Why does the power needed for a traditional COBOL application not have a linear relationship with the power needed for a new Java application?

Answers

Answer 1

There is no reference to which benchmark is used as the basis for a statement made in the question.

In addition, you do not identify which version of COBOL is being compared to which version of Java.  Data memory management is different between Java and COBOL.

The 70s mainframe version of COBOL had static memory allocation and no runtime stack. (The new versions of COBOL have "Automatic Variables" allocated in a stack.) Java has garbage collection and a stack for recursion refills. Both features have a CPU cycle cost in support.

Object-COBOL must have dynamic memory, just as Java must have objects and their class information data structure.  The data types are very different from COBOL and Java. COBOL supports arithmetic in numeric character fields. Any conversion of characters to binary and vice versa depends on the implementation and is hidden from the programmer. Programmers can specify that a field must be local in binary. The IBM version of COBOL supports the “compressed decimal” data format that is implemented in hardware on 360, 370 and z machines. Compilers compatible with an IBM need to handle this type of data without software.


Related Questions

Use the drop-down menus to complete the statements about using section breaks in a document.
The four section break options can be found in the Breaks menu under the tab.
To insert a section break and start the new section on a new page, you would choose
To insert a section break and start the new section on the same page, you could choose

Answers

Answer:

1. Layout

2. Next Page

3. Continuous

Explanation:

Edge 2020

Answer:

Layout

Next Page

Continuous

Explanation:

Which of the following ports offers a fast connection that could be used to download and watch your favorite TV shows?

Ethernet

modem

FireWire

USB

Answers

Answer

The Answer Would Be FireWire and the next one would be USB

Explanation:

FireWire offers a fast connection that could be used to download and watch your favorite TV shows.

What is FireWire and how it is related to connection?

FireWire is a computer interface employed for high-speed communication (i.e., connection) and transference of data.

Apple described this interface using the name of FireWire.

This interface (FireWire) can be used to connect different classes of electronic tools (e.g., printer, scanner, video, etc)

In conclusion, FireWire offers a fast connection that could be used to download and watch your favorite TV shows.

Learn more about FireWire here:

https://brainly.com/question/1590202

I have a .NET 6 basic website that I built using Entity Framework as the database for updating pages. I am ready to deploy the site/database to a live server somewhere, but I am looking for the best option.

The website is built using the latest .NET Framework 6.0, with Entity Framework 6.0.3. I know about HostGator, GoDaddy and InterServer.

I have read stuff online that said HostGator doesn't actually support the latest .NET 6.0, and GoDaddy only supports .NET Core 3.2?

HostGator is rougly $5.00 a month, GoDaddy is $6.00, and InterServer is $8.00.

I am leaning towards InterServer, because I have read that InterServer supports the latest .NET 6.0 and Entity Framework.

I am used to deploying to servers using LAMP stack, Linux, Apache, PHP, MySQL... The prices there are lower and it is fairly simple to setup. I figure there has to be something similar for windows and .NET.

For something similar, am I looking for Shared Hosting? Or VPS? I really don't understand what I need. I was hoping for Shared Hosting, export my SQL Server database, create it on the live server, then FTP my files over.

InterServer seems like it supports everything, so I am leaning towards that. I know no matter what, Windows Hosting is going to be a little bit more expensive. I just want something that I know is going to work with the latest .NET technologies.

Does anyone have any suggestions?

Answers

In the above scenario, i will recommend Bluehost  or InterServer since it is good and can meet your requirement.

What is Bluehost?

Bluehost is known to be a software that is said to be a little bit better than HostGator in the aspect of  security as it gives offer free SSL certificates, malware tools, and others.

Therefore, In the above scenario, I will recommend Bluehost  or InterServer since it is good and can meet your requirement.

Learn more about Bluehost from

https://brainly.com/question/17062016

#SPJ1

explain about your business and sales after covid 19 pandemic​

Answers

The global economy has undergone tremendous disruption brought about by the pandemic, with some sectors being grievously hit while others have fresh openings.

