# Computers and Technology

All new and solved questions in Computers and Technology category

### We can easily improve the formula by approximating the area under the function f(x) by two equally-spaced trapezoids. Derive a formula for this approximation and implement it in a function trapezint2( f,a,b ).

We can easily improve the formula by approximating the area under the function f(x) by two equally-spaced trapezoids. Derive a formula for this approximation and implement it in a function trapezint2( f,a,b )....

### You were hired as a systems analyst by a small independent publishing firm. This firm has been specialized in paperback books, and now thinking of publishing most of their paperback books online. As a systems analyst, you are expected to help develop a computerized inventory and distribution information system, and lead the whole project. With the new strategic objective, you will also develop a solution that will help the firm convert paperbacks to e-books. In your first month, you are expected

You were hired as a systems analyst by a small independent publishing firm. This firm has been specialized in paperback books, and now thinking of publishing most of their paperback books online. As a systems analyst, you are expected to help develop a computerized inventory and distribution informa...

### Consider the following correct implementation of the selection sort algorithm. public static void selectionSort(int[] elements) { for (int j = 0; j < elements.length - 1; j++) { int minIndex = j; for (int k = j + 1; k < elements.length; k++) { if (elements[k] < elements[minIndex]) { minIndex = k; } } if (j != minIndex) { int temp = elements[j]; elements[j] = elements[minIndex]; elements[minIndex] = temp; // line 19 } } } The following declaration and method call appear in a method in

Consider the following correct implementation of the selection sort algorithm. public static void selectionSort(int[] elements) { for (int j = 0; j < elements.length - 1; j++) { int minIndex = j; for (int k = j + 1; k < elements.length; k++) { if (elements[k] < elements[minIndex]) { minInde...

### Consider an allocator on a 32-bit system that uses an implicit free list. Each memory block, either allocated or free, has a size that is a multiple of four bytes. Thus, only the 30 higher order bits in the header and footer are needed to record block size, which includes the header and footer and is represented in units of bytes. The usage of the remaining 2 lower order bits is as follows: bit 0 indicates the use of the current block: 1 for allocated, 0 for free. bit 1 indicates the use of the

Consider an allocator on a 32-bit system that uses an implicit free list. Each memory block, either allocated or free, has a size that is a multiple of four bytes. Thus, only the 30 higher order bits in the header and footer are needed to record block size, which includes the header and footer and i...

### Como hago para poner brainly en español???

como hago para poner brainly en español???...

### The following building blocks are NOT available in the Building Blocks grouping: 1.Calendar 2.Page Parts 3.Advertisements 4.Picture Placeholders

The following building blocks are NOT available in the Building Blocks grouping: 1.Calendar 2.Page Parts 3.Advertisements 4.Picture Placeholders...

### There is a file of a few Sean Connery movies on the internet. Each entry has the following form: Name of Movie Release Date Running Time (maybe) Several names of some of the stars A separator line (except after the last movie) Your assignment is: for each movie, 1. read in the Name, Release Date, the stars 2. Sort the movies by Movie Name alphabetically, 2. Sort the stars alphabetically, by last name 3. Print the Movie Name, Release Date, Running Time (if there) and Print the list of stars

There is a file of a few Sean Connery movies on the internet. Each entry has the following form: Name of Movie Release Date Running Time (maybe) Several names of some of the stars A separator line (except after the last movie) Your assignment is: for each movie, 1. read in the Name, Release Date, ...

### Write a C program that reads a hexadecimal value from the keyboard and then stores the value into an unsigned char variable. Read two int values p and n from the keyboard, where the values are less than 8. Change the initial hexadecimal value in the following way: Shift the n bits starting at position p, so that they form the n least significant bits of the result. The remaining bits of the result are set to 0. Display the result using printf %x.

Write a C program that reads a hexadecimal value from the keyboard and then stores the value into an unsigned char variable. Read two int values p and n from the keyboard, where the values are less than 8. Change the initial hexadecimal value in the following way: Shift the n bits starting at positi...

### N a particular board game, there is exactly one row and it comprises N spaces, numbered 0 through N - 1 from left to right. There are also N marbles, numbered 0 through N - 1, initially placed in some arbitrary order. After that, there are two moves available that only can be done one at a time: Switch: Switch the marbles in positions 0 and 1. Rotate: Move the marble in position 0 to position N - 1, and move all other marbles one space to the left (one index lower). The objective is to arrange t

n a particular board game, there is exactly one row and it comprises N spaces, numbered 0 through N - 1 from left to right. There are also N marbles, numbered 0 through N - 1, initially placed in some arbitrary order. After that, there are two moves available that only can be done one at a time: Swi...

### You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?

You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation?...

### Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous locations.

Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean that he should periodically perform ____ on his co...

### What would you present to a player if you wanted to create and sustain “tactical immersion?” Which genres of games most support tactical immersion?

What would you present to a player if you wanted to create and sustain “tactical immersion?” Which genres of games most support tactical immersion?...

### I need help with these

I need help with these...

### 1 the background image on the desktop of computer is called 1 image 2 icon 3 desktop 4 wallpaper2 this command is a duplicate of a file or folder 1 copy 2 move 3 duplicate 4 none of these​

1 the background image on the desktop of computer is called 1 image 2 icon 3 desktop 4 wallpaper2 this command is a duplicate of a file or folder 1 copy 2 move 3 duplicate 4 none of these​...

### 1.Discuss the complexities of owning and sharing digital information.2. Explore who benefits or is harmed by policies around copyright.​

1.Discuss the complexities of owning and sharing digital information.2. Explore who benefits or is harmed by policies around copyright.​...

### What is the area of I LIKE YA CUT G?

What is the area of I LIKE YA CUT G?...

### The key uniquely identifies each record Question 3 options: Key record Composite key Foreign key Primary key

The key uniquely identifies each record Question 3 options: Key record Composite key Foreign key Primary key...

### In the future what types of jobs will most likely be automated​

in the future what types of jobs will most likely be automated​...