Answer:
Muzzleloaders are early firearms that are loaded from the open end
Explanation:
A muzzleloader is any firearm into which the projectile and usually the propellant charge is loaded from the muzzle of the gun.
This is distinct from the more popular modern designs of breech-loading firearms.
Thus, muzzleloaders are early firearms that are loaded from the open end.
Answer:
a. 2100
b. 2199
Explanation:
GIven that:
The file size = 1000 MB
The payload size is = 100 bytes
The negotiated window size is = 1000 bytes.
This implies that the sliding window can accommodate maximum number of 10 packets
The sender receives an ACK 1200 from the receiver.
Total byte of the file is :
1000 MB = 1024000000 bytes
a.
Sender receives an ACK 1200 from the receiver but still two packets are still unacknowledged
=1200 + 9 * 100
= 1200 + 900
= 2100
b. What is the last byte number that can be sent without an ACK being sent by the receiver?
b. Usually byte number starts from zero, in the first packet, the last byte will be 99 because it is in 1000th place.
Thus; the last byte number send is :
= 1200 + 10 *100 -1
= 1200 + 1000-1
= 1200 + 999
= 2199
In python:
first_grade = float(input("Please input the first grade "))
second_grade = float(input("Please input the second grade "))
third_grade = float(input("Please input the third grade "))
print("The average of the three grades is {}".format( round((first_grade + second_grade + third_grade) / 3,2)))
Answer:
Interrupt (INT) helps operating system to stop work on one process and start work on other process using interrupt signals.
Explanation:
Purpose of interrupts:
• Interrupts are useful when an I/O device needs to be serviced only occasionally at low data transfer rate.
• For example, when a peripheral requires the attention of the processor to perform an I/ O operation.
A trap:
• also known as an exception or a fault, is typically a type of synchronous interrupt caused by an exceptional condition
• is a software-generated interrupt.
• For example it's caused by division by zero or invalid memory access.
Can traps be generated intentionally by a user program? Yes.
If so, for what purpose?
• the usual way to invoke a kernel routine (a system call) because those run with a higher priority than user code.
• Handling is synchronous, so the user code is suspended and continues afterwards.
• In a sense they are active - most of the time, the code expects the trap.
Most good melodies restrict their basic range to no more than an octave-and-a-half. Most good melodies use repeating elements. Listeners should be hearing certain melodic intervals, rhythms and other musical shapes repeating throughout the melody