Answer:
What do you mean?
Explanation:
Microsoft office is a good tech company
I just the question what
what is java programing
Answer:
Explanation:
Java is a class-based, object-oriented programming language that is designed to have as few implementation dependencies as possible. ... Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of the underlying computer architecture
Answer:
The Java programming language was developed by Sun Microsystems in the early 1990s. Although it is primarily used for Internet-based applications, Java is a simple, efficient, general-purpose language. Java was originally designed for embedded network applications running on multiple platforms.
Explanation:
What does it NOT mean for something to be open source?
It’s available for anyone to use
It’s free for all
It’s available for anyone to modify
Free to use but you have to pay a fee to modify
Answer:
Free to use but you have to pay a fee to modify
Explanation:
You NEVER have to pay for OPEN SOURCE
Which statement best describes network security?
Network security means all information is open to the public, the network is not compromised, and everyone has access to the network.
Network security means personal information is kept safe, the network is not compromised, and only authorized users have access.
Network security means everyone has access to the network, the network is not compromised, and no one has authorization to use it.
Network security means everyone has access to the information, the network is not compromised, and only a handful of people are authorized users.
Answer:
B). Network security means personal information is kept safe, the network is not compromised, and only authorized users have access.
Explanation:
I just did the Assignment on EDGE2022 and it's 200% correct!
Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)
Write an application that uses String method region-Matches to compare two stringsinput by the user. The application should input the number of characters to be compared andthe starting index of the comparison. The application should state whether the comparedcharacters are equal. Ignore the case of the characters when performing the comparison.
Answer:
Explanation:
The following program creates a function called region_Matches that takes in two strings as arguments as well as an int for starting point and an int for amount of characters to compare. Then it compares those characters in each of the words. If they match (ignoring case) then the function outputs True, else it ouputs False. The test cases compare the words "moving" and "loving", the first test case compares the words starting at point 0 which outputs false because m and l are different. Test case 2 ouputs True since it starts at point 1 which is o and o.
class Brainly {
public static void main(String[] args) {
String word1 = "moving";
String word2 = "loving";
boolean result = region_Matches(word1, word2, 0, 4);
boolean result2 = region_Matches(word1, word2, 1, 4);
System.out.println(result);
System.out.println(result2);
}
public static boolean region_Matches(String word1, String word2, int start, int numberOfChars) {
boolean same = true;
for (int x = 0; x < numberOfChars; x++) {
if (Character.toLowerCase(word1.charAt(start + x)) == Character.toLowerCase(word2.charAt(start + x))) {
continue;
} else {
same = false;
break;
}
}
return same;
}
}
If you have downloaded this book's source code from the companion Web site, you will find a file named text.txt in the Chapter 12 folder. (The companion Web site is at www.pearsonhighered/gaddis.) The text that is in the file is stored as on sen- tence per line. Write a program that reads the file's contents and calculates the average of words per sentence.
Answer:
Explanation:
The following python code loops through each line within a file called text.txt and counts all the words, then it divides this count by the number of sentences in the text file. Finally, output the average number of words per sentence.
f = open("text.txt", "r")
all_words = 0
sentences = 0
for x in f:
list = x.split(' ')
all_words += len(list)
sentences += 1
average = all_words / sentences
print("There are an average of " + str(average.__round__()) + " words in each sentence.")
How SPARQL 1.1 has advantage over SPARQL 1.0??
The bag class in Chapter 5 has a new grab member function that returns a randomly selected item from a bag (using a pseudorandom number generator). Suppose that you create a bag, insert the numbers 1, 2, and 3, and then use the grab function to select an item. Which of these situations is most likely to occur if you run your program 300 times (from the beginning): A. Each of the three numbers will be selected about 100 times. B. One of the numbers will be selected about 200 times; another number will be selected about 66 times; the remaining number will be selected the rest of the time. C. One of the numbers will be selected 300 times; the other two won't be selected at all.
Create a C++ program to input a list of positive numbers
from the keyboard and find the average. The list is terminated with the value -99 (Sentinel
input value).
Answer:
can you help me please? https://brainly.com/question/23169922
Explanation:
what was original name
whoever answers first gets brainly crown
Answer:
BackRub
Explanation:
https://acm.cs.nthu.edu.tw/problem/13144/
The website is the problem, and I need to implement the 13144.h(which is function.h in the 13144.cpp) to get the right answer.
Thanks for your help.
