Create an 80x86 program that define an array of doubleword numbers then read two values, first one indicates how many actual numbers will be in the array, and an integer n. The program should display all of the numbers in the array that are greater than the number n.

Answers

Answer 1

The program requires user to read a specified number of values beyond a set limit from a given array. The program which performs this task is written in python 3 thus :

from random import randint

#import the randomint module

import random

#import the random module

double_list = [randint(11, 99) for p in range(0, 10)]

#randomly selects a list of 10 double integer values

def rand_num(lis, n_values , n):

#initialize a function named rand_num which takes in 3 parameters

filter = [val for val in lis if val > n]

#filters the variables to contain those only greater than the specified limit

arr_ = random.sample(filter, n_values)

#using the sample function, select the stated number of values from the filtered list

return arr_

#return the selected values

n_values = int(input('Enter number of values : '))

#prompts user for the length of array

n = int(input('Enter limit : '))

#prompts user for the limit of the values to be included in the array

print(rand_num(double_list, n_values, n))

#A sample run of the program is given and output attached.

Learn more :https://brainly.com/question/25434178

Create An 80x86 Program That Define An Array Of Doubleword Numbers Then Read Two Values, First One Indicates

Related Questions

Q1. What is animation?

Answers

Answer:

The act of animating, or giving life or spirit.

Explanation:

HOPE IT HELPS............

Need help with Python coding...
2.14 LAB: Using math functions
Given three floating-point numbers x, y, and z, output the square root of x, the absolute value of (y minus z) , and the factorial of (the ceiling of z).

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('%0.2f %0.2f %0.2f' % (your_value1, your_value2, your_value3))

Ex: If the input is:

5.0
6.5
3.2
Then the output is:

2.24 3.30 24.00

Answers

Answer:

6.5

24.00

it think it's my answer

A 5G network will have the following advantages over a 4G network: a. Overall network support and operations costs are reduced, new applications can be made available sooner, and the risk of human error is reduced. b. Ability to support more concurrent devices, minimal infrastructure changes, and lower latency. c. Lower latency, greater bandwidth, and ability to support more devices. d. Ability to support exciting new applications, greater bandwidth, and improved security

Answers

A 5G network will have the following advantages over a 4G network except that C. Lower latency, greater bandwidth, and ability to support more devices.

A 5G network simply means the 5th generation mobile network. It enables a new kind of network that is designed to connect everyone and devices.

The advantages of a 5G network over a 4G network include lower latency, greater bandwidth, and the ability to support more devices.

Read related link on:

https://brainly.com/question/25530245

What is a characteristic of a magnetic reed switch?
Select one:
a. Switch contacts that are not enclosed
b. Bigger size than mechanical switches
C. High sensitivity to magnetic fields
d. Very high voltage flows through contacts

Answers

Answer:

option D is correct answer

Explanation:

Very high voltage flows through contacts.

hope this helps you

The answer is D.
Explanation:N/A

1. How many colors are available in color. palette.
2. 20 colors are available in color palette. True / False​

Answers

Answer:

16 colors in the palette

false only 16 colors

Define the following solider​

Answers

What soldier can you show me a picture?

What sets blockchain solutions apart from conventional record-keeping solutions?

Answers

Blockchain technology are in commonly used in this dispensation. The thing that sets blockchain solutions apart from conventional record-keeping solutions is simply the ability to share different versions of the same data to multiple parties.

Blockchain is known to buildup trust, security, transparency, and the traceability of data shared across a business network. It also minimize cost  with new efficiencies.

It is simply known to be distributed ledger technology that helps in the storage of information in the form of blocks and no one can change or add the data.

See full question below

What sets blockchain solutions apart from conventional record-keeping solutions?

the ability for multiple parties to be certain they are using the same data

the ability to share different versions of the same data to multiple parties

a focus and priority on bitcoin and cryptocurrency

a system that maintains rigor and complexity

Learn more from

https://brainly.com/question/21105181

While discussing the testing procedures for relays, Technician A says that if a relay does not
click or activate a circuit it is intended to operate, it can be comprehensively tested using a
voltmeter, test light, or ohmmeter. Technician B says that electronic relay testers do not
require a voltage source. Who is correct?
Select one:
O a. Technician A only
O b. Technician B only
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

Answer:

Socratic app

Explanation:

it will help you

Answer C is correct
Hope this helped <33

Devices on one network can communicate with devices on another network via,
1)Multiplexer
2)Printer
3)Router
4)Hub

Answers

It is option 4 a hub cuz that is what it is used for

Answer:

3

Explanation:

switches use resistors in series and parallel and can function well as digital inputs
to electronic control systems.
Select one:
O a. Proximity
O b. Smart
O C. Touch-sensitive
O d. Push button

Answers

Answer:

d push button bc it will cut all power when in off

A function getints has been defined that has no parameters and returns an array of integer values. The first value in the array contains the total number of items in the array (including itself). Write code (not a function or main) to: Write a prototype for getints() Call getints() From the resulting array, print the first value (after the length) and the last value, each on a separate line.

