1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
6

You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret

urn the data out of methods. A method could be called using any numeric value as an argument, whether it is a variable, a named constant, or a literal constant.
Computers and Technology
1 answer:
san4es73 [151]3 years ago
4 0

Answer:

1. You can invoke or call a method from another program or method: TRUE

2. When methods must share data, you can pass the data into and return the data out of methods: TRUE

3. A method could be called using any numeric value as an argument, whether it is a variable, a named constant, or a literal constant: TRUE

Explanation:

You might be interested in
What are 6 subtopics on computer programming ?
lubasha [3.4K]

On the internet, I found

Research topics

Artificial Intelligence

Computing and Mathematics

Cybersecurity

Data Science and Machine Learning

Embedded Systems and IoT

Process Management

Hope this helped :T

3 0
3 years ago
Consider an unpipelined or single-stage processor design like the one discussed in slide 6 of lecture 17. At the start of a cycl
pantera1 [17]

Answer:

a. Clock Speed of Processor = 0.5 GHz

b. Cycles per Instruction (CPI) = 1 Clock per Instruction

c. Throughput = 1 billion Instruction per Second

Explanation

Given Data

Time Take to complete the single Cycle = 2000ps = 2000 x 10⁻¹²

To Find

a. Clock Speed of Processor = ?

b. Cycles per Instruction (CPI) = ?

c. Throughput = ?

Solution:

a. Clock Speed of Processor = ?

Clock Speed = 1/Time to complete the cycle

                      = 1/2000 x 10⁻¹²  Hz

                      =  0.0005 x 10¹²  Hz

                      =  0.5 x 10⁹  Hz                             as   10⁹ = 1 Giga   so,

                      = 0.5 GHz

b. Cycles per Instruction (CPI) = ?

It is mentioned that, each instruction should start at the start of the new cycle and completely processed at the end of that cycle so, we can say that Cycles per Instruction (CPI) = 1

for above mentioned processor.

c. Throughput = ?

Throughput = CPI x Clock Speed

where

CPI = 1 cycle per instruction

Clock Speed = 1 billion Instructions per Second

as

Clock Speed = 1 billion Cycles per Second

Throughput = 1 cycle per instruction x 1 billion Cycles per Second

Throughput = 1 billion Instruction per Second

                         

6 0
3 years ago
) how many bits are used for host number on the child network (subnet) , b) how many usable addresses can exist on this child ne
vovikov84 [41]

Answer:

Machine’s IP=126.127.85.170, Machine’s Netmask=/27, Parent’s Netmask=255.255.240.0 .

a) Machine's Netmask = /27 : therefore no. of remaining bits for hosts =32-27 = 5 bits.

b) No. of usable addresses in the child network = 25 -2 = 32-2 =30 [Since first(network ID of the machine) and last ip (broadcast address of the machine ) addresses are not used ]

c) first usable address is on this child network (subnet) =

First, find out the network id of machine can be found out by doing bitwise AND machine's IP and Machine's subnet mask :

01111110. 01111111.01010101.10101010 (IP)

11111111. 11111111 .11111111 .11100000 (Subnet Mask)

01111110. 01111111. 01010101.10100000 (Network ID )

first usable address is on this child network (subnet) :   01111110. 01111111. 01010101.10100001

: 126.127.85.161

d) what the last usable address is on this child network (subnet) :  01111110. 01111111. 01010101.10111110

: 126.127.85.190

e) what the child network’s (subnet's) broadcast address is :

In the directed broadcast address , all the host bits are 1. Therefore, broadcast address :

01111110. 01111111. 01010101.10111111 (126.127.85.191)

f) what the child network's (subnet's) network number is : Network ID has already been calcuulated in part c .

01111110. 01111111. 01010101.10100000 (126.127.85.160)

6 0
3 years ago
50 POINTS!!!
ycow [4]

Answer:

1. -> B.

2. -> C

3. -> A

Explanation:

1. Antennas = help the router fetch and transmit a signal

2. Repeaters = help in increasing the range of signal

3. Adapters = help the device detect a wireless signal

7 0
3 years ago
¿En qué países se ha implementado un sistema de vigilancia a través de drones?, ¿qué aspectos positivos y negativos ha generado?
mel-nik [20]

Answer:

17 países.

Explicación:

Hay diecisiete países que tienen vehículos aéreos no tripulados armados y donde se ha implementado un sistema de vigilancia con drones. Los drones son excelentes para recopilar grandes cantidades de datos de imágenes. Se puede implementar fácilmente para la vigilancia y mantener la seguridad. Se puede conducir a través de la computadora, no del piloto en él, por lo que el piloto se guarda. Los aspectos negativos de los drones es que tienen tiempos de vuelo cortos y el clima puede afectar fácilmente a los drones. Las operaciones precisas son difíciles y también eliminan futuros trabajos.

7 0
3 years ago
Other questions:
  • You can encrypt individual files, but microsoft recommends encrypting at what level?
    9·1 answer
  • This type of peripheral is used to interact with, or send data to, the computer.
    12·2 answers
  • g If a class named Student has a data member named gpa , and one of its member functions has a parameter also named gpa , how ca
    7·1 answer
  • Using 2 bytes, how many different characters can Unicode represent?
    14·1 answer
  • What does it mean to be self demanding?
    12·1 answer
  • Set methods are also commonly called _____ methods, and get methods are also commonly called _____ methods.
    6·1 answer
  • Which of the following best describes contextual design?
    10·1 answer
  • Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
    14·1 answer
  • The IPv6 address for an Ethernet connection begins with FE80::/64. What does this tell you about the address
    12·1 answer
  • Why is quantum computing potentially a better fit for weather forecasting than classical computers?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!