Note: The answers to the questions and the screen captures that justify your answers will both be assigned some points.
For how long has your system been up?
How many cores does your machine have?
How many processors does your machine have?
What is the frequency of each processor?
How much physical memory does your system have?
How much of this memory is free?
What is the size of your virtual memory or swap file?
Run a text editor on your systems (ex. notepad, gedit). What is the process ID? Kill the text editor process.
1. System uptime can be found using the 'uptime' command on Linux or 'systeminfo' on Windows.
2. The number of cores can be found in your system's CPU specifications or using a tool like 'Task Manager' on Windows or 'lscpu' on Linux.
3. The number of processors can also be found in your system's CPU specifications or by using the same tools mentioned above.
4. Processor frequency can be found in the CPU specifications or through system monitoring tools.
5. Physical memory can be viewed using 'Task Manager' on Windows or 'free -h' on Linux.
6. Free memory can be viewed using the same tools as mentioned in point 5.
7. Virtual memory or swap file size can be found in 'System Properties' on Windows or by checking the '/proc/swaps' file on Linux.
8. To find the process ID of a text editor, you can use 'Task Manager' on Windows or the 'ps' command on Linux. To kill the process, use 'Taskkill' on Windows or 'kill' on Linux.
Please follow the relevant steps for your system to find the specific information you need.
Learn more about the command: brainly.com/question/30067892
QUESTION 6
To create our own Custom View, we may need to override the OnMeasure method. Why is
this? Give a practical example, with some of the variables we might want to access.
(a)
(b) There are three distinct means of creating a new view. Evaluate each in terms of complexity
and uniqueness of code.
(c)
onDraw method demands the knowledge of primitive shapes in order for it to be used
efficiently. Comment on this, detailing specific functionality to draw basic shapes.
Answer: eeeeeeek
Explanation:
The create our own Custom View, we may need There are three distinct means of creating a new view. Evaluate each in terms of complexity and uniqueness of code.
What is the complex?A complex is an informal phrase for what occurs when someone forms the opinion—often an exaggerated opinion—that a specific circumstance is risky or embarrassing. Saying, "For heaven's sake, don't draw attention to her nose being so huge!" is an example. She'll get a complex from you.
The term Measure customer view refers to that opportunity to tell. The android how big they want their customer view to be dependent on the layout constraints provided by the parents.
Therefore, The custom view means creating a new view. And evaluating terms of complexity.
Learn more about The complex here:
https://brainly.com/question/17027861
#SPJ1
Which of these is not a valid form
layout in Microsoft Access?
100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.
I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :
- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9
I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?
I have already asked this before and recieved combinations, however none of them have been correct so far.
Help is very much appreciated. Thank you for your time!
Based on the information provided, we can start generating possible six-digit password combinations by considering the following:
The password contains one or more of the numbers 2, 6, 9, 8, and 4.
The password has a double 6 or a double 9.
The password does not include 269842.
One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.
Using this method, we can generate the following list of possible password combinations:
669846
969846
669842
969842
628496
928496
628492
928492
624896
924896
624892
924892
648296
948296
648292
948292
Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
8. Click ‘Yes’ on the SQL query you created in Step #7. Open the Pet_ Cat table and resize all of the columns to best fit the contents. Take a screenshot showing the new table and paste it in the space provided below.
To resize the columns in the Pet_Cat table to best fit the contents, you can follow these steps:
1. Open the Pet_Cat table by clicking on it in the navigation pane on the left side of the screen.
2. Hover your mouse over the line between the column headers until you see the double arrow cursor.
3. Click and drag the line to the right or left to resize the column to best fit the contents.
4. Repeat this process for all of the columns in the table.
5. Once you have resized all of the columns, take a screenshot of the new table by pressing the "Print Screen" button on your keyboard.
6. Open a new document or image editing software and paste the screenshot into the space provided.
7. Save the document or image and submit it as directed in the assignment instructions.
I hope this helps! Let me know if you have any further questions.
#SPJ1
https://brainly.com/question/30781607?referrer=searchResults
arrange the following numbers in ascending order -2/3, 7/-18 , 5/-19
Answer:
2/3 5/19 7/18
Explanation:
In CengageNOWv2, you may move, re-size, and rearrange panels in those assignments that use multiple panels.
Answer:
true
Explanation:
trust me lol, I promise it's correct.
