answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry_Shevchenko [17]
2 years ago
11

When excel follows the order of operations the formula 8 * 3 + 2 equals?

Computers and Technology
1 answer:
Airida [17]2 years ago
3 0
It follows the normal convention of BODMAS , which is the order of precedence of operations , so the answer equals to 26
You might be interested in
The computer component that makes sure that instructions are decoded and executed properly is the ___________.
Shalnov [3]

Answer:

The Central Processing Unit

Explanation:

The Central Processing Unit is the brains of the computer where most calculations take place. A central processing unit (CPU), also called a central processor or main processor is the electronic circuitry within a computer that executes instructions that make up a computer program. The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions.

8 0
2 years ago
Read 2 more answers
For the (pseudo) assembly code below, replace X, Y, P, and Q with the smallest set of instructions to save/restore values on the
Dimas [21]

Answer:

Explanation:

Let us first consider the procedure procA; the caller in the example given.

  Some results: $s0,$s1,$s2, $t0,$t1 and $t2 are being stored by procA. Out of these registers, few registers are accessing by procA after a call to procB. But, procB might over-write these registers.

       Thus, procA need to save some registers into stack first before calling procB, .

      only $s1,$t0 and $t1 are being used after return from procB in the given example,

       Caller saves and restores only values in $t0-$t9, according to MIPS guidelines for caller-saved and callee-saved registers, .

       Thus, procA needs to save only $t0 and $t1.

    jal instruction overwrites the register $ra by writing the address, to which the control should jump back, after completing the instructions of procB, when procB is called,.

       Therefore, procA also need to save $ra into stack.

 ProcA is writing new values into $a0,$a2, procA must save $a0 and $a1 first before calling procB, .

     In the given example, after return from procB, only $a0 is being used. It is therefore enough to save $a0.

   Also, procA needs to save frame pointer, which points the start of the stack space for each procedure.

       Generally, as soon as the procedure begins, frame pointer is set to the current value of the stack pointer,.

Let us consider the procedure procB; the callee in the given example.

 The callee is responsible for saving values in $s0-$s7 and restoring them before returning to caller, this is according to MIPS guidelines for caller-saved and callee-saved registers,

   procB is expected to over-write the registers $s2 and $t0. Nonetheless, in the first two lines, procB might over-write the registers $s0 and $s1.

   Thus, procB is responsible for saving and restoring $s0,$s1 and $s2.

X:

We need to create space for 5 values on the stack since procA needs to save $a0,$ra,$t0,$t1 and $fp(frame pointer), . Each value(word) takes 4 bytes.

$sp = $sp – 20 # on the stack, create space for 5 values

sw $a0, 16($sp) # store the result in $a0 into the memory address

               # indicated by $sp+20

sw $ra, 12($sp) # save the second value on stack

sw $t0, 8($sp) # save the third value on stack

sw $t1, 4($sp) # save the fourth value on stack

sw $fp, 0($sp) #  To the stack pointer, save the frame pointer

$fp = $sp      #  To the stack pointer, set the frame pointer

Y:

lw $fp, 0($sp) #  from stack, start restoring values

lw $t1, 4($sp)

lw $t0, 8($sp)

lw $ra, 12($sp)

lw $a0, 16($sp)

$sp = $sp + 20 # decrease the size of the stack

P:

$sp = $sp – 12 #  for three values, create space on the stack

sw $s0, 0($sp) # save the value in $s0

sw $s1, 0($sp) # save the value in $s1

sw $s2, 0($sp) # save the value in $s2

Q:

lw $s0, 0($sp) #  from the stack, restore the value of $s0

lw $s1, 0($sp) #  from the stack, restore the value of $s1

lw $s2, 0($sp) #  from the stack, restore the value of $s2

$sp = $sp + 12 # decrease the stack size

8 0
2 years ago
Which code fragment would correctly identify the number of arguments passed via the command line to a Java application, excludin
blondinia [14]

Answer:

The answer is a. int count =args.length

Explanation:

Which code fragment would correctly identify the number of arguments passed via the command line to a Java application, excluding the name of the class that is being invoked?

a. int count = args.length;

b. int count=0; while (!(args[count].equals(""))) count ++;

c. int count = args.length - 1;

d. int count = 0; while (args[count] != null) count ++;

The answer is a. int count =args.length

args is a string array object, which contains set of all arguments. You can find the number of argument by using args.length.

