use structural hierarchical design method to implement the data path circuit. design and simulate each individual sub-design. wire each sub-design together to implement your final data path circuit.

Answers

Answer 1

A network is divided into layers by a hierarchical structure, and each layer has a set of functions that specify how it fits into the overall network. This gives a network designer the ability to select the best hardware, software, and features to fulfill a specific purpose for that network layer.

What does architectural structural hierarchy mean?

When one element is given more weight than another, this is what is meant by hierarchy. In order to accentuate certain aspects and give them importance, architectural hierarchy is typically applied throughout the design and construction of buildings. Size, shape, and color can all be used to construct a hierarchy.

Why would one want to create a hierarchical design?

Hierarchical design aids in organizing and structuring your design because it allows you to enter a big design one element at a time. You may better understand the contents of each module in your design by organising it. As a result, the design process moves more quickly and debugging is made simpler.

To know more about hierarchical visit;

https://brainly.com/question/13391804

#SPJ4


Related Questions

Write a shell in C/C++
**Prefer this to be written in C++**
Your shell should use the fork system call and the execv system call (or one of its variants) to execute commands. The shell needs to use either wait or waitpid system calls to wait for a program to complete execution. You should recognize the command exit to mean that your shell program should terminate by calling the exit() system call.
A very simple shell such as this needs at least the following components:
a command-line parser to figure out what the user is trying to do.
If a valid command has been entered, the shell should use fork to create a new child process, and the child process should exec the command.
Your shell will need to support file redirection. Use the same syntax as defined in the Bash shell: a single '>' implies that one needs to redirect the standard output of the program being started to the referenced file while a single '<' implies the same with standard input. The double '>>' implies that standard output will append to an existing file rather than create a new file (similar behavior is required for the '<<' operator and standard input). You do not need to implement support for the Bash pipeline operator '|'.
Before calling exec to begin execution, the child process may have to close stdin (file desriptor 0) and/or stdout (file descriptor 0), open the corresponding file and use the dup2 system call to make it the appropriate file descriptor. Don't forget to use the close system call to close the old file descriptor.

Answers

char **argv, int argc, and int main Run the command loop.lsh loop(); carry out any shutdown/cleanup.return; load any configuration files, if any EXIT SUCCESS;}

What on a computer is a cmd command?

Mean by CMD)? A programme is given an instruction (. CMD) when it is to carry out a specific activity. Depending on the type of system being used, it frequently refers to a particular phrase or word that instructs the computers what to perform via a terminal interface or shell.

How do command lists work?

An assortment of GPU commands can be stored and replayed as a command list. By minimising the runtime overhead produced, a program list may enhance performance.

To know more about command visit:

https://brainly.com/question/3632568

#SPJ4

PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
________________________________________
Output: Your goal

You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses. ________________________________________
Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Write your pseudocode here:










________________________________________

Part 2: Code the Program
Use the following guidelines to code your program.
1. Use the Python IDLE to write your program.
2. Using comments, type a heading that includes your name, today’s date, and a short description.
3. Set up your def main(): statement. (Don’t forget the parentheses and colon.)
4. Conclude the program with the main() statement.
5. Include at least two print statements and two variables.
6. Include at least four input prompts.
7. Use concatenation to join strings.
8. Follow the Python style conventions regarding indentation in your program.
9. Run your program to ensure it is working properly. Fix any errors you may observe.

Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!

When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE.
When you submit your assignment, you will attach this Python file separately.
________________________________________
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?



How could your program be useful in the real world?



What is a problem you ran into, and how did you fix it?



Describe one thing you would do differently the next time you write a program.

btw don't talk unless you are answering the question

Answers

Answer:

i can only give you pseudocode my fren

Explanation:

# information about me

def main():

MyName =  “malaki”

print(myName)

myInfo = “I was born in wichita, Kansas U.S. I live in japan. I love hotdogs.”

print(myInfo)

main()

sorry if this did not help :( i tried

In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

What is pseudocode?

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

Pseudocode is a description of the steps in an algorithm using simple or everyday language. In essence, a pseudocode uses straightforward (concise) words and symbols to summarize the steps taken during a software development process.

Consequently, the following are some characteristics of a pseudocode as the Pseudocode needs to be clear, Pseudocode ought to be ending. Executable pseudocode is required.

