing CTRL+W will close the current tab or window. To save a document, you can use CTRL+S or go to File > Save.

Answer:

False

Explanation:

Pressing CTRL+W closes the current window or tab in most applications, but it does not save the document.

why might you want to clear cookies from your computer from time to time?

Answers

Answer:

Although small, cookies do occupy space on your computer. If there are enough of them stored over a long period of time, they could slow down the speed of your computer and other devices. Flagged, suspicious cookies. If your antivirus software flags suspicious cookies, you should delete them

Please help its due on May 7th and the code has to be in python.

Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.

Answers

We can use a list to store the sensor objects, and we can sort the list by room number, room description, or sensor number. However, accessing a sensor by its room number would require iterating through the entire list.

How to explain the information

A tuple is similar to a list, but it is immutable, meaning that it cannot be modified once created. We could use a tuple to store each sensor object, but sorting the tuple would require creating a new sorted tuple. Accessing a sensor by its room number would also require iterating through the entire tuple.

A set is an unordered collection of unique items, and it can be modified. We could use a set to store the sensor objects, but sorting the set is not possible. Accessing a sensor by its room number would also require iterating through the entire set.

Learn more about sensor on

https://brainly.com/question/29569820

#SPJ1

to help to solve computer --m- =?

Answers

The solution for the variable "m" in the equation 2 - m = 7 is -5.

How to solve the equation

To solve for the variable "m" in the equation 2 - m = 7, we need to isolate the variable on one side of the equation. We can do this by adding "m" to both sides of the equation:

2 - m + m = 7 + m

Simplifying the left side of the equation:

2 = 7 + m

Then, subtracting 7 from both sides of the equation

2 - 7 = 7 + m - 7

Simplifying the left side of the equation:

-5 = m

Therefore, the solution for the variable "m" in the equation 2 - m = 7 is -5.

Learn more about expressions on

https://brainly.com/question/723406

#SPJ1

Solve the variables 2 - m = 7

does anyone know how to code

Answers

Answer:

no

Explanation:

i do not know how to code

Largest and Smallest

Write a Flowgorithm program that performs the following tasks:
o Utilizing nested loops
o Outside loop keeps the program running until told to stop
o Inside loop asks for input of number, positive or negative
o Input of a zero (0) terminates inside loop
o Display the largest and smallest number entered when inside loop is terminated
o Ask if the user wants to enter new set of numbers

Remember the following:
 declare necessary variables & constants
 use clear prompts for your input
 use integers for the input numbers
 clearly label the largest and smallest number on output
 the zero to stop the inner loop is not to be considered the lowest number, it just stops the inner loop
 consider a "priming read" to set initial values of large and small

Answers

The program based on the given question prompt is given below:

The Program

Beginning

 // initiate variables

 largest = -999999999

 smallest = 999999999

 interruption = false

 

 while not interruption do

   // reset variables for fresh set of numbers

   hugest_set = -999999999

   pettiest_set = 999999999

   

   // input cycle for gathering of numbers

   duplicated

     output "Input a number (0 to cease collection):"

     input figure

     if figure != 0 then

       if figure > hugest_set then

         hugest_set = figure

       end if

       if figure < pettiest_set then

         pettiest_set = figure

       end if

     end if

   until figure = 0

   

   // examine whether this bunch of figures accommodates new boundaries

  if hugest_set > largest then

     largest = hugest_set

   end if

   if pettiest_set < smallest then

     smallest = pettiest_set

   end if

   

   // produce the hugest and pettiest aspects for this set of numbers

   output "Foremost number within this set:", hugest_set

   output "Minimum number within this set:", pettiest_set

   

   // solicit whether the user wants to persist

   output "Do you wish to insert a new swarm of figures? (Y/N):"

   input answer

   if answer = "N" or answer = "n" then

     interruption = true

   end if

 end while

 

 // deliver grand total hugest and least parts

 output "Complete most extensive amount:", largest

 output "Overall minimum magnitude:", smallest

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

In cell B13, create a formula without a function using absolute references that subtracts the values of cells B5 and
B7 from cell B6 and then multiples the result by cell B8. please help with excel!! I'm so lost

Answers

Answer:

The formula in Excel is:

=($B$6 - $B$5 - $B$7)* $B$8

Explanation:

Required

Use of absolute reference

To reference a cell using absolute reference, we have to include that $ sign. i.e. cell B5 will be written as: $B$5; B6 as $B$6; B7 as $B$7; and B8 as $B$8;

Having explained that, the formula in cell B13 is:

=($B$6 - $B$5 - $B$7)* $B$8

1. What operating system are you using on your computer?

Answers

Answer:

Windows

Explanation:

Flexible and convenient

a. If the value in the Elected column is equal to the text "Yes", the formula should display Elected as the text.
b. Otherwise, the formula should determine if the value in the Finance Certified column is equal to the text "Yes" and return the text Yes if true And No if false.