Describe a topic, idea, or concept in the tech space you find engaging it makes you lose all track of time. Why does it captivate you? Why does it captivate and inspire you.
The fascinating subfields of computer science include numerous that deal with data, technology, life, money, health, and other topics.
In the modern world, computer science is used in practically everything, including the devices we use every day.
In computer science, what is a subdomain?According to the DNS hierarchy, a subdomain is a domain that is a subdomain of a larger domain. For particular or distinctive information on a website, it is utilised as a quick and simple technique to establish a more memorable Web address.
Which computer science subfields are there?The primary fields of study in computer science are artificial intelligence, computer systems and networks, security, database systems, human computer interaction, vision and graphics, numerical analysis, programming languages, software engineering, bioinformatics, and computing theory.
To know more about computer science visit:-
https://brainly.com/question/20837448
#SPJ1
______ is used to ensure that data is organized most efficiently in a database. A) Consistency checking. B) Validation C) Normalization D) Range checking
Answer:
C) Normalization
Explanation:
Normalization is an approach that is to be done in a systematic manner in order to remove the data duplicity and there are non-desirable attributes such as insert, update, delete, etc. In this the process should be followed in multi step that contains the data in a tabular form so that it could eliminate the repetition of data to maintain the efficiency of the data
Therefore according to the given situation, the option C is correct
The process of ensuring that data values are ordered such that the values in the columns confirms to a certain range and expunged duplicate values is called Normalization.
Data Normalization ensures that the data values are efficiently arranged and ordered, while also getting them ready for analytical purpose. A normalized data will usually be rid of duplicates and the weight of the values in the columns would be even.Hence, the process is known as Normalization.
Learn more : https://brainly.com/question/21986997
__________ often causes overactive eye movement.
A. Alcohol
B. Nicotine
C. Morphine
D. Xanax
A customer complains that her desktop computer will not power on. What initial actions should you take?
Answer:
Test The Components and the motherboard
Explanation:
Well, im going to assume that she turned on the pc and the screen is completely black, nothing being displayed but the fans are spinning. The first thing i would do is test the components to see if its working or not. What i would do first is test the components. I would start from the RAM, Video Card (If it has one) CPU, PSU, and motherboard. I would also take out the CMOS battery and put it back in after a while to clear the bios settings if the customer messed with the bios settings. Make sure to test the motherboard and check for physical damage (Fried Areas, blown capacitors, water Damage etc.) And if you cant find any physical damage try testing the motherboard and see if its dead or not. Also try checking if all of the cables are plugged in all the way, like a loose HDMI cable, loose psu cable etc. Also make sure the psu is connected to power
Also, this is my first brainly answer. Yay :)
Initials action we should take are as follows,
Check that all of the cables are fully plugged in.Ensure that power supply is turned on.After that, i will check for faulty power cable.Now open CPU and check parts and devices one by one such as RAM, SMPS etc.These are the initial actions we should take when computer is not powering on.
Learn more https://brainly.com/question/24504878
Most presentations use text:
Answer:
The correct response is "at a minimum".
Explanation:
Texts are an accompanying indicator of that same basis of these observations mostly during introduction or analysis, must be quite succinct as well as accurateThroughout reality, a Power point presentation's fundamental requirements or suggestions are to prevent a lot much textual from being used although it all works together.This code is giving no error but is not printing my "goal." Which is to print a year of highschool when a number is input. Instead the code is only printing "Not in High School" every time, every number. Can someone please explain to me what I did wrong?
grade_number = input("What year of high school are you in? ")
if grade_number == 9:
print("Freshman")
elif grade_number == 10:
print("Sophomore")
elif grade_number == 11:
print("Junior")
elif grade_number == 12:
print("Senior")
else:
print("Not in High School")
Answer:
You must convert your input to an integer before the if statements.
Explanation:
input() returns a string, which should be converted to your desired type, OR you should compare against string literals.
See below for working code.
3. (5pts )Given an unweighted undirected graph G, and a vertex pair u and v, please give out a pseudo code returning T if v is reachable from u. Otherwise return F. Analyze the time complexity of your algorithm.
The time complexity of your algorithm in the graph is given:
function isReachable(u, v, visited, graph):
if u == v:
return True
visited[u] = True
for neighbor in graph[u]:
if not visited[neighbor]:
if isReachable(neighbor, v, visited, graph):
return True
return False
How to explain the graphHere, graph is the adjacency list representation of the graph, visited is an array that stores whether a vertex has been visited or not, and u and v are the source and destination vertices respectively.