Answer:
Th.. uh... yea... uh.. I don’t know
Explanation:
Create a class called Dot for storing information about a colored dot that appears on a flat grid. The class Dot will need to store information about its position (an x-coordinate and a y-coordinate, which should both be integers) and its color (which should be a string for now). You can choose what to call your attributes, but be sure to document them properly in the class's docstring.
Don't forget that every function definition, including method definitions, must have a docstring with a purpose statement and signature.
Answer:
Explanation:
The following class is written in Python, it has the three instance variables that were requested. It also contains a constructor that takes in those variables as arguments. Then it has functions to update the positions of the Dot and change its color. The class also has functions to output current position and color.
class Dot:
"""Class Dot"""
x_coordinate = 0
y_coordinate = 0
color = ""
def __init__(self, x_coordinate, y_coordinate, color):
"""Constructor that takes x and y coordinates as integers and a string for color. It ouputs nothing but saves these argument values into the corresponding instance variables."""
self.x_coordinate = x_coordinate
self.y_coordinate = y_coordinate
self.color = color
def moveUp(self, number_of_spaces):
"""Moves the Dot up a specific number of spaces that is passed as a parameter. Updates y_position"""
self.y_coordinate += number_of_spaces
return ""
def moveDown(self, number_of_spaces):
"""Moves the Dot down a specific number of spaces that is passed as a parameter. Updates y_position"""
self.y_coordinate -= number_of_spaces
return ""
def moveLeft(self, number_of_spaces):
"""Moves the Dot left a specific number of spaces that is passed as a parameter. Updates x_position"""
self.x_coordinate -= number_of_spaces
return ""
def moveRight(self, number_of_spaces):
"""Moves the Dot right a specific number of spaces that is passed as a parameter. Updates x_position"""
self.x_coordinate += number_of_spaces
return ""
def dot_position(self):
"""Print Dot Position"""
print("Dot is in position: " + str(self.x_coordinate) + ", " + str(self.y_coordinate))
return ""
def dot_color(self):
"""Print Current Dot Color"""
print("Dot color is: " + self.color)
Ralph and his team need to work together on a project. If they need a device that will provide shared storage with access to all team members, which of these devices would work best? *
USB Flash Drive
2 TB HDD installed on one of their computers
BD-RW installed on one of their computers
Network attached storage appliance
Find the reference angle of the angle = 850°
Answer:
magine a coordinate plane. Let’s say we want to draw an angle that’s 144° on our plane. We start on the right side of the x-axis, where three o’clock is on a clock. We rotate counterclockwise, which starts by moving up. We keep going past the 90° point (the top part of the y-axis) until we get to 144°. We draw a ray from the origin, which is the center of the plane, to that point. Now we have a ray that we call the terminal side. But we need to draw one more ray to make an angle. We have a choice at this point. Our second ray needs to be on the x-axis. If we draw it from the origin to the right side, we’ll have drawn an angle that measures 144°. If we draw it to the left, we’ll have drawn an angle that measures 36°. This second angle is the reference angle. It’s always the smaller of the two angles, will always be less than or equal to 90°, and it will always be positive. Here’s an animation that shows a reference angle for four different angles, each of which is in a different quadrant. Notice how the second ray is always on the x-axis.
Explanation:
A large computer repair company with several branches around Texas, TexTech Inc. (TTi), is looking to expand their business into retail. TTi plans to buy parts, assemble and sell computer equipment that includes desktops, monitors/displays, laptops, mobile phones and tablets. It also plans to sell maintenance plans for the equipment it sells that includes 90-day money back guarantee, 12-month cost-free repairs for any manufacturing defects, and annual subscription for repairs afterwards at $100 dollars per year. As part of a sales & marketing campaign to generate interest, TTi is looking to sell equipment in 5 different packages: 1. Desktop computer, monitor and printer 2. Laptop and printer 3. Phone and tablet 4. Laptop and Phone 5. Desktop computer, monitor and tablet TTi plans to sell these packages to consumers and to small-and-medium businesses (SMB). It also plans to offer 3-year lease terms to SMB customers wherein they can return all equipment to the company at the end of 3 years at no cost as long as they agree to enter into a new 3-year lease agreement. TTi has rented a warehouse to hold its inventory and entered into contracts with several manufacturers in China and Taiwan to obtain high-quality parts at a reasonable price. It has also hired 5 sales people and doubled its repair workforce to meet the anticipated increase in business. TTi has realized that it can no longer use Excel spreadsheets to meet their data and information needs. It is looking to use open source and has decided to develop an application using Python and MySQL. Your team has been brought in to design a database that can meet all of its data needs. Create a report that contains the following:
Required:
a. Data requirements of TTi: What are the critical data requirements based on your understanding of TTI business scenario described above.
b. Key Entities and their relationships
c. A conceptual data model in MySQL
Answer:
hecks
Explanation:
nah
Write a program that simulates a fishing game. In this game, a six-sided die is rolled to determine what the user has caught. Each possible item is worth a certain number of fishing points. The points will remain hidden until the user is finished fishing, and then a message is displayed congratulating the user depending on the number of fishing points gained.
