For a particular DRAM design the cell capacitance is C,=50fF, Vpp=5 V and V=1.4 V. Each cell represents a capacitive load on the bit line of 2fF. The sense amplifier and other circuitry attached to the bit line has a 20fF. What is the maximum number of cells that can be attached to a bit line while ensuring a minimum bit line signal of 0.1 V? How many bits of row addressing can be used? If the sense amplifier gain is increased by a factor of 5 how many word line address bits can be accommodated.
In: Electrical Engineering
Write a business report (addressed to your supervisor) focused on how your company (Samsung) should use analytical models such as break-even and forecasting to make strategic business decisions. Provide examples that are not only specific to your current employer, but that also demonstrate your ability to create and apply these analytical models. Support your views with appropriate evidence. Your answer should be at least 500 words in length and presented in a professional manner (proper spelling, grammar, word usage, thoughts grouped by paragraph, etc.) with sources properly cited using APA style.
In: Operations Management
Write a complete shell script that first asks the user to enter a URL. The script should read the URL into a variable named url.
The shell script should then retrieve the file associated with the
URL by using the curl command.
The output of the curl command should be
redirected to a file named
html_file.
The shell script should then use the grep command to search the file named html_file for the word manhattan.
Finally, the shell script should make the file named
html_file readable to everyone by issuing the
appropriate chmod command to give "o" (others)
read permission on the file.
In: Computer Science
3. Many private security companies perform tasks similar to public law enforcement, and, because of that, much of the training of private security personnel is comparable to that of public law enforcement. In a 500-word response, compare and contrast the similarities and differences between the two entities. While much of their initial training may be similar, ongoing training for each entity is different. Evaluate the ongoing training of private security compared to public law enforcement. Critique three issues that cause shortfalls in private security and suggest ways these companies can overcome these shortfalls.
In: Operations Management
C++ needed
Create a loop which gives the player instructions on what to input. Then read input from the player. The input will be either one of three options:
• If the user enters the word “answer” or some other string you choose to indicate the player is ready to end the game and guess. In this case, output the hidden rule.
• Three numbers separated by spaces. Let’s call a trio of numbers and the corresponding output a Guess. Once a user makes a Guess. If the user enters a sequence that follows the rules, output “Yes!” Otherwise output “No.”
• Treat any other entry as an exception.
In: Computer Science
It’s not easy
to come up with a secure password that one can actually remember.
One of the
methods proposed is to take a line of text and take first letter of
each word to form
a password. An extra step is substitute ”o” with 0, ”a” with ”@”,
and ”l” with
1. For instance, using ”Come to the meadow on law street” would
yield
”Cttm01s”. Write a program that asks the user to enter a phrase and
outputs
the password that is generated using these rules.
You can assume that the words in the phrase will be separated by a
single space or
a common punctuation sign such as ”.,?!;:” followed by a space.
PYTHON PLEASE! THANK YOU
In: Computer Science
1. Please briefly describe in one short paragraph a valuable business problem that you are interested in solving and how designing a database can help in solving this problem. You should treat this database design project as something you can put on your CV and explain to potential employers (or potential investors if you are pursuing a startup).
2. Create three tables that you will use in your database. Write the SQL code (can be done in PgAdmin or in MS Word etc.). Then write a short paragraph explaining the purpose of each table.
In: Computer Science
In: Economics
Perhaps one of the first key decisions a prospective business owner makes is the mode of entry in the chosen country. Making the correct choice will ensure the integrity of the business not only legally, but financially as well. Accordingly, a detailed understanding of the various modes of entry will provide students with the knowledge needed to properly select the appropriate organization.
Compose a minimum 700-word analysis of the following modes of entry:
Address the following in the analysis:
In: Operations Management
In C: Find a string within a string Given two strings S1 & S2, search for an occurrence of the second string within a first string. Note: Do not use system library for the implementation. Input: Code Zinger University Zinger where, First line represents string S1. Second line represents string S2. Output: 5 Here 'Zinger' word starts at 5th index within 'Code Zinger University’. Assume that, The length of strings S1 & S2 are within the range [1 to 10000]. Character comparisons will be case-sensitive.
In: Computer Science