Complete the member functions void Matrix::add(const Matrix &), void Matrix::mul(double), void Matrix::mul(const Matrix &), void Matrix::tr(void), and void Matrix::eye(int) (highlighted in purple) of the Matrix class in the header file file matrix.h. #ifndef MATRIX_H_ #define MATRIX_H_ #include #include #include using namespace std; #define ROW_MAX 10 #define COL_MAX 10 // In the following, the matrix object is referred to as A, // upper case letters denote matrices, // and lover case letters denote scalars. class Matrix { public: Matrix(int m_, int n_, double v_): m(m_), n(n_) { fill(v_); }; // constructor for an m_ xn_ matrix A initialized to v_ // constructor for an m_ x n_ matrix A Matrix(int m_, int n_) : Matrix(m_, n_, 0.0) {} initialized to 0.0 // constructor for an m_ x m_ matrix A Matrix(int m_): Matrix(m_, m_) {} initialized to 0.0 Matrix(): Matrix(0) {} // constructor for a 0 x 0 matrix A (empty matrix) Matrix(const Matrix &A_) { set(A_); } // copy constructor void from_str(const string &str_); // reads in m, n, and the matrix elements from the string str_ in the format of "m n A[0][0] A[0][1]...A[m-1][n-1]" string to_str(void); // returns the string representation of A in the format of "m n A[0][0] A[0][1]...A[m-1][n-1]" int getRows(void) const; // returns the number of rows int getCols(void) const; // returns the number of columns double get(int i, int j_) const; // returns A[i][j_] void set(int i, int j_, double v_); // sets A[i][j_] to v_ (A[i][j] =v_) void set(const Matrix &A_); // sets A to A_ (A = A_) void add(const Matrix &A_); // adds A_ to A (A := A + A_) void mul(double v_); // multiplies A by the scalar v_ (A := v_ A) void mul(const Matrix &A_); // multiplies A by A_ (A := AA_) void tr(void); // sets A to its transpose (A := A^T) void eye(int m_); // sets A to the m_ x m_ identity matrix (A := 1) private: int m; int n; void setRows(int m_); // sets the number of rows to m_ void setCols(int n_); // sets the number of columns to n_ double data[ROW_MAX][COL_MAX]; // holds the matrix data as 2D array void fill(double v_); // fills the matrix with v_ }; void Matrix::fill(double v. v_) { for (int i = 0; i < getRows(); i++) { for (int j = 0; j < getCols(); j++) { set(i, j, v_); } void Matrix::from_str(const string &str_) { istringstream stream(str_); int m = 0, n = 0; stream >> m_; stream >> n_; setRows(m_); setCols(n_); int i = 0, j = 0; double v_; while (stream >> v_) { set(i, j, v_); j+= 1; if (j == getCols()) { i=i+1; j = 0; if (i == getRows()) // the number of rows // the number of cols break; } string Matrix::to_str(void) { ostringstream_stream(""); _stream << getRows() << " " << getCols(); for (int i = 0; i < getRows(); i++) { for (int j = 0; j < getCols(); j++) _stream << " " << fixed << defaultfloat << get(i, j); return _stream.str(); } int Matrix::getRows(void) const { return m; } int Matrix::getCols(void) const { return n; } void Matrix::setRows(int m_) { m = m_; } void Matrix::setCols(int n_) { n=n_; } double Matrix::get(int i, int j_) const { return data[i][j_]; } void Matrix::set(int i, int j_, double v_) { data[i][j] = v_; } void Matrix::set(const Matrix &A_) { setRows(A_.getRows()); setCols(A_.getCols()); for (int i = 0; i < getRows(); i++) { for (int j = 0; j < getCols(); j++) set(i, j, A_.get(i, j)); } void Matrix::add (const Matrix &A I // your statements here UI void Matrix::mul(double v // your statements here 1 void Matrix::mul(const Matrix &A. // your statements here void Matrix::tr(void) // your statements here void Matrix::eye(int m // your statements here #endif

Answers

Answer 1

The provided code defines a Matrix class in the header file "matrix.h" with various member functions and operations. The missing member functions that need to be implemented are `add(const Matrix &)`, `mul(double)`, `mul(const Matrix &)`, `tr(void)`, and `eye(int)`.