What are the effects?

Its aftermath has hastened the conversion to e-business, remote work, and digital remodeling as firms have poured significant capital into technological solutions in order to ameliorate compliance to the current state of affairs. Companies further evaluated their delivery strategies and diversified places from where they sourced materials so as to minimize any single nation's or region’s influence.

Altogether, the pandemic has showcased the indispensable value of pliancy, robustness, and novelty for business operations, and those entities that were able to adeptly conform to the existing condition are predicted to thrive in the post-COVID period.

Read more about business here:

https://brainly.com/question/24553900
#SPJ1

Before the assembly line only the wealthy could afford automobiles.
True
False

Answers

True poor people or middle class or lower class people could not have a thing because they simply did not have in of money

aya what's the full form of JPEG ?​

Answers

Hi!jpeg stands for "Joint Photographic Experts Group."

Answer:

"Joint Photographic Experts Group",

Explanation:

JPG is a digital image format which contains compressed image data. With a 10:1 compression ratio JPG images are very compact. JPG format contains important image details. This format is the most popular image format for sharing photos and other images on the internet and between Mobile and PC users.

I need help with this!!! PLEASE!!! Are headphones, radios, dishwashers, and remote controls considered Computers? Do any of them store data or process any data?
^_^

Answers

Answer:

yes they are some sort of computers

Answer:

yes they are

Example:Tv is a type of computer because they work like a computer but does different things

What is the word to tell excel that you want it to do math

Answers

Are you referring to functions? In a cell you can type "=" and it will allow you to enter a formula to insert math equations involving other cell values.

To use   ( 2 complement ) answer it (101101)2 – (1100)2 =   (                    )2

  

100001+

 

  

1100001-

 

  

100001-

 

  

1100001+

 To use   ( 2 complement ) answer it (101101)2 – (1100)2 =   (                    )2

  

100001+

 

  

1100001-

 

  

100001-

 

  

1100001+

 



Answers

Answer:

2(101101) - 2(1100) = 200002

Explanation:

the text is everywhere don't know what to answer

To what twenty-first century need did social media respond?


As the world became increasingly complicated and people became busier, people had less time to interact.

As the world became more intense and people became overwhelmed, people needed simple ways to communicate.

As the world became more expensive and people had less money, people had fewer ways to spend time together.

As the world became closer and more intimate, people had less of a desire to communicate face-to-face.

Answers

Answer:

As the world became increasingly complicated and people became busier, people had less time to interact.

Explanation:

According to.............Network can be classified into client-server and peer to peer

Answers

According to computing networking, Network can be classified into client-server and peer to peer.

What are client-server and peer-to-peer networks?

The peer-to-peer network links computers so that they can all share all of the resources or a portion of them. One or more central computers or servers that administer the resources and store the data are required for the client server networks to function.

In a client-server network, the server responds to client requests for services. Every node in a peer-to-peer network has the ability to request and provide services. 5. Compared to peer-to-peer networks, client-server networks are more expensive.

Learn more about Network from

https://brainly.com/question/1326000

#SPJ1

why computer is now considered a commodity.

Answers

Answer:

Computers are considered commodities because they are relatively easy to produce and there is a lot of competition in the market. This means that prices are relatively low and there is not a lot of differentiation between products.

Explanation:

Hope this helps!

An __________ hard drive is a hard disk drive just like the one inside your, where you can store any kind of file.

Answers

An external hard drive is a hard disk drive just like the one inside your computer, where you can store any kind of file.

These drives come in various sizes, ranging from small portable drives that can fit in your pocket to larger desktop-sized drives with higher storage capacities. They often offer greater storage capacity than what is available internally in laptops or desktop computers, making them useful for backups, archiving data, or expanding storage capacity.

Overall, external hard drives are a convenient and flexible solution for expanding storage capacity and ensuring the safety and accessibility of your files.

