Answer:
Exiting a function
Explanation:
Return simply returns a specified value at the end of a def function (if you're in python). It does not print or do anything else. You could set variables equal to a def function that returns or you could put the def function in a print statement to print the returned value.
The basic difference between RAM and ROM memory is RAM is read/write while ROM Is read-only.
Explanation:
- A ROM, non-volatile memory, does not use to store data, but RAM is volatile and requires power to store data.
- ROM is not given usually as a specification, but RAM is typically specified when buying a computer.
- We can write data only once in ROM. However, once it is written, we can read it any number of times. RAM is the main memory in a computer, and read from and write to it much faster than other storage types. RAM is used to store files in use on the computer.
Hence the basic difference between RAM and ROM memory is RAM is read/write while ROM Is read-only.
Answer: True
Explanation:
Subset sum problem and Knapsack problem can be solved using dynamic programming.
In case of Knapsack problem there is a set of weights associative with objects and a set of profits associated with each object and a total capacity of knapsack let say C. With the help of dynamic programming we try to include object's weight such that total profit is maximized without fragmenting any weight of objects and without exceeding the capacity of knapsack, it is also called as 0/1 knapsack problem.
Similar to knapsack problem, in subset sum problem there is set of items and a set of weights associated with the items and a capacity let say C, task is to choose the subset of items such that total sum of weights associated with items of subset is maximized without exceeding the total capacity.
On the basis of above statements we can say that subset sum problem is generalization of knapsack problem.
Answer:
Server core
Explanation:
Server core is miniature Microsoft Windows server installation option with limited features, that mimic the features of an actual core server, with little servicing and management requirement, disk and memory, and attack vulnerability.