Assembler Language
CSCI 360-1 Assignment 4 Name_____________________
Spring 2019 ABENDs and Dump Reading
25 points
This programming assignment does not require any further coding or documentation than what is provided. The program will ABEND and your task is to learn how to investigate what happened so that you can debug your own Assembler programs in the future. To begin, run the following program on the Marist mainframe using the ASSIST JCL used previously. Be sure you type it or copy it EXACTLY as shown below:
DUMP1 CSECT
USING DUMP1,15 ESTABLISH REG 15 AS BASE REG
*
SR 2,2 CLEAR REG 2
*
LA 3,NUM1 LOAD ADDRESS OF NUM1 INTO REG 3
LA 4,NUM2 LOAD ADDRESS OF NUM2 INTO REG 4
*
A 2,0(,3) ADD NUM1 TO REG 2
A 2,0(,4) ADD NUM2 TO REG 2
*
LA 5,SUM LOAD ADDRESS OF SUM INTO REG 5
ST 2,0(,5) STORE THE SUM OF NUM1 & NUM2 AT SUM
*
XDUMP , SET REG 2 TO 35
*
LTORG
*
SUM DC F'0' FULLWORD OF ZERO TO LATER HOLD SUM
*
NUM1 DC F'1206000000' VARIOUS FULLWORD INTEGER VALUES
NUM2 DC F'972460'
NUM3 DC F'1344335922'
*
END DUMP1
Use the resulting ABEND dump output to answer the questions below. Each is worth 2 points except question 11 which is worth 5 points.
Did this error occur (a) while the program was being assembled or (b) when it was being run?
________________________________________________________________________________
What is the address of the next instruction which would have been executed?________________________________________________________________________________
What is the value of the condition code at the time of the ABEND?
________________________________________________________________________________
What is the length of the instruction that caused the ABEND (number of bytes)?
_______________________________________________________________________________
What is the address of the instruction that caused the abend?
_________________________________________________________________________________
What type of error occurred (number and name)?
_________________________________________________________________________________
What usually causes this error?
_________________________________________________________________________________
What does the value in register 2 represent at the time of the ABEND dump?
__________________________________________________________________________________
What instruction needs to be added to fix this ABEND?
_________________________________________________________________________________
What does the value stored at location counter value 00002C represent?
_________________________________________________________________________________
What exactly happened here to cause the ABEND? Be detailed but succinct in your description.
_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

_________________________________________________________________________________

Answers

Answer 1

hello thnks

Explanation:


Related Questions

Complete the code for the provided Sequence class. Your code should provide the expected results when run through the provided SequenceTester class. Add code for these two methods in the Sequence class: public Sequence append(Sequence other) append creates a new sequence, appending this and the other sequence, without modifying either sequence. For example, if a is 1 4 9 16 and b is the sequence 9 7 4 9 11 then the call a. Append(b) returns the sequence 1 4 9 16 9 7 4 9 11 without modifying a or b. Public Sequence merge(Sequence other) merges two sequences, alternating elements from both sequences. If one sequence is shorter than the other, then alternate as long as you can and then append the remaining elements from the longer sequence. For example, if a is 1 4 9 16 and b is 9 7 4 9 11 then a. Merge(b) returns the sequence without modifying a or b. 3. 1 9 4 7 9 4 16 9 11

Answers

To complete the Sequence class to provide the expected results when running through the provided SequenceTester class, we need to add two methods: append() and merge().

The append() method creates a new sequence by appending the current sequence with another sequence without modifying either sequence. This can be achieved by creating a new Sequence object and adding the elements of both sequences to it. The resulting sequence will contain all the elements of both sequences in the order they were added.

The merge() method merges two sequences by alternating elements from both sequences. This can be achieved by creating a new Sequence object and adding elements alternately from both sequences until one sequence runs out of elements. If one sequence is shorter than the other, the remaining elements of the longer sequence are added to the end of the merged sequence.

When these methods are added to the Sequence class and called through the provided SequenceTester class, they should produce the expected results. The append() method should return a new sequence containing all the elements of both sequences in the order they were added, without modifying the original sequences. The merge() method should return a new sequence containing elements alternately from both sequences, followed by any remaining elements from the longer sequence.

By implementing these methods in the Sequence class, we can extend its functionality to include the ability to append sequences and merge sequences, making it a more versatile and useful tool for working with sequences of data.