Answers

Answer:

Explanation:In the below code : Create method getints() : with no arguments and integer array return type Inside method : Declare n integer Input n Declare integer array with n length : arrInt Assign n at 0th array index Use loop from 1 to n: i counter Input arr... view the full answer

Function getints  is presented in the Prototype of the following code will be:

// Prototype

int* getints();

What is function getints?

This function requests an integer from the person using it and then returns it. You can ask for the integer using a prompt argument.

Older OSes used the C method getch() to collect user input. Depending on the function call, it only allows one input character at a time. Unless the user supplies input, the program's execution is halted.

For trhe Prototype the code will be:

// Prototype

int* getints();

For the getints the code will be:

// Call getints()

int* array = getints();

The print values will be:

// Print the first and last value

printf("The first value is %d\n", array[1]);

printf("The last value is %d\n", array[array[0]]);

Learn more about  function getints, here:

https://brainly.com/question/30928705

#SPJ2

Discuss how to enhance the security of a Linux computer in a systematic manner.

Answers

Answer:

So here are five easy steps to enhance your Linux security.

1. Choose Full Disk Encryption (FDE) No matter which operating system you are using, we recommend that you encrypt your entire hard disk.

2. Keep your software up-to-date.

3. Learn how to use Linux’s firewall.

4. Tighten up security in your browser.

5. Use anti-virus software.

Explanation:

Linux has five steps for enhanced security.

What are the five layers of security in Linux?

A Linux is an operating system and has a Linux kernel that is based on the system and consists of five-layer of enhanced security.

These are FDE that is chosen full disk encryption, followed by keeping software up to date and learning how to make use of a firewall. It also tightens the browser's security plus the use of anti-virus.

Fin dout more infimation about the linux.

brainly.com/question/25480553

The operating system called Windows 7 is typically used for _____ a. Laptop computers b. Super computer c. All of the options d. Desktop computers​

Answers

Answer:

all of these

Explanation:

,,,,,,,,,,,,,,,,

The operating system called Windows 7 is typically used for C All of these.

An operating system simply means a collection of programs that is vital for coordinating the operations of the computer software and hardware.

It should be noted that the operating system called Windows 7 is typically used for laptop computers, super computer, and desktop computers.

Therefore, the correct option is All of these.

Read related link on:

https://brainly.com/question/17252990

Ms. Miller recently performed a little experiment for her photography class. She dressed a model in a generic outfit and asked two different photographers to photograph her using the same set and lighting. The students observed that the images produced by each photographer were vastly different likely due to artistry; however, one student mentioned that something else might be at play here. What other factor MOST LIKELY caused these images to turn out so differently?

A.
the instructions Ms. Miller gave to each photographer

B.
the communication and feelings each photographer was able to evoke in the model

C.
the level of education and how much experience each photographer has

D.
time and stress levels of each photographer

Answers

Answer:

C. the level of education and how much experience each photographer has.

Despite some having degrees in film, visual art, or design, the majority of photographers are self-taught. As you earn more and more XP, you can advance through the eight levels of photography

What experience do you need to be a photographer?

There are no formal educational qualifications to become a professional photographer. Despite some having degrees in film, visual art, or design, the majority of photographers are self-taught. Many photojournalists hold journalism degrees or have a wealth of practical experience.

As you earn more and more XP, you can advance through the eight levels of photography. According to the video, the phases you'll move through as you level up are as follows: (0) Just Starting, (1) Keyboard Photographer, (2) Gear Geek, (3) The Student, (4) The Casual Snapper, (5) Hobbyist, (6) Online Legend, and (7) The Pro.

Therefore, the correct answer is option C. the level of education and how much experience each photographer has

To learn more about the level of education refer to:

https://brainly.com/question/19475756

#SPJ2

Why is it important to keep software up to date? Select 3 answers that are correct.
A.) fix bugs

B.) download malware

C.) add features

D. ) limit personal use

E. ) patch security holes

Answers

Answer:

It is important to keep your software up because (A) it fixes bugs, (C) adds features, and (E), it patches your security holes.

To put it in short, your answers is A, C, and E.

I hope this helped at all.

lol easy dont need to use brainly its a,c,d

When proofreading, you should do all of the following except _____.


read aloud

ask someone else to look over the document

take the time to carefully look over your work

skim the document quickly

Answers

Answer:

Skim the document quickly

Explanation:

The purpose of proofreading is to catch any errors that may have been present when the work was first written.

