Questions
For a particular DRAM design the cell capacitance is C,=50fF, Vpp=5 V and V=1.4 V. Each...

For a particular DRAM design the cell capacitance is C,=50fF, Vpp=5 V and V=1.4 V. Each cell represents a capacitive load on the bit line of 2fF. The sense amplifier and other circuitry attached to the bit line has a 20fF. What is the maximum number of cells that can be attached to a bit line while ensuring a minimum bit line signal of 0.1 V? How many bits of row addressing can be used? If the sense amplifier gain is increased by a factor of 5 how many word line address bits can be accommodated.

In: Electrical Engineering

Write a business report (addressed to your supervisor) focused on how your company (Samsung) should use...

Write a business report (addressed to your supervisor) focused on how your company (Samsung) should use analytical models such as break-even and forecasting to make strategic business decisions. Provide examples that are not only specific to your current employer, but that also demonstrate your ability to create and apply these analytical models. Support your views with appropriate evidence. Your answer should be at least 500 words in length and presented in a professional manner (proper spelling, grammar, word usage, thoughts grouped by paragraph, etc.) with sources properly cited using APA style.

In: Operations Management

Write a complete shell script that first asks the user to enter a URL. The script...

Write a complete shell script that first asks the user to enter a URL. The script should read the URL into a variable named url.


The shell script should then retrieve the file associated with the URL by using the curl command.

The output of the curl command should be redirected to a file named html_file.

The shell script should then use the grep command to search the file named html_file for the word manhattan.


Finally, the shell script should make the file named html_file readable to everyone by issuing the appropriate chmod command to give "o" (others) read permission on the file.

In: Computer Science

3. Many private security companies perform tasks similar to public law enforcement, and, because of that,...

3. Many private security companies perform tasks similar to public law enforcement, and, because of that, much of the training of private security personnel is comparable to that of public law enforcement. In a 500-word response, compare and contrast the similarities and differences between the two entities. While much of their initial training may be similar, ongoing training for each entity is different. Evaluate the ongoing training of private security compared to public law enforcement. Critique three issues that cause shortfalls in private security and suggest ways these companies can overcome these shortfalls.

In: Operations Management

C++ needed Create a loop which gives the player instructions on what to input. Then read...

C++ needed

Create a loop which gives the player instructions on what to input. Then read input from the player. The input will be either one of three options:

• If the user enters the word “answer” or some other string you choose to indicate the player is ready to end the game and guess. In this case, output the hidden rule.

• Three numbers separated by spaces. Let’s call a trio of numbers and the corresponding output a Guess. Once a user makes a Guess. If the user enters a sequence that follows the rules, output “Yes!” Otherwise output “No.”

• Treat any other entry as an exception.

In: Computer Science

It’s not easy to come up with a secure password that one can actually remember. One...

It’s not easy
to come up with a secure password that one can actually remember. One of the
methods proposed is to take a line of text and take first letter of each word to form
a password. An extra step is substitute ”o” with 0, ”a” with ”@”, and ”l” with


1. For instance, using ”Come to the meadow on law street” would yield
”Cttm01s”. Write a program that asks the user to enter a phrase and outputs
the password that is generated using these rules.


You can assume that the words in the phrase will be separated by a single space or
a common punctuation sign such as ”.,?!;:” followed by a space.

PYTHON PLEASE! THANK YOU

In: Computer Science

1. Please briefly describe in one short paragraph a valuable business problem that you are interested...

1. Please briefly describe in one short paragraph a valuable business problem that you are interested in solving and how designing a database can help in solving this problem. You should treat this database design project as something you can put on your CV and explain to potential employers (or potential investors if you are pursuing a startup).

2. Create three tables that you will use in your database. Write the SQL code (can be done in PgAdmin or in MS Word etc.). Then write a short paragraph explaining the purpose of each table.

In: Computer Science

Cryptocurrency has seemingly taken the world by storm over the last several years, and will likely...

Cryptocurrency has seemingly taken the world by storm over the last several years, and will likely be an ongoing issue which presents challenges to governments, banks, and businesses across the globe. Your task for this assignment is to do some cursory research on the subject of cryptocurrency and answer the following question;


What impact might cryptocurrency have on international business in the next 5 years, especially considering the aspect of exchange rate risk?


Your answer should be approximately 250-500 words, and I am particularly interested in YOUR analysis of the matter.

***** Please type in a word document*****

In: Economics

Perhaps one of the first key decisions a prospective business owner makes is the mode of...

Perhaps one of the first key decisions a prospective business owner makes is the mode of entry in the chosen country. Making the correct choice will ensure the integrity of the business not only legally, but financially as well. Accordingly, a detailed understanding of the various modes of entry will provide students with the knowledge needed to properly select the appropriate organization.

Compose a minimum 700-word analysis of the following modes of entry:

  • Turnkey Project
  • Licensing
  • Corporation
  • Franchising
  • Joint Venture

Address the following in the analysis:

  • Discuss and describe the various modes of entry.
  • Evaluate the pros and cons associated with each mode of entry.

In: Operations Management

In C: Find a string within a string Given two strings S1 & S2, search for...

In C: Find a string within a string Given two strings S1 & S2, search for an occurrence of the second string within a first string. Note: Do not use system library for the implementation. Input: Code Zinger University Zinger where, First line represents string S1. Second line represents string S2. Output: 5 Here 'Zinger' word starts at 5th index within 'Code Zinger University’. Assume that, The length of strings S1 & S2 are within the range [1 to 10000]. Character comparisons will be case-sensitive.

In: Computer Science