To learn more about Programming, visit:

https://brainly.com/question/15683939

#SPJ11

In the code below, what's the final value of the variable x?
var x = 10;
X = x + 7;
X = X* 3;
A:51
B:34
C:10
D:21

Answers

A 51

x=10 so we substitute 10 into the spots for x in the beginning

x=10+7

x=17*3

x=51
If bar x = 10 ;

Where you see the var x replace it with 10.

X = x + 7
X = 10 + 7 = 17

Substitute the value of the first var X in the equation

X = X* 3
X = 17 * 3 = 51

Therefore the final value of var x is 51 option A

What exception type does the following program throw, if any? a) public class Test public static void main (String [ args) System.out.println (1 / 0) b) public class Test { public static void main (String[] args) { int [ list = new int[5]; System.out.println (list[5]) c) public class Test public static void main (String[] args) String s ="abc"; System.out.println (s.charAt (3)); d) public class Test public static void main (String[] args) Object o new Object (); String d= (String) o e) public class Test public static void main (String [U args) Object o null; System.out.-println (o.toString()); f) public class Test ( public static void main (String [] args) { Object o= null; System.out.println (o);

Answers

The program throws an ArithmeticException because it attempts to divide by zero (1 / 0).

The program throws an ArrayIndexOutOfBoundsException because it tries to access an index that is out of bounds (list[5]).The program throws a StringIndexOutOfBoundsException because it tries to access a character at an index that is out of bounds (s.charAt(3)).The program throws a ClassCastException because it tries to cast an instance of Object to a String, which is not possible without proper type compatibility. The program throws a NullPointerException because it tries to invoke a method (toString()) on a null object reference (o).The program does not throw an exception. It simply prints the value of o, which is null.

To learn more about  ArithmeticException click on the link below:

brainly.com/question/22786493

#SPJ11

when asking a question how do u add a photo for others to also see​

Answers

Click on the bottom button

Answer:

click on the thing that looks like a paper clip and select a file (microsoft computers)

Explanation:

Assignment 6: Animation for edhesive help please!!!!!!

Answers

I am here to offer guidance and support with your animation task! Please provide me with more information regarding what kind of assistance you require, including any specific animation program or coding language you're utilizing.

When it comes to creating animations, there are a variety of software tools and coding languages that can be utilized. Some popular animation software includes Adobe Animate, Toon Boom Harmony, and Blender. Adobe Animate is widely used for creating 2D animations, while Toon Boom Harmony is a popular choice for professional 2D and 3D animation projects. Blender is a free and open-source software that can be used to create 3D animations and visual effects.

In addition to software tools, there are also coding languages that can be used for animation, such as JavaScript, HTML5, and CSS3. JavaScript is used to create interactive animations for websites, while HTML5 and CSS3 can be used to create simple animations for websites and mobile applications.

Understanding which software or coding language you're using is crucial to providing relevant assistance for your animation project.

Learn more about animation here: https://brainly.com/question/22722118

#SPJ4

One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all that apply. If it is easy to understand, no one will dispute what is included in the algorithm. It will give everyone else an opportunity to comment on the process described in the algorithm. It will serve as the starting point for all future activity. It communicates the consecutive instructions of the solution.

Answers

Answer: B,C,D

Explanation:

Answer:

the answer is B,C,D

Explanation:

Passwords shall not be transmitted in the clear outside the secure domain
True
False

Answers

True. Passwords should never be transmitted in the clear outside the secure domain. The transmission of passwords in clear text is a major security risk and can lead to unauthorized access and compromise of sensitive information.

When a password is transmitted in clear text, it means that it is not encrypted or protected in any way during the transmission process. This allows anyone who intercepts the communication to easily read and capture the password, exposing it to potential misuse.

To ensure the security of passwords during transmission, it is essential to use secure protocols such as HTTPS or other encrypted communication channels. These protocols employ encryption techniques to protect the sensitive information, including passwords, from unauthorized access.

Additionally, it is crucial to follow best practices such as password hashing and salting on the server-side to store and handle passwords securely. Hashing transforms the password into an irreversible string of characters, making it extremely difficult for attackers to retrieve the original password even if they gain access to the stored data.

By adhering to these security measures, organizations can protect the confidentiality and integrity of user passwords, reducing the risk of unauthorized access and potential security breaches.

For more such questions domain,Click on

https://brainly.com/question/218832

#SPJ8

What do network executives blame for the superficiality in media reporting?