Learn more about graph on
https://brainly.com/question/25184007
#SPJ1
System testing – During this stage, the software design is realized as a set of programs units. Unit testing involves verifying that each unit meets its specificatio
System testing is a crucial stage where the software design is implemented as a collection of program units.
What is Unit testing?Unit testing plays a vital role during this phase as it focuses on validating each unit's compliance with its specifications. Unit testing entails testing individual units or components of the software to ensure their functionality, reliability, and correctness.
It involves executing test cases, evaluating inputs and outputs, and verifying if the units perform as expected. By conducting unit testing, developers can identify and rectify any defects or issues within individual units before integrating them into the larger system, promoting overall software quality.
Read more about System testing here:
https://brainly.com/question/29511803
#SPJ1
QUESTION 7
Any use of a direct quote or paraphrased idea does not need to be cited properly in APA style.
O True
O False
Write a function that accepts an int array and the array’s size as arguments.
The function should create a new array that is twice the size of the argument array.
The function should copy the contents of the argument array to the new array, and initialize the unused elements of the second array with 0.
The function should return a pointer to the new array.
Demonstrate the function by using it in a main program that reads an integer N (that is not more than 50) from standard input and then reads N integers from a file named data into an array.
The program then passes the array to your array expander function, and displays the values of the new expanded array, one value per line.
You may assume that the file data has at least N values. There are no prompts for the integer and no labels for the expanded reversed array that is printed out. If the integer read in from standard input exceeds 50 or is less than 0 the program terminates silently.
Using the knowledge in computational language in C++ it is possible to write a code that the function that accepts an int array and the array’s size as arguments.
Writting the code:#include<iostream>
#include<fstream>
// Use the standard namespace.
using namespace std;
// Define the function to expand the given array
// to twice its capacity.
int *Array_Expander(int arr[], int size)
{
// Create a new array of double size.
int *new_array = new int[2*size];
int i = 0;
// Start the loop to copy the values of the
// given array into the new array.
while(i < size)
{
// Copy the value in the new array.
new_array[i] = arr[i];
// Increment the value of the variable i.
i = i + 1;
}
// Start the loop to set the value of the second half
// of the new array to 0.
while(i < 2*size)
{
// Set the value to 0.
new_array[i] = 0;
// Increment the value of the variable i.
i = i + 1;
}
// Return the new array.
return new_array;
}
// Define the main() function.
int main()
{
// Create an integer to store the size of the array.
int N;
// Store the size of the array from the standard input.
cin >> N;
// Return if the value of N is less than 0
// or greater than 50.
if(N < 0 || N > 50)
return 0;
// Create an array of size N.
int *arr = new int[N];
// Open the file in read mode.
ifstream infile;
infile.open("data");
// Display the error message if the file is not found
// and return.
if(!infile)
{
cout << "Error: File not found!" << endl;
return 0;
}
int i = 0;
// Start the loop to read the values from the file.
while (!infile.eof() && i < N)
{
// Read the value from the file and store
// it in the array.
infile >> arr[i];
// Increment the value of the variable i.
i = i + 1;
}
// Close the input file.
infile.close();
// Call the function and store the new array.
arr = Array_Expander(arr, N);
// Start the loop to print the values of the
// array, one value per line.
for(int i = 0; i < 2*N; i++)
{
cout << arr[i] << endl;
}
// Return 0 and exit the program.
return 0;
}
See more about C++ at brainly.com/question/12975450
#SPJ1
What is the BCC feature used for?
to format email message text in a custom font
to format email message text in a blind font
to send a courtesy copy of an email to someone who does not need to take action
to send an email to someone without revealing that person’s email address to others on the distribution list
Answer:
to send an email to someone without revealing that person’s email address to others on the distribution list
Explanation:
BAM
To send an email to someone without revealing that person’s email address to others on the distribution list.
What is BCC?
"Blind carbon copy" is referred to as BCC. BCC is a similar method to CC for forwarding copies of an email to additional recipients. When CC is used, a list of recipients is shown; when BCC is used, a list of recipients is not visible.
Because the other receivers won't be able to see that the email has been forwarded to another person, it is known as a blind carbon copy.