To complete the Matrix class implementation, the missing member functions need to be implemented as follows:

1. `void Matrix::add(const Matrix &A_)`: This function should add the matrix A_ to the current matrix A element-wise. It requires iterating through the elements of both matrices and performing the addition operation.

2. `void Matrix::mul(double v_)`: This function should multiply every element of the matrix A by the scalar value v_. It involves iterating through the elements of the matrix and updating their values accordingly.

3. `void Matrix::mul(const Matrix &A_)`: This function should perform matrix multiplication between the current matrix A and the matrix A_. The dimensions of the matrices need to be checked to ensure compatibility, and the resulting matrix should be computed according to the matrix multiplication rules.

4. `void Matrix::tr(void)`: This function should calculate the transpose of the current matrix A. It involves swapping elements across the main diagonal (i.e., elements A[i][j] and A[j][i]).

5. `void Matrix::eye(int m_)`: This function should set the current matrix A to an identity matrix of size m_ x m_. It requires iterating through the matrix elements and setting the diagonal elements to 1 while setting all other elements to 0.

By implementing these missing member functions, the Matrix class will have the necessary functionality to perform addition, multiplication (by a scalar and another matrix), transpose, and create identity matrices.

know more about Matrix class :brainly.com/question/31424301

#SPJ11


Related Questions

how do you indicate 1 item in cow 's foot notation​

Answers

In Cow's Foot notation (also known as Entity-Relationship notation), an entity is represented as a rectangle and an occurrence of that entity is represented as an instance of the rectangle. To indicate 1 item in Cow's Foot notation, you would draw a single instance of the entity rectangle

you run an it blog website that has millions of visitors throughout the month. you wish to improve the performance of the website which has been distributed across several regions with multiple ec2 instances running behind elastic load balancers. you wish to configure your route53 routing policies such that users's requests from europe are redirected to the european ec2 instances and users's requests from the us are redirected to the us ec2 instances. what type of routing policy is the best choice to help you achieve this objective? [sample aws exam question]

Answers

The Geolocation routing policy provides an effective solution for improving the performance of your website by directing users to the closest and most appropriate server, resulting in faster response times and a better user experience.

To achieve the objective of redirecting users' requests from Europe to the European EC2 instances and users' requests from the US to the US EC2 instances, the best routing policy to use is the Geolocation routing policy. This policy routes traffic based on the geographic location of the user, which is determined by their IP address.

By using the Geolocation routing policy, you can create multiple record sets for your domain name in Route53, each corresponding to a different geographic location. For example, you can create a record set for Europe and another one for the US.

Then, you can associate each record set with the corresponding EC2 instances using the Elastic Load Balancer. This ensures that users' requests from Europe are directed to the European EC2 instances and users' requests from the US are directed to the US EC2 instances.

Overall, the Geolocation routing policy provides an effective solution for improving the performance of your website by directing users to the closest and most appropriate server, resulting in faster response times and a better user experience.

To Learn More About Geolocation

https://brainly.com/question/31191144

SPJ11

List the different types of views in which Reports can be displayed.

Answers

Answer:

Depending upon the type of report you are viewing, the following view types are available. Report view is the default view for most reports. It consists of a time period, an optional comparison period, a chart, and a data table. Trend view displays data for individual metrics over time.

Explanation:

Read everything and give me your answer, do not forget to give me 5 stars, thank you

a developer needs to confirm that a contact trigger works correctly without changing the organization's data. what should the developer do to test the contact trigger?

Answers

To test a contact trigger without modifying the organization's data, a developer can create test data in a separate sandbox environment that is a replica of the production environment. The sandbox environment allows developers to test triggers, as well as any other changes, without affecting the live data.

After creating the test data in the sandbox environment, the developer can execute the trigger on that data to ensure that it functions as expected. The developer can then review the results of the trigger execution to verify that it behaves as intended.

Additionally, the developer can use debugging tools provided by the platform, such as debug logs and the Developer Console, to inspect the trigger's behavior and identify any issues or bugs. These tools allow the developer to step through the code and view the values of variables and objects at each step, providing insight into the trigger's execution and behavior.

To know more about contact trigger click this link -

brainly.com/question/8215842

#SPJ11

Clicking the ____ button in the Themes group displays the Themes gallery window. a. Gallery b. More c. Expand d. Maximize.