Answers

Network executives often express concern about the superficiality in media reporting, which refers to the lack of depth and quality in news stories, leading to a limited understanding of important issues.

There are several factors that network executives typically blame for superficiality in media reporting:

Sensationalism: News organizations sometimes prioritize attention-grabbing headlines and stories over more in-depth and informative pieces, as they attract higher ratings and ad revenue.Deadline pressures: Reporters face constant pressure to deliver news quickly, which may lead to less thorough research and a focus on shorter, less informative pieces.Limited resources: Many news outlets have reduced their budgets, leading to fewer investigative journalists and a reliance on easy-to-produce stories.Audience preferences: Some network executives believe that audiences prefer shorter, more easily digestible news stories, and therefore cater their content to meet these preferences.Social media: The rapid spread of information through social media platforms can result in a shallow understanding of complex issues, as users may only read headlines or short summaries.

In conclusion, network executives attribute the superficiality in media reporting to factors such as sensationalism, deadline pressures, limited resources, audience preferences, and the influence of social media. This can result in a lack of in-depth and informative news coverage, which may limit the public's understanding of important issues.

To learn more about Network, visit:

https://brainly.com/question/30456221

#SPJ11

most computers have temporary holding areas called __________.

Answers

Answer:

Random Access Memory (RAM)

RAM (Random access memory)

Area Triangolo Rettangolo in c++

Scrivere un programma in C per il calcolo dell'area di un triangolo rettangolo, si richiede codice in c.
Dati di input: cateto1 e cateto2
Output: Area del Triangolo

Answers

Answer:

#include <iostream>

using namespace std;

void askCat(int &cateto1, int &cateto2);

int AreaRett(int cateto1, int cateto2, int &area);

void stampaRisultato(int area);

int main()

{

  int cateto1, cateto2, area;

  askCat(cateto1, cateto2);

  area = AreaRett(cateto1, cateto2,area);

  stampaRisultato(area);

}

void askCat(int &cateto1, int &cateto2)

{

 cout << "Inserisci lunghezza cateto1: ";

 cin >> cateto1;

 cout << "Inserisci lunghezza cateto2: ";

 cin >> cateto2;

}

int AreaRett(int cateto1, int cateto2, int &area)

{

 area = (cateto1*cateto2)/2;

 return area;

}

void stampaRisultato(int area)

{

 cout << "L'area del triangolo rettangolo e': " << area << endl;

}

Write a python program using "Nested if statement" that will

ask the users to enter their age and if they are registered to

vote. Then print a message informing them that they can vote,

or a message explaining why they cannot vote (underage or not.

registered)

They can vote only if they are over 17 years of age and

registered to vote.

o

O

Answers

The Python program using nested if statements that will ask the user for their age and if they are registered to vote. The program will then print a message to inform them if they can vote or not.

The program first asks the user to input their age as an integer using the `input()` function and converting it to an integer using the `int()` function. The program then asks if the user is registered to vote using the `input()` function. The program uses a nested if statement to check if the user is eligible to vote.

The outer if statement checks if the user is 18 years or older. If the user is 18 years or older, the inner if statement checks if the user is registered to vote. If the user is registered to vote, the program prints a message informing them that they can vote. If the user is not registered to vote, the program prints a message explaining why they cannot vote.

To know more about program visit:

https://brainly.com/question/11023419

#SPJ11



name two living thing and nonliving thing that interact in an ecosystem

Answers

Answer and Explanation:

1. Water and Fish.

- Fish live in water.

- Fish are living.

- Water is not living.

2. The Sun and Trees.

- The Sun is the source of energy for trees.

- The Sun is not living.

- Trees are living.

#teamtrees #PAW (Plant And Water)

In your opinion, how can communication be affected by media and information?

Answers

Communication and information are fundamental aspects of modern society. The media play an important role in the way people receive and process information.

The media can play an important role in educating and raising awareness in society about important issues, such as human rights, gender equality and environmental protection.

Furthermore, the media can serve as a platform for people to share information and communicate with a wider audience, which can contribute to a more meaningful and constructive dialogue in society.

In conclusion, the media and information have a significant impact on the way people communicate and relate to each other.

Lear More About Media and information

https://brainly.com/question/21444450

#SPJ11

Whenever you create the instance of subclass, an instance of parent class is created implicitly which is referred by super reference variable.