Therefore, In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

Learn more about language on:

https://brainly.com/question/20921887

#SPJ2

Which type of boot authentciation is more secure?
a) Power-on Password or supervisor password?
b) Drive password
c) Full disk encryption
d) Windows password

Answers

the correct answer would b (C) because all the other ones are not on the list

Microsoft Excel is an example of a(n) application.

Answers

Answer:

Yes, it is an example of an app. It's downloadable (like apps normally are)

and it works through some of the same coding as an app.

-----------------------------------------------------------------------------------------------------------------Have a nice day person

<3

Microsoft created and released Excel, a spreadsheet program. It is a component of the Microsoft Office productivity software package.

What is the main use of Microsoft Excel?

Spreadsheets can be formatted, organized, and computed by Microsoft Excel users.

By structuring data using programs like Excel, data analysts and other users may make information easier to study when it is added or changed. In Excel, the rectangular containers are known as cells, and they are organized into rows and columns.

It has calculating or computing capabilities, graphing tools, pivot tables, and the Visual Basic for Applications macro programming language (VBA). The Microsoft Office program package includes Excel.

Therefore, Microsoft produced Microsoft Excel, a spreadsheet, for Windows, macOS, Android, and iOS.

Learn more about Microsoft Excel here:

https://brainly.com/question/24202382

#SPJ2

data privacy may not be applicable in which scenarios?
1. an app targeted at children for entertainment
2.a platform developed purely for knowledge exchangewith no motive of financial incentive
3.a platform being hosted in a country with no dp laws but targeted at data subjects from a country with stringent DP laws
4.a website for disseminating knowledge and that allows anonymous access

Answers

Data privacy may not be appropriate within the following scenarios:

An app focused on children for amusement: Whereas information security is vital, uncommon controls such as the Children's Online Protection Security Act (COPPA) might apply instep.A stage created absolutely for information trade with no rationale of monetary motivation: As long as individual information isn't collected or prepared, information protection may not be specifically appropriate.A stage being facilitated in a nation with no information protection laws but focused on information subjects from a nation with rigid information protection laws: The stage ought to comply with the information security laws of the focused country, regardless of the facilitating area.Web site for spreading information and permitting mysterious get to In case no individual information is collected or connected to the clients, information security may not be specifically pertinent, but other contemplations like site security ought to still be tended to.

In situation 1, particular directions like COPPA may administer data privacy for children.

In situation 3, compliance with the focus on the country's data privacy laws is fundamental notwithstanding of facilitating area.

Learn more about data privacy here:

https://brainly.com/question/31211416

#SPJ1

How are centralized computing and cloud computing similar?

Answers

The centralized computing and cloud computing similar because Cloud as well as they other both operates a centralized management system.

What are the similarities between cloud computing and grid computing?

The Grid and Cloud are known to have similarities like both of them are known to be used to share recourses such as the computational power, storage, and others.

Hence, The centralized computing and cloud computing similar because Cloud as well as they other both operates a centralized management system.

Learn more about cloud computing from

https://brainly.com/question/19057393

#SPJ1

Lawn Mowing(Use the posted CarRental.py as an example to code this program.)The lawn-mowing season lasts 20 weeks. The weekly fee for mowing a lot as the following: To pay the bill, the customer can have three options: pay once, twice, or 20 times for the season. If the customer pays for once, the fee for the season is simply the seasonal total. If the customer requests two payments, each payment is half the seasonal fee plus a $5 service charge. If the customer requests 20 separate payments, add a $3 service charge per week. Write a Python main() function that reads the lot size and payment number option from the user, the program should print the amount per payment and the total payment as the sample output shown below. Note that, for now, you should assume that the lot size input will always be a positive number, and the payment option input is 1, 2, or 20. Sample outputs:Lot SizeWeekly FeeLess than 400 Sq. Ft $25400 Sq. Ft –Less than 600 Sq. Ft$35600 Sq. Ft and above

Answers

Answer:

The price of a Lawn Mowing Professional can vary depending on your area. ... On average, lawn mowing and trimming costs $50, with prices ... much you will pay to hire a professional to mow your lawn, this article ... In one example of average pricing for fertilization and weed control, ... Once a week, $206.

