Answer:
def cal(n):
s=0
while n>0:
r=n%10
if(r==0 or r==4 or r==6 or r==9):
s=s+1
elif r==8:
s=s+2
n=n//10
print(s)
n=int(input("enter number:"))
print(n)
cal(n)
Explanation:
- Create a function to calculate count of closed path
.
- Create a variable to store count of closed path
.
- While number is positive
, extract last digit of n
.
- Reduce number by truncating last digit
.
- Make a function call to compute count of path.
Answer:
10.1.1.150:80
Explanation:
Socket address is the combination of an IP address and port number.
HTTP is what most unencrypted webpage use, instead of HTTPS which is the encrypted version of HTTP.
By default, webserver using Hypertext Transfer Protocol (HTTP) uses a standard port known as port 80.
The Socket address which is the combination of the IP address and standard port number will be something like this:
10.1.1.150:80
Answer:
The answer is "minVal - userVals.at(0); /userVals.at(i) < minVal "
Explanation:
In the question, it uses minVal instead of XXX to hold the very first arra(userVal) element, and rather than YYY you choose a conditional statement to check which integer is lower than minVal to index of loop increment. It changes the value of the minVal if the condition is valid. It's completely different if we talk about another situation.
Answer:
speed up of process creation increases in the effective access time of memory
Explanation:
Virtual memories are often used in order to save up ram for other applications and not being limited by the actual physical memory that we have, in this case the virtual memory is slower than normal memories since they are not actual memories and are restricted to the spee of the connection or the speed of the disk where they are located.
Answer:
Registry
Explanation:
Windows Registry is used to store the configuration and setting information for hardware and software program which is critical for Windows operation. The registries are structured in hierarchical database model.
Basically, hierarchical database model is akin to a tree format which consist of the parent nodes and their child nodes. For example, a node named as HKEY_LOCAL_MACHINE can possess child nodes HARDWARE, SOFTWARE AND SYSTEM.
The node in the tree is also termed as a key.