Answers

Whenever you create an instance of a subclass, an instance of the parent class is implicitly created as well. This instance is referred to by the super reference variable, allowing the subclass to access and utilize the properties and methods of the parent class.

Yes, when you create an instance of a subclass in Java, an instance of the parent class is created implicitly as well. This parent class instance is referred to by the "super" reference variable within the subclass. This allows the subclass to inherit all of the methods and properties of the parent class, while also having its own unique functionality. It is important to note that the parent class constructor is called automatically when creating the subclass instance, and any arguments passed to the subclass constructor are forwarded to the parent class constructor using the "super" keyword.

Learn more about subclass here:-

https://brainly.com/question/13790787

#SPJ11

Which of the following methods causes the next slide to be displayed during a slide show? Select all the options that
apply.

A. Click the left mouse button.
B. Press SPACEBAR.
C. Press ESC.
D. Click the right mouse button.

Answers

B (spacebar) and D (right mouse button)

For the next slide to display during a slide show, always click the left mouse button and press spacebar. That is options A and C.

What is a computer slide show?

A computer slide show is a presentation of an information using the application software called power point presentation.

These information are represented as a slide show which is showing a single screen of information.

Input devices such as the keyboard and the mouse are used to navigate through these slides.

Therefore, for the next slide to display during a slide show, always click the left mouse button and press spacebar on the keyboard.

Learn more about keyboards here:

https://brainly.com/question/26152499

A survey of 68 college students was taken to determine where they got the news about what's going on in the world. Of those surveyed, 29 got the news from newspapers, 18 from television, and 5 from bo

Answers

 we can construct a Venn diagram representing the survey results. From the diagram, we can determine the cardinality (number of elements) for each region, including those who got the news from only newspapers, only television, both newspapers and television, and those who did not get the news from either source.

Based on the given information, we can construct a Venn diagram with two overlapping circles representing newspapers and television. The region where the circles overlap represents the individuals who got the news from both newspapers and television, which is given as 5.
To determine the number of individuals who got the news from only newspapers, we subtract the number of individuals who got the news from both sources (5) from the total number of individuals who got the news from newspapers (29). Therefore, n(Newspapers only) = 29 - 5 = 24.
Similarly, to find the number of individuals who got the news from only television, we subtract the number of individuals who got the news from both sources (5) from the total number of individuals who got the news from television (18). Therefore, n(Television only) = 18 - 5 = 13.
To calculate the number of individuals who got the news from either newspapers or television, we add the number of individuals who got the news from only newspapers (24), the number of individuals who got the news from only television (13), and the number of individuals who got the news from both sources (5). Therefore, n(Newspapers or Television) = 24 + 13 + 5 = 42.
Finally, to determine the number of individuals who did not get the news from either newspapers or television, we subtract the number of individuals who got the news from newspapers or television (42) from the total number of individuals surveyed (68). Therefore, n(Neither) = 68 - 42 = 26.
By analyzing the completed Venn diagram and calculating the cardinality for each region, we can provide the answers to the specific questions regarding the number of individuals who got the news from only newspapers, only television, both newspapers and television, and those who did not get the news from either source.

learn more about cardinality here

https://brainly.com/question/13437433



#SPJ11

How might telecommuting be implemented as an alternative work
arrangement in a carribbean country?

Answers

The first step is to assess the existing infrastructure and technological capabilities to ensure reliable internet connectivity and communication channels. Secondly, policies and guidelines need to be developed to govern telecommuting, including eligibility criteria, expectations, and performance metrics.

Training and support programs should be provided to help employees adapt to remote work environments. Additionally, collaboration tools and platforms should be implemented to facilitate communication and project management. Finally, monitoring and evaluation mechanisms should be established to assess the effectiveness of telecommuting and make necessary adjustments.

To implement telecommuting in a Caribbean country, it is crucial to evaluate the country's technological infrastructure and ensure that reliable internet connectivity is available to support remote work. This may involve investing in improving internet infrastructure and expanding broadband coverage to remote areas.

Once the technological foundation is established, policies and guidelines need to be developed to govern telecommuting. These policies should define eligibility criteria for employees, specify expectations and deliverables, and establish performance metrics to measure productivity and accountability. Clear communication channels should be established to keep employees informed and connected.

Training and support programs should be provided to help employees adapt to remote work environments. This may include training on the use of remote collaboration tools, time management, and maintaining work-life balance. Support systems such as IT help desks should be available to address technical issues and provide assistance.