Write a method that computes the average of the values in an array of doubles. The header of the method is as follows:

public static double average(double[] x)

Answers

Answer:

Written in Java

public static double average(double[] x){

   double sum = 0.0;

   for(int i=0;i<x.length;i++){

       sum+=x[i];

   }

   return sum/x.length;

}

Explanation:

This defines the method

public static double average(double[] x){

This initializes sum to 0.0

   double sum = 0.0;

This iterates through the array

   for(int i=0;i<x.length;i++){

This adds up items of the array

       sum+=x[i];

   }

This returns the average

   return sum/x.length;

}

Attached to this program is the full program that include the main method of the program

The OSI is reference/conceptual model and accordingly multiple practical models (such as TCP/IP, AppleTALK, etc) exits. Which fundamental functionalities necessarily needs to considered while implementing any network model?

Answers

Answer:

The fundamental functionalities necessarily needs to considered while implementing any network model are (1) Scalability, (2)The quality of service (3) Fault tolerance (4) Security.

Explanation:

Solution:

Network must help a wide area of applications and administrations, just just as work over various sorts of links and devices that make up the physical infrastructure. The term network refers to the innovations that help the infrastructure and the customized administrations and rules, or protocols, that move messages over the network.

The following are some  fundamental functionalities necessarily needs to considered while implementing any network model which is stated below:

(1) Scalability :

A huge number of users and service providers connect with the Internet every week. All together for the Internet to help this fast measure of development, it must be scalable.

A scalable network can extend rapidly to help new clients and applications without influencing the performance of the administration being conveyed to existing clients.  

(2)Quality of Service :

Networks must provide predictable, quantifiable, and, now and again, ensured administrations.  

Networks also need mechanisms to carry on congested network traffic. Network bandwidth is the estimate of the data-transfer size of the network. As such, what amount of data can be transmitted inside a particular measure of time? Network data transfer capacity is estimated in the quantity of bits that can be transmitted in a solitary second, or bits every second (bps).  

(3) Fault Tolerance :

The Internet is consistently accessible to the a huge number of users who depend on it. This requires a network design that is worked to be fault tolerant.

A fault-tolerant network is one that constrains the impact of a failure, with the goal that the least number of devices are influenced by it. It is likewise worked in a manner that empowers fast recuperation when such a failure happens.

Faults-tolerant networks rely upon various ways between the source and destination of a message. On the off chance that one way comes up short, the messages can be immediately sent over an alternate connection.

(4) Security:  

The Internet has advanced from a firmly controlled inter network of instructive and government associations to a generally open methods for transmission of business and individual interchanges.

Subsequently, the security necessities of the network have changed. The network infrastructure, the system administrations, and the information contained on arrange appended gadgets are vital individual and business resources. Bargaining the respectability of these benefits could have genuine outcomes.

Which company is producing laptops nowadays? *
Cute
Aspire
Dell
Innovative

Answers

Answer:

dell

thanks for points

Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character – to change every third character in the array to its replacement character

(C++ coding)

Answers

Method explanation:

Defining a method "changeCharacter" that takes three parameters that are "character array", and two integer variable "s, k" in its parameters.Inside the method, a for loop is declared that takes array value and defines a conditional statement that checks the 3rd character value in the array, is used to the array that holds its key-value.Please find the full program in the attachment.

Method description:

void changeCharacter(char* ar, int s, int k)//defining a method changeCharacter that takes three parameters

{

  for(int j = 1; ar[j]!='\0'; j++)//defining a for loop for 3rd character value in array  

  {

      if(j%3== 0)//use if block that check 3rd character value in array  

      {

          ar[j-1] = k; //Changing the 3rd character in array

      }

  }

}

Learn more:

Program: brainly.com/question/12975989

Write a function called changeCharacter that takes three parameters a character array, its size, and

What is a Ram and what does it doe to youre computer

Answers

Answer:

it may help you!

Explanation:

Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

Assignment
Write a assembly program that can display the following shapes:

Rectangle
Triangle
Diamond
The program will read an input from the user. The input is terminated with a period. So the program will continue to run until a period is read.