Answer:
Answered below
Explanation:
//Python code
numberOfCasts = 3
j = 0
fishingPoints = 0
sum = 0
while j < numberOfCasts:
dieNum = randint(1 , 6)
if dieNum ==1:
fishingPoints = 2
elif dieNum == 2:
fishingPoints = 4
elif dieNum == 3:
fishingPoints = 6
elif dieNum == 4:
fishingPoints = 8
elif dieNum == 5:
fishingPoints = 10
elif dieNum ==6:
fishingPoints = 12
sum += fishingPoints
j++
if sum > 30:
print ("Great catch")
elif sum > 10 and sum <= 30:
print("Good catch")
else:
print ("Bad day")
What is the output of the following code?
int x = 6, y = 3, z=24, result=0;
result = 2*((z/(x-y))%y+10);
cout<< result<
Answer:
The output is 24
Explanation:
Given
The above code segment
Required
The output
We have (on the first line):
[tex]x = 6[/tex]
[tex]y = 3[/tex]
[tex]z=24[/tex]
[tex]result=0[/tex]
On the second line:
[tex]result = 2*((z/(x-y))\%y+10)[/tex]
Substitute the value of each variable
[tex]result = 2*((24/(6-3))\%3+10)[/tex]
Solve the inner brackets
[tex]result = 2*((24/3)\%3+10)[/tex]
[tex]result = 2*(8\%3+10)[/tex]
8%3 implies that, the remainder when 8 is divided by 3.
The remainder is 2
So:
[tex]result = 2*(2+10)[/tex]
[tex]result = 2*12[/tex]
[tex]result = 24[/tex]
Hence, the output is 24
Which file helps web administrators detect any issues that affect the smooth running of the web server?
A. log
B. cache
C. server
D. client
Answer:
Server
Explanation:
A web server is computer software and underlying hardware that accepts requests via HTTP, the network protocol created to distribute web pages.
The file helps web administrators detect any issues that affect the smooth running of the web server.
What is net server is a software program ?A net server is a pc software program and underlying hardware that accepts requests thru HTTP, the community protocol created to distribute net pages.
It is hardware that makes use of HTTP (Hypertext Transfer Protocol) and different protocols to reply to customer requests revamped the World Wide Web. The primary process of an internet server is to show internet site content material via storing, processing and turning in webpages to users.
Read more about the administrators :
https://brainly.com/question/26096799
#SPJ2
3. Discuss microprocessor components, chips,
and specialty processors.
5. Define expansion slots, cards,including
graphics cards, network interface cards, wireless
network cards, and SD cards.
Answer:
3
Microprocessor Components
Control Unit.
I/O Units.
Arithmetic Logic Unit (ALU)
Registers.
Cache.
The chips capacities express the word size, 16 bits, 32 bits, and 64 bits. The number of bits determined the amount of data it can process at one time
The specialty processors are specifically designed to handle special coprocessor and Graphics Processing Unit (GPU), like displaying 3D images or encrypting data.
5
slot machine, known variously as a fruit machine, puggy, the slots, poker machine/pokies, fruities or slots, is a gambling machine that creates a game of chance for its customers.
A video card (also called a graphics card, display card, graphics adapter, or display adapter) is an expansion card which generates a feed of output images to a display device (such as a computer monitor).
network interface controller is a computer hardware component that connects a computer to a computer network. Early network interface controllers were commonly implemented on expansion cards that plugged into a computer bus.
wireless network interface controller is a network interface controller which connects to a wireless network, such as Wi-Fi or Bluetooth, rather than a wired network, such as a Token Ring or Ethernet.
The standard SD card has dimensions of 32 mm by 24 mm by 2.1 mm, a storage capacity of up to 4 GB. Typical levels of performance are not as high as the other types of SD memory card mentioned below.
good luck!!!
what is the full from of CPU?