Collaboration tools and platforms should be implemented to enable effective communication and project management. This may involve adopting video conferencing tools, project management software, and cloud-based document sharing platforms. These tools facilitate virtual meetings, file sharing, and real-time collaboration among remote team members.

To ensure the success of telecommuting, regular monitoring and evaluation should be conducted. This involves assessing productivity levels, employee satisfaction, and the overall impact on organizational goals. Feedback mechanisms should be in place to gather insights from employees and make necessary adjustments to improve the telecommuting experience.

By following these steps, telecommuting can be effectively implemented as an alternative work arrangement in a Caribbean country, providing flexibility for employees and contributing to a more efficient and resilient workforce.


To learn more about technology click here: brainly.com/question/9171028

#SPJ11

How does the number of jobs in internet media compare to the number of jobs in tv broadcasting and print media?

Answers

The number of jobs in internet media is a lot when compare to the number of jobs in tv broadcasting and print media as people can now work remotely from home.

What is the role of media in entertainment?

The function of mass media in entertainment is mostly to get the people inform and also entertained.

Note that The number of jobs in internet media is increasing daily as people are creating a lot of content when compare to the number of jobs in tv broadcasting and print media as people can now work remotely from home.

Learn more about internet media from

https://brainly.com/question/13467876

#SPJ1

Answer:

There are more employees working in Internet media than print media, but TV broadcasting outnumbers them both

In recent years, there has been a significant shift towards online media consumption, leading to an increase in jobs in the internet media industry. While the number of jobs in traditional TV broadcasting and print media has decreased, they still have a considerable number of employees. However, the number of jobs in internet media has surpassed that of print media, but TV broadcasting still has more employees than internet media.

1.5.1 Show the contents of the id[] array and the number of times the array is accessed for each input pair when you use quick-find for the sequence
9-0 3-4 5-8 7-2 2-1 5-7 0-3 4-2.
1.5.2 Do Exercise 1.5.1, but use quick-union (page 224). In addition, draw the forest of trees represented by the id[] array after each input pair is processed.
1.5.3 Do Exercise 1.5.1, but use weighted quick-union (page 228).
----------------------------------------------------------------------------------------
Below is the- quick-find, quick-union, and weighted quick-union. This should be all that�s required in order to complete. Please advise if I am missing something
Quick-find
public int find(int p)
{ return id[p]; }
public void union(int p, int q)
{ // Put p and q into the same component.
int pID = find(p);
int qID = find(q);
// Nothing to do if p and q are already
in the same component.
if (pID == qID) return;
// Rename p�s component to q�s name.
for (int i = 0; i < id.length; i++)
if (id[i] == pID) id[i] = qID;
count--;
}
-----------------------------------------------------------------------------------------
Quick-union
private int find(int p)
{ // Find component name.
while (p != id[p]) p = id[p];
return p;
}
public void union(int p, int q)
{ // Give p and q the same root.
int pRoot = find(p);
int qRoot = find(q);
if (pRoot == qRoot) return;
id[pRoot] = qRoot;
count--;
}
--------------------------------------------------------------------------------------------
Weighted Quick-Union
public class WeightedQuickUnionUF
{
private int[] id; // parent link (site indexed)
private int[] sz; // size of component for roots (site indexed)
private int count; // number of components
public WeightedQuickUnionUF(int N)
{
count = N;
id = new int[N];
for (int i = 0; i < N; i++) id[i] = i;
sz = new int[N];
for (int i = 0; i < N; i++) sz[i] = 1;
}
public int count()
{ return count; }
public boolean connected(int p, int q)
{ return find(p) == find(q); }
private int find(int p)
{ // Follow links to find a root.
while (p != id[p]) p = id[p];
return p;
}
public void union(int p, int q)
{
int i = find(p);
int j = find(q);
if (i == j) return;
// Make smaller root point to larger one.
if (sz[i] < sz[j]) { id[i] = j; sz[j] += sz[i]; }
else { id[j] = i; sz[i] += sz[j]; }
count--;
}

Answers

Using quick-find:

