Which one of the following is a front-end technology? Select one: O a. Python O b. ASP Script O c. Rubby on Rail
Q: Outline five factors that can affect the transmission of data acrossthe nation.
A: Data transmission across the nation is a quite common matter in the twenty-first century. Millions o...
Q: Write short notes on the following :(a) ROM(b) PROM(c) EPROM
A: Computer memory is classified into two types of memory. Primary memory and secondary memory. The pri...
Q: Web development
A: Objective: A webpage should be developed such that it can include an animated div element of height ...
Q: Write a C Program that allows a user to enter any number of student test scores until the user enter...
A: EXPLANATION: - A do...while loop is used to read the scores of the students till 999 is not entered...
Q: Write a simple C++ code as I am a beginner.
A: // iostream in C++ is the standard library which implement stream based input/output capabilities #i...
Q: Based on below declaration: char copy[50],msg1[50]=”Pandemic in Year 2020”; char msg2[50] = “COVID-1...
A: The program is written in C #include <string.h>#include <stdio.h> int main(){ int r...
Q: Write a complete command to check if a particular package say P is installed or not on a system.
A: Answer : The " Which " is a complete command to check if a particular package say P is installed or...
Q: What changes in the hardware required to be made when the analog controller will be replaced with a ...
A: When the analog controller will be replaced with a microprocessor/digital computer - An ADC is use...
Q: Thank you in advance and I apperciate your quick response and help What is the difference between ...
A: The difference between Trike, AS/NZS 4360:2004 Risk Management, and CVSS. S.NO TRIKE AS/NZS ...
Q: discuss protocols run on each layer of tcp/ip.explain with diagrams
A: The most widely used protocol for communication is the TCP/IP protocol. Computers are connected to n...
Q: Use C language
A: C-string: A string is a collection of characters in consecutive locations in an array. A c-string i...
Q: NAS and SAN, describe there working also what is the concept of personal cloud how is it different f...
A: SAN - Storage Area Network A dedicated, high-speed network that administers access to block-level ...
Q: Consider the values of a=5 and b=25 and give the output of the below script: 'a=$a+$b' let "b=$a+$b"...
A: given code: a=5b=25let "a=$a+$b"let "b=$a+$b"let "c=$a+$b"let "d=$a+$b+$c" echo " value of d is $d"
Q: Q4: Generate LR(0) machine for the given grammar after removing conflicts, if any? A→L L>LP|P P>(P)|...
A: LR(0) item: LR (0) item is a production G with a dot at some position on the right side of the pr...
Q: Describe the B-spline curves.
A: • B-Splines A polynomial curve for modelling curves and surfaces Consists of curve segments whose p...
Q: Discuss the steps on how Huffman encoding algorithm is use in determining the efficiency of data com...
A: We all know that Huffman Coding is a lossless data compression algorithm which is based on a binary ...
Q: Write a C++ program to display fireworks in a ring shape using asteriks (*). Loops, arrays, function...
A: #include <iostream> #include <ctime> #define ESC char(27) #define FUSEMIN 800 #define FU...
Q: Explain the statement " the complexity of CYK algorithm is O(n^3)"
A: CYK algorithm: - This is a dynamic programming algorithm to determine whether or not a string is in ...
Q: string of length N contains (N*(N+1)) / 2 substrings. Write a program to input string and print its ...
A: Explanation We can do it by using three-loop The first loop will pick the starting character, the mi...
Q: The Government of Ghana (GoG) seeks to embark on a project called C-GH. C-GH is targeted at starting...
A: NOTE:“Since you have posted a question with multiple sub-parts, we will solve first three subparts f...
Q: 2)If a five-digit number is input through the keyboard, write a program to print a new number by add...
A: #include <iostream>#include <vector>using namespace std;int main(){ int num, sum, rema...
Q: Please try to explain in depth QUESTION 2 1. Differentiate between nation-state and non-nation-state...
A: The term “hacker” is popularly associated with cybercriminals regarding malicious intentions while i...
Q: Explain Direct Memory Access (DMA) , and input/output timing diagram with clock synchronization. Su...
A: Actually, DMA stands for direct memory access.
Q: In c++ please
A: Input: Search key Output : Return true if element present otherwise return false step1: Initialize n...
Q: Write a C program for a library automation which gets the ISBN number, name,author and publication y...
A: Include the essential header files Define Structure Define Structure check condition Display the mas...
Q: Create a one-shot using a 555 timer that will produce a 0.5s output pulse.
A:
Q: 1. Design UML design diagrams of your Turing Machine.