Answers

Clicking the "Gallery" button in the Themes group displays the Themes gallery window.

In the context of a software application or program that includes a Themes feature, clicking the "Gallery" button in the Themes group will open the Themes gallery window. This option is denoted by the letter "a" in the given options.

The Themes gallery window typically provides a collection of pre-designed themes or templates that users can apply to their documents, presentations, or other types of files. These themes often consist of coordinated sets of colors, fonts, and graphical elements that can be applied to give a consistent and visually appealing look to the document or presentation.

By clicking the "Gallery" button, users can access and explore the available themes within the application. They can preview different themes, select the one that best suits their needs, and apply it to their content with a single click. The Themes gallery provides a convenient and efficient way to enhance the visual appearance of documents or presentations, making them more engaging and professional-looking.

Learn more about program here: https://brainly.com/question/30613605

#SPJ11

if your hard disk is 10gb or less then you may want to use ntfs because it is more efficient in handling smaller volumes of data. group of answer choices true false

Answers

True. NTFS (New Technology File System) is generally more efficient in handling smaller volumes of data compared to other file systems like FAT32. This is because NTFS uses a more advanced file allocation table (FAT) structure that allows for better management of file data, resulting in less wasted space on the hard disk.

Additionally, NTFS has other features that make it suitable for handling larger files and more complex directory structures. For instance, it supports file compression, encryption, and permissions, which can help protect sensitive data. It also has better error-checking and recovery capabilities, which can help prevent data loss in case of a system crash or hardware failure.

However, it's worth noting that NTFS has some limitations as well. For example, it may not be compatible with older operating systems, such as Windows 95 or 98. Also, NTFS may require more system resources than other file systems, so it may not be the best choice for very low-end computers or devices with limited storage capacity. Overall, the decision to use NTFS or another file system will depend on your specific needs and hardware requirements.

Learn more about New Technology File System here-

https://brainly.com/question/30735036

#SPJ11

Complete the following code, which is intended to print out all key/value pairs in a map named myMap that contains Stringdata for student IDs and names:Map myMap = new HashMap();. . ._______________________________for (String aKey : mapKeySet){String name = myMap.get(aKey);System.out.println("ID: " + aKey + "->" + name);Maha Otaibi 112}a) Map mapKeySet = myMap.keySet();b) Set mapKeySet = myMap.keySet();c) Set mapKeySet = myMap.getKeySet();d) Set mapKeySet = myMap.keySet();

Answers

The code, which is intended to print out all key/value pairs in a map named myMap that contains Stringdata for student IDs and names.The correct answer is d) Set mapKeySet = myMap.keySet();.

This code will retrieve the set of all keys in the HashMap myMap using the keySet() method and store it in a Set called mapKeySet. The for loop will then iterate through each key in mapKeySet and retrieve the corresponding value (name) using the get() method. Finally, the key and value are printed out in the desired format using System.out.println(). This code assumes that the key is a String representing the student ID and the value is also a String representing the student name.

learn more about key/value pairs here:

https://brainly.com/question/29672652

#SPJ11

During a network infrastructure upgrade, you replaced two 10 mbps hubs with switches and upgraded from a category 3 utp cable to a category 5e. During the process, you accidentally cut the cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact on your network?.

Answers

During a network infrastructure upgrade, you replaced two 10 mbps hubs with switches and upgraded from a category 3 utp cable to a category 5e. During the process, you accidentally cut the cat 5e patch cable that stretches from the network printer to the upgraded switch. The impact on all network nodes EXCEPT the printer will be available.

For those setting up home computer networks, Ethernet patch cable can connect a computer to a network hub, router, or Ethernet switch.

Thus, Ethernet cable can be thought of as a type of cable in the simplest sense. Patch cable, on the other hand, is a type of Ethernet cable that incorporates connectors at both ends.

Patch cables often consist of coaxial cable, although they can also be comprised of fibre optics, CAT5/5e/6/6A, shielded or unshielded wires, or single-conductor wires. Patch cables are never permanent solutions because they always have connectors on both ends, unlike pigtails or blunt patch cords.

Learn more about patch cables:

https://brainly.com/question/28494737

#SPJ4

Which is government departments fund the Global Positioning System
The Global Positioning System is funded by the department of

Answers

Answer:

The department of defense

Explanation:

Does any body like animal jam

Answers

Answer:

Yep!

