What is the data type for a company's profit?
Although it may seem obvious that currency should be represented by some floating point data type, floating point values are merely approximations, and these approximations can introduce rounding errors that can be difficult to predict. For instance, when dealing with Sterling, we physically deal with whole pounds (£) and hundredths of a pound (pennies). However, tax and interest rates are typically expressed as percentages, so we inevitably need to introduce fractions of a penny into our calculations, rounding up or down to the nearest penny. But a penny is already a fraction (one hundredth of a pound), so we immediately lose two digits of precision before we've begun.
In order to retain the precision we require, we need to introduce a scalar, such that we deal in whole pence rather than whole pounds. A scalar of 100 would allow us to treat £1.23 as if it were really 123 pence. Now we can store monetary values as integers instead of floating point values and that alone can have a significant benefit in terms of performance (integer arithmetic is significantly quicker than floating point arithmetic).
We still have the problem of how to deal with unpredictable rounding errors that might occur within the fractions of a penny we create when working with percentages. However, this is easily resolved by raising our scalar by a higher power of 10. Thus a scalar of 1000 would mean our 123 pence then becomes 1230 tenths of a pence, while a scalar of 10,000 would create 12,300 hundredths of a pence. That's about as much precision as we require for currency values. We could go further, but we have to keep in mind that the greater the scalar, the lower the range of values we can represent.
Assuming twos-complement signed notation, a 32-bit signed integer can accommodate whole values in the range -2,147,483,648 through 2,147,483,647. With a scalar of 10,000, this would accommodate all monetary values in the range £-214,748.3648 through £214,748.3647. While adequate for many smaller businesses, this would be highly unsuitable for large corporations with a profit/loss in excess of this range. However, each additional bit doubles the range such that a 64-bit integer could easily accommodate all monetary values in the range £-922,337,203,685,477.5808 through £922,337,203,685,477.5807.
So, the data type we actually use will be an integer, typically a 64-bit integer. However, in order to make the integer more intuitive and easier to work with, it will ideally be encapsulated by a class that can also encapsulate a user-defined scalar and currency enumerator (such as GBP or USD). In this way, users can work with actual currency in real numbers, such as pounds and pence (including fractions of a penny where appropriate), while the class performs its calculations upon the scaled integer and presents the result back to the user in pounds and pence.
XML stands for "eXtensable Markup Language." It is a method of marking information with tags very similar to HTML. By marking data with these tags, you can easily programatically parse data. Example: John 20 Male Sue 35 Female
How do you move Scoresaver 2 to a different computer without paying for it?
Contact the manufacturer.
What is the difference between array linklist?
Linked list consists of data nodes each pointing to next in the list .An array consist of contiguous chunk memory of predetermined size
/* Discrete Fourier Transform and Power Spectrum Calculates Power Spectrum from a Time Series Copyright 1985 Nicholas B. Tufillaro */ #include #include #define PI (3.1415926536) #define SIZE 512 double ts[SIZE], A[SIZE], B[SIZE], P[SIZE]; main() { int i, k, p, N, L; double avg, y, sum, psmax; /* read in and scale data points */ i = 0; while(scanf("%lf", &y) != EOF) { ts[i] = y/1000.0; i += 1; } /* get rid of last point and make sure # of data points is even */ if((i%2) == 0) i -= 2; else i -= 1; L = i; N = L/2; /* subtract out dc component from time series */ for(i = 0, avg = 0; i < L; ++i) { avg += ts[i]; } avg = avg/L; /* now subtract out the mean value from the time series */ for(i = 0; i < L; ++i) { ts[i] = ts[i] - avg; } /* o.k. guys, ready to do Fourier transform */ /* first do cosine series */ for(k = 0; k <= N; ++k) { for(p = 0, sum = 0; p < 2*N; ++p) { sum += ts[p]*cos(PI*k*p/N); } A[k] = sum/N; } /* now do sine series */ for(k = 0; k < N; ++k) { for(p = 0, sum = 0; p < 2*N; ++p) { sum += ts[p]*sin(PI*k*p/N); } B[k] = sum/N; } /* lastly, calculate the power spectrum */ for(i = 0; i <= N; ++i) { P[i] = sqrt(A[i]*A[i]+B[i]*B[i]); } /* find the maximum of the power spectrum to normalize */ for(i = 0, psmax = 0; i <= N; ++i) { if(P[i] > psmax) psmax = P[i]; } for(i = 0; i <= N; ++i) { P[i] = P[i]/psmax; } /* o.k., print out the results: k, P(k) */ for(k = 0; k <= N; ++k) { printf("%d %g\n", k, P[k]); } }
What is an example of how an embedded object in software works?
