There is no reference to which benchmark is used as the basis for a statement made in the question.
In addition, you do not identify which version of COBOL is being compared to which version of Java. Data memory management is different between Java and COBOL.
The 70s mainframe version of COBOL had static memory allocation and no runtime stack. (The new versions of COBOL have "Automatic Variables" allocated in a stack.) Java has garbage collection and a stack for recursion refills. Both features have a CPU cycle cost in support.
Object-COBOL must have dynamic memory, just as Java must have objects and their class information data structure. The data types are very different from COBOL and Java. COBOL supports arithmetic in numeric character fields. Any conversion of characters to binary and vice versa depends on the implementation and is hidden from the programmer. Programmers can specify that a field must be local in binary. The IBM version of COBOL supports the “compressed decimal” data format that is implemented in hardware on 360, 370 and z machines. Compilers compatible with an IBM need to handle this type of data without software.
Use the drop-down menus to complete the statements about using section breaks in a document.
The four section break options can be found in the Breaks menu under the tab.
To insert a section break and start the new section on a new page, you would choose
To insert a section break and start the new section on the same page, you could choose
Answer:
1. Layout
2. Next Page
3. Continuous
Explanation:
Edge 2020
Answer:
Layout
Next Page
Continuous
Explanation:
Which of the following ports offers a fast connection that could be used to download and watch your favorite TV shows?
Ethernet
modem
FireWire
USB
Answer
The Answer Would Be FireWire and the next one would be USB
Explanation:
FireWire offers a fast connection that could be used to download and watch your favorite TV shows.
What is FireWire and how it is related to connection?FireWire is a computer interface employed for high-speed communication (i.e., connection) and transference of data.
Apple described this interface using the name of FireWire.This interface (FireWire) can be used to connect different classes of electronic tools (e.g., printer, scanner, video, etc)In conclusion, FireWire offers a fast connection that could be used to download and watch your favorite TV shows.
Learn more about FireWire here:
https://brainly.com/question/1590202
I have a .NET 6 basic website that I built using Entity Framework as the database for updating pages. I am ready to deploy the site/database to a live server somewhere, but I am looking for the best option.
The website is built using the latest .NET Framework 6.0, with Entity Framework 6.0.3. I know about HostGator, GoDaddy and InterServer.
I have read stuff online that said HostGator doesn't actually support the latest .NET 6.0, and GoDaddy only supports .NET Core 3.2?
HostGator is rougly $5.00 a month, GoDaddy is $6.00, and InterServer is $8.00.
I am leaning towards InterServer, because I have read that InterServer supports the latest .NET 6.0 and Entity Framework.
I am used to deploying to servers using LAMP stack, Linux, Apache, PHP, MySQL... The prices there are lower and it is fairly simple to setup. I figure there has to be something similar for windows and .NET.
For something similar, am I looking for Shared Hosting? Or VPS? I really don't understand what I need. I was hoping for Shared Hosting, export my SQL Server database, create it on the live server, then FTP my files over.
InterServer seems like it supports everything, so I am leaning towards that. I know no matter what, Windows Hosting is going to be a little bit more expensive. I just want something that I know is going to work with the latest .NET technologies.
Does anyone have any suggestions?
In the above scenario, i will recommend Bluehost or InterServer since it is good and can meet your requirement.
What is Bluehost?Bluehost is known to be a software that is said to be a little bit better than HostGator in the aspect of security as it gives offer free SSL certificates, malware tools, and others.
Therefore, In the above scenario, I will recommend Bluehost or InterServer since it is good and can meet your requirement.
Learn more about Bluehost from
https://brainly.com/question/17062016
#SPJ1
explain about your business and sales after covid 19 pandemic
The global economy has undergone tremendous disruption brought about by the pandemic, with some sectors being grievously hit while others have fresh openings.