A:
Q: Draw an example graph for each of these.(a) A planar graph has 5 vertices and 3 faces. How many edge...
A: Answer a) For any (connected) planar graph with v vertices, e edges and f faces, we have v-e+f=2 her...
Q: Write briefly about(a) Static RAM(b) Dynamic RAM
A: Computer memory is classified as two types of memory 1.Main memory 2.Secondary memory. The main me...
Q: What is needed for different entities to communicate, name two well-known data transport protocols p...
A: Note: we are only allowed to solve one question in one post. please post your remaining question in ...
Q: what is computer science?
A: Computer science is the study of computers and computing as well as their theoretical and practical ...
Q: Explain Direct Memory Access (DMA) , and input/output timing diagram with clock synchronization. Su...
A: Direct memory access (DMA) is a feature of computer systems that allows certain hardware subsystems ...
Q: Answer this question, part (1), (2) & (3). Design a three-bit even-up counter using three JK fli...
A: Logic diagram of a 3-bit binary counter. (a) A counter is first described by a state diagram, which...
Q: Write a c program and fill a queue with random numbers between 0 and 100. The size of the queue is a...
A: Program: //included header files#include <stdio.h>#include <string.h>#include <stdlib...
Q: E-There is no Start menu, no desktop Explorer shell, no Microsoft Management Console(MMC), and virtu...
A: To find the correct option that does not has start menu, desktop Explorer shell, Microsoft Manageme...
Q: Application of EDF means Where is it used? or Where do you use it? Select one: True False
A: Application of EDF means Where is it used? or Where do you use it? other than that : •Identificati...
The front end development controls everything that users visually understand first in their browser or application. Front end developers are accountable for the appearance and quality of a site. Front end development mostly concentrated on whatever some may coin the customer side of growth.
Step by step
Solved in 2 steps
- Which of the following operating systems can be modified and the source code redistributed? Group of answer choices Android iOS Windows Mobile Chrome OSQUESTION 35 Which of the following definitions best describe a snap-in? a. It is a Windows PowerShell command in verb-noun format. b. It is a text-based interface that requires you to type in all the commands. c. It is a component that adds control mechanisms to the MMC console for a specific service or object. d. It is a command-line utility for configuring power management and generating power management reports. 2 pointsWhich of the following statements about Online Wallets is CORRECT: A. The information on an online wallet is usually stored locally (e.g., in a local computer). B. You can access your online wallet using a web interface on your computer or using an app on your smartphone. C. You don't need to worry about the security of your bitcoins if the people who operate the online wallet site are malicious.
- Which of he following is not a system software?APC DOSB LinuxCMAC OS XDDatabase systemPlease written by computer source Which is not a feature listed below that would improve or augment the functionality of one or more roles of a Windows Server? THERE IS ONE CORRECT ANSWER, PLEASE CHOOSE ONE Remote Assistance TFTP SNMP .NET WINS Windows AD/DC Bitlocker Encryption.Which of the following is a device identification string that can be used to control the installation of a device? Group of answer choices A device driver A hardware ID A global catalog server A domain controller
- 8 Which active contents run only on computers with windows operating system? A. JavaScript B. Plug-Ins C. ActiveX controls D. Web BugsWhich are not system directories? Group of answer choices /bin, and /etc /dev and / /user and /users /var and /procWhich of the following is an example of application software? a. screen saver b. Excel c. firewall d. Microsoft Windows 10
- i Another word for a software application is a program? True /False ii. When there is more than one application running, this is called multitasking? True / False iii. A web browser is a type of application ? True /False iv. Whether an app works on your device can depend on the following a) Operating system b) The amount of memory on your computer c) both v) Your computer faces so many threats it is useless to try to protect it? True / False vi) If you have Windows operating system one option to back your computer would be to use “Time Machine”? True / False vii) Which of the following tips would you look for the address bar of a web site: a) The correct spelling of the website b) The lock security symbol c) The darker colour of the name of the organization d) All of the above e) Option 5 vii) Researching the company means: a) verifying the telephone number b) Verifying that the address is real c) Both viii) Safest way to pay online is a) Money transfer b) Bank transfer c) Debt Card d)…Joshua, a systems administrator, is configuring new Windows 10 laptops. He is creating new local users on each laptop. He realizes that two users have the same name, Miguel. He uses the name Miguel for one user. Which of the following is a valid user name that he can create for the second user? a. Mig<> b. Miguel? c. Miguel2 d. MigueLWhich of the following are variable names that will compile? Circle all that will compile. Group of answer choices email~address Printer88 amount$