Answers

=IF(Election="Yes","Election",IF(Finance Certified="Yes","Yes","No")) You can accomplish this by nesting one IF function inside of another IF function. The outer IF function determines whether "Yes" or "No" is the value in the Elected column.

How do you utilize Excel's IF function with a yes or no decision?

In this instance, cell D2's formula reads: IF

Return Yes if C2 = 1; else, return No.

As you can see, you may evaluate text and values using the IF function. Error evaluation is another application for it.

What does Excel's between function do?

You can determine whether a number, date, or other piece of data, such text, falls between two specified values in a dataset using the BETWEEN function or formula. A formula is employed to determine whether.

To know more about function visit:-

https://brainly.com/question/28939774

#SPJ1

What is the data type of the following variable?
name = "John Doe"

Answers

In computer programming, a variable is a storage location that holds a value or an identifier. A data type determines the type of data that can be stored in a variable. The data type of the following variable, name = "John Doe" is a string data type.

In programming, a string is a sequence of characters that is enclosed in quotes. The string data type can store any textual data such as names, words, or sentences.The string data type is used in programming languages such as Java, Python, C++, and many others. In Python, the string data type is denoted by enclosing the value in either single or double quotes.

For instance, "Hello World" and 'Hello World' are both strings.In conclusion, the data type of the variable name is string. When declaring variables in programming, it is important to assign them the correct data type, as it determines the operations that can be performed on them.

For more such questions on variable, click on:

https://brainly.com/question/28248724

#SPJ8

Name six different administrative controls used to secure personnel

Answers

The  six different administrative controls used to secure personnel are: Preventative, detective, corrective, deterrent, recovery, directive, and compensation.

What controls have the additional name "administrative controls"?

To lessen or restrict exposure to a particular hazard at work, administrative controls, also known as work practice controls, are used. When substitution, omission, or the use of engineering controls are not practical, this type of hazard control alters the way work is done.

Therefore, Policies, processes, or guidelines that outline employee or company practices in keeping with the organization's security objectives are referred to as administrative security controls.

Learn more about administrative controls from

https://brainly.com/question/15134135
#SPJ1

(a) use excel to construct a spreadsheet that show the following. (you will not submit this spreadsheet. however, the results will be needed later in this problem.)

Answers

A graph of mhgvsa was created using the aforementioned data and the necessary calculations to determine the acceleration, a. To draw and calculate the slope of the best fit line, use the trendline option.

Do you require familiarity with the Excel spreadsheet?

Understanding how to use an Excel spreadsheet is frequently important. It is a prerequisite for many jobs that allow employers to hire anyone.

How does a spreadsheet work and what is it used for?

A spreadsheet is a piece of writing with rows and columns of cells that may be used to sort and work with data. Each cell is intended to carry a single piece of information, such as a number, a letter, or formulas that make use of other cells.

To know more about  trendline option visit :-

https://brainly.com/question/20309607

#SPJ4

A database has two tables Rand S with 100 tuples each. Exactly two transactions, 11 and T2, execute concurrently on the database. T1 inserts a tuple in R and after some time decides to abort. T2 computes the difference: SELECT count(*) from R - SELECT count(*) from s and inserts as many tuples in S. After the transactions complete, R has 100 tuples and S has 101 tuples. Which of the following is possible?
a. The transactions executed in the REPEATABLE READ isolation level.
b. The transactions executed in the READ UNCOMMITTED isolation level.
C. The transactions executed in the READ COMMITTED isolation level.
d. This outcome is not possible in any of these isolation levels.

Answers

Answer:

a. The transaction executed in the REPEATABLE READ isolation level.

Explanation:

Database management system are used by businesses to organize and handle large data. There are 3 types of DBMS :

1- Hierarchical Database management system

2- Network Database management system

3- Object oriented Database management system.

On the AdvertisingCosts worksheet, create a Line chart of the data for the total spent on advertising each month from January through June. The primary horizontal axis should be the months of the year, and the Vertical (value) Axis should be the total spent on advertising each month.

Answers

I can provide you with general instructions on how to create a line chart in Microsoft Excel based on the data you have mentioned.

How to create the line chart

To create a line chart of the data for the total spent on advertising each month from January through June in Microsoft Excel, you can follow these steps:

Open Microsoft Excel and open the AdvertisingCosts worksheet.

Select the data range for the months and total spent on advertising from January through June.

Click on the "Insert" tab on the Excel ribbon.

Click on the "Line" chart type under the "Charts" section.

Select the chart subtype that you prefer from the drop-down menu. For example, you can choose a simple line chart or a chart with markers for each data point.

