1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
6

1) Discuss when it is best to use indexes. ​

Computers and Technology
1 answer:
Natasha2012 [34]3 years ago
5 0

indexes should be used when working figures which have large tables

You might be interested in
. Suppose: x = (1111 1111 1111 1111 1111 1111 1111 1100)2 y = (0011 1011 1001 1010 1000 1010 0000 0000)2 a. Is x bigger than y i
ahrayia [7]

Answer:

a. Using 32bit unsigned binary system, x is bigger than y

b. Using 32 bit signed system, x is not bigger than y.

Explanation:

a.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In an unsigned system all binary digits are used up as the magnitude bits;

First, we need to convert each number to decimal

x = 4294967292 (decimal)

y = 999983616 (decimal)

4294967292 is greater than 999983616

So, x is greater than y (in 32 bit unsigned binary system)

b.

x = (1111 1111 1111 1111 1111 1111 1111 1100)2

y = (0011 1011 1001 1010 1000 1010 0000 0000)2

In a signed system, the most significant bit is used as the signed bit, the remaining bits are used in representing the magnitude bits;

The most significant bit is always the first bit.

0 represents positive (+)

While

1 represents negative (-)

First we need to separate the most significant bit from the magnitude bits.

So x = 1 (111 1111 1111 1111 1111 1111 1111 1100)2

And y = 0 (011 1011 1001 1010 1000 1010 0000 0000)2

Then, we need to convert each number to decimal

x = -2147483644

y = +999983616

From the above, y is greater than x

4 0
3 years ago
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other
dezoksy [38]

Answer: False

Explanation:

 The given statement is false, as the alarm filtering is the process of classifying the various type of IDPS alert in the system and it can be managed more efficiently.

The IDPS administrator can easily set an alarm filtering in the running system. It can generate the various types of positive tract in the system and then adjust the different alarm classifications. Alarm filters are same as the packet filter in which they can easily filter the items from the source and destination IP address.

3 0
3 years ago
What is the data rate on a channel if the transmission duration of a frame of 1250 kb takes 200 ms ?
posledela

Answer:

6250 Kbps

Explanation:

See it in the pic.

8 0
3 years ago
We love him, because he ."
Andre45 [30]
We love him, because he “is everything I need.” I’m kinda confused on the answer lemme know if you need help
7 0
2 years ago
Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
Alex Ar [27]

Answer:

def capitalize_first(st):

   capitilized_list = []

   splitted_st = st.split(". ")

   for x in splitted_st:

       capitilized_list.append(x[0].capitalize() + x[1:])

   capitilized_st = ". ".join(capitilized_list)

   return capitilized_st

 

s = input("Enter a string: ")

print(capitalize_first(s))

Explanation:

Create a function called capitalize_first that takes one parameter, st

Create an empty list that will hold the capitalized strings

Split the given string using split function and put them in the splitted_st

Create a for loop that iterates through splitted_st. For each string in splitted_st, capitalize their first character and put them in the capitalized_list.

When the loop is done, join the strings in the capitalized_list using join function and set the joined string to capitilized_st

Return the capitilized_st

Ask the user for the string

Call the function with entered input and print the result

7 0
3 years ago
Other questions:
  • Jackson builders is constructing new homes in the Parkway subdivision.The company needs the logic for an application that ncalls
    13·1 answer
  • Computer user support helps people with minor computer problems. <br><br> True or False
    12·1 answer
  • Which event occurs when the user clicks on an html element?
    9·1 answer
  • Object Oriented Programming (OOP) allows us to handle complex code in an organized structure and break down the problem by model
    5·1 answer
  • Eugenia told her coach that she was too tired to play. As soon as she said it, she realized that she had made a big mistake. She
    12·1 answer
  • Describe data center technology and its relevance to modern-day cloud computing. Support your opinion with cited information.( S
    14·1 answer
  • Requests to access specific cylinders on a disk drive arrive in this order: 24, 20, 4, 40, 6, 38, and 12, and the seek arm is in
    10·1 answer
  • Is a MODEM required for Internet Connectivity ?<br> Yes<br> No
    9·2 answers
  • 6 → What is the difference between SHA-256 and SHA-512?
    12·1 answer
  • The ___________ method returns the length of an array.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!