Explanation:

Hello, the code I am trying is completely off as I am doing this in python---what is the correct way to write a code for this kind of problem? Thanks truly it means more than you know. I'm trying to learn as quickly as possible. Here is the problem: Output values in a list below a user-defined amount Write a program that first gets a list of integers from the input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Ex: If the input is: 5 50 60 140 200 75 100 the output is: 50,60,75, The 5 indicates that there are five integers in the list, namely 50, 60, 140, 200, and 75. The 100 indicates that the program should output all integers less than or equal to 100, so the program outputs 50, 60, and 75. For coding simplicity, follow every output value by a comma, including the last one. Such functionality is common on sites like Amazon, where a user can filter results.



Warm regards, and thanks truly, Lily



Here is the code I tried for python/python 3 that I need help with greatly, because the list isn’t printing horizontally for the Zybooks simulator.

# reading input from user

s = input()

# splitting the string by space

splits = s.split(" ")

# calculating the size

n = int(splits[0])

# computing the values for list

lst = []

for i in range(n):

lst.append(int(splits[i + 1]))

# extracting the threshold from splits

threshold = int(splits[-1])

# looping through each value in list

for value in lst:

# checking value is less than or equal to that last threshold value.

if value <= threshold:

# printing the value ends with comma

print(value, end=',')



This is the output I am receiving. 5 50 60 140 200 75 100,

50,

60,

75,

but the expected output must be printed horizontally. Expected output 50,60,75, Thanks again truly.

Answers

Using the knowledge in computational language in python it is possible to write a a program that first gets a list of integers from the input.

Writting the code:

# reading a number

size = int(input())

# Creating a list

lst = []

# Looping for size times

for i in range(size):

   # Appending input to th eend of list

   lst.append(int(input()))

# Reading threshold value

threshold = int(input())

# Looping through each value in list

for x in lst:

   

   # Comparing x and threshold

   if x<threshold:

       

       # Printing value of x

       print(x,end=",")

See more about python at brainly.com/question/13437928

#SPJ1

Hello, the code I am trying is completely off as I am doing this in python---what is the correct way

Answer:

See attached image for code

Explanation:

The best way to do this is to create a python list and put all those values in the list. Then it is easy to see which is the threshold - it would be the last number on the list and thereby print out values less than that number

There are many different ways of solving this problem using lists. My approach will ask the user for 5 numbers and then ask for the threshold after entering the 5 numbers. I feel that is a better and more transparent approach than having to enter 6 numbers and take only the first 5.

I am not sure how much of Python programming has been taught, I have provided the code with comments to help you.

Please ask if you need further explanation

Hello, the code I am trying is completely off as I am doing this in python---what is the correct way

The floating point representation need to incorporate three things:  Sign  Mantissa  Exponent
 1 bit for Sign.  3 bits for Exponent.  4 bits for Mantissa (the mantissa field needs to be in normalized form
For the discussed 8-bit floating point storage:
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.

Answers

To encode the negative decimal fraction -9/2 (-4.5) using the 8-bit floating-point notation with 1 bit for sign, 3 bits for exponent, and 4 bits for mantissa, we follow these steps:

Step 1: Convert the absolute value of the decimal fraction to binary.

To convert -4.5 to binary, we start by converting the absolute value, 4.5, to binary. The integer part is 4, which can be represented as 0100. For the fractional part, we multiply 0.5 by 2 repeatedly until we reach the desired precision. The fractional part is 0.1, which can be represented as 0.0001.

So, the absolute value of -4.5 in binary is 0100.0001.

Step 2: Determine the sign.

Since the decimal fraction is negative, the sign bit will be 1.

Step 3: Normalize the binary representation.

In normalized form, the binary representation should have a single 1 before the decimal point. We shift the bits to the left until we have a 1 before the decimal point. In this case, we get 1.00001.

Step 4: Determine the exponent.

The exponent represents the number of positions the binary point is shifted. In this case, the binary point is shifted 3 positions to the right, so the exponent is 3. To represent the exponent in binary, we convert 3 to binary, which is 011.

Step 5: Determine the mantissa.

The mantissa is the fractional part of the normalized binary representation, excluding the leading 1. In this case, the mantissa is 00001.