Answer:
CPU is known as Central Processing Unit.
The function leap n, which takes an integer n as input, and returns True if the year n is a leap year, and False otherwise. NOTE: Please provide function declaration [2 marks]. Leap years are those that are evenly divisible by 4, except any year that is also evenly divisible by 100 unless that year is also evenly divisible by 400. So, for example, 1996, 2012, and 2020 are all leap years, but 2100, 2200, and 2300 are not leap years, because although they are all evenly divisible by 4, they are also evenly divisible by 100. However, 1600, 2000, and 2400 are leap years, because although they are divisible by 100, they are also divisible by 400. The Haskell interaction may look like: > leap 1996 True > leap 2000 True > leap 2100 False
Answer:
Explanation:
The following code snippet is a leap year checker written in Haskell which checks to see if the year is a leap year and then outputs a boolean value.
isDivisibleBy :: Integral n => n -> n -> Bool
isDivisibleBy x n = x `rem` n == 0
leap_n :: Integer -> Bool
leap_n year
| divBy 400 = True
| divBy 100 = False
| divBy 4 = True
| otherwise = False
where
divBy n = year `isDivisibleBy` n
In order to make burger a chef needs at least the following ingredients: • 1 piece of chicken meat • 3 lettuce leaves • 6 tomato slices Write down a formula to figure out how many burgers can be made. Get values of chicken meat, lettuce leaves and tomato slices from user. Hint: use Python’s built-in function
Answer:
how many burgers would you have to make ?
Explanation:
this is a question ot an answer
When the function below is called with 1 dependent and $400 as grossPay, what value is returned?
double computeWithholding (int dependents, double grossPay)
{
double withheldAmount;
if (dependents > 2)
withheldAmount = 0.15;
else if (dependents == 2)
withheldAmount = 0.18;
else if (dependnets == 1)
withheldAmount = 0.2;
else // no dependents
withheldAmount = 0.28;
withheldAmount = grossPay * withheldAmount;
return (withheldAmount);
}
a. 60.0
b. 80.0
c. 720.0
d. None of these
Answer:
b. 80.0
Explanation:
Given
[tex]dependent = 1[/tex]
[tex]grossPay = \$400[/tex]
Required
Determine the returned value
The following condition is true for: dependent = 1
else if (dependnets == 1)
withheldAmount = 0.2;
The returned value is calculated as:
[tex]withheldAmount = grossPay * withheldAmount;[/tex]
This gives:
[tex]withheldAmount = 400 * 0.2[/tex]
[tex]withheldAmount = 80.0[/tex]
Hence, the returned value is 80.0
how can a computer be used by a manager of a shopping mall
Answer:
- used to look at security cameras
- used to buy supplies for the mall (maintenance)
- billing
Answer:
With growing square footage of shopping malls, however, comes the challenge of managing these super structures. Shopping mall managers need to take care of all tenant and building services, including physical security hardware of both the individual tenants’ spaces, the general facility and common areas.
What are some of the security and access control challenges unique to shopping centers and malls?
Multiple tenants across multiple buildings. Access for tenants with their own set of employees needs to be managed efficiently.
Tenant turnover. When a tenant terminates his lease, his ability to access the space should be completely revoked. Mall management must be able to do this in a timely manner for the security of the shared property and for the safety of the next tenant.
Expansion, reduction and relocation of tenants within facilities. While this does not entail revocation of access, mall management must be able to provide smooth transition, in terms of access control to the new space, and denial of access to the previously-occupied space where a new tenant will be moving in.
Security for Shared Entrances and Spaces. Managing access privileges for shared facilities like that in a mall can be challenging. For instance, if a tenant in a mall hires or fires an employee, mall management needs to be informed so they can update access privileges to common entrances and shared spaces. This also applies for maintenance workers, cleaning crews and the like. An efficient access control system allows mall management to control access privileges with ease.
Explanation:
9.19 LAB: Words in a range (lists) Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds of a search range. The file should be read using the file.readlines() method. The input file contains a list of alphabetical, ten-letter strings, each on a separate line. Your program should output all strings from the list that are within that range (inclusive of the bounds). Ex: If the input is:
Answer:
9.2. Métodos del Objeto File (Python para principiantes)
Explanation:
Which Save As element allows a user to save a presentation on a computer?
Add a Place
OneDrive
Recent
This PC
Answer:
Option D, This PC allows a user to save a presentation on a computer
Explanation:
If one choses the option C, the file will be saved in the folder in which the user is working. Hence, option C is incorrect.
