Name the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the number.

Answers

Answer 1

Answer:

Parity Bit

Explanation:

Given that Parity bit is a form of strategy or method that utilizes a scheme in adding a solitary bit to a binary string. This can be either 1 or 0, thereby making the total quantity of bit to become either odd parity bit or even parity bit during storage.

Hence, the technique that uses a scheme to sum the individual digits in a number and stores the unit's digit of that sum with the number is called PARITY BIT.


Related Questions

What is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Management solution will comply with?

Answers

Answer:

Acceptable use policy.

Explanation:

An acceptable use policy also known as fair use policy can be defined as a set of rules and guidelines defined by the original owner or administrator in charge of a service, website, web resources or network in order to regulate privileges, control the way the resources are used and to prevent any unauthorized access or usage by others.

Hence, an acceptable use policy is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Management solution will comply with.

Generally, acceptable use policy are used in various organizations, schools, public spaces to ensure every users comply with it.

im trying to call the keys in a dictionary I have called "planet_dict". in order for them to be included in the for loop, the values of the keys have to be within a range of
273 <= x <= 373
I understand how to do this with certain values, but idk how to call them from a dictionary.

Answers

You can do something like this. My code iterates through the dictionary keys and then we use that key to get a value. We check if the value is between 273 and 373 and if it is, it's a water planet. My code is just a general idea of what to do. Instead of printing, you could add the key to a list and then print the contents of the list.

PYTHON HW PLEASE HELP. I NEED THE ACTUAL CODE!!! 100 POINTS AND BRAINLIEST. REPORTING IF YOU DON'T ANSWER
Question 1:

Design a BankAccount Class with the following requirements:

1. Class variables
- Overdraft Fee = 20 (Overdraft fee is subtracted from the account when account balance is negative after a withdraw)
2. Object variables
- Balance (Balance is the amount of money an account has left)
3. Methods
- deposit(amount): Accepts an argument amount of type number, adds this amount to account's balance
- withdraw(amount): Accepts an argument amount of type number, subtract this amount to account's balance, if the resulting balance is negative, apply an Overdraft Fee on the account balance

Test your class to see if it works:
- Scenario 1:
- Create a new account called "college_checking", assign 1000 dollars to the initial balance.
- Withdraw 200 dollars
- Withdraw 500 dollars
- Deposit 100 dollars
- Withdraw 600 dollars
- Check your remaining balance, it should be -220 dollars of balance, because $1000 - $200 - $500 + $100 - $600 - $20(overdraft) = $-220

- Scenario 2:
- Create a new account called "europe_trip_fund", assign 0 dollars to the initial balance.
- Deposit 250 dollars
- Deposit 220 dollars
- Deposit 530 dollars
- Withdraw 721 dollars
- Check your remaining balance, it should be $279 dollars of balance, because $0 + $250 + $220 + $530 - $721 = $279


Question 2:

Design a OverdraftProtectionAccount that inherits from BankAccount Class with the additional requirements:

1. Methods
- withdrawal(amount): Accepts an argument amount of type number, subtract this amount to account's balance, if the resulting balance is negative, log an error message:
"There's insufficient funds in your account to complete this transaction"
to the terminal and stop the transaction so that your balance isn't overdrafted.


Test your OverdraftProtectionAccount class to see if it works:
- Scenario 3:
- Create a new account called "personal_checking", assign 100 dollars to the initial balance.
- Withdraw 20 dollars
- Withdraw 50 dollars
- Deposit 12 dollars
- Withdraw 60 dollars
- Check your remaining balance, it should be 42 dollars of balance, because $100 - $20 - $50 + $12 = $42, the last withdrawal didn't go through because that would leave your account balance negative.

Answers

Answer:

Here maybe this will help you

Explanation:

A(n) is an internal corporate network built using Internet and World Wide Web standards and products.

Answers

An intranet  is an internal corporate network built using Internet and World Wide Web standards and products.

What is the definition of intranet?

This is known to be small or restricted computer network used by a group to communicate with one another is described as an intranet. An intranet is a private computer network that only employees of a specific workplace can access. noun.

