answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
2 years ago
13

Define a new object in variable painter that has properties "name" storing "Vincent van Gogh"; "artworks" storing "The Starry Ni

ght", "Irises" and "The Potato Eaters"; "bornDate" storing "March 30, 1853"; and "diedDate" storing "July 29, 1890".
Computers and Technology
1 answer:
trapecia [35]2 years ago
6 0

Answer:

painter = {'name' : "Vincent van Gogh", 'artworks': ["The Starry Night","Irises","The Potato Eaters"],'bornDate': "March 30, 1853", 'eyeColor': "July 29, 1890", 'diedDate': "July 29, 1890"} #this is a code which holds the questions defined value in a painter variable.

Explanation:

  • The above question wants to declare a variable that is in the form of a key and value pair.
  • The above question states to define name, artworks,eyeColor, and dieddate as a key and the other is defined as a value.
  • when a user wants to access the whole dictionary then he can do with the help of the painter variable.
  • But when he wants to access the value of any particular key, then he can do it with the help of the key name as "painter[keyname]".

You might be interested in
In the graph shown here, by what percentage are the number of people in computer occupations in general projected to increase?
SOVA2 [1]

Answer:

12% or 21%

Explanation:

not really sure

8 0
2 years ago
Read 2 more answers
Translate the following MIPS code to C. Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3
Romashka [77]

Answer:

f = 2 * (&A[0])

See explaination for the details.

Explanation:

The registers $s0, $s1, $s2, $s3, and $s4 have values of the variables f, g, h, i, and j respectively. The register $s6 stores the base address of the array A and the register $s7 stores the base address of the array B. The given MIPS code can be converted into the C code as follows:

The first instruction addi $t0, $s6, 4 adding 4 to the base address of the array A and stores it into the register $t0.

Explanation:

If 4 is added to the base address of the array A, then it becomes the address of the second element of the array A i.e., &A[1] and address of A[1] is stored into the register $t0.

C statement:

$t0 = $s6 + 4

$t0 = &A[1]

The second instruction add $t1, $s6, $0 adding the value of the register $0 i.e., 32 0’s to the base address of the array A and stores the result into the register $t1.

Explanation:

Adding 32 0’s into the base address of the array A does not change the base address. The base address of the array i.e., &A[0] is stored into the register $t1.

C statement:

$t1 = $s6 + $0

$t1 = $s6

$t1 = &A[0]

The third instruction sw $t1, 0($t0) stores the value of the register $t1 into the memory address (0 + $t0).

Explanation:

The register $t0 has the address of the second element of the array A (A[1]) and adding 0 to this address will make it to point to the second element of the array i.e., A[1].

C statement:

($t0 + 0) = A[1]

A[1] = $t1

A[1] = &A[0]

The fourth instruction lw $t0, 0($t0) load the value at the address ($t0 + 0) into the register $t0.

Explanation:

The memory address ($t0 + 0) has the value stored at the address of the second element of the array i.e., A[1] and it is loaded into the register $t0.

C statement:

$t0 = ($t0 + 0)

$t0 = A[1]

$t0 = &A[0]

The fifth instruction add $s0, $t1, $t0 adds the value of the registers $t1 and $t0 and stores the result into the register $s0.

Explanation:

The register $s0 has the value of the variable f. The addition of the values stored in the regsters $t0 and $t1 will be assigned to the variable f.

C statement:

$s0 = $t1 + $t0

$s0 = &A[0] + &A[0]

f = 2 * (&A[0])

The final C code corresponding to the MIPS code will be f = 2 * (&A[0]) or f = 2 * A where A is the base address of the array.

3 0
1 year ago
10. (P37) Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently lon
MissTica

Answer:

see explaination

Explanation:

For GBN:

A sends will 9 segments in total. These are initially sent segments 1, 2, 3, 4, 5 and later re-sent segments 2, 3, 4, and 5.

B will send 8 ACKs. They are 4 ACKS with sequence number 1, and 4 ACKS withsequence numbers 2, 3, 4, and 5.

For SR:

A sends 6 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later re-sent segments 2. B sends 5 ACKs. They are 4 ACKS with sequence number 1, 3, 4, 5. And there is oneACK with sequence number 2.

For TCP:

A sends 6 segments in total. They are initially sent segments 1, 2, 3, 4, 5 and later re-sent segments 2. B sends 5 ACKs. They are 4 ACKS with sequence number 2. There is one ACK withsequence numbers 6.

Let it be observed that TCP always send an ACK with expected sequencenumber.

b). TCP. This is because TCP uses fast retransmit without waiting until time out.

8 0
1 year ago
Write a loop that reads strings from standard input, where the string is either duck or goose. the loop terminates when goose is
Misha Larkins [42]
Have in mind that the following code is ofr C++ but I know that whatever the language you are using, you can use the same idea:

<span><iostream> 
using namespace std; 
int main() 
{ 
int count=0; 
string x; 
while(1) 
{ 
cout<<"Enter either goose or duck"; 
cin>>x; 
if ( x=="Goose") break; 
count++; 
} 

cout<<"Number of Ducks="<<count<<endl; 
return 0; 
}
</span>
Another one that is simplier but the language is python is:
counter = 0while True:  line = input()if line == 'duck':  counter += 1    elif line == 'goose':breakprint(counter)
4 0
2 years ago
Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
Len [333]

Answer:

white-hat hacker

Explanation:

The white-hat hacker is also called as ethical hacking. The white hat hacker is the security of the computer in an ethical manner by some experts it specializing in system testing and other test modules of computer is to ensure the security of the information security of an organization.

As Matt is a  developer for protecting the Cyber in a company The Matt creates secure management information systems. it divides the new task into the computer So Matt is a white-hat hacker in that organization

4 0
2 years ago
Other questions:
  • Column A contains numbers from rows 1-20. You can use the formula ----?---- to find the value of the largest number divided by t
    13·1 answer
  • Column, bar, pie, line, and scatter are all types of_____
    9·1 answer
  • A good website design combines which of the following elements? (select all that apply) powerful web server hardware components
    9·2 answers
  • #Remember that Fibonacci's sequence is a sequence of numbers
    14·1 answer
  • Consider the following relationship involving two entities, students and classes:A student can take many classes. A class can be
    9·1 answer
  • Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rath
    13·1 answer
  • How many times is the function wordScramble() called in the given program? public class WordScramble { public static void wordSc
    6·1 answer
  • Write a MATLAB function named average_of_scores_with_drops The function will have two inputs and two return values. The first in
    11·1 answer
  • PLEASE HELP!!!
    11·1 answer
  • The dealer's cost of a car is 85% of the listed price. The dealer would accept any offer that is at least $500 over the dealer's
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!