For example, a spreadsheet object can be brought into a word-processing document. Any time the spreadsheet object is updated in the original spreadsheet software, the object is automatically updated in the destination document.
OSS is the Apple processing unit found in iPhones, Macs, and other apple devices. Sprint doesn't carry for Apple products so it does not have an OSS version.
A passive threat to computer security is?
passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.
Draw functional decomposition diagram with an example?
Functional is another word for workable. Decomposition is another word for falling apart. diagram is another word for drawing. I hope you can find someone who understands your question better than I have
UniversityofCAMBRIDGE
University of OXFORD
IMPERIAL College London
UCL (University College London)
KING'S College London
University of EDINBURGH
University of MANCHESTER
University of BRISTOL
LONDON School of Economics and Political...
University of WARWICK
University of GLASGOW
University of BIRMINGHAM
University of SHEFFIELD
University of YORK
University of ST ANDREWS
University of NOTTINGHAM
University of SOUTHAMPTON
University of LEEDS
DURHAM University
University of SUSSEX
University of LIVERPOOL
CARDIFF University
University of BATH
University of ABERDEEN
QUEEN MARY, University of London
NEWCASTLE University, NEWCASTLE Upon Tyn...
University of LANCASTER
University of LEICESTER
University of READING
QUEEN'S University of Belfast
University of DUNDEE
University of SURREY
LOUGHBOROUGH University
University of EXETER
School of Oriental and African Studies, ...
University of ESSEX
University of STRATHCLYDE
BRUNEL University
University of EAST Anglia (UEA)
ROYAL HOLLOWAY University of London
ASTON University
SWANSEA University
University of BRADFORD
GOLDSMITHS, University of London
BANGOR University
HERIOT-WATT University
ABERYSTWYTH University
University of KENT
The OPEN University
University of HULL
Why do you use a b c d e f in hexadecimal number system why don't p q r s t u or anything else?
The use of a b c d e f, along with 0 1 2 3 4 5 6 7 8 9, in representing hexadecimal numbers is simply a matter of accepted convention. You could certainly use p q r s t u, or something else, but you would need to understand the rules of arithmetic when doing so, and you would be flying in the face of established convention.
How is a context diagram used by software engineers?
System context diagrams (SCD) are used by software engineers to show how software based systems act as a whole and what the input and output factors would be. SCDs are used early in a project to show users what is available and the scope of the project.
Which command displays amount of total and available memory?
You can use the DOS command MEM to show total and available memory, but it only shows the memory for the process that is running the command shell. It will not show the memory in terms of Windows, nor will it work at all for Windows 7.
What is a good example of a software development management?
Software development management is the process of overseeing work that encompasses five areas. These areas are risk, requirement, change, software configuration, and release.
What is the diffference between waterfall model and modified waterfall model?
Modified waterfall model verified and validate the user requirements for every phase. Meanwhile, waterfall did not, it only verify and validate user requirement at the end of the phase.
6 What is the role of a Micro sequencer in Microprogramming Control Unit?
In computer architecture and engineering, a sequencer or microsequencer is a part of the control unit of a CPU. It generates the addresses used to step through themicroprogram of a control store.
Usually the addresses are generated by some combination of a counter, a field from a microinstruction, and some subset of the instruction register. A counter is used for the typical case, that the next microinstruction is the one to execute. A field from the microinstruction is used for jumps, or other logic.
Since CPUs implement an instruction set, it's very useful to be able to decode the instruction's bits directly into the sequencer, to select a set of microinstructions to perform a CPU's instructions.
Most modern CPUs are considerably more complex than this description suggests. They tend to have multiple cooperating micromachines with specialized logic to detect and handle interference between the micromachines.
Blood bank management system-UML diagram?
The UML are behavioral diagram used to describe a set of actions that some systems(s) should or can perform in collaboration with one or more external users of the system. In this case, blood bank management systems.
Discuss the advantages of waterfall model?
Advantage: -
1-You get the software according to your demand.
2-It is best for small projects.
3-It is very much sequential & systematic.
What is information hiding in software engineering?
The Modules should be designed specifically so that no information(Algorithm and data) contained within the module is not accessible to the other module that have no need of that information.
Hiding implies that Effective modularity can be achieved by defining a set of independent modules that communicate with one another only through information necessary to achieve software function.
What ways can object oriented systems be considered cure to the software crisis?
It isn't clear what you mean by the "software crisis". The benefits of object oriented systems are usually in the re-use of code (not having to write the same type of code over and over again), which leads to a better ROI (return on investment).
This means you can leverage what you already have done to get a product to market faster.
What are the four p's of software engineering?
There four p's in software engineering. The four p's are people , product, process, project.
Why do you think software development is risky?
Not all models of software engineering are risky. The spiral model takes care of risk in every phase.