Answer:
21 times
Explanation:
Following are the description of output:
To represent the 5 children as a computer bit, we make use of the equation . 3 bits are required to represent the 5 children.
Given that
---- number of children
The number of bits (b) is calculated as:
Substitute 5 for n
Take logarithm of both sides
Apply law of logarithm
Make b the subject
The number of bits must be an integer. So, we use the greatest integer closest to 2.32. The integer is 3
So:
Hence, the number of bits to represent the 5 children is 3.
Read more about bits at:
Answer: See explanation
Explanation:
1. Record the exchange assuming Caleb paid $30,000 cash and the exchange has commercial substance.
Dr Machine (new) $52000
Dr Loss on exchange of asset $2000
Dr Accumulated Depreciation $18400
Cr Equipment (Old) $42400
Cr Cash $30000
Nite that loss was calculated as:
= Market value of new machine - (Book value if old machine - Depreciation) - Cash paid
= $52000 - ($42400 - $18400) - $30000
= $52000 - $24000 - $30000
= -$2000
2. Record the exchange assuming Caleb paid $22,000 cash and the exchange has commercial substance
Dr Machine (new) $46000
Dr Accumulated Depreciation $18400
Cr Equipment (Old) $42400
Cr Cash $22000
Note that the value of the new machine was calculated as:
= Original cost + Cash paid - Accumulated Depreciation
= $42000 + $22000 - $18400
= $46000
Answer:
Must use mutators to initialize class data.
May use assignment statements to initialize class data.
Explanation:
These are the two characteristics that are present in constructors. A constructor is an instance method of a class or structure that creates an object of the class to which it belongs. This is mostly used in object-oriented programming. These constructors usually have the same name as the actual class, and can be used in order to set the values of the members of an object.
Answer:
Internet access
Explanation:
Answer:
The correct word for the blank space is: Access controls.
Explanation:
Access controls regulate who has access to sensitive information in a company. Access controls can be physical -grant access to data centers, restricted rooms or buildings- and virtual -grant access to servers, networks or certain types of files or data.
report which device drivers a computer uses
B.
determine which ports are open on a computer
C.
report the status of individual computer users
D.
determine which operating system is running on a computer
Answer: C)report the status of individual computer users
Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.
Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)