"Technical Communication: Global, Collaborative, and Digital" in Strategies for Technical Communication
In: Operations Management
A digital computer has a memory unit with 32 bits per word. The instruction set consists of 122 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?
d) What is the largest unsigned binary number that can be accommodated in one word of memory?
In: Computer Science
Problem 3. A digital computer has a memory unit with 32 bits per word. The instruction set consists of 122 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. a) How many bits are needed for the opcode? b) How many bits are left for the address part of the instruction? c) What is the maximum allowable size for memory? d) What is the largest unsigned binary number that can be accommodated in one word of memory?
In: Computer Science
Ann and Bill play the following game in which 4 gold coins are to be won. Ann selects a word from the set {up, out, over} and Bill selects a word from the same set (it could be the same word). If the words selected by the two players differ, then Ann wins one gold coin, and the remainder go to Bill. If the words selected by the two players are the same, then the number of gold coins won by Ann equals the number of letters in the chosen word, and the remainder go to Bill.
(a) Represent this scenario as a zero-sum 3 × 3 game.
(b) Calculate the equilibrium strategies for the game, and explain how the players should play the game using these strategies.
(c) Use the answer you deduced in part (b) to determine the game value v and show explicitly that Ann’s payoff is bounded above by this game value.
In: Statistics and Probability
① Protection is strictly an internal problem. (1 word), on the other hand, requires not only an adequate protection system but also consideration of the external environment within which the system operates.
② A (1 word) is a computer, appliance, or router that sits between the two security domains and monitors and logs all connections. It can also limit connections based on source or destination address, source or destination port, or direction of the connection.
③ In the (1 word) algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests as it reaches each cylinder, until it gets to the other end of the disk. At the other end, the direction of head movement is reversed, and servicing continues.
④ A file-control block (FCB) (an (1 word) in most UNIX file systems) contains information about the file, including ownership, permissions, and location of the file contents.
In: Computer Science
use python to solve
Write a function called word_chain that repeatedly asks the user for a word until either (1) the user has entered ten words, or (2) the user types nothing and presses enter. Each time the user enters an actual word, your program should print all the words entered so far, in one long chain. For example, if the user just typed "orange", and the user has already entered "apple" and "banana", your program should print "applebananaorange" before asking for the next word. Each of your prompts should look like this:
Enter word:
Your function MUST be called word_chain. You can write code in the main part of your program to test your function, but when you submit, your code must ONLY have the function definition!
In: Computer Science
Please answer the following questions
1) Suppose the user inputs “Good Morning!” in the console when running the following code.
What will be printed to the console?
char word[100] ;
cout << “Type a word: “;
cin >> word;
cout << word << endl;
2) What is the value of myStr[5] after the following code?
char myStr[100] = “Good!”;
3) Suppose we have a string variable that contains a string with a length of N, what is the index of
the third to the last character in this string?
4) Please fill the two inputs to the substr function so that it will print “morning” to the console.
string myStr = “Good morning Friday!”;
cout<<myStr.substr( ___, ___ )<<endl;
5) I am trying to initialize a c-style string to “chen”. What is the problem of the following code?
char myStr[5] = {‘c’, ‘h’, ‘e’, ‘n’ };
cout<<myStr;
In: Computer Science
What is a program format?
CNC programming is based on what current standard?
Briefly describe the Word address format.
Define each of the following as they pertain to CNC programming.Explain G code?
1.Character
2.Address
3.Word
4.Block
5.Program
Explain what a G code is?
The difference between modal and nonmodal G codes?
Explain the mode and use of each of the following G
codes.Explain what an M code is.
G 49
G1
G80
G0
G92
Explain what a M code is.
What two main groups to M codes fall?
Explain the type and use of the following M codes.Explain the
function of the following Word address command.
M6
M30
M0
M3
M5
Explain the function of the following Word address command.
(N0080 G83 X-.5 Y.375 Z-.8876 R.1 Q.1)
In: Computer Science
question: Pig LatinPig latin, is a mock language which
encrypts english sentences using the following rules: For every
word in a sentence, the firstletter of the word is shifted to the
end of the word and the suffix “-ay” is added at the end of the
word. For example, “hey pat”becomes “eyhay atpay”.Implement
thepiglatin(str)function so it translates sentences to pig latin.
If you have time remaining, try implementing afunction to ”decrypt”
piglatin, i.e. given a sentence in piglatin, return the english
version of the sentence
def pig_latin(sentence: str) -> str:
"""
Return a pig latin encrypted version of the
given sentence
>>> pig_latin("that pig is
so cute aww")
'hattay igpay siay osay utecay wwaay'
>>> pig_latin("utm needs
more food options")
'tmuay eedsnay oremay oodfay ptionsoay'
"""
# TODO: write this function's body - ay
pass
In: Computer Science
1. Discuss the THREE uses of Trial Balance with Literature Review and by providing example for each use of Trial Balance. . (word range – 150 to 200)
2. Mr. Juma paid the rent three months in advance for his shop. Write a short note on prepaid expenses with Literature Review and by providing examples. (word range – 150 to 200)
3. Ms. Salma is yet to pay the salaries to her employees of last three months. Write a short note on accrued expenses with Literature Review and by providing examples. (word range – 150 to 200)
4. Yummy Foods received an advance payment of OMR 1,000 for the order to be delivered after two months. Write a short note on unearned income/ Income received in advance with Literature Review and by providing examples. (word range – 150 to 200)
5. Reflection Report – Online Course (word range – 100 to 150)
Your reflection may include, your individual experience, What did you learn from this online course, how much progress you made in the online course, strengths of the online course, challenges you faced in attempting the online course, etc.
In: Accounting