The kind of internet utilized privately is an intranet. Since it is a private network, only authorized users can access the intranet. The intranet has a small user base and only offers a little amount of information to its users. various network types

An intranet is a computer network used exclusively by employees of a company for information exchange, improved communication, teamwork tools, operational systems, and other computing services.

Therefore, An intranet  is an internal corporate network built using Internet and World Wide Web standards and products.

Learn more about intranet  from

https://brainly.com/question/13139335
#SPJ1

why was the keyboard invented, write a paragraph and you can get a crown and 50 points

Answers

Answer:

The keyboard was invented for the alphabet and numbers so people can talk to others and work on essays, and have a way to communicate to human beings and for stuff like i'm doing right now, writing paragraphs for stuff like this and for school, really the keyboard was invented for anything, you can use it for anything in the whole world.

Explanation:

Hope this helps!!

The keyboard was invented so people can type on a computer


A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him
administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.
Which of the following security practices was violated?
Principle of least privilege
Strong password policy
Entry control roster
Multifactor authentication

Answers

Answer:

Principle of least privilege

Explanation:

The principle of least privilege means the user has only access to that data which is required to complete the task

Therefore as per the given situation, Joe who is an emloyee wants to access the client data base but later on he needs to access the payroll data base

So as per the given situation, the first option should be violated

Hence, the same is to be considered

write an algorithm to sumn of even numbers from 1 to 10​

Answers

Answer:

1. Start

2. Evensum = 0

3. For I = 1 to 10

3.1 If I % 2 == 0

3.1.1 Evensum = Evensum + I

4. Print Evensum

5. Stop

Explanation:

The line by line explanation is as follows:

[The algorithm starts here]

1. Start

[This initializes Evensum to 0]

2. Evensum = 0

[This iterates from 1 to 10, inclusive]

3. For I = 1 to 10

[This checks if current number is even number]

3.1 If I % 2 == 0

[If yes, this adds the even number]

3.1.1 Evensum = Evensum + I

[This prints the sum after the sum]

4. Print Evensum

[This ends the algorithm]

5. Stop

Computer science students typically get hands-on experience in all of the following EXCEPT:

writing code

testing programs

creating a blueprint for a house

fixing program errors

Answers

Answer:

C. Creating a blueprint for a house.

Creating a blueprint for a house is not a typical activity within the curriculum of computer science students.

Hence the correct answer is C.

Computer science students typically get hands-on experience in writing code, testing programs, and fixing program errors.

These activities are fundamental to learning programming and software development.

However, creating a blueprint for a house is not a typical activity within the curriculum of computer science students. This task is more closely related to fields such as architecture or civil engineering, where professionals design physical structures.

Creating a blueprint for a house involves architectural design and planning, which is not typically part of a computer science curriculum. While some computer science concepts can be applied to architectural design software, the two fields have distinct focuses and skill sets.

Hence the correct answer is C.

Learn more about computer science click;

https://brainly.com/question/35123324

#SPJ3

Your supervisor has asked you if it is possible to monitor servers for potential port scans via SNMP. What two OIDs can you provide to your supervisor that may show when a port scan is in progress

Answers

Explanation:

The two OIDs can you provide to your supervisor that may show when a port scan is in progress are:

UdpNoPorts

TcpOutRsts

UdpNoPorts and TcpOutRsts may show when a port scan is in progress.

Write a program to determine what change a cashier should return to a customer. The program will ask how much an item being purchased costs, and then how much the customer paid. The program will return what change should be given.

Enter the item cost: 7.12
Enter what customer paid: 20.00

The total number of cents to be returned is: 1288

Change given should be
Number of 10 dollar bills: 1
Number of 5 dollar bills: 0
Number of 1 dollar bills: 2
Number of quarters: 3
Number of dimes: 1
Number of nickels: 0
Number of pennies: 3

it needs to be in c++ not java

Answers

Using the knowledge in computational language in C++ it is possible to write a code that  determine what change a cashier should return to a customer.

