answersLogoWhite

0

📱

Computer Science

Computer Science is the systematic study of algorithmic processes that describe and transform information. It includes the theoretical foundations of information and computation and the practical techniques of applying those foundations to computer systems. Among the many subfields of Computer Science are computer graphics, computer programming, computational complexity theory, and human-computer interaction. Questions about Computer Science, terms such as algorithms and proofs, and methodologies are encouraged in this category.

1,839 Questions

Write a C program to find out whether character passes through keybroad is a digit or not?

hey..it s simple..make use of built-in function isdigit(character)..it s in stdlib.h...

What are symbolic constants?

A symbolic constant is a constant with a name, numeric constants are unnamed and must be retyped in the code on each usage. Generally use of symbolic constants is preferred as it makes the code self documenting and allows the compiler to catch typing errors in constant usage.

Different parts of desktop?

DIFFERENT PARTS OF A DESKTOP: â—‹TASKBAR -> a long horizontal bar at the bottom of a desktop. â—‹ICONS -> a small image with a text label representing objects like documents, application,folders,devices,etc.â—‹WALLPAPER ->the background screen of a desktop.elow,,add nio ko..FS:audiztah_jajamin36@yahoo.com..unun lng..tq!..

What types of locations can hold source and destination operands?

Source and result operands can be in one of four areas:

Main or virtual memory: As with next instruction references, the main or virtual memory address must be supplied.

• Processor register:With rare exceptions, a processor contains one or more registers that may be referenced by machine instructions. If only one register exists,reference to it may be implicit. If more than one register exists, then each register is assigned a unique name or number, and the instruction must contain the number of the desired register.

• Immediate: The value of the operand is contained in a field in the instruction

being executed.

• I/O device: The instruction must specify the I/O module and device for the operation.If memory-mapped I/O is used, this is just another main or virtual

memory address.

Define method overloading and write two method headers that together exhibit overloading?

Method overloading is when two or more methods have the same name, but the computer can differentiate between the methods by looking at the parameters.

Example:

public static void go(int x)

public static void go(double x)

If you pass an int, the first method would be called. If you pass a double, the second method would be called

How many characters per second can be transmitted over a 1200-band line in each what modes considering a character code of 8 bits synchronous serial transmission asynchronous with 1 stop?

for 8 bit synchronous serial transmission total transmitted characters will be

1200/8

and for asynchronous transmission with 1 stop total bit will be (8+1+1=10) i.e. (8 bit + start bit+stop bit)

so transmitted characters will be

1200/10

What is validation of an algorithm?

Once an algorithm has been devised it become necessary to show that it works it computer the correct to all possible, legal input. One simply way is to code into a program. However converting the algorithm into program is a time consuming process. Hence,it is essential to be reasonably sure about the effectiveness of the algorithm beforeit is coded. This process, at the algorithm level,is called"validation". Several mathematical and other empirical method of validation are available. Providing the validation of an algorithm is a fairly complex process and most often a complete theoritical validation though desirable, mey not be provided. Alternately, algorithm segment,which have been proved elsewhere may be used and the overall working algorithm may be empirically validated for several test cases.Such method,although suffice in most cases,may often lead to the presence of unidentified bugs or side effect later on.

And

The process of measuring the effectiveness of an algorithm before it is coded to know the algorithm is correct for every possible input.This process is called validation. Example :-

This article describes the algorithms for validating bank routing numbers and credit card numbers using the checksum built into the number. While they differ in how they are generated, the technique used for both is similar.

by Niraj Sharma

What is object linker?

In computer science, a linker or link editor is a program that takes one or more objects generated by a compiler and combines them into a single executable program.

http://en.wikipedia.org/wiki/Linker

This is a response to the question, "What is object linker?". The appropriate question would have been, "What is a linker or link editor in the field of Computer Science and Software Engineering?". Note that a linker is called a loader when it refers to a run-time process. Linkers refer to compile-time processes.

The importance of the computer?

Computer training takes a computer from a common household item to a powerful tool for work, school, and personal tasks. Enrolling in a computer training program can teach you how to use common software programs and also maintain your computer's hardware. Specialized training for computers is also available to focus on a specific type of program, such as word processing, or a specific type of task, such as managing finances.

What tag will make words FLASH on and off repeatedly?

You can use the <blink> tag, but the best you can do is do this: <span id="blah">Some Text here</span> and put this code in a script tag:

function go() {

if (document.getElementById("blah").style.visibility == "visible") {

document.getElementById("blah").style.visibility = "hidden";

}

else {

document.getElementById("blah").style.visibility = "visible";

}

}

window.onload = function() {var x = window.setInterval("go()", 200);};

Change blah to whatever you need it to be, and the document.getElementBy("blah") to the id attribute. change 200 to how fast it blinks in milliseconds

What is the BTB?

The BTB stands for:

Bromothymol Blue

Mostly used for testing the water if there is acid or not.

Difference between super and mini computer?

The difference between a super computer and a mini computer is in their computing power. A super computer has infinitely more computing power than a mini computer.

What is Icon 17?

Our company was established in 2005 and has been providing the latest in website management, up-to-date design, and hosting. Our goal is to provide professional customer service, and to help you create and manage your very own website. We specialize in offering your product excellent service, and our staff offers quality and reliable services you can count on. In addition, our friendly and professional staff are here to answer any questions you may have about our company or our services.

Whether you need to create a new website or have a website managed, we have what you need at prices you can afford. At Icon 17, our goal is to provide you with courteous, expedient, and professional service of the highest caliber.

Browse our Web site for more information about Icon 17. If you have any questions or would like to speak with a Icon 17, Inc. representative regarding our products and services, please e-mail us at service@icon17.com or call us at 416-930-2749.

What does restricted access major mean?

It means you must meet the requirements for entrance to the major. Its not open to all students but only those who qualify. You will usually find this in the health related majors.

Write a c program to find the maximum of two numbers and print out with its position?

maxValue = function (array) {mxm = array[0];for (i=0; i<array.length; i++) {if (array[i]>mxm) {mxm = array[i];}}return mxm;};

i don't know

What are the disadvantages of low level language?

There are several disadvantages in low level programming languages

  1. It is very difficult to learn the language.
  2. It is very difficult to program in low level language.
  3. It is difficult to understand the pre-existing program if it is written in low level language.
  4. It is difficult to modify the program.
  5. It is difficult to debug the programs.
  6. It is difficult to fix the errors in the program.
  7. It is difficult to find and fix the semantic errors.