Like wise option A is also incorrect as it will require user to provide a location as option for saving the file
Option B is also incorrect as it will allow the user to save files in the C drive/D drive or one drive
Option D is correct because if the user choses this option file will be saved on the computer.
Hence option D is correct
Answer:
Option D : This PC allows a user to save a presentation on a computer
Explanation:
Edg 2021
how many stages needed to have powerful amplifier?
Power amplifier stages in a real circuit. Circuit diagram of a three stage practical audio power amplifier is shown in the figure below. Small signal transistor Q1 and its associated components form the voltage amplification stage.
Answer:
Generally you should pick an amplifier that can deliver power equal to twice the speaker's program/continuous power rating. This means that a speaker with a “nominal impedance” of 8 ohms and a program rating of 350 watts will require an amplifier that can produce 700 watts into an 8 ohm load.
6.22 LAB: Output values below an amount - methods
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, and output all integers less than or equal to that value. Assume that the list will always contain less than 20 integers.
Ex: If the input is:
5 50 60 140 200 75 100
the output is:
50 60 75
The 5 indicates that there are five integers in the list, namely 50, 60, 140, 200, and 75. The 100 indicates that the program should output all integers less than or equal to 100, so the program outputs 50, 60, and 75. For coding simplicity, follow every output value by a space, including the last one.
Such functionality is common on sites like Amazon, where a user can filter results.
Write your code to define and use two methods:
public static void getUserValues(int[] myArr, int arrSize, Scanner scnr)
public static void outputIntsLessThanOrEqualToThreshold(int[] userValues, int userValsSize, int upperThreshold)
Utilizing methods will help to make main() very clean and intuitive.
My Code & Error Message Attached
import java.util.Scanner;
public class LabProgram {
public static void GetUserValues(int[] myArr, int arrSize, Scanner scnr){
int i;
for(i=0;i
myArr[i] = scnr.nextInt();
}
}
public static void outputIntsLessThanOrEqualToThreshold(int[] userValues, int userValsSize, int upperThreshold) {
int i;
for(i=0;i
if(userValues[i] <= upperThreshold)
System.out.print(userValues[i]+" ");
}
}
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int[] userValues = new int[20];
int upperThreshold;
int numVals;
numVals = scnr.nextInt();
GetUserValues(userValues, numVals, scnr);
upperThreshold = scnr.nextInt();
outputIntsLessThanOrEqualToThreshold(userValues, numVals, upperThreshold);
System.out.println();
}
}
Answer:
hope this helps.
Explanation:
n = int(input())
lst = []
for i in range(n):
lst.append(int(input()))
threshold = int(input())
for x in lst:
if x < threshold:
print(x)
Following are the Java program to find the less number from 100 in 5 number of the array:
Java Program to check array numbers:please find the code file in the attachment.
Output:
Please find the attached file.
Program Explanation:
import package.Defining class LabProgram Inside the class two methods "GetmyArr, outputIntsLessThanOrEqualToThreshold" is defined that takes three variable inside the parameters.In the "GetmyArr" method it takes one array and one integer variable and a scanner that inputs the array value "myArr" which limits set into the "arrSize" variable. In the "outputIntsLessThanOrEqualToThreshold" method it takes three parameters "myArr, arrSize, and upperThreshold". In this, it checks array value is less than "upperThreshold", and prints its value.Outside this main method is defined that defines array and variable and class the above method.Find out more about the java code here:
brainly.com/question/5326314
What can a developer do to customize a macro beyond the simple tools of the Macro Design tab?
O Edit the macro in the SQL view.
O Make the macro a security risk.
O Eliminate restricted actions from the macro.
O Edit the macro in the Visual Basic language.
Answer: D is the answer I did the assignment.
Explanation:
Create a public class called Catcher that defines a single class method named catcher. catcher takes, as a single parameter, a Faulter that has a fault method. You should call that fault method. If it generates no exception, you should return 0. If it generates a null pointer exception, you should return 1. If it throws an illegal argument exception, you should return 2. If it creates an illegal state exception, you should return 3. If it generates an array index out of bounds exception, you should return 4.
Answer:
Sorry mate I tried but I got it wrong
Explanation:
Sorry again
______ lets people access their stored data from a device that can access the Internet.
______ are programs that help people work and play online.
Answer:
Cloud computing and applications
Explanation:
Answer: Cloud computing
Applications
Explanation: