Answer:
The minimum number of bits necessary to address 8K words is 13.
Explanation:
You have the number of words to address that is 8000 words, a word is the smallest addressable memory unit.
8000 words can be addressed with
units. Now you have to find the value of n that approximates to the number of words.
So you can see that 13 bits are needed to address 8K words.
Answer:
e) Code segment II produces correct output for all values of str, but code segment I produces correct output only for values of str that contain "pea" but not "pear".
Explanation:
<em>if - elseif - else statements work in sequence in which they are written. </em>
- <em> </em>In case <em>if() statement is true, </em>else if() and else statements will not get executed.
- In case <em>else if() statement is true</em>, conditions in if() and else if() will be checked and else statement will not be executed.
- In case <em>if() and else if() both are false</em>, else statement will be executed<em>.</em>
First, let us consider code segment I.
In this, first of all "pea" is checked in if() statement which will look for "pea" only in the String str. So, even if "pearl" or "pear" or "pea" is present in 'str' the result will be true and "pea" will get printed always.
After that there are else if() and else statements which will not get executed because if() statement was already true. As a result else if() and else statements will be skipped.
Now, let us consider code segment II.
In this, "pearl" is checked in if() condition, so it will result in desired output.
Executable code is attached hereby.
Correct option is (e).
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark">
java
</span>
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark">
java
</span>
Answer:
TEARDROP
Explanation:
Teardrop is a form of attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself .
Teardrop attack also involves sending fragmented packets to a target machine in which the victim is been tricked into sending messages to and from itself. One of the fields in an IP header is the “fragment offset” field, indicating the starting position of the data contained in a fragmented packet relative to the data in the original packet.
Answer:
See explaination for the program code
Explanation:
code:
public static int[] countLastDigits(int[] list) {
int[] count = new int[10];
for (int i = 0; i < list.length; i++) {
int digit = list[i] % 10;
count[digit]++;
}
return count;
}
Answer:
True
Explanation:
In this question, some information is missing. The question does not describe which type of question is this.So the correct question is it is a True/False question.
Application software is the collection of the program which is design for the purpose of end-user without the system software the application software is nothing. The main objective to introduce application software for reducing the effort of humans and we can do any task in a very easy manner.
The main objective of application software to enable the people to work groups or the entire enterprise to solve the problems and perform the specific tasks.