The data the program reads is as follows:

A shape command followed by parameters.

R stands for Rectangle. The parameters are height (rows) and width (columns)

T stands for Triangle. The parameters is base width

D stands for Diamond. The parameters

Your program needs to read the input and based on the input do the following:

Print your name
Then print the name of the shape
Then the shape below it.
Sample input:
R 03 10
T 05
D 11
.
Output:
Loay Alnaji
Rectangle
**********
**********
**********
Triangle
*
***
*****
Diamond
*
***
*****
*******
*********
***********
*********
*******
*****
***
*

Requirements
Your main should only be the driver. It should only read the "shape type", based on that, call the proper function to read the parameters and draw the shape.
Example of your main (just example, pseudocode):

loop:
read shape
if shape is '.' then exit
if shape is 'R'
call Rectangle Function
if shape is 'D'
call Diamond Function
if shape is 'T'
Call Triangle Function
go to loop

Answers

The program above is one that begins with the _begin name, which is the passage point of the program.

What is the program  about?

The program uses framework call int 0x80 to print your title on the screen utilizing the compose framework call. It loads the suitable values into the registers (eax, ebx, ecx, edx) to indicate the framework call number, record descriptor, buffer address (where the title is put away), and length of the title.

It checks in case the shape input may be a period (.), which demonstrates the conclusion of input. In case so, it bounced to the exit name to exit the program.

Learn more about program  from

https://brainly.com/question/23275071

#SPJ1

AssignmentWrite a assembly program that can display the following shapes:RectangleTriangleDiamondThe
AssignmentWrite a assembly program that can display the following shapes:RectangleTriangleDiamondThe
AssignmentWrite a assembly program that can display the following shapes:RectangleTriangleDiamondThe

what are examples of widgets

Answers

some examples of widgets are event countdowns, website visitors counter, clocks, daily weather report, etc.

1. Write a function named problem1 to simulate the purchases in a grocery store. Write statements to read the price of each item until you enter a terminal value to end the loop. Calculate the subtotal and add a sales tax of 8.75% to the subtotal. Return the subtotal, the amount of the sales tax, and the total. Call the function and display the return results. (25 pts)​

Answers

Answer:

ok

Explanation:

How does calculate() work?

Answers

By answering questions math problems lol

Answer:

calculate works by determining the amount of something

Explanation:

which statements did both aristotle and ptomlemy assume? select two options

Answers

Both Aristotle and Ptolemy considered that each planet is bound to a single sphere, but geometers and astronomers might use a number of such spheres to create the observed planet movements.

Who is Ptolemy?

Claudius Ptolemy was a Roman mathematician, astronomer, astrologer, geographer, and music theorist who produced many scientific treatises, three of which were influential in Byzantine, Islamic, and Western European science.

Ptolemy centered his geocentric model on the Earth. Ptolemy assumed the universe was a system of nested spheres around the Earth based on the facts he had. He thought that the Moon was nearest to the Earth, followed by Mercury, Venus, and finally the Sun.

Learn more about Ptolemy:
https://brainly.com/question/15075606
#SPJ1

Yari is having trouble determining the appropriate combination of f-stop and shutter
speed for a still image he is taking. What tool could help him find the correct
exposure for the ISO setting he's using?

Answers

Answer:

Yari could just use the automatic settings on the camera. So basicly he could just turn off manual and let the camera find the best settings.

Explanation:

He can use a light meter

A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.

Answers

Answer:

Intrusion detection system

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

Example of mediated communication and social media

Answers

Answer: mediated communication: instant messages

social media: social platforms

Explanation:

Example of mediated communication and social media

Use the drop-down menus to complete statements about how to use the database documenter

options for 2: Home crate external data database tools

options for 3: reports analyze relationships documentation

options for 5: end finish ok run

Use the drop-down menus to complete statements about how to use the database documenteroptions for 2:

Answers

To use the database documenter, follow these steps -

2: Select "Database Tools" from   the dropdown menu.3: Choose "Analyze"   from the dropdown menu.5: Click on   "OK" to run the documenter and generate the desired reports and documentation.