Writting the code:

#include <iostream>

using namespace std;

int main() {

// your code goes here

cout << "Enter the item cost : ";

double cost;

cin >> cost;

cout << "\nEnter what customer paid : ";

double paid;

cin >> paid;

double ret;

ret = paid - cost;

cout << "\nThe total number of cents to be returned is : " << ret;

cout << "\nChange given should be";

int ten,five,one;

ten = ret/10;

ret = ret - (10*ten);

five = ret/5;

ret = ret - (5*five);

one = ret/1;

cout << "\nNumber of 10 dollar bills : " << ten;

cout << "\nNumber of 5 dollar bills : " << five;

cout << "\nNumber of 1 dollar bills : " << one;

return 0;

}

See more about C++ at brainly.com/question/12975450

#SPJ1

Why should you study media critically? (4 reasons)

Answers

Answer:

Media provides a framework for understanding the media and helps enable us to interpret and evaluate media messages for ourselves. Media literacy skills are closely related to critical thinking skills, as they challenge us to think more deeply about not only what we see, but what we know. Like geography, because the media define for us our own place in the world. Like science and technology, the media help us to learn technology by adopting the leading edge of modern technological innovation.

Explanation:

I have no idea what I’m doing and this is due in 45 minutes

Answers

Answer:

Not enough info...

Explanation:

_________________ component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Answers

Answer:

Authorization component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

True or False(T or F): Point-and-shoot cameras have only 1 lens. *

Answers

Answer:

True

Explanation:

Technically speaking they only have one.

Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.

Answers

Answer:

Over and above basic medication signaling, but instead of signaling, ICMPv6 could be used for other objectives. It could be utilized for the below description.

Explanation:

That falls into the same category even though IPv4 does through ARP.  

Neighbor Discovery:

Used mostly for control of hosts but instead multichannel interface setup.  

Router Discovery:

Trying to manage Handheld IPv6 hand-offs.  

Throughout IPv6, within a week of negligible and sometimes more broadcast group, this same ICMPv6 response can begin. The whole last extension connector before another ICMPv6 connector contains a 58-value new Header field.

why is operating system important software for computer?give 3 reasons

Answers

Answer: See explanation

Explanation:

The operating system of a computer is required to manage both the hardware components and the computer's software.

Also, it helps in managing the processes and the memory or the computer.

Lastly, it helps in communication as well as the detection of errors. It should be noted that the operating system of a computer is a very important tool.

Jeremy has created a snippet of JavaScript. Which event handlers will he use to invoke JavaScript from his HTML form?

onClick
SelectedIndex
onCheck
onSubmit
inputText

Answers

Answer:

One of them is OnClick, but there are more.

Explanation:

I took my post test and only clicked OnClick and I missed this one and it says "not all correct answers chosen"

Answer:

The TWO correct answers are:

onClick

onSubmit

Assume the availability of an instance variable arr that refers to an ArrayList of Strings. Write a helper method concatAll that returns the concatenation of all the Strings in the ArrayList in the order in which they appear in the ArrayList

Answers

Answer:

Explanation:

The following code is written in Java and is a method that takes in an ArrayList as a parameter, it then loops through the ArrayList and adds each element to the instance variable called arr as well as a space between each element (this can be removed by deleting the " "). Finally, it prints the final result of the variable arr to the screen.

public static void concatAll(ArrayList<String> myArr) {

       String arr = "";

       for (int x = 0; x < myArr.size(); x++) {

           arr += myArr.get(x) + " ";

       }

       System.out.println(arr);

   }

If the old and new systems are operated side by side until the new system has proven itself, this type of system conversion plan is parallel implementation. True or false?

Answers

Answer:

True

Explanation:

. What is a one-dimensional basic component in art and geometry

Answers

Answer:

a straight line

Explanation:

Anything one dimensional can only be a line

What is power point?​

Answers

Answer:

PowerPoint is an electronic presentation program that helps people present a speech using a collection of slides.

Explanation:

Answer:

Power point is a presentation program released in 1987

Explanation:

The home keys on the numeric keypad are 4, 5, and 6.

True
False

Answers

Answer:

true, The home keys for the numeric keypad are 4 5 6

TRUE!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

g The method of mapping where each memory locationis mapped to exactly one location in the cache is

Answers

Answer:

Direct Mapped Cache

Explanation:

Given that a Direct Mapped Cache is a form of mapping whereby each main memory address is mapped into precisely one cache block.

