297 Answered Questions for the topic Computer
07/21/25
What’s the difference between a vulnerability, an exploit, and a threat?
These terms come up a lot in cybersecurity, and they seem kind of similar. Can someone explain the actual difference between a vulnerability, an exploit, and a threat?
07/21/25
How does multi-factor authentication actually work behind the scenes?
I know MFA makes accounts more secure, but I don’t really get what’s going on technically. What’s happening in the background when I enter a code or use a device to log in?
07/21/25
How can I tell if a website is safe to visit?
Sometimes I’m not sure if a site is legit or if it might be dangerous. What are the main signs that a website is safe to click on and use?
Computer C
04/02/25
C process problem
ProblemFirstly, downloading two text files from the url:https://drive.google.com/file/d/1fgJqOeWbJC4ghMKHkuxfIP6dh2F911-EThese file contains the 100000 ratings of 943 users for 1682 movies in the...
more
12/22/24
HOW IS THIS SQL NOT WORKING
SELECT Employees.EmployeeID,EmployeePhone.EmployeeIDFROM EmployeesInnerJoin EmployeePhone ON Employees.EmployeeID=EmployeePhone.EmployeeID;Also if someone can answer how to specify what you want to...
more
12/08/24
Struggling to learn coding or build your first website? Let me help you master Python, Java, and more in 2024!
Are you looking to learn programming or build your first website in 2024? Do you find coding languages like Python or Java overwhelming and need a clear, structured guide to succeed? Let me help!...
more
Is there a good way to use ChatGPT and other AI systems for learning?
This question explores the potential of AI in learning and looks at:
How can I create my own chatbot to help me in school?
Is there an ethical way to do this so that the teacher and school knows...
more
Computer
03/08/24
Why should a student learn to type using "touch" typing. Isn't "find and peck" with two index fingers good enough?
Are typing skills necessary today?
01/17/24
Computer Network Throughput
Suppose Alice wants to send a 200 kB file to Bob as a single message. The path from Alice to Bobhas three links of transmission rates: R1 = 2 Mbps, R2 = 500 kbps, and R = 1 Mbps.(a) Assuming no...
more
01/17/24
Computer Network Throughput
Suppose Alice wants to send a 200 kB file to Bob as a single message. The path from Alice to Bobhas three links of transmission rates: R1 = 2 Mbps, R2 = 500 kbps, and R = 1 Mbps.(a) Assuming no...
more
Computer
11/23/23
Brandflex life customer care number,,8670518629
Brandflex life customer care number,,8670518629Brandflex life customer care number,,8670518629Brandflex life customer care number,,8670518629Brandflex life customer care number,,8670518629Brandflex...
more
10/04/23
Create entity relationship diagram for Heritage Consortium? Name entities, attributes, and relations (9 entities with all 1 to many relationships)
The Heritage Consortium, headquartered in Toronto, Canada, helps coordinate cooperation among 50 large government-sponsored museums across North America, South America and Europe....It wouldn't let...
more
08/31/23
True or false computer introduction
a. Applications requiring complex, sophisticated mathematical calculations use mainframesb. Instead of the term, port, the term, connector, sometimes is used to identify audio and video ports
Using a Samsung Tablet
Hello! I was wondering if anyone has experience in utilizing a Samsung tablet, specifically Samsung Notes, in their lessons. Is there a way to show the tutor in real time what I'm writing? Is the...
more
06/11/23
IEEE-754 standard for 32-bit floating point
Using the IEEE-754 standard for 32-bit floating point, what biased exponents and mantissa values as given below represent NaN? (Choose all that apply) 0 and nonzero 0 and 255 0 and 0 255...
more
06/11/23
What is the biased exponent in this example, expressed as decimal?
Question 10To find the IEEE-754 SP floating point representation of the binary number 0.0000111, one first shifts thedecimal point to the (left or right) by right, 5 places. Question 11(Continuing...
more
06/11/23
Write the decimal number 29.23 as an unsigned fixed point binary
Write the decimal number 29.23 as an unsigned fixed point binary representation with 5 bits for the integer part and 4 bits for the fractional part. Be sure to round up, if needed, to obtain the...
more
06/06/23
Recursion in C - Explain Given Solution
Question: Write a recursive function to add to each number in a linked list the original values of its two neighbors. For example, 10->2->3->5->NULL becomes...
more
05/31/23
What Combinations Apply RISC-V
A nested function calls another function (plot_function with parameter a0) and is also called by another function. Given the code that follows RISCV calling convention, which sets of registers...
more
05/31/23
RISC-V Conventions
You are the author of the function F while your friend is the author of the function G. Both F and G are located in the same RISC-V main memory but you and your friend do not know the contents of...
more
05/31/23
Order of RISC-V Conventions
Suppose we have the following stack, where the red line is the indicator for sp: Suppose we now want the stack to contain these additional data items in the following order:We are given the...
more
05/31/23
Online Resources for ML/NNs
I am a novice programmer with a bit of conceptual background in ML/NNs, but I haven't programmed much in Python. Besides tutorials like Kaggle or platforms like Coursera/Edx, what are some free...
more
05/30/23
Assembly and RISC-V Calling Convention
A nested function calls another function (plot_function with parameter a0) and is also called by another function. Given the code that follows RISCV calling convention, which sets of registers...
more
05/30/23
Order of Stack using RISC-V
Suppose we have the following stack, where the red line is the indicator for sp: Suppose we now want the stack to contain these additional data items in the following order:We are given the...
more
05/30/23
Let x = 131 in base 10. If x is represented as an 8-bit unsigned binary integer, and you apply the operation x << 4, what will the result be in base 10?
Let x = 131 in base 10. If x is represented as an 8-bit unsigned binary integer, and you apply the operation x << 4, what will the result be in base 10?
Still looking for help? Get the right answer, fast.
Ask a question for free
Get a free answer to a quick problem.
Most questions answered within 4 hours.
OR
Find an Online Tutor Now
Choose an expert and meet online. No packages or subscriptions, pay only for the time you need.