answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
2 years ago
15

TQ Artificial Intelligence (AI)

Computers and Technology
1 answer:
dybincka [34]2 years ago
8 0
Ask Elon Musk he knows
You might be interested in
Multiply each element in origList with the corresponding value in offsetAmount. Print each product followed by a semicolon (no s
Pavlova-9 [17]

Answer:

Replace /* Your code goes here */  with

for(i =0; i<NUM_VALS; i++) {

    printf("%d", origList[i]*offsetAmount[i]);

printf(";");

}

Explanation:

The first line is an iteration statement iterates from 0 till the last element in origList and offsetAmount

for(i =0; i<NUM_VALS; i++) {

This line calculates and print the product of element in origList and its corresponding element in offsetAmount

    printf("%d", origList[i]*offsetAmount[i]);

This line prints a semicolon after the product has been calculated and printed

printf(";");

Iteration ends here

}

5 0
2 years ago
Using range(1,101), make two list, one containing all even numbers and other containing all odd numbers. How can I do this on Py
jeka94

Answer:

even = []

odd = []

for i in range(1,101):

if i % 2 == 0:

even.append(i)

else:

odd.append(i)

4 0
1 year ago
5.During a recent network attack, a hacker used rainbow tables to guess network passwords. Which type of attack occurred
Anton [14]

Answer:

Rainbow table attack

Explanation:

A rainbow table attack is a type of network attack or hacking where the hacker tries to utilize a rainbow hash table to crack the passwords in a database system. A rainbow table itself is a hash function used in cryptography for saving important data in a database. Especially passwords.

In this process, sensitive data are hashed two or multiple times with the same key or with different keys so as to avoid rainbow table attack. In a rainbow table attack, the hacker simply compares the hash of the original password against hashes stored in the rainbow table and when they find a match, they then identify the password used to create the hash.

6 0
2 years ago
Assume we have a computer where the clocks per instruction (CPI) is 1.0 when all memory accesses hit in the cache. The only data
umka21 [38]

Answer:

6.6 times faster considering I-cache

Explanation:

<em>Given data </em>:

CPI  = 1

Data accesses ( loads and stores ) = 40% of instructions

Miss penalty = 200 clock cycles

Miss rate = 2% for I-cache ,  5% for D-cache

<u>Determine how much faster the computer will be if all instructions were Cache hits </u>

In this condition the memory stall = 0

hence: CPU ideal time = ( Ic * CP1  + memory stall ) * clock cycle time --- ( 1 )

                                     = ( Ic * 1 + 0 ) * clock cycle time

<em>Note : Memory stall = Ic * ( 1 + load fraction ) * miss rate * miss penalty  --- ( 2)</em>

back to equation 1

Memory stall ( for I-cache ) = Ic * ( 1 + 40% ) * 2% * 200

                                              = 5.6 Ic

Input value into equation 1

CPU ideal time = Ic * 1 + 5.6Ic * clock cycle time

                         = ( 6.6 Ic ) * clock cycle time

To determine how much faster we take the ratio of the CPU ideal time

=   6.6 Ic * clock cycle time / 1  Ic * clock cycle time

= 6.6 times faster

4 0
2 years ago
Blackbaud is a company that supplies services and software designed for nonprofit organizations. Which type of e-commerce websit
natka813 [3]

Explanation:

Blackbaud's software products are specially designed to support the unique needs of nonprofit and social good organizations.

Explore our software solutions that can help you advance your organization's mission.

3 0
2 years ago
Other questions:
  • Which telecommunications device is widely used in industries that require closed communication?
    7·2 answers
  • What is the other name designated to a game master of multiplayer online games (MMOs)?
    11·2 answers
  • What does the following function return? void index_of_smallest(const double all, int startindex, int numberOfSlots); A. a doubl
    7·1 answer
  • Programming challenge description: Write a program that, given two binary numbers represented as strings, prints their sum in bi
    6·1 answer
  • Write a program to determine all pairs of positive integers, (a, b), such that a &lt; b &lt; 1000 and [a2 + b2 + 1)/(ab) is an i
    13·1 answer
  • The establishment called ABC Enterprise requires a Java program to keep a database of the inventory of the products that it sell
    8·1 answer
  • Write a function called sum_scores. It should take four arguments, where each argument is the team's score for that quarter. It
    6·1 answer
  • Design two subclasses of Employee…SalariedEmployee and HourlyEmployee. A salaried employee has an annual salary attribute. An ho
    12·1 answer
  • Read the attached paper titled A Survey of Coarse-Grained Reconfigurable Architecture and comment on it. Make sure to specifical
    5·1 answer
  • A small e-commerce company uses a series of Robotic Process Automation solutions to manage the backup of data from individual wo
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!