1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio039 [100]
3 years ago
13

Plzzz help ya girl out due soon

Computers and Technology
1 answer:
matrenka [14]3 years ago
3 0
The answer to this question is D. This is because programming language is a language used to run the application software. A programmer or developer writes code, and the code language (most common is JavaScript) is translated and it runs the program.
You might be interested in
Does technology shape society or does society shape technology?
Naya [18.7K]

Answer:

Both. Society creates needs, these needs have to be met. Innovative people then meet the challenge because society says “we’ll compensate you if you can figure this out” and so the race begins. When that technology is developed, and the need is met, the technology inspires society to develop new wants and needs and so the cycle begins anew. Consider the biggest technologies in Human history: The wheel, created ancient civilization because it allowed for transport; The clock and calendar, allowing societies to develop schedules for all of their activities; Writing, allowing information to be passed down accurately from generation to generation; Farming, eliminating the need for civilization to be nomadic; Education systems, allowing for the standards of professionalism to be raised and specialized people to be created; fast-forward to the Industrial Age with the Steam Engine and Coal power plant; fast-forward again to the development of flight; fast-forward again to the atomic bomb and the first computer; etc.

Explanation:

7 0
3 years ago
Show the array that results from the following sequence of key insertions using a hashing system under the given conditions: 5,
sergejj [24]

Answer:

a) Linear probing is one of the hashing technique in which we insert values into the hash table indexes based on hash value.

Hash value of key can be calculated as :

H(key) = key % size ;

Here H(key) is the index where the value of key is stored in hash table.

----------

Given,

Keys to be inserted are : 5 , 205, 406,5205, 8205 ,307

and size of the array : 100.

First key to be inserted is : 5

So, H(5) = 5%100 = 5,

So, key 5 is inserted at 5th index of hash table.

-----

Next key to inserted is : 205

So, H(205) = 205%100 = 5 (here collision happens)

Recompute hash value as follows:

H(key) =(key+i) % size here i= 1,2,3...

So, H(205) =( 205+1)%100 = 206%100 = 6

So, key 205 is inserted in the 6th index of the hash table.

----------

Next Key to be inserted : 406

H(406) = 406%100 = 6(collision occurs)

H(406) =(406+1) %100 = 407%100 = 7

So, the value 406 is inserted in 7the index of the hash table.

-----------------

Next key : 5205

H(5205) = 5205%100 = 5(collision)

So, H(5205) = (5205+1)%100 = 6( again collision)

So, H(5205) = 5205+2)%100 = 7(again collision)

So, H(5205) = (5205+3)%100 = 8 ( no collision)

So, value 5205 is inserted at 8th index of the hash table.

-------------

Similarly 8205 is inserted at 9th index of the hash table because , we have collisions from 5th to 8th indexes.

-------------

Next key value is : 307

H(307) = 307%100 = 7(collision)

So, (307+3)%100 = 310%100 = 10(no collision)  

So, 307 is inserted at 10th index of the hash table.

So, hash table will look like this:

Key       index

5         5

205         6

406         7

5205 8

8205 9

307         10

b) Quadratic probing:

Quadratic probing is also similar to linear probing but the difference is in collision resolution. In linear probing in case of collision we use : H(key) = (key+i)%size but here we use H(key) =( key+i^2)%size.

Applying Quadratic probing on above keys:.

First key to be inserted : 5.

5 will go to index 5 of the hash table.

-------

Next key = 205 .

H(205) = 205%100 = 5(collision)

So. H(key)= (205+1^2)%100 = 6(no collision)

So, 205 is inserted into 6th index of the hash table.

--------

Next key to be inserted 406:

So, 406 %100 = 6 (collision)

(406+1^2)%100 = 7(no collision)

So, 406 is moved to 7th index of the hash table.

----------

Next key is : 5205

So, 5205%100 = 5 (collision)

So, (5205+1^2)%100 = 6 ( again collision)

So, (5205+2^2)%100 = 9 ( no collision)

So, 5205 inserted into 9th index of hash table.

-----------

Next key is 8205:

Here collision happens at 5the , 6the , 9th indexes,

So H(8205) = (8205+4^2)%100 = 8221%100 = 21

So, value 8205 is inserted in 21st index of hash table.

--------

Next value is 307.

Here there is collision at 7the index.

So, H(307) = (307+1^2)%100 = 308%100= 8.

So, 307 is inserted at 8the index of the hash table.

Key           Index

5                  5

205                  6

406                  7

5205                9

8205               21

307                   8

3 0
3 years ago
Andrina writes letters that are regularly sent to hundreds of her company’s customers. Because of this, she would like for the M
galben [10]

The correct answer is A.

7 0
3 years ago
A manufacturer wishes to design a hard disk with a capacity of 30 GB or more (using the standard definition of 1 GB = 2^30 bytes
never [62]

Answer:

4 Platters

Explanation:

The capacity of one platter

= 1024 x 2048 x 4096

<em>1 platter capacity= 8GB </em>

For a 30GB hard disk, we need

30/8  = 3.75  platters.

<em>we round off the answer  so 4 platters will be required.</em>

7 0
3 years ago
Scenario2: Now suppose the LAN must support both voice and data and you must choose one of these multiple access strategies in o
AleksandrR [38]

Answer:

The RTP (real time protocol) which uses the UDP ( user datagram protocol) and Real-time control protocol.

Explanation:

The RTP of a voice over IP protocol (VoIP) which is used to prioritise the transfer of video and audio data over text data. It is used for video conferencing and telephony services in an enterprise.

It uses the user-datagram protocol to transfer or access videos and audio data for its real time effect and the real-time control protocol for quality of service analysis and maintenance.

4 0
3 years ago
Other questions:
  • Give two reasons why it is important to upgrade your browser when a new version becomes available.
    8·1 answer
  • The Joint Photographic Experts Group developed the ___________ graphic format.
    12·2 answers
  • A plaintiff can bring a claim for intentional infliction of emotional distress when all but which of the following takes place:
    9·2 answers
  • One way to prepare for filing the PROFILE is to:
    12·2 answers
  • A large lens can be very heavy and can only be supported at the_______.
    13·1 answer
  • Will a large computer monitor have a clearer picture than using my plasma tv screen?
    9·1 answer
  • What is Ce stands for?
    8·1 answer
  • Staff in several departments interact with the order processing system and will be affected by any
    9·1 answer
  • Select the correct answer from each drop-down menu,
    9·1 answer
  • ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!