All the options are usually done when proofreading, except for the last one.

Hope this helps :)

What is considered a relatively new science that is being developed?
O targeting advertising to number of downloads
O targeting advertising to demographics
O targeting advertising to geography
O targeting advertising to adolescents

Answers

Answer:

b

Explanation:

Targeting advertising to demographics  is considered a relatively new science that is being developed. Option (b) is correct.

What do you mean by Geography?

The study of places and the interactions between people and their environs is known as geography. Geographers study the surface of the Earth and the various human societies that live there.

Advertising refers to the methods used to draw attention to a good or service. In order to attract consumers' attention, advertising seeks to highlight a good or service. It is often used to market a particular product or service, although there are many other applications as well, with commercial advertising being the most popular.

Through "branding," which links a product name or image with particular traits in consumers' minds, commercial advertising frequently aim to boost consumption of their goods or services.

Therefore, Option (b) is correct. Targeting advertising to demographics  is considered a relatively new science that is being developed.

Learn more about Geography, here;

https://brainly.com/question/1462956

#SPJ2

Guys did yall get call of duty vanguard yet ​

Answers

Answer:

no not yet

Explanation:

but brainliest me

no not yet soon tho

True or False. A range has an address called a range address.
True
False

Answers

Answer:

im not sure so i apoligize, but i think its true

Explanation:

It’s false
Hope that helps!

We have noted that there can be no input queuing if the switching fabric is n times faster than the input line rates, assuming n input lines all have the same rate. Explain why this is the case.

Answers

Consider the given data:

Assume packet length=n

Maximum queuing delay= (n–1)D

All packets are of the same length, n packets arrive at the same time to the n input ports, and all n packets want to be forwarded to different output ports.

a)  The maximum delay for a packet for the memory = (n-1)D

b)  The maximum delay for a packet for the bus = (n-1)D

c)  The maximum delay for a packet for the crossbar switching fabrics=  0

In cell G5, enter a formula without using a function that subtracts the actual dollars billed from the estimated amount to determine the remaining amount of the estimate for general administrative services

Answers

Using the appropriate excel syntax, the formula which calculates the actual amount from estimated amount is : =C10 - D10

Using the cells thus :

Actual dollar billed = C10Estimated amount = D10

Using the cell values defined above ; the required excel syntax is as follows :

=C10 - D10

Note : All excel formulas begin with the equal to sign.

Learn more : https://brainly.com/question/25644130

what is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS. ​

Answers

Answer:

ARPANET: Advanced Research Projects Agency Network

BOOTP: Bootstrap Protocol

GSM: Global System for Mobiles

GUI: graphical user interface

EOM: Enterprise Output Management

EULA: end-user license agreement

CTSS: The Compatible Time Sharing System

Explanation:

BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.

GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.

ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.

BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.

GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.

EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.

EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.

CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.

What is true about client-side scripting?

Answers

Answer:

A client-side script is a program that is processed within the client browser. These kinds of scripts are small programs which are downloaded , compiled and run by the browser. JavaScript is an important client-side scripting language and widely used in dynamic websites.

Explanation:

Client-side scripting refers to the execution of scripts on the client's device (typically in a web browser) rather than on the server.

Given that,

To write about client-side scripting.

Since, Client-side scripting simply means running scripts, such as JavaScript, on the client device, usually within a browser.

All kinds of scripts can run on the client side if they are written in JavaScript because JavaScript is universally supported.

Therefore, client-side scripting enables the execution of scripts on the client's device, enhancing web interactivity and reducing server load.

JavaScript is a widely used language for client-side scripting.

To learn more about scripting visit:

https://brainly.com/question/26121358

#SPJ4

An information of a 500GB is transferred at the speed of 10MB/s. Calculate the full time the information will be transfer.

Answers

Answer:

50,000 seconds

Explanation:

First multiply 500GB into 1000.(*1GB is equal to 1000MB so were going to multiply it so that we can get the exact MB) and we will get 500,000 MB. Then let's divide it by 10.(*since 10MB can be transfer in just one second.) and we will get 50,000 SECONDS.

Hope it can help you lovelots

g Deliverables: 1.Referencing the Arduino attachInterrupt() documentationand the provided code, what does the attachIntterupt() function call on line 19 do, and how does that work with the magnet_detected() function

Answers

Answer:software routine that hardware invokes in response to an interrupt.

Explanation:

Activity 4 - Accomplishing the Scoring Card Direction: Evaluate yourself by checking the appropriate boxes to indicate the degree of competency in nail care tools and equipment.

pls help guys:-(​

Answers

The score that will be given to the identification of nail care tools, materials, and equipment will be 15.