What are the effects?Its aftermath has hastened the conversion to e-business, remote work, and digital remodeling as firms have poured significant capital into technological solutions in order to ameliorate compliance to the current state of affairs. Companies further evaluated their delivery strategies and diversified places from where they sourced materials so as to minimize any single nation's or region’s influence.
Altogether, the pandemic has showcased the indispensable value of pliancy, robustness, and novelty for business operations, and those entities that were able to adeptly conform to the existing condition are predicted to thrive in the post-COVID period.
Read more about business here:
https://brainly.com/question/24553900
#SPJ1
Before the assembly line only the wealthy could afford automobiles.
True
False
aya what's the full form of JPEG ?
Hi!jpeg stands for "Joint Photographic Experts Group."
Answer:
"Joint Photographic Experts Group",
Explanation:
JPG is a digital image format which contains compressed image data. With a 10:1 compression ratio JPG images are very compact. JPG format contains important image details. This format is the most popular image format for sharing photos and other images on the internet and between Mobile and PC users.
I need help with this!!! PLEASE!!! Are headphones, radios, dishwashers, and remote controls considered Computers? Do any of them store data or process any data?
^_^
Answer:
yes they are some sort of computers
Answer:
yes they are
Example:Tv is a type of computer because they work like a computer but does different things
What is the word to tell excel that you want it to do math
Are you referring to functions? In a cell you can type "=" and it will allow you to enter a formula to insert math equations involving other cell values.
To use ( 2 complement ) answer it (101101)2 – (1100)2 = ( )2
100001+
1100001-
100001-
1100001+
To use ( 2 complement ) answer it (101101)2 – (1100)2 = ( )2
100001+
1100001-
100001-
1100001+
Answer:
2(101101) - 2(1100) = 200002
Explanation:
the text is everywhere don't know what to answer
To what twenty-first century need did social media respond?
As the world became increasingly complicated and people became busier, people had less time to interact.
As the world became more intense and people became overwhelmed, people needed simple ways to communicate.
As the world became more expensive and people had less money, people had fewer ways to spend time together.
As the world became closer and more intimate, people had less of a desire to communicate face-to-face.
Answer:
As the world became increasingly complicated and people became busier, people had less time to interact.
Explanation:
According to.............Network can be classified into client-server and peer to peer
According to computing networking, Network can be classified into client-server and peer to peer.
What are client-server and peer-to-peer networks?The peer-to-peer network links computers so that they can all share all of the resources or a portion of them. One or more central computers or servers that administer the resources and store the data are required for the client server networks to function.
In a client-server network, the server responds to client requests for services. Every node in a peer-to-peer network has the ability to request and provide services. 5. Compared to peer-to-peer networks, client-server networks are more expensive.
Learn more about Network from
https://brainly.com/question/1326000
#SPJ1
why computer is now considered a commodity.
Answer:
Computers are considered commodities because they are relatively easy to produce and there is a lot of competition in the market. This means that prices are relatively low and there is not a lot of differentiation between products.
Explanation:
Hope this helps!
An __________ hard drive is a hard disk drive just like the one inside your, where you can store any kind of file.
An external hard drive is a hard disk drive just like the one inside your computer, where you can store any kind of file.
These drives come in various sizes, ranging from small portable drives that can fit in your pocket to larger desktop-sized drives with higher storage capacities. They often offer greater storage capacity than what is available internally in laptops or desktop computers, making them useful for backups, archiving data, or expanding storage capacity.
Overall, external hard drives are a convenient and flexible solution for expanding storage capacity and ensuring the safety and accessibility of your files.
Write a method that computes the average of the values in an array of doubles. The header of the method is as follows:
public static double average(double[] x)
Answer:
Written in Java
public static double average(double[] x){
double sum = 0.0;
for(int i=0;i<x.length;i++){
sum+=x[i];
}
return sum/x.length;
}
Explanation:
This defines the method
public static double average(double[] x){
This initializes sum to 0.0
double sum = 0.0;
This iterates through the array
for(int i=0;i<x.length;i++){
This adds up items of the array
sum+=x[i];
}
This returns the average
return sum/x.length;
}
Attached to this program is the full program that include the main method of the program
The OSI is reference/conceptual model and accordingly multiple practical models (such as TCP/IP, AppleTALK, etc) exits. Which fundamental functionalities necessarily needs to considered while implementing any network model?
