. create a repository in GitHub.
Q: (An B) u (An B) = O B O A O None of the choices O AnB O AnB
A: Answer is in step 2
Q: Computer Science I need a C++ program that will take a list of random integers from a .txt file, sc...
A: The solution to the given problem is below.
Q: Program file: p4.c What is the sum of the first 50 odd numbers? Write a program that prints just one...
A: C program to find sum of first 50 odd numbers: #include <stdio.h> int main(){ int i, sum=0;...
Q: Design and implement a circuit that generates the (15)'s complement of a HEX digit p(P3P2P1P0). Prov...
A: Below is given the answer
Q: 1. Please create a Conceptual Data Model (using Draw.io), containing entities and their relations...
A: creating a Conceptual Data Model(Using draw.io) , containing entities and their relationships as the...
Q: What is the output of the following cod print(10**2//-3) а) -20 b) 33 с) -33 d) -34
A: Given The answer is given below.
Q: Create a table as the following: 1. three columns (company, contact, country) 2.7 rows 3. the compan...
A: 1.) table tag : The table tag in HTML is used to create a table in a HTML Webpage. 2.) th tag : The ...
Q: Create a C++ function that takes two integers p and q as the parameters and then returns true in the...
A: Taking two integers p and q as the parameters and then returns true in only case of the conditions a...
Q: Given the problem of basic multiplication: Input: Two n-digit nonnegative integers, x and y. Output:...
A: Lets see the solution.
Q: Create a python code that inputs the complete name (first name/middle name/last name), address, cont...
A: In python input("prompt is optional") is used to take input from keyboard and print("any string" or ...
Q: 11. Write a code in AVR to load the value $20 into location $1A using register R20 and substract it ...
A: The code is given below for the above given question:
Q: What is the CAM table? And what is the command to display the CAM table
A: As per our policy we are allowed to solve single question in multi part question . please upload oth...
Q: Which of the ff. input string/s is/are accepted by the automat
A: Lets see the solution.
Q: Given a sorted array of n comparable items A, and a search value key, return the position (array ind...
A: Algorithm Means, A computer can solve a problem using an algorithm, which is a well-def...
Q: 3. Write a program that as the user to enter their 4 test scores. Based on their average test scores...
A: ANSWER:-
Q: For graph given in figure I and heuristic table in table 1, answer following questions: Find path fr...
A: “Since you have asked multiple questions, we will solve the first question for you. If you want any ...
Q: our organization is in the process of migrating to a newer enterprise resource planning application....
A: Windows Server 2016 is the successor to the Windows Server 2012 R2.
Q: What is a timetable th
A: What is a timetable that can be serialised? Answer: Serial schedule: Serial schedule both by defin...
Q: Please Solve In 20mins In what type of situation kernel density plot is not useful? examples
A: Answer: I have given answered in the handwritten format in brief explanation.
Q: Determine the validity of the ff. argument: If this variable is larger than 3, then its square is la...
A: given: Determine the Validity of the FF.argument.
Q: 1. Giving the following Java program representing the class student, complete the missing code. a. G...
A: Here, I have to write a java program for the given class Student and complete the parts given.
Q: What is the time complexity (in big-O notation) of binary search in a sorted array containing m (m >...
A: SUMMARY: - Hence, we discussed all the points
Q: tudy about a full virtualization based hypervisor and explain its working and ecture. (Please must e...
A: "Virtualized environments." A virtual machine, which itself is essentially a means of separating hel...
Q: In Ruby programming language, write a program to input the radius of a sphere(in cm) and print the v...
A: In Ruby programming language, write a program to input the radius of a sphere(in cm) and print the v...
Q: Describe the main differences between defects and antipatterns in software testing
A: "A mistake in coding is called Error, error found by tester is called Defect, defect accepted by dev...
Q: Write a fragment of code in C++ based on following algorithm. Include all the variables declaration ...
A:
Q: I need the code in 32 bits Assembly language please: Assign the symbol SetupESI to the following li...
A: Before giving answer let's see about Assembly Language. Assembly language and what is 32 bit codding...
Q: 2. [10] What function is implemented in the circuit below (provide answer in SOP form): Milk Lemon T...
A: Introduction: What function is implemented in the circuit below (provide answer in SOP form): Honey ...
Q: ing explains the purpose of information system in terms of handling business organizational activity...
A: NOTE: ACCORDING TO COMPANY POLICY WE CAN SOLVE ONLY 1 QUESTION. YOU CAN RESUBMIT THE QUESTION AGAIN ...