8 0
2 years ago
Exercise 9.1.6: Checkerboard, v1 Spoint
AysviL [449]

Answer:

In order to get following pattern, we have to use numpy package.

Following code with work perfectly fine and will print the pattern.

Python code starts as below

*********************************************

<em># Python program to print 8 X 8 alternative 1 and 0's. 3rd and 4th row with all 0's </em>

<em># checkerboard pattern using numpy </em>

<em># We need Following pattern </em>

<em># 0 1 0 1 0 1 0 1 </em>

<em># 1 0 1 0 1 0 1 0 </em>

<em># 0 1 0 1 0 1 0 1 </em>

<em># 0 0 0 0 0 0 0 0 </em>

<em># 0 0 0 0 0 0 0 0 </em>

<em># 1 0 1 0 1 0 1 0 </em>

<em># 0 1 0 1 0 1 0 1 </em>

<em># 1 0 1 0 1 0 1 0 </em>

<em> </em>

<em>import numpy as np </em>

<em> </em>

<em># function to print Checkerboard pattern </em>

<em>def printcheckboard(n): </em>

<em> </em>

<em>        print(" Customized Checkerboard pattern:") </em>

<em>        # create a n * n matrix   </em>

<em>        x = np.zeros((n, n), dtype = int) </em>

<em>        y = np.zeros((n, n), dtype = int) </em>

<em>        # fill with 1 the alternate rows and columns </em>

<em>        x[1::2, ::2] = 1 </em>

<em>        x[::2, 1::2] = 1 </em>

<em>       # fill with 0 the alternate rows and columns </em>

<em>        y[1::2, ::2] = 0 </em>

<em>        y[::2, 1::2] = 0 </em>

<em> </em>

<em>        # print the pattern  for first 3 rows</em>

<em>        for i in range(0,3): </em>

<em>                for j in range(n): </em>

<em>                        print(x[i][j], end =" ") </em>

<em>                print() </em>

<em>        # print the pattern   for next two rows with all 0's</em>

<em>        for k in range(3,5): </em>

<em>                for l in range(n): </em>

<em>                        print(y[k][l], end =" ") </em>

<em>                print() </em>

<em>         # print the pattern  for last 3 rows with alternative 1 and 0.        </em>

<em>        for i in range(5,8): </em>

<em>                for j in range(n): </em>

<em>                        print(x[i][j], end =" ") </em>

<em>                print() </em>

<em> </em>

<em># Calling the function code </em>

<em>n = 8 </em>

<em>printcheckboard(n)</em>

**************************************

End of the Python Code.

Explanation:

In this you have to use Python3.7 and numpy should be installed as well in order to execute the code successfully.

2 D matrix will be created using Python numpy library and checkboard pattern is generated using array slicing.

Here n=8 and it will generate the checkerboard pattern of alternative 0 and 1. However, we need row 4th and 5th as all 0. So we have initialized two arrays matrix as x and y.

Comments in the code is self explanatory.

PS: Please make sure code is edited in IDE so that tabs or space issues can be taken care.

8 0
2 years ago
Which of the following is true of how packets are sent through the internet?
horrorfan [7]

Answer:

It is A: Packet metadata is used to route and reassemble information travelling  through the internet.

Explanation:

Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee

Step 2: Entering the network

Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.

Step 3: Taking flight

The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.

Step 4: BGP

These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.

Step 5: Finding a route

This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.

Step 6: Bad information

For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.

Last step: Arrival

The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.

3 0
2 years ago
Read 2 more answers
Other questions:
  • 1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
    15·1 answer
  • Compare the encryption algorithms found in s-tools: idea, mdc, des, and 3des.
    5·1 answer
  • Interactive sites where users write about personal topics and comment to a threaded discussion are called 
    15·1 answer
  • Find and record a set of instructions containing a repetition clause (e.g., instructions on a shampoo bottle, a recipe, etc.). H
    11·1 answer
  • 1. PLCs were originally designed as replacements for: a) microcomputers. c) analog controllers. b) relay control panels. d) digi
    6·1 answer
  • Your company just bought a new subsidiary based in Des Moines, Iowa. Although your local operation already uses IPv6 for local n
    7·1 answer
  • Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr
    14·1 answer
  • This program will output a right triangle based on user specified height triangle_height and symbol triangle_char. (1) The given
    9·1 answer
  • Which of the following is not an advantage of a flowchart?
    15·1 answer
  • Write a C# program named ProjectedRaises that includes a named constant representing next year’s anticipated 4 percent raise for
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!