Answer:
The fundamental functionalities necessarily needs to considered while implementing any network model are (1) Scalability, (2)The quality of service (3) Fault tolerance (4) Security.
Explanation:
Solution:
Network must help a wide area of applications and administrations, just just as work over various sorts of links and devices that make up the physical infrastructure. The term network refers to the innovations that help the infrastructure and the customized administrations and rules, or protocols, that move messages over the network.
The following are some fundamental functionalities necessarily needs to considered while implementing any network model which is stated below:
(1) Scalability :
A huge number of users and service providers connect with the Internet every week. All together for the Internet to help this fast measure of development, it must be scalable.
A scalable network can extend rapidly to help new clients and applications without influencing the performance of the administration being conveyed to existing clients.
(2)Quality of Service :
Networks must provide predictable, quantifiable, and, now and again, ensured administrations.
Networks also need mechanisms to carry on congested network traffic. Network bandwidth is the estimate of the data-transfer size of the network. As such, what amount of data can be transmitted inside a particular measure of time? Network data transfer capacity is estimated in the quantity of bits that can be transmitted in a solitary second, or bits every second (bps).
(3) Fault Tolerance :
The Internet is consistently accessible to the a huge number of users who depend on it. This requires a network design that is worked to be fault tolerant.
A fault-tolerant network is one that constrains the impact of a failure, with the goal that the least number of devices are influenced by it. It is likewise worked in a manner that empowers fast recuperation when such a failure happens.
Faults-tolerant networks rely upon various ways between the source and destination of a message. On the off chance that one way comes up short, the messages can be immediately sent over an alternate connection.
(4) Security:
The Internet has advanced from a firmly controlled inter network of instructive and government associations to a generally open methods for transmission of business and individual interchanges.
Subsequently, the security necessities of the network have changed. The network infrastructure, the system administrations, and the information contained on arrange appended gadgets are vital individual and business resources. Bargaining the respectability of these benefits could have genuine outcomes.
Which company is producing laptops nowadays? *
Cute
Aspire
Dell
Innovative
Answer:
dell
thanks for points
Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character – to change every third character in the array to its replacement character
(C++ coding)
Method explanation:
Defining a method "changeCharacter" that takes three parameters that are "character array", and two integer variable "s, k" in its parameters.Inside the method, a for loop is declared that takes array value and defines a conditional statement that checks the 3rd character value in the array, is used to the array that holds its key-value.Please find the full program in the attachment.Method description:
void changeCharacter(char* ar, int s, int k)//defining a method changeCharacter that takes three parameters
{
for(int j = 1; ar[j]!='\0'; j++)//defining a for loop for 3rd character value in array
{
if(j%3== 0)//use if block that check 3rd character value in array
{
ar[j-1] = k; //Changing the 3rd character in array
}
}
}
Learn more:
Program: brainly.com/question/12975989
What is a Ram and what does it doe to youre computer
Answer:
it may help you!
Explanation:
Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis
Which core business etiquette is missing in Jane
Answer:
As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:
Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.
Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.
Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.
Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.
Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.
It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.
Assignment
Write a assembly program that can display the following shapes:
Rectangle
Triangle
Diamond
The program will read an input from the user. The input is terminated with a period. So the program will continue to run until a period is read.
The data the program reads is as follows:
A shape command followed by parameters.
R stands for Rectangle. The parameters are height (rows) and width (columns)
T stands for Triangle. The parameters is base width
D stands for Diamond. The parameters
Your program needs to read the input and based on the input do the following:
Print your name
Then print the name of the shape
Then the shape below it.