Q: Compare between "Online Communities" and "Communities of Practice (CoP)". Provide an for each commun...
A: Working communities (CoPs) can be characterized in a way that is connected to an important cause or ...
Q: The uniform quantization is an approach where a sampled value is assigned to a number from a set, wh...
A: I have answered this question in step 2.
Q: I need the code in 32 bits assembly code please: Calculate the number of elements in the following ...
A: Lets see the solution in the next steps
Q: Find a case study in your surrounding environment that can be solved by database system approach. Id...
A: Databases strategy: This relational strategy. Making usage of database systems (DBMS) includes suppo...
Q: must you specify in your clients’ configurations to adhere to your subnetting scheme? a. 255.255.25...
A: Ans- The subnet mask which we must specify in our clients configurations for adhering to our subnett...
Q: Suppose you were implementing a Company---Employee relationship. Which of these classes would be con...
A: Company comprises (made up of) Employees and hence it is the aggregating class. The existence of the...
Q: 3. Design a full subtractor circuit using (i) (ii) (ii) Two half subtractors. Using only NAND gates ...
A:
Q: of the following is False? O Dynamic memory consumes less pow ) Access time of SRAM is less than tha...
A: 1- Static memory consume less power. It is expensive than Dynamic memory. Static memory consumes con...
Q: Write a C# Sharp program to print your name and Course specialisation in a separate line.
A: your question is about Writing a C# Sharp program to print your name and Course specialization in a...
Q: In the Euclidean (metric) Traveling Salesperson Problem (TSP), we started with a DFS traversal of th...
A: in traveling salesperson problem we started with DFS traversal of minimum ST and then skipped vertic...
Q: One of the major concerns in using freeware is that it can be used as an instrument to compromise se...
A: Synergy is the concept that the whole of an entity is worth more than the sum of the parts. This log...
Q: Q.1.3Alter the EMPLOYEES table to add a column as specified below: EMPLOYEES AGE SMALLINT Q.1.4 Upd...
A: “Since you have asked multiple questions, we will solve the first question for you. If you w...
Q: 91 a. 92
A: Convert to regular expression are as follows:
Q: What is the output of the program? #include #include using namespace std; int checking (int x = 7,...
A: d. compile time error. because, checking function is defined in the wrong way. it should be int chec...
Q: Given the problem of searching two arrays Input: arrays A and B of n integers each, and an integer t...
A: Given : for i<-1 to n do if A[i]==t then return TRUE end ifend for for i<-1 to n do if B[i...
Q: Do NOT use ANY string/character manipulation or arithmetic functions to implement your solution. Te...
A: The code for the above given question is below:
Q: So, when a cell in Microsoft Excel is filled with hashtags, what does it mean?
A: The hashtag filled into the cells of Excel sheets seems to be like some error, but it is not the cas...
Q: Act One has become a multi-faceted business. Which of the services does Act One NOT offer? Headhunti...
A: Problem: which of the services does act one not offer. See below steps for answer and explanation: S...
Q: Consider the following declarations. In each case, write the English name of the type of x. Example:...
A: (a) int *x[];(b) int (*x)[];(c) double **x;(d) unsigned long int (*x[])[n]; Given the declarations.
Q: layer(s) are involved in encrypting the data of a packet? Which address(es) does not change at each ...
A: The seven layers of the OSI model have their own functionalities and concerned properties. A data pa...
Q: b) Convert the following if statement to a single switch statement. Don't forget to employ the defau...
A: Here the switch case variable will be Year. Different switch case will have different possible value...
Computer Science
please show the commands in git terminal
1. create a repository in GitHub.
2. clone the repository twice one for class1 folder and one for class2 folder.
3. edit README.md in class1 and do a commit and edit README.md in class2 and do a commit.
4.git push in class1 to GitHub repository.
