Unanswered | Answered

Computer Science

Parent Category: Computers
Computer Science is the systematic study of algorithmic processes that describe and transform information. It includes the theoretical foundations of information and computation and the practical techniques of applying those foundations to computer systems. Among the many subfields of Computer Science are computer graphics, computer programming, computational complexity theory, and human-computer interaction. Questions about Computer Science, terms such as algorithms and proofs, and methodologies are encouraged in this category.
Mary Kenneth Keller, B.V.M. (1913 - 1985)was an American Roman Catholic religious sister , educator, and pioneer in computer science . She was the first woman to earn a Ph.D. incomputer science in the United States.
Addition of two matrices is simply performed by iterating over all of the elements and adding elements with like indices together. A c code snippet... for (i=0; i
Front Ends are tools through which the user accesses the data in the backend and interacts with data. For example to Enter Data, Edit Data, Delete Data which is stored in backend the frontends are necessary. User friendly front ends are necessary when the user not aware of accessing the data without...
Iap stand for in app purchase like playing clash of clans or othergames like that you could spend money to buy something for you inthe app.
A connection between the Internet of Things (IoT) and artificialintelligence will become a threat to mankind, provided basicquestions are answered prior to considering imposing constraints onAI capabilities.
More knowledge. If you know more you can do more. For example ilike web designing. Its the easiest way of expressing your colorfulideas to millions of people with very small lines of codes whichare basically like symbols. Like "Yo dude wassup...... Nothin much" can convey a lot ofinformation among...
No. Artificial Intelligence is far too primitive to do that. Human intelligence, often using sophisticated software tools that only seem intelligent, runs the planet. That "seem intelligent" is the key; AI is the new Philosopher's Stone, the eternally unobtainable Holy Grail. However, the argument...
An open loop system is simple and straightforward, requiring fewerphysical or logical connections as the closed loop design. It lacksthe feedback offered by closed loop designs. As such, it is oftenconsidered inferior to a closed loop design. A closed loop design assures the initiator that the...
the character-at-a-time printers are too slow; therefore, theseusers need line-at-a-time printers. Line printers, orline-at-a-time printers, use special mechanism that can print awhole line at once; they can typically print the range of 1,200 to6,000 lines per minute.
Through sniffing a network they can basically observe the packagetraffic on the network. Their sources and destinations. By sniffingthey can listen the TCP/UDP ports and analyze the packages and thedata inside of it. So by using sniffing tools network adminstratorscan monitor unusual traffic...
merge sort is the most efficient way of sorting the list of array.
A relation may be in 2NF if 1. it is in 1NF & 2. Every non prime attribute functional dependent on primaryattribute
Yes, it's a kind of storage, so you can store anything that willfit.
In a sense yes all computer controlled enemies in games are AI anda handful of robots could be considered to have an artificialintelligence, however as of now they are just basic programs anddon't really think for them selves and are not really conscience sodon't expect USR robots breaking through...
You can use the bounded tiling problem. Given a problem in NP A, it has a turing machine M that recognizes its language. We construct tiles for the bounded tiling problem that will simulate a run of M. Given input x, we ask if there is a tiling of the plane and answer that will simulate a run of...
hey..it s simple..make use of built-in function isdigit(character)..it s in stdlib.h...
interactive python. org/rune stone/static/pythonds/Trees/TreeTraversals . html (take the spaces out and enterinto your web address)
Sleek, speedy, fast, fine UI, highly productive, etc.
Old: function (par1, par2) int par1; char *par2; {...} New: int function (int par1, char *par2) {...}
In a computer language, Primitive data types are the fundamental orbuilt-in data types the language will manipulate without asubroutine call, type modifier, or object. For example, in C they are: int, char, float, and double. In Java they are: byte, short, int, long, float, double, Boolean,and char....
Generally, it takes 4 years to complete a standard B.S. inengineering.
The easiest way is to have them each directly access a shared, synchronized data structure of some sort. Queues often work well, as one thread can be adding information to the end of it while the other thread removes information from the front.28.214999999999996 - 31.185
A symbolic constant is a constant with a name, numeric constants are unnamed and must be retyped in the code on each usage. Generally use of symbolic constants is preferred as it makes the code self documenting and allows the compiler to catch typing errors in constant usage.
Natural language is essentially the opposite of computer languageand code. English is a natural language that has developednaturally over thousands of years while computer code is aartificial construct. One of the great barriers between humans interfacing with computers(eg. artificial intelligence)...
Robots can not advance their hardware they can only duplicate it sothat artificial intelligence through robots will not advance unlesshumans have some sort of input into it.
Yes Artificial Intelligence works but there is not any certain wayin which it works. There are many definitions of ArtificialIntelligence in which one of them is a computer problem that needsto be solved with a high level of intelligence. Many AI researchershave discovered many different approaches...
