1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
10

I am stuck on these 2 questions. Can someone help me please?

Computers and Technology
1 answer:
Debora [2.8K]3 years ago
5 0

Answer:

My answer could not be submitted because of some signs and symbols in my solution.

So, I've added the answer and a comprehensive explanation as an attachment.

Note that the question is answered using Python programming language.

Explanation:

Lines that start with # are used to explain the program

<em>See attachment</em>

Download txt
You might be interested in
What are the first and the last physical memory addressesaccessible using
Misha Larkins [42]

Answer

For First physical memory address,we add 00000 in segment values.

For Last physical memory address,we add 0FFFF in segment values.

<u>NOTE</u>-For addition of hexadecimal numbers ,you first have to convert it into binary then add them,after this convert back it in hexadecimal.

a)1000

For First physical memory address, we add 00000 in segment value

We add 0 at the least significant bit while calculating.

          1000<u>0</u> +00000 = 1000<u>0</u> (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           1000<u>0</u> +0FFFF =1FFFF    (from note)

b)0FFF

For First physical memory address,we add 00000 in segment value

We add 0 at the least significant bit while calculating.

     0FFF<u>0</u> +00000=0FFF0 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           0FFF<u>0</u> +0FFFF =1FFEF (from note)

c)0001

For First physical memory address,we add 00000 in segment value

We add 0 at the least significant bit while calculating.

     0001<u>0</u> +00000=00010 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           0001<u>0</u> +0FFFF =1000F (from note)

d) E000

For First physical memory address,we add 00000 in segment value

 We add 0 at the least significant bit while calculating.

    E000<u>0</u> +00000=E0000 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           E000<u>0</u> +0FFFF =EFFFF (from note)

e) 1002

For First physical memory address,we add 00000 in segment value

 We add 0 at the least significant bit while calculating.

    1002<u>0</u> +00000=10020  (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           1002<u>0</u> +0FFFF =2001F (from note)

6 0
3 years ago
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
Speech on inventors and inventions
vlada-n [284]
Interntors present an interesting kind of people who think in peculiar ways sometimes. This ability allows them to view certain situations in ways in which other people cannot. Because of this, they can think of new ways of how such situations can be tackled. This is how inventions are born. A person with an inventive mind sees a new situation where he thinks of a new solution how he could improve this situation with his invention.

This process is continued continuously with new generations of inventors seeing and coming back to old situations over and over again, inventing new things along the way. 
4 0
3 years ago
Software is the brain of computer. Explain this starement
Annette [7]

here you go

i hope this helps you

5 0
3 years ago
Given an input array of strings (characters) s, pick out the second column of data and convert it into a column vector of data.
hodyreva [135]

Answer:

Consider the following code.

Explanation:

save the following code in read_and_interp.m

 

function X = read_and_interp(s)

[m, n] = size(s);

X = zeros(m, 1);

for i = 1:m

if(str2num(s(i, 2:5)) == 9999)

% compute value based on previous and next entries in s array

% s(i, 2:5) retrieves columns 2-5 in ith row

X(i,1) = (str2num(s(i-1 ,2:5)) + str2num(s(i+1,2:5)))/2;

else

X(i,1) = str2num(s(i,2:5));

end

end

end

======================

Now you can use teh function as shown below

s = [ 'A' '0096' ; 'B' '0114' ; 'C' '9999' ; 'D' '0105' ; 'E' '0112' ];

read_and_interp(s)

output

ans =

96.000

114.000

109.500

105.000

112.000

7 0
3 years ago
Other questions:
  • Consider a method defined with the header:
    13·1 answer
  • A user is attempting to format a 4 TB HDD using NTFS but only has the option to format the disk with a size of approximately 2 T
    15·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    8·1 answer
  • What is the difference between a rack and a tower?
    8·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • A web application is an example of:
    7·1 answer
  • How are special characters added to a Word document? Check all that apply.
    6·2 answers
  • The Last Free brainliest<br><br> This Is The Last Brainliest That Im Doing Forever Sorry Guys
    8·2 answers
  • Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a c
    6·1 answer
  • fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!