It is considered cheaper compared to the associative method of cache mapping, and it is faster when searching through it. This is because it utilizes a tag field only.

Hence, The method of mapping where each memory location is mapped to exactly one location in the cache is "Direct Mapped Cache"

the following section of psudo code inputs a number n, multiplies together 1 x 2 x 3 x ..... x n, calculates input number/sum and output result of the calculations.
locate 3 errors and suggest a corrected piece of code.

INPUT n
FOR mult = 1 TO n
sum = 0
sum = sum * mult
result = n / sum
NEXT
PRINT result

Answers

Answer:

INPUT n

sum = 1

FOR mult = 1 TO n

sum = sum*mult

NEXT

result = n/sum

PRINT result

Explanation:

sum should not be defined inside the for loop because it will reset to the initial number after every loop iteration which is not what is desired. Sum should not be 0 if it is being multiplied then divided. This will cause an error. Result should be calculated after sum has settled on a final number, after the loop has finished.

Your company just installed a new web server within your DMZ. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server?

Answers

Answer:

The port that should be set open to allow users to access this new server is:

TCP port.

Explanation:

Ports are openings or entrance doors through which data packages have access to a PC or server.  TCP and UDP are transport protocols with port numbers.  TCP means Transmission Control Protocol.  They are used to connect two devices over the internet and other networks.  UDP means User Datagram Protocol.  They are used to connect applications and to speed the transfer of data.  Comparatively, UDP is faster, simpler, and more efficient than TCP.  TCP enables retransmission of lost data packets, which UDP cannot do.

Zahid needs to ensure that the text flows around an image instead of the image being placed on a separate line as the text. Which tab on the Layout dialog box should Zahid use to perform this task? Position Text Wrapping Size He can’t do this on the Layout dialog box.

Answers

Answer:

I believe the answer is He can't do this on the layout dialog box

Explanation:

You use the format tab for text wrapping.

( Sorry if I'm wrong )

Answer:

B.) Text Wrapping

Explanation:

I think that's the right answer. It's how you can make the text flow around an image in doc so I assume it's right. I'm really sorry if it's wrong :(

Which of these are illegal activities? Check all that apply.

running a pyramid scheme
offering free gifts
threatening to harm property
downloading a virus
hacking a computer

Answers

Answer:

Offering free gifts

Explanation:

Answer:

ace

Explanation:

Write a grammar for the language consisting of strings that have n copies of the letter a followed by the same number of copies of the letter b and the the same number of copies of the letter c, where n >0. For example, the strings abc, aaaabbbbcccc, and aaaaaaaabbbbbbbbcccccccc are in the language but a, abbc, bac, and aaabbbcc are not

Answers

Answer:

def language(mystring, n):

   if n > 0:

       string_list = [x for x in mystring]

       string_cont = ""

       for character in string_list:

           string_cont += character * n

       print(string_cont)

Explanation:

When n is equal to 0, that is, n=0, The python program multiplies the characters of the string "mystring" by the integer variable "n" to output a string with all characters with the same count.

File details such as the document title and author name are called ____.


Backstage details


User Descriptions


User-defined fields


Document properties

Answers

Answer:

Document properties

Explanation:

From the list of given options, document properties answers the question.

Every computer file has its details which include (but not limited to) the file name, file type, file permission, date etc.

The above details and many more are makes it easy to identify files.

To get a document property, right click on the file/document, select properties, then select the details tab.

On the details tab, you will see a comprehensive list of the properties attributed to that particular documents

To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.
A) one
B) two
C) three
D) multi