Neither one will always be better than the other. The good thing is that any machine which can be represented by one can also be represented by the other. A DFA will usually be much easier to read and follow, since each step will be unambiguous. With a given input, you will always follow the same...
Binary-valued quantities can be 0 or 1, true or false, right orwrong. There are only 2 possible values.
It depends on what you mean by 'line structure'.
Adam Osborne was born on March 6, 1939 and died on March 18, 2003. Adam Osborne would have been 64 years old at the time of death or 76 years old today.
objetivo? su mision! su principal funcion.. la finalidad con la quees realizada este proyecto, es poder mejorar al ser humano, crear ydesarrollar una especie de forma, que piense por decirlo de algunamanera las cosas 1000%mas rapido que un ser humano, la inteligenciaartificial se baza en sobrepasar...
It all started with the mouse, not the optical one but the one with the balls. It was used first, two ball mouses are taken & there two balls of each are taken out & with the help it was made possible to project anything physical to computer screen
It can be either or even both - depends on how the designer(s) designed the distributed systems
well it depends on what AI software it is. some might be frommachines to learning algorithms. so for example if you get likecortana the AI system with Microsoft. it is learning new things.you can ask it to give you weather, play music etc. but it isconstantly learning more and more.
Machines are capable of performing specific tasks that normallyrequire human intelligence such as visual perception, speechrecognition, decision-making, and language translation etc. So infinance are we can use AI according to business need.
Put the text to display here
The formula AF(p -> Xp) is such a formula. It's simple to see that the formula is a LTL formula and judging by its syntax, it's not a CTL formula. The proof that there is no equivalent CTL formula is a bit more complicated.
ict means it is a knd of subject in TLE .. ( for students ) ICT : the subject of information all about the computer and its parts including the classification.
Cloud Computing Advancements inDesign, Implementation, and Technologies outlines advancementsin the state-of-the-art, standards, and practices of cloudcomputing, in an effort to identify emerging trends that willultimately define the future of the cloud. A valuable reference foracademics and...
Some love artificial intelligence because they think it will make their life easier for the-- which is true but there are disadvantages as well. Suppose the fact that these things will only be machines and they will not always listen to command especially if they are programed as a complete human....
In a pure segmentation architecture, segments are allocated like variable partitions, although the memory management hardware is involved in decoding addresses. Pure segmentation addresses replace the page identifier in the virtual address with a segment identifier, and find the proper segment (not...
A part of this question requires re-translating into readable English. The "size" of a page is 1 Kb. The size of a frame equals the size of a page, so a frame is also 1 Kb. There are to be 64 frames in 8 pages, which would mean 8 frames per page, except that one frame also equals one page?... This...
The top-down design starts from the start of the program and tracks down all steps but the step wise refinement is backwards.
Currently the top supercomputer in the world is Jaguar, a Cray XT5-HE which is currently working for the National Center for Computational Sciences at the Oak Ridge National Laboratory. Jaguar contains 37,376 six-core AMD Opteron processors (for a total of 224,256 cores) which have been measured...
Notepad can only read plain text from files. So if you try to open an image in notepad, it will attempt to ready the binary as ASCII encoded characters. This is where all those funky characters come from. If you want to view the binary for a file you will want to look for a hex editor. These...
This algorithm has several advantages. It is simple to write, easy to understand and it only takes a few lines of code. The data is sorted in place so there is little memory overhead and, once sorted, the data is in memory, ready for processing. The major disadvantage is the amount of time it takes...
4 - one for each character. However, depending on the computer language being used, there is some "overhead" - for example, with "C", the end of a text string is indicated with a null character, so "Bill" would need 5 bytes. Other languages precede strings with their length, the length taking 2, 4...
The apology was released by the British Prime Minister Gordon Brown on behalf of the UK government for sentencing Alan Mathison Turing in the 1950s to chemical castration which caused depression and eventually led to his suicide in 1954.
use to compose, review,edit,revise,layout,written memos and reports
It largely depends on the university, but typically IS is a business major and CS is an engineering major. Not only will IS and CS have different requirements, so will the school of business versus the school of engineering. IS graduates typically find work in the network administration field while...
Because guys have an interest in technology and have a stronger ability to deal with machines, although girls can be interested in machinery if they choose to but they have to be strong and tough which was also the reason guys join these programs.
Because guys have an interest in technology and have a stronger ability to deal with machines, although girls can be interested in machinery if they choose to but they have to be strong and tough which was also the reason guys join these programs.
String is a pre-defined class in Java. For example: String s = new String("This is a string"); the variable s is now a String object since it was declared and initialized in the String class.
The north bridge is the circuitry that interfaces the CPU with the faster components in the system, such as RAM, ROM, AGP/PCIe video cards, etc. It also serves as the link to the south bridge.
WikiAnswers currently uses bots to help with categorizing questions, correcting the way questions are asked, adding related link and more. These are simple tasks that can be preformed by bots with a good accuracy rating. These bots however can not answer questions nor can they give advice, this is...