Putting it all together, the 8-bit floating-point representation for -9/2 (-4.5) in the given format is:

1 011 00001

Note: The above encoding assumes the given format with 1 bit for sign, 3 bits for exponent, and 4 bits for mantissa, as specified in the question. The actual floating-point formats used in real-world systems may vary, and this is a simplified example for educational purposes.

for more questions on fraction

https://brainly.com/question/17220365

#SPJ8

QUESTION 1 Choose a term from COLUMN B that matches a description in COLUMN A. Write only the letter (A-L) next to the question number (1.1-1.10) in the ANSWER BOOK. COLUMN A 1.1. Substances that provide nourishment to the body 1.2. How you think and feel about something 1.3. Helps to cope with the challenges of being a student Exercise relating to increasing your heart rate 1.5. Having traits or qualities traditionally associated with 1.4. men 1.6. Seeing, hearing, or sensing something that is not really there 1.7. 1.8. Leaving everything till the last minute Is Chapter 2 in the Constitution of SA 1.9. Group of people who share notes and information 1.10. Ability to exercise for extended period of time COLUMN B A hallucination B nutrients C study group D procrastinate E endurance F Bill of Rights G Cardio-vascular H masculine I attitude J resilience K strength L flexibility ​

Answers

Answer:

1.1 B nutrients 1.2 I attitude 1.3 J resilience 1.4 H masculine 1.5 L flexibility 1.6 A hallucination 1.7 D procrastinate 1.8 F Bill of Rights 1.9 C study group 1.10 E endurance

Explanation:

what is government to business ​

Answers

Government-to-business is a relationship between businesses and governments where government agencies of various status/levels provide services and/or information to a business entity via government portals or with the help of other IT solutions.

Source: https://snov.io/glossary/g2b/

When Jenna borrows her dad's office chair, it's too big for her, so her feet dangle and don't reach the floor—which can cause what?

A: eye strain

B: carpal tunnel syndrome

C: a repetitive motion injury

D: slouching posture

Answers

Answer:

D

Explanation:

Answer:

B: carpal tunnel syndrome

Explanation:

YYou have to have your hand on the ddesk.

list two precautions you should take when using free utility software available on the web

Answers

Answer:

dont use any personal information. make sure its a safe website

Fill in the blank to complete the sentence.
If you only want to use the localtime function, you can load just that one function into active memory using the following line of code.

from _______ import localtime()

(Sorry for bad picture) ​

Fill in the blank to complete the sentence.If you only want to use the localtime function, you can load

Answers

Answer:

The correct answer is time

Explanation:

from time import localtime()

Fill in the blank to complete the sentence.If you only want to use the localtime function, you can load

how to protect your computer from physical damage

Answers

To protect your computer from physical damage while a laptop cover or sleeve can protect your laptop while on the go, a skin, or tight case will protect it from physical damage while in use. Some even serve as water repellents.

What is a computer system?

A computer system is a collection of different parts that work together to complete a task. Its components include the motherboard, CPU, RAM, and ROM.

To keep such equipment working well, dust and filth should be removed from them on a regular basis. Before ejecting the device from the system, make sure it is disconnected.

Therefore, most devices have a safety guide and an instruction booklet; always use the suggested settings to ensure your system runs smoothly. These guidelines are usually provided by the manufacturer and are trustworthy.

To learn more about the computer system, refer to the link:

https://brainly.com/question/5415448

#SPJ1

A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced, new applications can be made available sooner, and the risk of human error is reduced. b. Ability to support more concurrent devices, minimal infrastructure changes, and lower latency. c. Lower latency, greater bandwidth, and ability to support more devices. d. Ability to support exciting new applications, greater bandwidth, and improved security

Answers

A 5G network will have the following advantages over a 4G network except that C. Lower latency, greater bandwidth, and ability to support more devices.

A 5G network simply means the 5th generation mobile network. It enables a new kind of network that is designed to connect everyone and devices.

The advantages of a 5G network over a 4G network include lower latency, greater bandwidth, and the ability to support more devices.

Read related link on:

https://brainly.com/question/25530245

Select the correct answer. Which decimal number is equivalent to this binary number? 11111011

Answers

Answer: 251

Explanation:

Step by step solution

128 + 64 + 32 + 16 + 8 + 0 + 2 + 1 = 251. This is the decimal equivalent of the binary number 11111011.

Answer:

251

Explanation:

list of functions of control unit​

Answers

Answer:

I guess it would help you

list of functions of control unit

C++

Convert totalOunces to pints, cups, and ounces, finding the maximum number of pints, then cups, then ounces.

Ex: If the input is 63, then the output is:

Pints: 3
Cups: 1
Ounces: 7
Note: A pint is 16 ounces. A cup is 8 ounces.

More:
First, the number of pints is found using integer division on the total ounces. Then, the remaining amount is found using modulo.

Next, the number of cups is found using integer division on the remaining ounces. The remaining amount is updated using modulo.

Finally, the number of ounces is assigned with the remaining ounces.

Answers

#include <iostream>

#include <cmath>

void totalOunches(int n) {

   

   int count[3];

   

   for(int i=0; i<3; i++) {

       int general_term = (std::pow(i+1,2) - (19*(i+1)) + 50) / 2;

       count[i] = n / general_term;

       n -= general_term * count[i];

   }

   

   std::cout << "\nPints: "   << count[0]

             << "\nCups: "    << count[1]

             << "\nOunches: " << count[2]

             << std::endl;

}

int main(int argc, char* argv[]) {

   

   int idx;

   std::cin >> idx;

   totalOunches(idx);

   

   return 0;

}

C++ Convert totalOunces to pints, cups, and ounces, finding the maximum number of pints, then cups, then

Assign numMatches with the number of elements in userValues that equal matchValue. userValues has NUM_VALS elements. Ex: If userValues is {2, 1, 2, 2} and matchValue is 2, then numMatches should be 3.

Your code will be tested with the following values:
matchValue: 2, userValues: {2, 1, 2, 2} (as in the example program above)
matchValue: 0, userValues: {0, 0, 0, 0}
matchValue: 10, userValues: {20, 50, 70, 100}

Answers

This code checks to see if each userValues element matches matchValue by iterating through each one. If that's the case, numMatches is raised by 1.

A property or an array?

The user must have access to a control that allows multiple value selection in order to change the values in an array property. The user-selected values are written to array elements when the form is submitted Values can be entered into an array property using a multiple-selection list box or a collection of checkboxes on a form. Controls are items that show data, make it easier to enter or update data, carry out actions, or allow users to make choices. Controls generally make the form simpler to use.

if (userValues[i] == matchValue) numMatches++; numMatches = 0;  (int i = 0; i NUM_VALS; i++);

To know more about code  visit:-

https://brainly.com/question/17293834

#SPJ1

What kind of waste does a computer generate?

Will give brainly :3

Answers

Answer:

waste???? a computer??

(b) Explain how implicit intents can lead to more efficient use of the mobile device and a better user experience.

Answers

The way that implicit intents can lead to more efficient use of the mobile device and a better user experience is that:

Implicit intents allow an app to request an action from another app without explicitly specifying the app that should perform the action. This can lead to more efficient use of the mobile device because the app that receives the implicit intent can choose the most appropriate app to perform the requested action, rather than the requesting app needing to know about all the available apps that can perform the action.

What is the  implicit intents about?

An example of this intent is that, if an app wants to share a piece of content with another app, it can use an implicit intent to request the action of "sharing."

The system will then determine which app is the most appropriate to handle the request, such as a messaging app or a social media app, and launch that app to handle the request.

Therefore,, using implicit intents can lead to a better user experience because it allows apps to work together and share functionality, rather than each app needing to provide all its own functionality, which can result in a fragmented and less cohesive user experience.

Learn more about mobile device from

https://brainly.com/question/917245

#SPJ1

What will be the different if the syringes and tube are filled with air instead of water?Explain your answer

Answers

Answer:

If the syringes and tubes are filled with air instead of water, the difference would be mainly due to the difference in the properties of air and water. Air is a compressible gas, while water is an incompressible liquid. This would result in a different behavior of the fluid when being pushed through the system.

When the syringe plunger is pushed to force air through the tube, the air molecules will begin to compress, decreasing the distance between them. This will cause an increase in pressure within the tube that can be measured using the pressure gauge. However, this pressure will not remain constant as the air continues to compress, making the measured pressure unreliable.

On the other hand, when the syringe plunger is pushed to force water through the tube, the water molecules will not compress. Therefore, the increase in pressure within the tube will be directly proportional to the force applied to the syringe plunger, resulting in an accurate measurement of pressure.

In summary, if the syringes and tube are filled with air instead of water, the difference would be that the measured pressure would not be reliable due to the compressibility of air.

In JAVA with comments: Consider an array of integers. Write the pseudocode for either the selection sort, insertion sort, or bubble sort algorithm. Include loop invariants in your pseudocode.