Explanation:

Viết phương trình diện tích phần gạch sọc biết độ dài hai cạch hình chữ nhật là a và b được nhập từ bàn phím

Answers

Answer:

A x B = khu vực

Explanation:

please help with this question​

please help with this question

Answers

Answer:

whats the problem/question?

Explanation:

Match the language with its generation.
"third generation"
"second generation"
"first generation"
"fourth generation"

machine language
assembly language
BASIC
Visual Basic .NET

Answers

"first generation" - machine language

"second generation" - assembly language

"third generation" -  high-level languages, like BASIC

"fourth generation" - high-level languages, like Visual Basic .NET

Answer:

1st gen - Machine language

2nd gen- Assembly language

3rd gen- Basic

4th gen- Visual Basic .Net

Explanation:

Which type of computer/server data can be collected with the Inventory Wizard using the Microsoft Assessment and Planning Toolkit

Answers

The Microsoft Assessment and Planning Toolkit (MAP) Inventory Wizard is an agentless inventory tool that can collect a wide range of hardware and software data for computers and servers

The Inventory Wizard uses Windows Management Instrumentation (WMI) and the Common Information Model (CIM) to collect the inventory data from remote computers and servers. The Inventory Wizard can also collect inventory data from virtual machines (VMs), Microsoft Hyper-V, and VMware ESX servers.MAP uses the Inventory Wizard to collect the following types of computer/server data:Hardware inventory data, including information about the processor, memory, disks, and network adapters, as well as system manufacturer and model.

Software inventory data, including information about the operating system, installed applications, and hotfixes and updates. Usage data, including information about system utilization, services, and startup programs. MAP can also collect data about SQL Server, SharePoint Server, and System Center Configuration Manager (SCCM)

To know more about Microsoft  visit:-

https://brainly.com/question/2704239

#SPJ11

The CPU is considered to be the............of a computer system​

Answers

Answer:

The Central Processing Unit (CPU) is the brain or main source of the computer system.

(a) Translate the following argument into symbolic form, using the specified statement variables.

∗ Let p be "It is hot" ∗

Let q be "It is cloudy" ∗

Let r be "It is raining" ∗

Let s be "It is sunny".

Argument: It is hot and not sunny. Being cloudy is necessary for it to be raining. It is either raining or sunny, but not both. Therefore, it is cloudy. (2 marks)

(b) Determine whether the argument in part (a) is valid or invalid. Justify your answer.

Answers

The following argument can be translated into symbolic form as:(p ∧ ¬s) ∧ (q → r) ∧ ((r ∨ s) ∧ ¬(r ∧ s)) → qwhere, p = "It is hot"q = "It is cloudy"r = "It is raining"s = "It is sunny"(b) Now, we need to check whether the given argument is valid or invalid.

For this, we can use a truth table to determine the truth value of the conclusion (q) for all possible truth values of the premises. The truth table is shown below:pqrs(p ∧ ¬s)(q → r)(r ∨ s) ∧ ¬(r ∧ s)(p ∧ ¬s) ∧ (q → r) ∧ ((r ∨ s) ∧ ¬(r ∧ s))qT T T F F F T T F T T F F T F F T T F T F F F F T T T F F T T T F T F T F F T T F F T F F F F F F TTherefore, the argument is valid because the conclusion (q) is true for all possible truth values of the premises.

To convert the argument into symbolic form, we use the following statement variables:Let p be "It is hot".Let q be "It is cloudy".Let r be "It is raining".Let s be "It is sunny".The argument is as follows:It is hot and not sunny: p and ~s.Being cloudy is necessary for it to be raining: q → r.It is either raining or sunny, but not both: r ⊕ s.Therefore, it is cloudy: q.The argument in symbolic form is:p ∧ ¬s → (q → r) ∧ (r ⊕ s) ∧ q(b) In terms of the premises, the argument is valid. That is, the conclusion follows logically from the premises. For instance, we have:p ∧ ¬s (premise)⟹ ¬s ∧ p (commutative law)⟹ (q → r) ∧ (r ⊕ s) ∧ q (premise)⟹ q (disjunctive syllogism)In terms of the truth values of the variables, the argument is invalid. For example, suppose that p is true, q is true, r is true, and s is false. Then the premises are all true, but the conclusion is false.