Input: 9-0

id[]: 0 1 2 3 4 5 6 7 8 9

Accesses: 22

Input: 3-4

id[]: 0 1 2 4 4 5 6 7 8 9

Accesses: 44

Input: 5-8

id[]: 0 1 2 4 4 8 6 7 8 9

Accesses: 66

Input: 7-2

id[]: 0 1 2 4 4 8 6 2 8 9

Accesses: 88

Input: 2-1

id[]: 0 1 1 4 4 8 6 1 8 9

Accesses: 110

Input: 5-7

id[]: 0 1 1 4 4 1 6 1 1 9

Accesses: 132

Input: 0-3

id[]: 4 1 1 4 4 1 6 1 1 9

Accesses: 154

Input: 4-2

id[]: 1 1 1 1 1 1 6 1 1 9

Accesses: 176

Using quick-union:

Input: 9-0

id[]: 0 1 2 3 4 5 6 7 8 0

Accesses: 2

Input: 3-4

id[]: 0 1 2 4 4 5 6 7 8 0

Accesses: 4

Input: 5-8

id[]: 0 1 2 4 4 5 6 7 4 0

Accesses: 6

Input: 7-2

id[]: 0 1 2 4 4 5 6 2 4 0

Accesses: 8

Input: 2-1

id[]: 0 1 1 4 4 5 6 2 4 0

Accesses: 4

Input: 5-7

id[]: 0 1 1 4 4 5 6 1 4 0

Accesses: 6

Input: 0-3

id[]: 4 1 1 4 4 5 6 1 4 0

Accesses: 20

Input: 4-2

id[]: 1 1 1 1 1 5 6 1 4 0

Accesses: 4

Using weighted quick-union:

Input: 9-0

id[]: 0 1 2 3 4 5 6 7 8 0

sz[]: 2 1 1 1 1 1 1 1 1 2

Accesses: 2

Input: 3-4

id[]: 0 1 2 4 4 5 6 7 8 0

sz[]: 2 1 1 2 1 1 1 1 1 2

Accesses: 2

Input: 5-8

id[]: 0 1 2 4 4 5 6 7 4 0

For more questions like sequence visit the link below:

https://brainly.com/question/15050706

#SPJ11

After previewing and cleaning your data, you determine what variables are most relevant to your analysis. Your main focus is on Rating, Cocoa. Percent, and Company. Location. You decide to use the select() function to create a new data frame with only these three variables. Assume the first part of your code is:


trimmed_flavors_df <- flavors_df %>%


What bean type appears in row 6 of your tibble?


a. Criollo

b. Beniano

c. Forastero

d. Trinitario

Answers

Answer: None of these

Explanation:

It is not possible for me to determine what bean type appears in row 6 of your tibble without more information. The select() function is used to create a new data frame with only the specified variables, but it does not change the content of the original data frame. In order to determine the bean type for row 6 of your tibble, you will need to access the relevant column of the data frame and use the index to retrieve the value for that row.

For example, if the column containing the bean type is called "Bean Type", you could use the following code to retrieve the value for row 6:

bean_type <- flavors_df$Bean.Type[6]

attempting to access an array element out of the bounds of an array, causes a(n) group of answer choices arrayelementoutofboundsexception arrayoutofboundsexception arrayexception arrayindexoutofboundsexception

Answers

Accessing an array element out of the bounds of an array will cause an ArrayIndexOutOfBoundsException.

An array is a list of elements stored in a specific order, and each element is accessed by its index. If you attempt to access an element with an index that is outside of the array's range, it will cause an exception.

An array is a collection of similar data types that are stored together in contiguous memory locations under the same name. The value in an array is called an array element, which is a separate data value that is stored in an array. Each element in an array is referenced by an index number, with the first element being stored at index 0. When you try to access an element of an array with an index value that is outside the valid range, you will receive an ArrayIndexOutOfBoundsException.

Learn more about array https://brainly.com/question/27041014

#SPJ11

What is a special type of variable used in subroutines that refers to a piece of data?

a parameter

a constant

a function

a routine

Answers

Answer:parameter

Explanation:

I got it right

Answer:

answer is A :)

Explanation:

Edge 2021

A two-in-one computer combines a tablet with a detachable ________ to make a relatively powerful, yet mobile computer.

Answers

A two-in-one computer is a device that combines the features of a tablet and a laptop. This device is designed to be both portable and powerful, making it an excellent choice for those who need to work on the go.

A two-in-one computer combines a tablet with a detachable keyboard to make a relatively powerful, yet mobile computer. This design is meant to provide users with the convenience of a tablet while still giving them the power and functionality of a laptop. The detachable keyboard is typically connected to the tablet through a series of magnetic or mechanical connectors.