5. git push in class2 to GitHub repository (`git push` will give you an error and tell you to git pull first. ) Fix the error and push to the GitHub repository.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 2 images
- Some database systems allow the administrator to choose between two forms of logging: normal logging, used to recover from system crashes, and archival logging, used to recover from media (disk) failure. When can a log record be deleted, in each of these cases, using the recovery algorithm of Section 19.4?In this assignment, you are required to write a bash script, call it mycontainer.sh to do the following tasks:1) Create an LXD container based on ubuntu.2) Install the latest version of mysql on the container created in Step 1. Then, start the database and autostart it during future boots.3) Print the process ID of the running database, then give this process the highest possible priority.4 Inside the container, create a new systemd service to: Re-execute Step 3 to adjust the priority. Send a notification message to your AUIS email address(es). Call this new service ‘email-mysql.service’.5) Adjust systemd to run the ‘email-mysql.service’ automatically once every six hours.6) Lastly, include necessary Bash commands to upload your container to an ssh server with the IP address 192.168.1.1. Assume the username and password are 'auis' and 'pass123', respectively.Match the correct explanation for the following functions: (ex 1a 2b..) 1. dir() 2. search() 3. getwd() 4. setwd("path") 5. .libPaths() 6. library() a. To get all packages currently loaded in the R enviroment b. To list the files contained in the current working directory c. To get the list of all pages installed d. To change the working directory and specify the path to the desired folder e. To get the library location containing all R packages f. To find out which directory you are currently in
- You are operating a distributed Cassandra database with a keyspace setup with the following command: create keyspace nosql with replication = {'class':'SimpleStrategy', 'replication_factor':5}; What is the minimum number of replicas that need to be available to complete a write to a table in this keyspace when writing with a consistency level of Quorum? Group of answer choices 2 3 4 5Given the following ls -l output: drw-r-xr-x. 2 root accounting_grp 4096 Jan 28 19:0 accounting/ What is the access permission for the ‘accounting’ folder (directory)? Write the command to change the access permission of the accounting folder (directory), so that the owner can read and execute, and the group and everybody else (world) can only read the file.85. A transaction commits as soon as its commit log record is written to stable storage at the primary and the backup site.This is a. One Safe b. Two Safe c. Two-very Safe d. Very Safe
- Jordan is assigned Full Control share permissions to a folder and Read NTFS permissions. He accesses the share by using the UNC path from his computer over the network. What is Jordan's effective permission level to the share in this scenario? a. Full control b. Owner c. Read & Execute d. ReadWrite a script that: Deletes all previously created directories from C:\bkp\Firefox\ Writes the amount of memory used by Firefox to a file C:\bkp\Firefox\%DATE% %TIME%\firefox.txt (%DATE% and %TIME% are current date and time) (if Firefox is running) Kills Firefox process (if it is running) Archives content of the Firefox profile directory to C:\bkp\Firefox\%DATE% %TIME%\firefox.zip Deletes the original Firefox profiles directory Shuts down the computerWhich of the following actions will improve database performance???? A) Cache data in memory B) Add additional CPUs C) Remove system stored procedures D) Expand the transaction log Connections to SQL Server are made over which of the following A) TCP B) SSL C) All of the above D) None of the above Which of the following does is NOT a term used with respect to storage devices? A) Queue depth B) Latency C) Volume D) Buffer pool
- Please write down the Linux command for each question. 17.1 What command should be used to change the read, write and execute permission of a file? 17.2 The command for a user wants to delete recursively all files and subdirectory from current directory is 17.3 What is the command which edits the scheduler for automatic command executions at background? 17.4 This command let a user check the names of the groups that this a/c belongs to. 17.5 What do we expect to see if running “$ echo `expr 2 \*3`? 17.6 Upon booting up the OS, the latest kernel initialization daemon process that the Ubuntu distribution is using today is ____ 17 Like to find files with “.sh” extensions from current local directory to all its subdirectories, what is the command? 17.8 What is the command to find the IP address of a network card? 17.9 What is usually written on the first line in shell scripts? 17.10 Like to backup all files and subdirectories under /var/www, the output file name is today.tar. The…84. A transaction commits as soon as its commit log record is written to stable storage at the primary site. This is a. One Safe b. Two Safe c. Two-very Safe d. Very SafeQuestion #9 Is each of the following an absolute pathname, a relative pathname, or a simple filename? milk_co correspond/business/milk_co /home/max /home/max/literature/promo .. letter.0210 Question #10 Suppose you have a file that is linked to a file owned by another user. How can you ensure that changes to the file are no longer shared? Question #11 If /home/zach/draft and /home/max/letter are links to the same file and the following sequence of events occurs, what will be the date in the opening of the letter? Max gives the command vim letter. Zach gives the command vim draft. Zach changes the date in the opening of the letter to January 31, writes the file, and exits from vim. Max changes the date to February 1, writes the file, and exits from vim. Question #12 What is an inode? What happens to the inode when you move a file within a filesystem? Question #13 The ls –i command displays a filename…