Answer:
The correct answer to this question is option (1).
Explanation:
Let x1 = Is number of pages that printer A can print in page/minute.
thus x1 + 5 = Is number of page that printer B can print in page/minute.
As printer A finishes his work in 60 min. So the task has 60x1 pages. As printers A and B both finish that task in 24 minutes. So the equation can be given as:
60x1 = 24x1 + 24(x1 + 5)
60x1 = 24x1 + 24x1 + 120
60x1=48x1 + 120
60x1-48x1=120
12x1=120
x1=120/12
x1=10
put the value of x1 in to (60x1). Therefore, the task has 60(10) = 600 pages. the task contains 600 pages.
So the answer to this question is option (1).
I know the first one shown in the picture but I can't see the one under it I can help you if you can show the whole problem under the first problem.
Answer:
a) AL will contains 0011 1100
Explanation:
In assembly language, shifting bits in registers is a common and important practice. One of the shifting operations is the SHR AL, x where the x specifies that the bits be shifted to the right by x places.
SHR AL, 2 therefore means that the bits contained in the AL should be shifted to the right by two (2) places.
For example, if the AL contains binary 1000 1111, the SHR AL, 2 operation will cause the following to happen
Original bit => | 1 | 0 | 0 | 0 | 1 | 1 | 1 | 1 |
Shift once to the right => | 1 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | (0) |
Shift once to the right => | 1 | 0 | 0 | 0 | 1 | 1 | 1 | 1 | (0) | (0) |
Notice;
(i) that there are two shifts - one at a time.
(ii) that the bits in bold face are the bits in the AL after the shift. Those that in regular face are those in the carry flag.
(iii) that the new bits added to the AL after a shift are the ones in bracket. They are always set to 0.
The term vulnerability describes the issue that Adam discovered.
b. vulnerability
<u>Explanation:</u>
SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.
As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.