How is this so?

This is the suggested sequence of steps to use the database documenter based on the given options.

By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.

Learn more about database documenter at:

https://brainly.com/question/31450253

#SPJ1

What is social displacement? Question 22 options: the gained efficiency in being able to communicate through technology , the act of moving files from your computer to an external site , the risk of being "unfriended" by someone on social media , the reduced amount of time we spend communicating face to face

Answers

Answer: The Answer should be D

Explanation: It's the definition.

What is garbage in garbage out?​

Answers

Answer: it means if you give a bad input it will result in a ad output.

Explanation:

It has n acronym GIGO which refers to how the quality of an output is determined by the quality of input.

Garbage is trash info... or input. And grabage out is the trash output.

Other Questions
11. Analyzing threat and hazard information enables the planning team to: Nurses stations are a three step process. First is check in which has a mean of 5 minutes. The second is the waiting room which has a mean of 3 minutes and the final is the patient room with a mean of 7 minutes. Assume that these have an exponential processing time.a. How much worse are the CT and TH of the exponential case from the "best case" at critical WIP on a percentage basis.b. At what value of WIP will average TH from the exponential line be 80% of that for the "best case" line. which statement about taxes is incorrect? both taxes and tradeable allowances in a market that has external costs can lead to the efficient quantity. taxes on producers cause the supply curve for the product to shift to the left. if the good causes an external cost, taxes actually reduce deadweight loss. taxes in markets always cause deadweight losses. What key factors led to the outbreak of plague throughout the world? Hi there, I am trying to learn how to convert a Context-Free Grammar into Chomsky Normal Form but so far I am struggling to do so. I have the following question here:Consider the CFG G induced by the following productions:S-aT | bV | YYT-bS | ATTU-aUV | UbV as | bWV | auYW-XU | WXX - aba | VXY - abs | SY | Give a grammar in Chomsky normal form that generates L(G2) \({). You must use all steps of the transformation described in the lectures in the given sequence That I need to solve, and I would greatly appreciate a walkthrough on how I would go about converting it to CNF. Thanks! A population of insects is sprayed with a new insecticide. Most of theinsects are killed but a few survive. In the next generation, many more of theinsects are unaffected by the insecticide. Which of the following BESTexplains these results? which famous south carolinian served as president of the continental congress from 1777-78 and served on the committee that negotiated the treaty of paris of 1783? Define and describe the agreement and the general conditionsof a written constructioncontract, and the important contractual difference betweenthem. Temperature changes can affect substances in different ways. Which of these actions will form a new substance with different properties? A. melting ice into water B. freezing juice into ice pops C. baking cake batter to make a cake D. heating chocolate chips to form a syrup PLEASE HELP ASAP I suck at math :( will give brainiest. thx advertising occurs when a consumer is ""unjustifiably injured"" or there is a ""violation of public policy."" How do I get Publix digital coupons? HURRY! Which of these originated in England and subsequently spread throughout much of the world?LatinsoccerChristianityjazz musicwine production How many miles will a person run during a 10 kilometer race?A family pool holds 10,000 gallons of water. How many cubic meters is this? When log cabins are being built, cable can be used to ensure the cabin walls are built at 90 angles to each other and to the floor. The diagram shows the dimensions of a one-room cabin and a dotted line representing a cable. Question 46 of 48 -/10 On January 1, 2022, Larkspur, Inc. had $1,050,000 of common stock outstanding that was issued at par and retained earnings of $757,000. The company issued 45,000 shares of commo a nurse is developing a plan of care for a woman who is at risk for thromboembolism. which measure would the nurse include as the most cost-effective method for prevention? early in a relationship passion and intimacy are high but commitment is usually low. I NEED AN ANSWER ASAP!! Why did the US continue to intervene in African countries? Which of the following math sentences matches the description, "negative 10 is less than negative 7"?-7 < -10-10 77>10HELP