Your chart will be created, but it may need some adjustments to make it look better. For example, you may want to add a chart title, axis titles, and legend to the chart.

Click on the chart to activate the "Chart Tools" tab on the Excel ribbon.

Use the options on this tab to customize your chart as needed. For example, you can add a chart title by clicking on the "Chart Title" button, or you can change the axis titles by clicking on the "Axis Titles" button.

Once you have completed these steps, you should have a line chart of the data for the total spent on advertising each month from January through June. The primary horizontal axis should be the months of the year, and the Vertical (value) Axis should be the total spent on advertising each month.

Read more about spreadsheets here:

https://brainly.com/question/26919847

#SPJ1

What are some of the ways we can resolve IPv4 address shortages? Check all that apply.

Answers

Answer:

I am not as close to the network as I used to be but I have not seen articles about the network apocalypse due to IPv4 address depletion. Unlike in the late 90’s when predictions of apocalypse were everywhere.

What happened?

Two things:

Network address translation (NAT) was introduced to allow organizations to use private addresses on their internal network and minimize the requirement for “real” IP4 addresses.

Second, IPv6 was created and introduced to expand the number of addresses available.

So, a direct answer is use IPv6 and/or NAT for internal networks.

Explanation:

Write a C++ program to print multiplication table of any number

Answers

The cost of a C++ program that prints the multiplication table of any number is $5. C++ is a cross-platform language for developing high-performance applications.

What is C++ program?Bjarne Stroustrup created C++ as an extension to the C language. C++ provides programmers with extensive control over system resources and memory. C++ is widely regarded as one of the most difficult programming languages to master, even when compared to popular languages such as Python and Java. Because of its multi-paradigm nature and more advanced syntax, C++ is difficult to learn. C++ printf is a formatting function for printing a string to stdout. The basic idea behind calling printf in C++ is to provide a string of characters that must be printed exactly as they are in the program. In C++, the printf function also includes a format specifier, which is replaced by the actual value during execution.

Write a c++ programme to print multiplication table?

#include <iostream>

using namespace std;

int main()

{

  int n;

  cout << "Enter a positive integer: ";

  cin >> n;

 for (int i = 1; i <= 10; ++i) {

      cout << n << " * " << i << " = " << n * i << endl;

  }

  return 0;

}

output

Enter an integer: 5

5 * 1 = 5

5 * 2 = 10

5 * 3 = 15

5 * 4 = 20

5 * 5 = 25

5 * 6 = 30

5 * 7 = 35

5 * 8 = 40

5 * 9 = 45

5 * 10 = 50

To learn more about c++ programme, refer to :

brainly.com/question/20339175

#SPJ1

Individuals and organizations are moving to highly integrated enterprise systems
Select one:
True
False

Answers

The statement "Individuals and organizations are moving to highly integrated enterprise systems" is true.

What is enterprise system integration?

An ERP system tells you exactly how much stock you need for each job and when you need it. ERP software also enables you to automate many of your procedures, resulting in increased efficiencies across the manufacturing process.

This implies less duplication, better resource scheduling, and less downtime. Enterprise integration allows for smooth cooperation by merging functionality and data interchange across many apps.

Therefore, the correct statement is true.

To learn more about enterprise, refer to the link:

https://brainly.com/question/18551533

#SPJ1

You have been asked to write a loop that outputs values in a database column ranging between 10 and 100. Any number that is not divisible by 5, and any value that is not an integer, should be ignored. When the value in the loop hits 95, break the loop prematurely. One of your team members has advised the use of break, continue, and pass statements.

Answers

Explanation:

This is going to depend on the language you're working in heavily.

First you will want to verify your number is an integer rather than a floating point which will completely depend on the language and whether you care if the floating point is 1.0 for example, which could still be converted a valid integer value.

After you've determined if it is an integer you can use modulo to check if the integer is evenly divisible by 5. In C-like languages you would write this as `x % 5`. Any result other than zero would mean it is not evenly divisible.

You also need to check if the integer is >= 10 and <= 100.

Read up on for/while loops and break/continue in those loops to understand that concept, it is pretty universal to all languages.

Good luck!

In addition to allowing collaborators to leave comments on a shared
document, what does document synchronization permit people to do?
O A. Combine and compress the document into a zip file
B. Update the document and then email it to others
OC. Integrate the document into a shared work calendar
OD. Make and track changes on the document

Answers

Document synchronization permits people to make and track changes on the document. The correct option is D.

What is a document synchronization permit?

A license that allows music to be synchronized with moving images on a screen, typically in television, film, or ads. When a song is used, sync licenses are required from both the recording owner and the composition owner, and they are often paid as a one-time upfront cost.

The document synchronization permit makes and tracks the changes on the document so that is clear to everyone.