Answers

The answer is D) multi
Other Questions
Oxygen is taken into the body from the environment, and carbon dioxide is removed from the body and released into the environment. Which body system is responsible for exchanging gases with the environment?. What is the purpose of a topic sentence in a paragraph? (1 point)Oto provide evidence for the ideas in the paragraphO to express the central idea of a paragraphO to describe the most important details that will be included in the paragraphO to explain where readers can find more information about the topic of a paragraph what is the equation? i really need help with this someone pls help Identify whether the following sentences are correct (c) or fragments (f). Then, correct the fragments. _____ 1. In todays society, people often choose computer-oriented careers. Such as programming and web designing. _____ 2. The teaching profession is often frustrating. Some say it is not worth the effort._____ 3. Good manners are important in all cases. Whether a person is in a good mood or not. _____ 4. When I go outside. I love to run in the long grass. _____ 5. Students serving students. This is a slogan which could be applied to peer tutoring services at Humber College. _____ 6. Love makes the world go round. Is love enough? _____ 7. The clown made the nasty, old woman laugh. Which is not an easy thing to do. _____ 8. When growing up in Canada, children have the same rights as adults. Unlike children in many other countries who are forced into slavery and mistreated by elders. karolyn purchased a movie-theatre style popcorn maker from party supply company. the glass overheated and shattered, injuring karolyn. she wants restitution but does not want to sue the company. she feels that the best way to handle this would be to present outlines of evidence to a judge and panel members who will issue an advisory verdict to start the settlement process. what type of dispute resolution would be best for karolyn? a. arbitration b. mediation c. minitrial d. summary jury trial a nurse is administering daunorubicin (daunoxome) to a patient with lung cancer. which situation requires immediate intervention? why does heart rate increase during exercise? a) to move sweat to the skin b) to increase the signals to the muscles that cause muscle contraction c) because the blood pressure increases, which causes the heart rate to increase d) because the "adrenaline rush" signals for the heart to beat faster e) to increase oxygen (o2) delivery to muscles a t-bill with face value $10,000 and 81 days to maturity is selling at a bank discount ask yield of 2.8%. required: a. what is the price of the bill? (use 360 days a year. do not round intermediate calculations. round your answer to 2 decimal places.) Students are working to find the mass of a hand lens which of the following would students use the measure mass as-120 overcomes resistance to atp-competitive fgfr inhibitors in patients with fgfr2 fusionpositive intrahepatic cholangiocarcinom the level of total investment by firms in new machinery and equipment helps to determine how rapidly the economy grows. this is a issue. however, to understand how much new machinery and equipment firms decide to purchase, one must analyze the incentives individual firms face, which is a macroeconomic microeconomic issue. 2. Why did Justice Roberts disagree? (-2,-13), (-8,0)A) 6/13B) 13/6C) -6/13D) -13/6 Select the correct answer from each drop-down menu.When you right-click a picture in a word processing program, which actions can youchoose to perform on that image?You can choose tov an image when you right-click the picture in the word processing program. You can also choose toV an image when you right-click the in picture in the word processing program. Which of the following is true regarding slavery north of the Chesapeake in North America?Multiple ChoiceThe economies of Philadelphia and New York profited considerably from the building and sale of slave vessels.Slaves in the northern colonies saw an even higher rate of mortality than those of the southern colonies or even of Portuguese lands inBrazil,Slavery had been banned across the northern colonies by the end of the eighteenth century.Many of the very northernmost colonies saw no direct profit from the slave trade.The number of slaves in the northern colonies matched those of the Chesapeake, but they were used far less for agricultural tasks. Read the question carefully and select the best answerWhich of these sentences from paragraph 3 best supports the correct answer to Question 57At's not surprising that the novelist most often mentioned in this context is Charles DickensBDickens, like Shakespeare, was both a writer of genius and a popular entertainer, proving that seriousness of purpose didn't preclude accessibilityHis novels appeared in serial instalments, like episodes of TV shows, and teemed with minor characters, the literary equivalent of character actorsDil Moyers was echoing what has become conventional wisdom when he said that what Dickens was to the smoky mean streets of Victorian Londen, DavidSimon is to America today What was the impact of John locks views of natural law on the founding fathers PLEASE HELP AND I WILL NAME BRAINLYIST RIGHT AWAY!!! Hay algn prroco catlico en este hospitai? Cual opcin contesta correctamente la pregunta?- Na, no hay alg n prroco catlico en este hospital.-No, no hay a nguno paroco catol co en este hospital-No, no hay ringn parroco catolico on esto hospital-No, hay ningun par oco catol co on este hospital David wants to pack 574 cereal bars into bags of 10 and bags of 8. The number of bags of 8 is 2 more than the number of bags of 10. How many bags of 10 and 8 can David pack all the cereal bars into?