Sample input:
R 03 10
T 05
D 11
.
Output:
Loay Alnaji
Rectangle
**********
**********
**********
Triangle
*
***
*****
Diamond
*
***
*****
*******
*********
***********
*********
*******
*****
***
*
Requirements
Your main should only be the driver. It should only read the "shape type", based on that, call the proper function to read the parameters and draw the shape.
Example of your main (just example, pseudocode):
loop:
read shape
if shape is '.' then exit
if shape is 'R'
call Rectangle Function
if shape is 'D'
call Diamond Function
if shape is 'T'
Call Triangle Function
go to loop
The program above is one that begins with the _begin name, which is the passage point of the program.
What is the program about?The program uses framework call int 0x80 to print your title on the screen utilizing the compose framework call. It loads the suitable values into the registers (eax, ebx, ecx, edx) to indicate the framework call number, record descriptor, buffer address (where the title is put away), and length of the title.
It checks in case the shape input may be a period (.), which demonstrates the conclusion of input. In case so, it bounced to the exit name to exit the program.
Learn more about program from
https://brainly.com/question/23275071
#SPJ1
what are examples of widgets
1. Write a function named problem1 to simulate the purchases in a grocery store. Write statements to read the price of each item until you enter a terminal value to end the loop. Calculate the subtotal and add a sales tax of 8.75% to the subtotal. Return the subtotal, the amount of the sales tax, and the total. Call the function and display the return results. (25 pts)
Answer:
ok
Explanation:
How does calculate() work?
Answer:
calculate works by determining the amount of something
Explanation:
which statements did both aristotle and ptomlemy assume? select two options
Both Aristotle and Ptolemy considered that each planet is bound to a single sphere, but geometers and astronomers might use a number of such spheres to create the observed planet movements.
Who is Ptolemy?Claudius Ptolemy was a Roman mathematician, astronomer, astrologer, geographer, and music theorist who produced many scientific treatises, three of which were influential in Byzantine, Islamic, and Western European science.
Ptolemy centered his geocentric model on the Earth. Ptolemy assumed the universe was a system of nested spheres around the Earth based on the facts he had. He thought that the Moon was nearest to the Earth, followed by Mercury, Venus, and finally the Sun.
Learn more about Ptolemy:
https://brainly.com/question/15075606
#SPJ1
Yari is having trouble determining the appropriate combination of f-stop and shutter
speed for a still image he is taking. What tool could help him find the correct
exposure for the ISO setting he's using?
Answer:
Yari could just use the automatic settings on the camera. So basicly he could just turn off manual and let the camera find the best settings.
Explanation:
A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
Answer:
Intrusion detection system
Explanation:
An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.
Example of mediated communication and social media
Answer: mediated communication: instant messages
social media: social platforms
Explanation:
Use the drop-down menus to complete statements about how to use the database documenter
options for 2: Home crate external data database tools
options for 3: reports analyze relationships documentation
options for 5: end finish ok run
To use the database documenter, follow these steps -
2: Select "Database Tools" from the dropdown menu.3: Choose "Analyze" from the dropdown menu.5: Click on "OK" to run the documenter and generate the desired reports and documentation.How is this so?This is the suggested sequence of steps to use the database documenter based on the given options.
By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.
Learn more about database documenter at:
https://brainly.com/question/31450253
#SPJ1
What is social displacement? Question 22 options: the gained efficiency in being able to communicate through technology , the act of moving files from your computer to an external site , the risk of being "unfriended" by someone on social media , the reduced amount of time we spend communicating face to face
Answer: The Answer should be D
Explanation: It's the definition.
What is garbage in garbage out?
Answer: it means if you give a bad input it will result in a ad output.
Explanation:
It has n acronym GIGO which refers to how the quality of an output is determined by the quality of input.
Garbage is trash info... or input. And grabage out is the trash output.