Every bit can either be a 0 or 1. So to find the amount of bit strings of length either, you do 2 length to find the amount of bit strings there are of a given length.
Sixth sense technology works with a mobile, computing device, acamera, and a projector. It starts by connecting the camera andprojector to the computing device inside someone's pocket. Thecomputing device then picks up video via visual tracking markersthat are placed on the person's fingers,...
Serves for the correlation of two situations, for example speed with respect to time, this serves you more for analysis of situation that you can apply to the computer when making a program but it does not directly influence as such
In theory the only advantage is Speed simply because one pass is faster than two passes. However a properly written two pass assembler can be faster than a poorly written one pass assembler because the two pass assembler spends alot less time doing memory intensive lookups, look-aheads, and back...
trees and graphs are very important data structures. they are used in compilers and in data base. compiler uses tree structures do convert data types and do calculations on booleans and variables. even the modem on your computer uses a binary tree structure called huffman encoding for data...
we are doing the project in ieee standard dotnet so we want the seminar topic in ieee standard only
the data will be flow in tha crime reporting
ALGOL is a family of programming languages, developed in the 1950s, that was intensely influential on the development of algorithm description computer science.
for (node=head; node!=null; node=node->next) printnode(node);
There is no institution called "University of Indiana"; its name is "Indiana University." .
Here, let's check out this one as a warming up: http://www.slideshare.net/oscarjr713/artificial-intelligence-power-point-presentation-3006401
Though its a very broad question, use of the c program is to develop computer software to help solve the problems or to automate manual systems, such as automating the tasks of data collection.
Computer integrated engineering is the act of useing computers topreform various jobs for example it can be used to be a vetanaryassistant .You are so stupid to even use this this also thaimplacations in the manifactur area of the market for example themanifacture if a toilet .
Turings' vision of AI was when you "talked" with an AI machine you would not know it was a computer. Today computers doing new tasks without prompting would be the goal of some programmers.
It depends on which school you go to. Some will treat them as the same discipline while others will require different classes for each.
a topology is a way to connect the network system.. we can connect network with different types. ring ,bus and mash is a topology or way to show connect network with different types. in ring topology the systems which we want to connect in network in the form of ring
In dynamic programming what amount of memory is needed by the programmer are allocated to it dynamically i.e at the run time so that wastage of memory can be avoided.
Floating point numbers are typically stored as numbers in scientific notation, but in base 2. A certain number of bits represent the mantissa, other bits represent the exponent. - This is a highly simplified explanation; there are several complications in the IEEE floating point format (or other...
We can make header files using macros in C. Just make one function using macros and save with extension ".h" and in Include directory where other header files are saved. You can use it in your C prog.
#include #include #include #include int main() { std::vector str_array = { "John", "Bill","Alan", "Craig"}; std::sort (arr.begin(), arr.end()); }
In mathematics and computer science, an algorithm is an effective method expressed as a finite list of well-defined instructions for calculating a function Algorithms are used for calculation, data processing, and automated reasoning. By complexity Algorithms can be classified by the...
in scan line polygon fill, each can line crossing a polygon, the area fill algorithm locates the intersection point of the scan line with the polygon edges. These intersection points are then stored from left to right and the corresponding frame buffer positions between each intersection painr are...
Mnemonics is a method of remembering things by associascation. Hexadecimal is a number system. 0-9 are as usual and then a(10) b(11) c(12) d(13) e(14) f(15)
k = you - int (you / j) * j; You can also use, if your language supports the modulus (%) operator... k = you % j;
If you are talking about the Nintendo Wii Console - then the answer is a direct " No " But if you talk about the games developed for Wii - Then the answer is " Yes " because most of the games ( High - end) use advance AI for characters ( Entities ) in their games.
1. Find the element is the list. Let pointer 'p' point to it. 2. Delete it from the list: if (p->Prev) p->Prev->Next = p->Next; else List->First = p->Next; if (p->Next) p->Next->Prev = p->Prev; else List->Last = p->Prev; 3. Release the memory associated with it.
It is called Computer Science because you are learning how a computer works and operates and how to translate that into human language. E.g. How a computer processes information, making programs using code like Java, C+, etc.. because computer science is the study of the theoretical foundations...
In one sense, a computer is fairly important to computer science since it's the main tool you use for filing system . On the other hand, computer help us to keep data base, track records and we can keep account details easily. If you want to analysis data you have to use computer. we can say that...
Most scripts written inside of Windows are written using Visual Basic, or a Visual Basic derivative, like Windows Script Host (created for things like logon scripts on networks.)
DFA - deterministic finite automata NFA - non-deterministic finite automata
on the Windows platform only, it is easier to refer to a storage partition as a letter than /dev/sda1/ .. linux and possibly Apple(c) computers use /dev/sda1/ because it is the raw code, C:\ is converted.. This is all I know. Microsoft(c) windows operating systems are written totally different.\n\n
I want you to tell me the advantages and disadvantages