To know more about argument visit:

https://brainly.com/question/32324099

#SPJ11

Even though data travels at the speed of light, networks can be slow. What affects the download speed of the network? Check all of the boxes that apply.

Even though data travels at the speed of light, networks can be slow. What affects the download speed

Answers

Answer:

bandwidth and internet connection

Explanation:

Answer: bandwidth and internet connection

Explanation:

On a Windows computer, which tab can be used in Task Manager to set the priority given to a specific application or service?

Answers

Answer:

details tab

Explanation:

which of the following is an advantage of a network star topology. a. supports bi-directional information flow b. easy to insert another station c. uses less cable than ring topology d. none of the above

Answers

The correct answer is "b. easy to insert another station." A network star topology offers the advantage of being easily expandable and accommodating new devices or stations.

In a star topology, each device is connected directly to a central hub or switch. This architecture allows for the addition of new stations without disrupting the existing network connections. When a new device needs to be added, it can simply be connected to an available port on the central hub or switch, making the expansion process straightforward. In contrast, other topologies like bus or ring may require more complex reconfiguration or disruption of existing connections when adding new stations.

To learn more about  expandable   click on the link below:

brainly.com/question/32113827

#SPJ11

in a catch statement, what does the following code do? .println(e.getmessage());

Answers

In a catch statement, the code .println(e.getMessage()); will print the message associated with the exception e to the console.

How does this code work?

The code .println(e.getMessage()); will print the message associated with the exception e to the console. The getMessage() method of the Throwable class returns the message associated with the exception. The println() method of the PrintStream class prints the specified text to the console.

The getMessage() method is a useful way to debug your code. When your code throws an exception, you can use the getMessage() method to get a more detailed description of the exception. This can help you to identify the cause of the exception and fix the problem.

Find out more on catch statement here: https://brainly.com/question/31678792

#SPJ4

Which task is considered part of network performance management?
connecting network servers to a gateway
protecting the network from unwanted intruders
installing and configuring the network operating system
monitoring the speed of the network’s Internet connection

Answers

The task that is considered part of network performance management is to monitor the speed of the network’s Internet connection. Thus, the correct option for this question is D.

What are the tasks of network performance management?

The tasks of network performance management are as follows:

It controls the management of local networks.It involves the methodology of gathering, estimating, and diagnosing all the metrics of each component of a network.It regulates the management of internet connection.

Apart from this, the strategy of installing, configuring, and maintaining the operating systems and IT infrastructure services are also included under the responsibilities of this professional of network performance management (NPM).

Therefore, the task that is considered part of network performance management is to monitor the speed of the network’s Internet connection. Thus, the correct option for this question is D.

To learn more about Network Performance Management, refer to the link:

https://brainly.com/question/27961985

#SPJ1

Joe prepares for IGCSE exam. He wants to know whether he is ready or not to sit for exam. So, he will take a trial exam and he decided to take real exam if he gets grade A. If his grade is not A, he must study more and take trail exam again. Write a pseudo-code and flowchart for Joe's condition. ​

Answers

Python pseudocode makes a difference to effortlessly decipher the genuine code to non-technical people included.

What is the  pseudo-code?

They are the key focal points of utilizing Python pseudocode in programming. So, the major portrayal to keep in sense on basic terms is that Python pseudocode may be a syntax-free representation of code.

In computer science, pseudocode may be a plain dialect depiction of the steps in an calculation or another framework. Pseudocode frequently uses structural traditions of a typical programming dialect, but is aiming for human perusing instead of machine writing.

Learn more about  pseudo-code from

https://brainly.com/question/24953880

#SPJ1

 Joe prepares for IGCSE exam. He wants to know whether he is ready or not to sit for exam. So, he will

please help me! No one ever does! will give 30 points and brainliest!

Write a summary about Digital Citizenship

Answers

Answer:

The term digital citizenship, also known as e-citizenship or cyber-citizenship, refers to the use of Information and Communication Technologies (ICT), and the principles that guide them, for the understanding of the political, cultural and social issues of a nation.

More Content by Concept

In other words, it is about citizen participation through digital or electronic environments and interfaces, through the Internet and Social Networks.

Digital citizenship is part of the electronic government system or digital democracy, which precisely consists of the administration of State resources through new ICTs and all their potential, to make life easier for citizens.

In this way, a digital citizen has the right to access information online in a safe, transparent and private way, in addition to the social and political participation that 2.0 media allows.

Explanation:

1) To point the lens of a camera up or down is called:
A) Arc
B)Dolly
C)Pan
D)tilt

Answers

Answer:

D)

Explanation:

Tilting is a cinematographic technique in which the camera stays in a fixed position but rotates up/down in a vertical plane.[1] Tilting the camera results in a motion similar to someone raising or lowering their head to look up or down. It is distinguished from panning in which the camera is horizontally pivoted left or right. Pan and tilt can be used simultaneously.[2] In some situations the lens itself may be tilted with respect to the fixed camera body in order to generate greater depth of focus. [3][4]

The camera's tilt will change the position of the horizon, changing the amount of sky or ground that is seen.[5] Tilt downward is usually required for a high-angle shot and bird's-eye view while a tilt upward is for a low-angle shot and worm's-eye view. The vertical offset between subjects can reflect differences in power, with superior being above.

ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use

Answers

Server and network is 2 different things, just put the server on a different network.  ;) duh

Explanation:

Where would you go to access frequently used icons?

File explorer
File manager
Toolbar
Web browser

Answers

Answer:

b

Explanation:

Answer:

C.) Toolbar

Explanation:

The toolbar is a strip of icons that are frequently used.

import java.util.Scanner;

public class PigLatin {
public static void main(String args[]) {
Scanner console =new Scanner(System.in);
System.out.println("Please enter a word");
String phrase=console.nextLine();

System.out.println(eachWord(phrase));
}

public static String eachWord(String phrase) {
String help[]=phrase.split(" ");

for(int i=0; i
if (help[i].charAt(0) == 'a'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'e'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'i'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'o'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'u'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'A'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'E'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'I'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'O'){
return help[i] + "-ay";
}
if (help[i].charAt(0) == 'U'){
return help[i] + "-ay";
}
else {
return help[i].substring(1)+"-"+help[i].charAt(0)+"ay";
}

}
return "aoujbfgaiubsgasdfasd";
}

I need help with this Pig Latin Program. I want to split the string so each word can run through the method eachWord. I don't know how to revamp this!

Answers

Answer:b

Explanation:

I took quiz

Answer:

uuuuuuuuuuhhm

Explanation:

CODE!

In which type of I/O addressing does a read or write operation trigger a dedicated I/O bus to select the appropriate device

Answers

The type of I/O addressing you're referring to is Direct Memory Access (DMA). It triggers a dedicated I/O bus.

The type of I/O addressing you're referring to is called "Direct Memory Access" (DMA). DMA is a method used in computer systems to transfer data between peripheral devices and memory without involving the CPU. It allows the CPU to offload the task of transferring data, thus improving system performance.

In DMA, a dedicated I/O bus, known as the DMA controller or DMA channel, is responsible for managing data transfers between the peripheral devices and memory. When a read or write operation is initiated, the CPU sets up the DMA controller by providing it with the necessary information, such as the source and destination addresses in memory, the number of bytes to transfer, and the direction of the transfer.

Once the DMA controller is configured, it takes control of the system bus and transfers data directly between the peripheral device and memory, bypassing the CPU. It triggers the I/O bus to select the appropriate device and performs the data transfer autonomously.

DMA is particularly useful for high-speed data transfers or when continuous data streams need to be processed. By reducing the involvement of the CPU in data transfer operations, DMA helps improve overall system efficiency and allows the CPU to focus on other tasks.