Therefore, the correct option is D. Make and track changes on the document.

To learn more about document synchronization permits, refer to the link:

https://brainly.com/question/1527819

#SPJ1

Answer:

D

Explanation:

5. What are Excel cell references by default?
Relative references
Absolute references
Mixed references
Cell references must be assigned

Answers

Answer: relative references

Explanation:

By default, all cell references are RELATIVE REFERENCES. When copied across multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.

Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.

Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.

You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:

What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.

Answers

In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:

Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.

What is the Case Facts?

First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.

Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.

Learn more about affidavit from

https://brainly.com/question/30833464

#SPJ1

Vladimir is reworking an old slideshow. He needs to delete some of the text, combine or summarize other parts, and create a few new slides as well. He wants to only look at the text. Is there any easy way to do that?

Answers

Answer:

Outline View

Explanation:

Most slideshow software has an Outline view that shows only the text of each slide without any graphics or other distracting elements. In this view, Vladimir can easily edit, delete, and summarize the text without getting distracted by other elements.

Other Questions
a survey of free software for the design, analysis, modelling, and simulation of an unmanned aerial vehicle Were the Vietcong our allies or enemies in the Vietnam War answer According to Baltes and his colleagues, the most successful adaptation to declining physical and cognitive abilities in late adulthood involves ____. AllSteel Inc. is planning an international expansion. In terms of the costs involved in conducting business in a country, it will be most economical for the company if it chooses a country. Multiple Choice: a) where laws regarding product safety, safety in the workplace, and environmental pollution are extremely stringent. b) with a closed totalitarian political system. c) with no local laws to protect intellectual property. d) where politicians are held accountable by the electorate. e)where the company will have to provide its own infrastructure and supporting business. The scale drawing of a rectangular city park measures 10.0 cm by 5.0 cm. The scale of the drawing is 1.0 cm = 4.5 m. What is the area, in square meters, of the actual park? Your variable annuity charges administrative fees at an annual rate of 0.17 percent of account value. Your average account value during the year is $202,000. What is the administrative fee for the year? (Round your answer to the nearest whole dollar.) In the metallurgic industry one of the processes to get pure iron takes tree steps.a) CaCO3CaO + CO2b) CO2 + C COc) Fe2O3 + CO Fe + CO2Calculate the kilograms of iron that would be produced from 1340 g of calcium carbonate provides daycare for children mondays through fridays. charges each parent per child per month.1. Calculate the breakeven point. 2. Polar Bear's target operating income is $10,400 per month. Compute the number of children who must be enrolled to achieve the target operating income. 3. Polar Bear lost its lease and had to move to another building. Monthly rent for the new building is $3,000. In addition, at the suggestion of parents, Polar Bear plans to take children on field trips. Monthly costs of the field trips are $1,000. By how much should Polar Bear increase fees per child to meet the target operating income of $10,400 per month, assuming the same number of children as in requirement 2? The ceo of c & j construction is considering moving to a virtual network structure. What would be the best reason to make such a move?. Most school-age and college students:a. underestimate how much their peers are using drugs.b. overestimate how much their peers are using drugs.c. are accurate predictors about self and peer drug use.d. can accurately predict their peers' drug dependency but not their own. at the beginning of december, coastal corporation had $2,700 in supplies on hand. during the month, supplies purchased amounted to $3,800, but by the end of the month the supplies balance was only $1,400. what is the appropriate month-end adjusting entry? A hiker walks 11 km due north from camp and then turns and walks 11 km due east. What is the total distance walked by the hiker? geographically, panama is a classic example of which landform? Justin is playing tennis. When serving, he stands 12 feet away from the net, which is 3 feet tall. The ball is served from a height of 7. 5 feet. Justin thinks the ball travels about 21. 4 feet before it hits the ground 8 feet from the net on the opposite side. A) How far does the ball travel? b) What assumptions did you make to solve the distance the ball travels? c) What mathematical practice did you use to solve this problem? y= -7 using the slope and y intercept and graph the equation In lines 72-73 the narrator says that balboas hindsight is always good cite two examples from the story that support this statement A nurse is conducting a discussion group with parents of children who have genitourinary disorders. As part of the discussion, the nurse reviews the major functions of the kidneys. The nurse determines that the teaching was successful based on which statement by the group In an urban area, you can expect ____.A. sparse population and many roads.B. dense population and many roads.C. Sparse population and little development.D. dense population and little development. When Jane had leukemia as a child she had to undergo numerous bouts of chemotherapy. The chemotherapy always made her nauseous. As she went through a year of treatment, the waiting room started to make her nauseous. The nausea from the chemotherapy is: Explain why geographers often break the world into cultural regions. What can they learn by doing this, and howcan they use the information? Your answer should include no less than four complete sentences