Answer and Explanation:
Given that total number of records in a file = 100000
Each record consists of= 240 bytes
Given that B= 2400 bytes.
Then total blocks in file = 100000 records * 240 / 2400
= 10000 blocks.
Time that will take for exhaustive read
= s + r + b.btt
= 16 + 8.3 + (10000) * 0.8
= 8024.3 msec
Now as per given X be the number of records that are searched randomly and it takes more than exhaustive read time.
Hence, X (s + r + btt) > 8024.3
X (16+8.3+0.8) > 8024.3
X > 8024.3/25.1
So that, X > 319.69
Hence, atleast 320 random reads should be made to search the file
The below displays ice-creams with its associated flavours. This we would display using <UL>
• Stick
o Chocobar
o Feast
• Bowl
o Butterscotch
o Blueberry
<UL>
<LI>Stick
<UL>
<LI>Chocobar </LI>
<LI> feast</LI>
</UL>
</LI>
<LI>Bowl
<UL>
<LI> Butterscotch </LI>
<LI> Blueberry </LI>
</UL>
</LI>
</UL>
Here <UL> tag is used to create un ordered list and one another <UL> tag inside <LI> created nested list which is the actual requirement. Like this we can created nested unordered lists and you can nest upto 4 levels and increasing the number of levels further may reduce clarity.
Answer:
Affective
Explanation:
Affective Component − This is the second model of customers attitude. This consists of a person’s feelings, sentiments, and emotions for a particular brand or product. They treat them as the primary criteria for the purpose of evaluation. The state of mind also plays a major role, like the sadness, happiness, anger, or stress, which also affects the attitude of a consumer.
Answer:
The American Registry for Internet Numbers ARIN
Explanation:
The American Registry for Internet Numbers (ARIN) is a not for profit organization that serves as the administrator and distributor of Internet numeric resources such as IP addresses (IPv4 and IPv6) ASN for the United States, Canada, as well as North Atlantic and Caribbean islands
There are four other Regional Internet Registry including APNIC, RIPE NCC, LACNIC and AFRINIC.
Answer: RSA infrastructure
Explanation:
Using this infrastructure we can implement asymmetric cryptography using a pair of public key and private key. It works on the mechanism that if one of the key is used for encryption the other key is used to decrypt the message.