Nail cure tools and equipment are the tools that are used for taking care of the nails. These include a nail file, nail clipper, nail cleaner, nail brush, etc.

The score that will be given to the identification of nail care tools, materials, and equipment is 15. The demonstration of knowledge on the safety practices of nail care tools, materials, and equipment will be 15 while the classification will be 10.

In conclusion, the total score will be 40.

Read related link on:

https://brainly.com/question/25711916

Cho lược đồ CSDL “Quản lý BÁN HÀNG” có các bảng như bên dưới. (Thuộc tính in đậm và
gạch chân là khóa chính, gạch CHÂN NÉT ĐỨT là khóa ngoại. Kiểu dữ liệu và độ rộng của
các thuộc tính tự chọn sao cho phù hợp.

Answers

sorry i donnt speak chinese

Select the correct answer.

Eva wants to convert a Lisp file into machine code by interpreting only a single line of code at a time. Which of these can help Eva with her work?

A.
interpreters

B.
output device

C.
compiler

D.
memory

E.
operating system

Answers

The program which would help Eva convert a Lisp file into machine code by interpreting only a single line of code at a time is: A.  interpreters

Interpreters can be defined as computer software programs that are designed to translate (interpret) a programming language (code) into machine code, especially by interpreting only a single line of code at a time.

Hence, an interpreter executes the instructions that are written in a programming language (code) one after the other (instruction by instruction), before it translate (interpret) the next line of code.

On the other hand, a compiler takes the entire program (code) and interprets them.

In conclusion, an interpreter can help Eva convert a Lisp file into machine code by interpreting only a single line of code at a time.

Rea d more: https://brainly.com/question/21130620

Match the Tools with the name of the tool.


Toolbar Options


Question 1 options:


Increase Indent



Line Spacing



Decrease Indent



Justify Text



Bullet Points



Center Text


1


2


3


4.


5


6

Answers

Answer:

1. Center Text

2. Justify Text

3. Bullet Points

4. Decrease Indent

5. Increase Indent

6. Line Spacing

Hope this helps:)

What device do e-learning applications usually use to help users with visual
impairment read digital content?

Answers

The answer is Screen Readers.
Other Questions
Which expressions are equivalent to - 8z +(-5.5) + 1.5z + 3y - 2.5?Select all that apply.A. -8 + 3y +6.52. - 8 - 6.5zC.-6.52 + 3y - 8D. -8 + 3y + (-6.52)E. 3y + (-6.52) -5.5 What is the term used to describe physical and artificial features of an area? A) Climate B) Topography C) Geography D) Sustainability How does Jim feel about the captain when he dies in chapters 1-3 of Treasure Island?A. He has no feelings towards him.B. He loves him.C. He pities him.D. He hates him. Cindy just became a personal trainer and is finalizing her pricing plans. Katrina graduated from college with a degree in veterinary science. She also has an interest in law enforcement. What company might be interested in hiring Katrina?A. a government building looking for a security officerB. a city government in need of an animal control officerC. a county commissioner looking for an executive assistantD. a large bank in need of a network manager what is the difference between sanidine and perthite arsene wenger pushes a box with a force of 60N over a distance 10m calculate the work done Suppose you lift a 17 kg k g box by a height of 1.0 m m . How much work do you do in lifting the box Zachai finishes the level in 154 seconds. how many bonus points did Zachai earn. Thank You Speech for your classmates. express your feeling towards your friends. tell us how you feel after almost 4 months being together as classmatesnot less than 50words(for speaking) Plz help I need help with. 4 The largest frog in the world is the goliath, It can grow to be 12 inches long. The smallest frog in the world is about 2.5% as log as the goliath. About how long is the smallest frog in the world What equation represents this sentence? 5 less than a number is 12. n5=12 5=12n 5=n12 5n=12 Pierre at caroline____inteligentsA.etes B.sommes C.sont Jacob was out at a restaurant for dinner when the bill came. His dinner came to $18. After adding in a tip, before tax, he paid $20.70. Find the percent tip. on which film did lauren bacall and humphrey bogart meet? An arithmetic sequence is given below.19, 14, 9, 4,...thWrite an explicit formula for the nterm an Some single-celled organisms make copies of themselves through mitosis. Which describes the function of the cell cycle in such single-celled organisms? PLS, NO SPAM!!How can athletes benefit from feedback given using the feedback sandwich technique?1) by using observation and recommendation, a coach can see what is needed and suggest a plan to athletes for training and practice2) by using observation and recommendation, athletes can see what they are doing wrong and use praise from a coach to feel more accomplished3) by using praise and constructive criticism, athletes can use what they feel to make changes to their training4) by using praise and constructive criticism, athletes can grow and improve through feedback that is presented positively 3. What are some similarities today that were going on in the 1950s?