Answers

Here's a Java pseudocode implementation of the selection sort algorithm with comments and loop invariants:

```java

// Selection Sort Algorithm

public void selectionSort(int[] arr) {

   int n = arr.length;

   for (int i = 0; i < n - 1; i++) {

       int minIndex = i;

       // Loop invariant: arr[minIndex] is the minimum element in arr[i..n-1]

       for (int j = i + 1; j < n; j++) {

           if (arr[j] < arr[minIndex]) {

               minIndex = j;

           }

       }

       // Swap the minimum element with the first element

       int temp = arr[minIndex];

       arr[minIndex] = arr[i];

       arr[i] = temp;

   }

}

```The selection sort algorithm repeatedly selects the minimum element from the unsorted part of the array and swaps it with the first element of the unsorted part.

The outer loop (line 6) iterates from the first element to the second-to-last element, while the inner loop (line 9) searches for the minimum element.

The loop invariant in line 10 states that `arr[minIndex]` is always the minimum element in the unsorted part of the array. After each iteration of the outer loop, the invariant is maintained.

The swap operation in lines 14-16 exchanges the minimum element with the first element of the unsorted part, effectively expanding the sorted portion of the array.

This process continues until the entire array is sorted.

Remember, this pseudocode can be directly translated into Java code, replacing the comments with the appropriate syntax.

For more such questions on pseudocode,click on

https://brainly.com/question/24953880

#SPJ8

WHICH OF THESE COMMANDS ALLOWS YOU TO NAVIGATE TO THE OUTLINE FILE THAT WILL BE INTEGRATED INTO A PRESENTATION?

Answers

The question seems to be asking about commands that allow you to navigate to an outline file for integration into a presentation.

How to go about this?

However, without specific information about the software or tools being used, it is difficult to provide a specific command.

Generally, in presentation software like Microsoft PowerPoint, you can navigate to an outline file by going to the "File" menu, selecting "Open," and choosing the appropriate file.

Other presentation tools may have similar options to navigate to and open an outline file.

Learn more about command at:

https://brainly.com/question/25808182

#SPJ1

script code written in many languages of the best known: ( C#_PHP_HTML)​

Answers

Answer:

PHP

Explanation:

The best way to answer this question is to interpret it as, which of the three is a scripting language.

Analyzing each of the languages

1. C#

C# is not a scripting language, but instead it is an object-oriented programming language. Also, c# is a compiled language and one of the features of scripting language is that, they are interpreted.

2. PHP

Basically, PHP are used for server side scripting language because it uses scripts and its programs are not for general purpose runtime environment (but instead for special runtime environments).

3. HTML

HTML is neither a programming language, nor a scripting language because its design pattern does not follow that or programming and scripting languages, and it can not perform what an actual programming and scripting language do.

Write a C++ program to find the area and circumference of a rectangle

Answers

Answer:

#include <iostream>

using namespace std;

   int main()

   {

    int width, lngth, area, peri;

 cout << "\n\n Find the Area and Perimeter of a Rectangle :\n";

 cout << "-------------------------------------------------\n";  

       cout<<" Input the length of the rectangle : ";

    cin>>lngth;

 cout<<" Input the width of the rectangle : ";

    cin>>width;

    area=(lngth*width);

 peri=2*(lngth+width);

       cout<<" The area of the rectangle is : "<< area << endl;

       cout<<" The perimeter of the rectangle is : "<< peri << endl;  

       cout << endl;

       return 0;

   }

Explanation:

A chart legend?

A.corresponds to the title of the data series column.
B.provides the boundaries of the chart graphic.
C.is based on the category labels in the first column of data.
D.is used to change the style of a chart.

Answers

A chart legend can be useful in some cases during data process
Change style and f art

Database systems are exposed to many attacks, including dictionary attack, show with implantation how dictionary attack is launched?(Java or Python) ?

Answers

A type of brute-force attack in which an intruder uses a "dictionary list" of common words and phrases used by businesses and individuals to attempt to crack password-protected databases.

What is a dictionary attack?

A Dictionary Attack is an attack vector used by an attacker to break into a password-protected system by using every word in a dictionary as a password for that system. This type of attack vector is a Brute Force Attack.

The dictionary can contain words from an English dictionary as well as a leaked list of commonly used passwords, which, when combined with common character replacement with numbers, can be very effective and fast at times.

To know more about the dictionary attack, visit: https://brainly.com/question/14313052

#SPJ1

PLEASE HELP ME ANSWER THIS QUESTION. I REALLY REALLY NEED IT.
. According to IEEE, what is software engineering? (A) The study of
approaches (B) The development of software product using scientific
principles, methods, and procedures (C) The application of engineering
to software (D) All of the above

Answers

IEEE (Institute of Electrical and Electronics Engineers) describes software engineering as:

(D) All of the above.

