Answer:
Direct Mapped Cache
Explanation:
Given that a Direct Mapped Cache is a form of mapping whereby each main memory address is mapped into precisely one cache block.
It is considered cheaper compared to the associative method of cache mapping, and it is faster when searching through it. This is because it utilizes a tag field only.
Hence, The method of mapping where each memory location is mapped to exactly one location in the cache is "Direct Mapped Cache"
Answer:
<u>Output</u>
The values read are:
25
3
4
65
7
9
5
6
1
11
10 data values were read
Explanation:
Below is the Java program to read all data from the file echoing the data to standard output and finally displaying how many data were read:-
import java.io.File;
import java.io.FileNotFoundException;
import java.util.Scanner;
public class MyFileReader {
public static void main(String[] args){
int num,counter=0;
File file=new File("numbers.txt");
try {
Scanner input=new Scanner(file);
System.out.println("The values read are: ");
while(input.hasNext()){
num=input.nextInt();
System.out.println(num);
counter+=1;
}
System.out.println(counter+" data values were read");
} catch (FileNotFoundException e) {
// TODO Auto-generated catch block
e.printStackTrace();
}
}
}
Answer:
A milestone is a significant progress point within your project. Milestones' main purpose is to set goals you have to achieve in order to succeed and complete your project
Explanation:
-Example 1-
You have to write a report for your project. This report contains introduction, problem background, results, and recommendations. The milestones for writing your report could be:
Milestone 1: introduction section is completed
Milestone 2: problem background section is completed
Milestone 3: results section is completed
Milestone 4: recommendations section is completed
-Example 2-
You have to design a webpage that allows the user to login, enters his/her name, and logout. The milestones in this case could be:
Milestone 1: login functionality is completed
Milestone 2: text field for typing the name is placed
Milestone 3: submit name button functionality is completed
Milestone 4: logout button functionality is completed
Milestone 5: all components of the webpage are fully integrated
You might think the goals in these examples can be set differently, and that is true. The definition of the milestones is in general subjective and it depends on how you design the steps you want to follow to complete your project. You might also want to add these milestones to a timeline so you have an estimated schedule of the development of your project.
Answer:
A class is like a blueprint of object.
Explanation:
A class defines the kinds of data and the functionality their objects will have.
A class enables you to create your own custom types by grouping together variables of other types, methods and events.
In C#, we can create a class using the class keyword.
Here's a sample program:
using System;
namespace ConsoleApplication
{
public class Test
{
public static void Main()
{
Add a1 = new Add(70, 50);
a1.AddNumbers();
Console.ReadLine();
}
}
class Add
{
private int row;
private int column;
public Add(int r, int c)
{
row = r;
column = c;
}
public void AddNumbers()
{
Console.WriteLine(row+column);
}
}
}
output: 120
Explanation of the program:
I have created a class named Add. Within a class, row and column are two fields and AddNumbers() is a method. We also have constructor to initialize row and column.
In main method, If I need to invoke members of the class, I must create an instance of the class. We can create any number of instances using the single class.IN our program, a1 is the reference variable using which we can invoke members of the class. I invoked function in the class and passed arguments to the constructor while creating an instance.
Those values are assigned to method variables and it operated the addition. Thus the output is 120.
Answer: Snort
Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.
The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.