directory
Q: Q. A person has NID, name, street, city, thana, district and age. A person may be an employee with s...
A: The attributes are as follows:-Customer ID: Number, 1st name , Middle name and Last name are text ty...
Q: Consider the value of x-9 and value of y=2 and solve the pythan program z=x%y z=x//y z=x**y print("S...
A: Given: consider the value of x=9 and value of y= 2 an solve the python program : z= x%y z = x // yz=...
Q: Write a PHP function named “fw” that accepts a string(text) and returns the length of the first word...
A: strtok() function can be used to fetch first word, then use strlen() outside to find the length of w...
Q: by Python
A: the output of the above program is given below Computter SciencesmputerComputer Sciences
Q: What is growth of function?
A: GROWTH OF THE FUNCTION IS BASICALLY THE COMPLEXITY OF THE FUNCTION OR IN SIMPLE WORDS IT DETERMINES ...
Q: Match the IPV4 address to its correct type. Public Class-B Drag answer here 195.168.25.75 Private Cl...
A: Given: Finding IP address
Q: Consider the program given below, where a process creates a thread by calling a function named as "r...
A: CORRECT OPTION : (E) The above C program is related to the threading . Basically threads are the seg...
Q: If x=8 and y=5, then not(x%y==1 or x//y<=1) will be Select one: O True False
A: Given variables x = 8 y = 5 and we need to evaluate boolean expression not(x%y == 1 or x//y <=...
Q: Suppose you are working as a technician in the company Al-Reem Batteries. The network administrator ...
A: We will use cisco packet tracer to solve the following problem.
Q: ANS FAST PLEASE
A: Given:
Q: 1.What is the responsibility of the MAC sublayer? 2. List the layers of the Internet model?
A: Q1 Functions of MAC Layer It provides an abstraction of the physical layer to the LLC and upper la...
Q: make a python program
A: def create_mat(Mat, r, c): # user defined function to create the grid print("\n...
Q: computer engineering question
A: Given: Code the above problem using python language:
Q: -If two numbers are same, calculate the c=a modulus b - If both the numbers are even, calculate the ...
A: START input a input b count = 0 if a == b do c = a%b count += 1 print c if a%2==0 and b%2==0 do cou...
Q: Write the name of the symbols used in the above ladder program
A: the name of the symbols used in the above ladder program
Q: Grand Villa Hotels which is the purported case study used improved manual system in theirroom bookin...
A: 1)There are agents like customer,room management
Q: Prove by contraposition that if k is integer and 3k+1 is odd, then k is even
A: If k is integer and 3k+1 is odd, then k is even We have to prove it by contraposition. Let, p: k i...
Q: In python for loop statement start value by default is taken as -1 Select one: O True O False
A: FALSE In python, for loop statement, the start value taken by default is 0 & not -1 Reason being...
Q: For each of the following, check the box if the language A is context free. A-fa"b"c" | a,b,c e (0,1...
A: To find out which of the languages is context-free. We will go through each of the languages A and f...
Q: Which of the following is true about polymorphic virus? a. The code of the virus program does cha...
A: Polymorphic viruses are file infectors that can create modified versions of itself to avoid detectio...
Q: web
A: Given: Write the JavaScript code to do the following: Use the literal notation to create a "Person"...
Q: For Artificial intelligence:
A: P(R=F) = 0.0001 P(B=F | R=T, H=W) = 0.00009 P(R=T | A=T, B=T, H=W) = 0.0016
Q: If x=9 and y=6, then not(x%y==1) or not(x//y<=1) will be Select one: O True O False
A: Refer to step 2 for the answer.
Q: Take first two alphabets of your name e.g. if your name is Asim then AS will be your data, then draw...
A: Code: #include <bits/stdc++.h>using namespace std; void printInitials(const string& name)...
Q: What will be the output of the below python program: import array as arr x=arr.array("i",[2,4,6]) fo...
A: The code is using range function in for loop, it returns a sequence of numbers and starts from 0 by ...
Q: web
A: 9)Syntax to create an array is: var array_name = [item1, item2, ...]; example is: var cars = ["vol...
Q: Based on the image below, given are group of integers separated by space and a single integer, store...
A: arr = []n = int(input("Enter number of elements : "))for i in range(0, n): ele = int(input()) ...
Q: The Operating System without a Service Pack is referred as _________________ a. SP2 b. SP1 c. S...
A: I have given an answer in step 2.
Q: X=Y Y=X Z = 2*pow(X,Y+2)/10 + 5 print(Z)
A: Given: x=y y=x z=2*pow(x,y+2)/10+5 print(z) where x=22 and y=4
Q: What kind of tool could a hacker use to intercept traffic on your network?
A: Packet sniffer: The Packet sniffer is also known as the protocol sniffer, packet analyzer, or netw...
Q: Use Python to solve the problem.
A: list = []def add(item): list.append(item)def display(list): print("Elements in the list are:")...
