Answer:
C++ code:
#include<iostream>
using namespace std;
void sort(int al[30], int l)
{
//we use insertion sort to sort the array.
int p,q,k;
for(q=1;q<l;q++) //starting from the 2nd item of the array.
{
k= al[q]; //taking qth item as key value.
p=q-1;
while(p>=0 && al[p]>k)
{
al[p+1]=al[p]; //all items those are greaer than al[q] are shifted //to right.
p=p-1;
}
al[p+1]=k;
}
}
int main()
{
int p,l, arrl[30];
cout<<"Enter the number of items in your array: ";
cin>>l;
cout<<endl;
cout<<"Enter your "<<l<<" items"<<endl;
for(p=0;p<l;p++)
{
cin>>arrl[p];
}
sort(arrl, l); //call function sort() to sort the array.
cout<<"The array after sorting: ";
for(p=0;p<l;p++)
{
cout<<arrl[p]<<" ";
}
cout<<endl;
cout<<"The smallest item is: ";
cout<<arrl[0]<<endl;
cout<<"The middle item is: ";
cout<<arrl[l/2]<<endl;
cout<<"The biggest item is: ";
cout<<arrl[l-1]<<endl;
}
Output is given as image.
<u>Answer:</u>
The correct answer option is C. near right.
<u>Explanation:</u>
The most accurate readings that you can take on an analog VOM are when the meter's pointer is near right.
There are two reasons behind this: readings towards the left end are likely to be off because of the incorrect adjustment of the zero adjust screw.
While readings at the left side may result in an inaccuracy in your reading as a smaller part of the total voltage is near the full scale.
Answer:
- Calculate the additional CPI due to the icache stalls.
- Calculate the additional CPI due to the dcache stalls.
- Calculate the overall CPI for the machine.
The additional CPI due to icache stalls = Hit Rate * Hit Latency + Miss Rate*
Miss Penalty = 0.9*2 + 0.1*50 = 1.8 + 5 = 6.8
The additional CPI due to dcache stalls = 0.92*2 + 0.08*124 = 11.76
The overall CPI = 0.3*11.76 + 0.7*1.0 + 1.0*6.8 = 11.03 7.
Explanation:
Answer:
The correct answer is A.
Explanation:
Vishing can be described as phishing but only using a mobile telephone, making the victim give up any personal information that could be used for identity theft etc.
Pharming is a process which redirects the traffic from a known and trusted website to another one where they perform the operation of stealing the personal information of the people.
The example given in the question falls into the category of "Spear Phishing" which is when the victim receive e-mails that look like they have been sent by a trusted and known individual. This way they are more likely to open the e-mail or click on the link in the e-mail and the phishing act has a higher chance of success.
I hope this answer helps.
The correct answer is..A?