Software engineering encompasses the study of approaches, and the development of software products using scientific principles, methods, and procedures. It also encompasses the application of engineering principles to software. It is a multidisciplinary field that combines technical knowledge, problem-solving skills, and systematic processes to design, develop, and maintain software systems efficiently and effectively.

Other Questions
capital assets used by governmental funds should be reported in: group of answer choices departmental memorandum records. the appropriate governmental funds. the property, plant, and equipment fund. the governmental activities column of the government-wide statements. the long-run budget constraint dictates that: the present value of trade balances is zero taken to infinity. the present value of wealth is equal to zero taken to infinity. the present value of wealth is exactly offset by the present value of trade balances. if the present value of wealth is positive, the nation cannot afford future trade deficits on average. Some differentiated cells become senescent almost immediately, leaving the cell cycle and undergoing terminal differentiation. Other cells have a high need to proliferate in order to grow and repair the organ or tissue, so they do not enter senescence for a long period of time. Which cell type would be most likely to put off senescence and terminal differentiation so it could continue to replicate in order to grow and repair?. If the m Why does Torvald feel he "dare not trust" the children to Nora after he has read the letter? Why do so many coconut trees grow near the ocean? They have money. (affirmative to negative sentence) Exercise Write the verbs in brackets. Use the first conditional.1-12- If my brother3- You4- Melissa5-If I6-Peter7- If I8-They9-What10-Many workers11-112-If he13-My uncle_14- If you15-Sandra, if you16-Cristopher17-Your motorbike18-If you(stay) at home if it.(go) abroad, I(not earn) enough money if you,(can) to go out later if she.(go) to the supermarket later, I(get) wet if he(find) the book you lent me, I(be) angry if we(happen) if youVBLIVEWORKSHEETS.(not buy) a bigger house if I(rain) this afternoon.(not finish) the vegetables, he(be) very worried.(lose) their jobs if that factory.(be) so happy if he(not take) an umbrella.(give) it back to you.(not visit) them next Saturday. We promised to go.(not go) to work tomorrow?(can) to go to the opera if he(not put) sugar in your coffee, it(not hurry up), you(not work) more hours.(not finish) her homework(buy) some tomatoes.(not take) an aspirin, your headache(close) down.(not get) promoted at work.(not have) a dessert.(remember) to get the tickets.(not taste) nice.(not break down) if the mechanic(be) late for the meeting.(find) the money he lost.(check) it.(not disappear). Use the poem "The Road Not Taken" to answer the following questions.In the poem, the authors tone is...Select one:a. Confusedb. Thoughtfulc. Excitedd. Angry the type of amnesia in which you lose your memory for past events is called: what might be a challenge in trying to estimate the fish population for a certain species? (mark all that apply.) group of answer choices you have to deal with gear biases. (some types of gear might be more likely to get catch certain species than others.) fish in deep water might be harder to find. you can't see all of the fish. it might be easier or only possible to catch fish of certain sizes. there are no challenges. it is easy to count the number of fish. Use the drop-down menus to complete the sentences.The only way to prevent people from contracting both curable and incurable STIs that is effective 100 percent of the time is with .The risk of contracting hepatitis is lowered when a person receives . are protective barriers used to reduce the risk of contracting an STI. If Billy weighs 120N on earth, how much will he weigh on the moon Which {pH} tests are qualitative? Select one: a. litmus paper and BTB b. litmus paper and {pH} paper \boldsymbol{\sim} c. litmus paper and {pH} meter d. BT Select the ways that you can gather information and develop ideas for your writing.A.go straight to your final draftB.outline and organizeC.ask and answer questions about your topicD.brainstormE.free-write Given: BI ODProve: BIG DOGAccurately draw and label the picture and mark the given information 2 pointsGive logical steps to prove that the triangles are similar 4 pointsGive correct reasons for each step 4 pointsThis can be written as a two column proof or a paragraph proof. Solve the equation.10=b4 identify the element of the promotional mix that is characterized by customized messages and whose primary cost is the cost of communication through mail, telephone, or computer help me pls ASAP I need it in 5mins Two vectors of magnitude 3 units and 4 units are at an angle 60degree between them. Find the magnitude of their difference