Carbon copy is referred to as a "CC" in email communication. When there was no internet or email, you had to sandwich a piece of carbon paper between the paper you were writing on and the paper you wanted to use as your copy in order to make a copy of the letter you were writing.
Therefore, To send an email to someone without revealing that person’s email address to others on the distribution list.
To learn more about BCC, refer to the link:
https://brainly.com/question/29398332
#SPJ6
Which statement below is an example of big data?
Answer:
Hope this helps:))))
THE FIRST ONE!!!
Which code snippet could be used to print the following series?
Your friend Alicia says to you, “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I don’t think I’m going to do that.” How would you respond to Alicia? Explain.
Since my friend said “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I will respond to Alicia that it is very easy that it does not have to be hard and there are a lot of resume template that are online that can help her to create a task free resume.
What is a resume builder?A resume builder is seen as a form of online app or kind of software that helps to provides a lot of people with interactive forms as well as templates for creating a resume quickly and very easily.
There is the use of Zety Resume Maker as an example that helps to offers tips as well as suggestions to help you make each resume section fast.
Note that the Resume Builder often helps to formats your documents in an automatic way every time you make any change.
Learn more about resume template from
https://brainly.com/question/14218463
#SPJ1
From 1995 to 1997, the number of web users
Doubled
Tripled
Quadrupled
Remained the same
Business Automation Experts (BAE) develop computer systems for
businesses. What would be the best reason for BAE to use teams instead of
individuals?
A. Salespeople working in teams would not have to be as self-
disciplined.
• B. Teams could bring together different skills for understanding and
meeting client needs.
C. Teams of salespeople would not require any training time or
expense.
D. Teams of salespeople could carry out their work without any
meetings.
SUBMIT
Business Automation Experts (BAE) develop computer systems for
businesses. The best reason for BAE to use teams instead of individuals is: "Teams could bring together different skills for understanding and meeting client needs." (Option B)
What are Business Automation Experts?Business Automation Experts (BAE) are individuals or organizations that specialize in developing computer systems and technology solutions for businesses.
They help companies to automate various business processes, such as sales, marketing, customer service, and operations, in order to increase efficiency and productivity. BAE work closely with businesses to understand their specific needs and requirements, and then design and implement custom automation solutions that help businesses to streamline their operations and achieve their goals.
Note that BAE typically have extensive knowledge of technology and business processes, as well as strong project management and communication skills.
Learn more aobut Teams:
https://brainly.com/question/17860885
#SPJ1
Demonstrate understanding of different number conversion techniques between data types (at least 2).
To carry out number conversion,
Step 1: Divide the decimal number to be converted by the new base value. Step 2 Take the residual from Step 1 and use it as the rightmost (least significant) digit of the new base number. Step 3: Divide the previous divide's quotient by the new base.
What is number conversion?As we all know, the number system is a method of representing numbers. In number system conversion, we will learn how to convert a number from one base to another.
There are other number systems that may be used, including binary numbers, decimal numbers, hexadecimal numbers, and octal numbers.
Learn more about number conversion techniques at:
https://brainly.com/question/28587953
#SPJ1
Pierre has used a special lens on his camera and, with the technology available, has created lighting for his photo to give it just the right look. Once the image is on his computer, how else might Pierre use technology to change his photo so that it is even closer to what he imagined?
Pierre can use his printer to print out his photo.
Pierre can copy the image that he took and send it to others.
Once the photo is taken, Pierre must use it as it is.
Pierre can use editing software to manipulate the image.
Answer:
Pierre can use editing software to manipulate the image.
Explanation:
Once Pierre has the image on his computer, he can use editing software like photoshop to change it, in order to get the desire output. He could do some color correction or light correction once the photo is on his computer.
demons I shall be your eternal nightmare
What is the word to tell excel that you want it to do math
Are you referring to functions? In a cell you can type "=" and it will allow you to enter a formula to insert math equations involving other cell values.
Doors and windows are important compositional elements that impact the facade of a building True False
Answer:
true
Explanation:
A trucking company is expanding its business and recently added 50 new trucks to its fleet delivering to numerous locations. The company is facing some challenges managing the new additions. Which of the company's problems could be solved more easily using quantum computing?
collecting travel data from all the company's trucks in real-time
tracking to ensure that shipments are sent and received on time
automating the inventory operations to handle the expansion
routing the trucks effectively to optimize fuel consumption
Answer: automating the inventory operations to handle the expansion