Learn more about I/O addressing

brainly.com/question/33456667

#SPJ11

plz answer the following ​

plz answer the following

Answers

Answer:

it trojan

Explanation:

what is the question asking

what is full form of RAM??? ​

Answers

Answer:

Random Access Memory, it's used to store working data and machine codes

Explanation:

Hope it helped !
Adriel

Other Questions
sean had difficulty getting to know women face-to-face because he felt awkward and embarrassed. in order to find a meaningful relationship what would be the best step for him to take? You may need to use the appropriate appendix table or technology to answer this question. The 92 million Americans of age 50 and over control 50 percent of all discretionary income. AARP estimates that the average annual expenditure on restaurants and carryout food was $1,873 for individuals in this age group. Suppose this estimate is based on a sample of 70 persons and that the sample standard deviation is $850. (a) At 95% confidence, what is the margin of error in dollars? (Round your answer to the nearest dollar.) $199 x can someone please help me with this Project Assignment: Visit any hospital, health post, health center or medical clinic of your near by and describe its facilities and services on reproductive health and contraception. An internal auditing supervisor reviewed the system of controls and the organizational objective of the purchasing department. What facet of engagement planning was the supervisor developing What is the aesthetic impact of the story everyday use ? Explain in two or more sentences. PLEASEEEE HELPPP GUYS!! You make a(n) _____ by fastening together usually perpendicular parts with the ends cut at an angle. you are running the ir to see of the final product contains magnesium. you are running the ir to see of the final product contains magnesium. true or false TRUE / FALSE. jesus' response to the accusations of the religious leaders was to speak and to his mission to the very end. in the long run, m oney demand largely depends ona. the price level but not the interest rate.b. neither the price level nor the interest rate.c. the interest rate but not the price level. The confirmation of customers' accounts receivable rarely provides reliable evidence about the completeness assertion because:_______. a. recipients usually respond only if they disagree with the information on the request. b. auditors typically select many accounts with low recorded balances to be confirmed. c. many customers merely sign and return the confirmation without verifying its details. d. customers may not be inclined to report understatement errors in their accounts. In his research of a toxic waste spill, Tobias is conducting a systematic investigation. What can be said about his investigation?1. its being done according to a system he read about in a book2. its sloppy and full of irrelevant information 3. its being done in a fixed methodical way4. its inefficient The point where movement occurred at depth which triggered the earthquake is the ___. An auto mechanic charges (C) an inibal fee of $50 and then $40 per hour. Which of the following linear functions represents this model if (h) represents hours?C=40h +50C=50h + 40C = 90hNone of these choices are correct. PLEASE HELP I WILL GIVE LOTS OF POINTS !A student illustrated a model of particles being transported out of the cell. ( image above) what best describes the transport process occurring in the model?a. energy is used to move sodium ions from low concentration to high concentrationb. sodium ions are moving from low to high concentration without using energyc. sodium ions are moving from high to low concentration without using energy d energy is used to move sodium ions from high to low concentration (scenario) I have to make a model of the great pyramid at giza, painted to look as close to identical as possible. Which term best describes the part you must cover?choices: A. volumeB. areaC. surface areaD. lateral area Use the normal approximation to find the indicated probability. the sample size is n, the population proportion of successes is p, and x is the number of successes in the sample.n = 81, p = 0.5: p(x 46)group of answer choices0.12100.13350.87900.1446 The December 31, 2019, balance sheet of Tybee Corporation is provided below (in millions).Assets Liabilities and Shareholders EquityCash $ 36 Accounts payable $ 4Accounts receivable 15 Interest payable 3Supplies 6 Unearned revenue 16Equipment 60 Note payable 20Less: Acc. Dep.(12) 48 Contributed capital 50Retained earnings 12Total $105 Total $105Transactions during 2020: Paid $5 for employee wages. Collected $10 cash from customers for work previously performed and billed. Purchased $2 of supplies for cash. Paid $3 to a vendor for supplies previously purchased on credit in December 2019. Paid the interest owed as of December 31, 2019. Completed $18 in services for customers, receiving 50 percent payment in cash andbilling the remainder. Paid a cash dividend of $3.Prepare journal entries.As of 12/31/2020: Had performed 25 percent of the services for which it had been paid in advance. Owes $3 for interest that will be paid next month. Depreciated equipment in the amount of $4. Physical count of supplies reveals $3 on hand.Prepare adjusting entries. Then provided an income statement, statement of retained earnings, and balance sheet pls! :) Deriving Current Interest Rates. Assume that interest rates for one-year securities are expected to be 0.02 today, 0.09 one year from now and 0.03 two years from now. Using only the pure expectations theory, what are the current interest rates on two- year securities. Enter the answer as a decimal using 4 decimals (e.g. 0.1234). A trader uses 3-month Eurodollar futures to lock in a rate on $5million for six months. How many contracts are required?