When the keyboard is detached, the device can be used as a tablet, allowing users to work or play on the go. When the keyboard is attached, the device functions like a traditional laptop, providing users with a full-size keyboard and trackpad for more productive work. Overall, the two-in-one computer is an excellent choice for those who need a versatile device that can adapt to their needs.

To know more about portable visit:

https://brainly.com/question/11854933

#SPJ11

What is a placeholder for a piece of information that can change is called?

Answers

Answer:

Variable.

Explanation:

A placeholder for a piece of information that can change is called variable.

In Computer programming, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

Hence, when you create variables in a function, you can can set the values for their parameters.

For instance, to pass a class to a family of classes use the code;

\\parameter Name as Type (Keywords) = value;

\\procedure XorSwap (var a,b :integer) = "myvalue";

Lab 18. 16 Java Script Password Strength zybooks

Answers

Here is an example of a JavaScript function that checks the strength of a password:

The Java Script Function

function checkPasswordStrength(password) {

 var strength = 0;

 // check the length of the password

 if (password.length >= 8) {

   strength += 1;

 }

 // check for lowercase letters

if (password.match(/[a-z]/)) {

   strength += 1;

 }

 // check for uppercase letters

 if (password.match(/[A-Z]/)) {

   strength += 1;

 }

 // check for numbers

 if (password.match(/\d/)) {

   strength += 1;

 }

 // check for special characters

 if (password.match(/[^\w\s]/)) {

   strength += 1;

 }

 return strength;

}

This function takes a password as an argument and returns a strength score between 0 and 5, where 0 is the weakest and 5 is the strongest.

Read more about Javascript here:

https://brainly.com/question/28021308

#SPJ1

what is the full form of PDA? HELP ME PLZ-​

Answers

Answer:

Patent ductus arteriosus (PDA)

Explanation:

Patent ductus arteriosus (PDA) is a medical condition in which the ductus arteriosus of a person fails to close after birth.

Answer:

personal digital assistant,

Explanation:

What is the first phase of game development?
OA
the concept phase
B.
the pre-production phase
O c.
the prototype phase
D.
the alpha phase
E.
the beta phase

Answers

Hello there! The answer is:

B. The Pre-Production Phase

When someone or a group of people are designing an app or game, they generally follow the rule of phases. Basically, if you don't know what this process is, sound effects, character designs, icons and the concept are discussed. This is the first phase of game development.

I hope I helped you!

The following are dihybrid F2 data from maize ('r'gene for color and 'R' gene for shape). Calculate the chi-square value for the followng obserwed data, with a standard dihybrid 9:3:3:1 ratio as the null hypothesis. Genotype I Phenotype / Observed Numbers R.Y_ / Round \& Yellow / 348 Ryy / Round \& green / 119 TY - I wrinkled \& Yeliow / 139 rry / wrinkled \& green / 42

Answers

The observed numbers are as follows: Round yellow: 348Round green: 119Wrinkled yellow: 139Wrinkled green: 42We can use the chi-square test to see whether or not these observed numbers follow a 9:3:3:1 ratio.

The null hypothesis, as specified in the problem, is that the observed numbers follow the 9:3:3:1 ratio.To begin, we need to determine the expected numbers based on the null hypothesis. The expected numbers for each category are as follows:

\(\(Xχ2 = (119 - 121.5)2/121.5\)\)

= 0.041

For the Wrinkled yellow category,χ2 = (139 - 121.5)2/121.5

= 2.719

For the Wrinkled green category,

\(χ2 = (42 - 40.5)2/40.5\)

= 0.092

The total chi-square value is the sum of these individual values:

\(χ2 = 0.800 + 0.041 + 2.719 + 0.092\)

= 3.652

Therefore, we reject the null hypothesis and conclude that the observed numbers are not consistent with a 9:3:3:1 ratio.

To know more about numbers  visit:

https://brainly.com/question/23867894

#SPJ11

Hardening applications is similar to hardening operating systems, in that you remove functions that are not needed, restrict access where you can, and make sure the application is up to date with patches.
True or False

Answers

True. Hardening applications is similar to hardening operating systems. Both processes involve removing unnecessary functions, restricting access, and ensuring that the system or application is up to date with patches. These steps help to enhance security and reduce vulnerabilities.

Application solidifying is the method involved with getting applications against figuring out and altering. Application solidifying expands the work expected to control the application, in this manner foiling countless digital assaults.

At a fundamental level, application solidifying includes refreshing existing or executing new application code to additional safe a server and carrying out extra programming based safety efforts. Instances of utilization solidifying incorporate, however are not restricted to: automatic patching of standard and third-party applications.

Know more about hardening applications, here:

https://brainly.com/question/13002377

#SPJ11

answer the following questions: 1. what is the broadcast ethernet address, written in standard form as wireshark displays it? 2. which bit of the ethernet address is used to determine whether it is unicast or mul-ticast/broadcast?

Answers

An IP address known as a "broadcast address" is used to target multiple hosts rather than just one system on a particular subnet network.

What is the broadcast address in terms of Ethernet network?A broadcast address is an IP address that targets the entire subnetwork as a whole rather than just one host.To put it another way, a broadcast address enables information to be distributed to every machine on a certain subnet rather than just one.Any IP address's broadcast address can be determined by taking the bit complement of the subnet mask, also known as the reverse mask, and applying it to the IP address in question using a bitwise OR calculation.Example:

The broadcast address can be determined in the way shown below if the IP address is 192.168.12.220 and the subnet mask is 255.255.255.128.

Internet protocol address: 11000000.10101000.00001100.11011100

Mask on the reverse side: 00000000.00000000.00000000.01111111

logical OR —————————————————————————————

Address for Broadcast: 11000000.10101000.00001100.11111111

To Learn more About broadcast address Refer to:

https://brainly.com/question/28865562

#SPJ4

Other Questions
milton co. owned all of the voting common stock of walker co. on january 3, 2020, milton sold equipment to walker for $140,000. the equipment cost clemente $165,000. at the time of the transfer, the balance in accumulated depreciation was $45,000. the equipment had a remaining useful life of five years and a $0 salvage value. both entities use the straight-line method of depreciation. at what amount should the equipment (net of depreciation) be included in the consolidated balance sheet dated december 31, 2020? Rabies, typhus, and malaria are _____. all untreatable transmitted by animal bites diseases which have been eradicated caused by viruses the process of determining if a model is an accurate representation of the real system is called The doctor asks you to dispense drug tablets for a 22 lb dog to be given at 5 mg/kg TID for 5 days. How many 25 mg tablets should you dispense? a.10 b.30 c.20 Which of the following verifies that AABC is similar to ADEF?A. AA postulateB. SAS theoremC. Similarity cannot be determined.D. SSS theorem edison's kinetoscope viewing box was initially highly profitable, but its popularity declined: question 11 options: because of competition from amusement parks. because edison oversaturated the market with the devices. because other inventors found ways to project films on a screen. because edison lost a patent-infringement suit filed by american mutoscope. Donna currently weighs 160 pounds, is 5 feet tall and needs 1700 kcal/day to maintain weight. How many kcalories should Donna consume daily in order to lose weight Y = 10x-4, y2 = 6x +17, and y exceeds y by 3. A company manufactures fuel tanks for cars. The total weekly cost (in dollar) of producing a tanks is given byC(x)= 10000+90x-0.05x2(a) 1. Find the marginal cost function.(b) 2. Find the marginal cost at a producing level of 500 tanks/week..(c) 3. Find the exact cost of producing the 501st item.I What phenomenon, seen in Italy in the fourteenth century, was attributed to a tarantula bite, causing people to jump around, dance wildly, tear at their clothes, and beat each other with whips Which property is used in the following expression?7(9 + 8) = 63 + 56A.Distributive PropertyC. Commutative Property ofAdditionB.Associative Property of AdditionD. AssociativeProperty of Multiplication What function g describes the graph of f after the given transformations?f(x) = |x|+7; reflected across the x-axis and translated 4 units up. How can I draw a histogram to illustrate the information? where does reduction occur in an electrolytic cell A straw is placed inside a rectangular box that is 6 inches by 4 inches by 7 inches, as shown. If the straw fits exactly into the box diagonally from the bottom left corner to the top right back corner, how long is the straw? Leave your answer in the simplest radical form. Choose the best answer. If necessary, Question 12,9,16,1, 6,5, 84 What is the median of the data set shown? Who is the oldest to youngest Disney Princess? What is USB 3.4 Port/Slot ? And also what USB connectors are compatible with USB 3.4 Port/Slot ? Please help ~~~~~7th Grade I have an 88 in my math class, according to my teacher if I get a 75% on my final exam my grade will be 86. my final exam is what percent of my grade?