Q: List the layers of the Internet model
A: the list of layers of the internet model is given below.
Q: Explain how CAD,CAE, and CAM software can work together to support the product development life cycl...
A: CAD, CAE & CAM • The computer-aided design or CAD is a software that is used to design componen...
Q: Rapid Application Development (RAD) assumes the use of techniques generation a. Fourth b. Third C. S...
A: An aggregation is a kind of association that models a part/whole relationship between an aggregate (...
Q: You are required to create an attack tree of robbing a shop. Question is from cyber security
A: Here we will draw an attack tree of robbing a shop.
Q: Write the output of the below given program import array as arr y=arr.array("i",[20,30,50,60]) y.ext...
A: Given program : import array as arr y = arr.array("i", [20, 30, 50, 60]) y.extend([40, 90, 10]) y.r...
Q: In your own words, explain how feedback fits into the input-processing-output-storage chain, in the ...
A: IPOS Input is anything we wish to embed in a system for some type of use. A variety of sources are...
Q: Complete the GPA exercise by allowing students with normal load to calculate their semester GPA (i.e...
A: #include <stdio.h>struct student{ char name [30]; int marks[ 5]; int total; float percentage...
Q: 9
A: For DLL error in the operating system, the command that we used to check the system file is:-
Q: Write an algorithm and draw a flowchart to read 2 numbers. If both the numbers are even perform powe...
A: ALGORITHM:- 1. Take input for 2 numbers as a and b. 2. If a%2==0 and b%2==0 Then Print pow(a,b). 3. ...
Q: What is the main purpose of this project? "Mobile Health Tips using Android"
A: Given: What is the main purpose of this project? "Mobile Health Tips using Android"
Q: Q3: Technology has revolutionized our lives in every regard. Discuss the impacts of technology over ...
A: Given: Technology has revolutionized our lives in every regard. Discuss the impacts of technology ov...
Q: 'CLO1.1:Simplify the following Boolean function AB' + A'C + AB +A'C 1 .A O 0.B O A.C O 'A.D O
A: simplify AB'+A'C+AB+A'C
Q: Why are the first 20 bases typically ignored from a Sanger sequencing .ab1 file? O The data quality ...
A: .ab1 file contains the DNA sequence electropherogram as well as raw data and some other information....
Q: Consider a value as a=2 and b value as b=6 Write the output of below given program a=a+5 a+=5 a*=(a+...
A: I have given an answer in step 2.
Q: Explain the steps taken in the Pollard Rho method, and show how it achieves the desired results. [6]
A: Lets see the solution.
Q: Which of the following is an example of spyware? a. Lottery scam email b. Internet Optimizer ...
A: Explanation Spyware is malicious software that infects computers and other internet-connected devic...
Q: The language is c program
A: // C program to check if a given number is perfect// or not#include<stdio.h> // Returns true ...
Q: Which one of the following protocols is used to access and configure remote computers and devices? ...
A: Which one of the following protocols is used to access and configure remote computers and devices? a...
- Assume your prompt is in the Jobs directory. Give one command to list the contents of the Reports directory and redirect the output to a file named list.txt in the same directory (Reports).
Step by step
Solved in 2 steps
- Assume you want to move the file ideas from the current directory to a subdirectory named Work, and you enter the following command: $ mv ideas Work When you examine the Work directory, the file is not listed there. Where is it?A list of all files in the current directory with their permissions is returned by what command.At the command prompt, type less /etc/passwd and press Enter. Where is the line that describes the root user located in this file?
- Write the command that will locate all files that are larger than 10 megabytes in size, and copy each one to the directory "/overflow".17. Assume you use a redirect to send the output from a command to a file. How do you control whether or not existing files are overwritten or protected?Question 2 • Write the DOS command to display a directory listing of the files in drive A in file-size order, largest first. • Write the DOS command to make a sub-directory named NEWDIR.
- What does the following command do? cp -u * dir_file i. copy all files to directory dir_file ii. update all files iii. delete all files iv. update all files in the current working directory and copy newer ones to directory dir_fileWrite a command that changes the file group of all files in the current working directory that start with a digit (0 through 9) to moderator.you will need to create the following textbook specified files. Use vi to create these files: test-file1 test-file2 test-file3 test-g test-sor respected test-u west coast alpha1 alpha2 practice caffeine names.tmp numbers.tmp What command instructs grep to look through all files in the current directory for lines containing the string Pat Lloyd and output just the names of the files that contain a match?
- What command outputs a long listing of your filenames in the current directory, including the permissions attached to each file?Assume the file list contains the names of several of the files listed in your home directory. What is the result of running the following? $ wc `cat list`you will need to create the following textbook specified files. Use vi to create these files: test-file1 test-file2 test-file3 test-g test-sor respected test-u west coast alpha1 alpha2 practice caffeine names.tmp numbers.tmp What command creates a new file chapter consisting of the contents of the files section1, section2, section3, and section4, with all lines numbered?