a database of the virus is called____​

Answers

Answer 1

Answer:

I believe it is poisoning I could be wrong


Related Questions

Design a class named Person with fields for holding a person’s name, address, and telephone number. Write one or more constructors and the appropriate mutator and accessor methods for the class’s fields. Next, design a class named Customer, which extends the Person class. The Customer class should have a field for a customer number and a boolean field indicating whether the customer wishes to be on a mailing list. Write one or more constructors and the appropriate mutator and accessor methods for the class’s fields. Demonstrate an object of the Customer class in a simple program.

Answers

Answer:

Here is the Person class:

class Person {  //class name

//below are the private data members/fields of Person class

   private String name;   //to hold name

   private String address;  //to hold address

   private String phoneNo;   // contains telephone number

   public Person(String name, String address, String phoneNo){  //constructor of Person class with name, address and phoneNo as parameters

       this.name = name;  

       this.address = address;

       this.phoneNo = phoneNo;     }  

   public String getName(){  //accessor method to get/access the name

       return this.name;     }   //returns the name

   public String getAddress(){  //accessor method to get/access the address

       return this.address;     }  //returns the address

   public String getPhoneNo(){ //accessor method to get/access the phone number

       return this.phoneNo;  } //returns the telephone number    

//mutator methods

   public void setName(String nam){  //mutator method to set the name

       this.name = nam;     }  

   public void setAddress(String addr){  //mutator method to set the address

       this.address = addr;     }  

   public void setPhoneNo(String phNo){   //mutator method to set the telephone number

       this.phoneNo = phNo;      } }

Here is the Customer class which extends the Person class:

class Customer extends Person{  //Customer class that is sub class of Person class

//below are the private data members/fields of Customer class

   private String CustomerNo;  //String type field to hold customer number

   private boolean MailingList;   //boolean field indicating whether the customer wishes to be on a mailing list

   public Customer(String name, String address, String phoneNo, String custNum, boolean mail) {  //constructor of Customer class that has parameters name, address and phoneNo (of Person class) and parameters custNum and mail ( of Customer class)

       super(name, address, phoneNo);  //  super keyword is used to refer to Person objects and to access the Person class constructor

       this.CustomerNo = custNum;  

       this.MailingList = mail;     }  

//accessor methods

   public String getCustomerNo(){  //accessor method to get/access the customer number

       return this.CustomerNo;     }  

   public boolean getMailingList(){ //accessor method to get/access the boolean mailing list to check whether a person wants to be on mailing list

       return this.MailingList;     }

//mutator methods

   public void setCustomerNo(String custNo){ //mutator method to set the customer number

       this.CustomerNo = custNo;     }  

   public void setMailingList(boolean mailing){ //mutator method to set the mailing list  

       this.MailingList = mailing;     } }

       

Explanation:

Here is the demonstration class to demonstrate object of Customer class, calls Person and Customer class methods to display the Customer information  such as name, address, phone number, customer number and if customer wants to receive mail.

import java.util.Scanner;   //used to take input from user

class Demonstration{   //test class

   public static void main(String args[]){   //start of main() function

Scanner input= new Scanner(System.in);   //creates object of Scanner class

       System.out.print("Enter Customer Name: ");  //prompts user to enter name

       String fname = input.nextLine();

       System.out.print("Enter Customer Address: ");  //prompts user to enter address

       String address = input.nextLine();

       System.out.print("Enter Customer Telephone Number: "); //prompts user to enter telephone number

       String phoneNumber = input.nextLine();

       System.out.print("Enter Customer Number: "); //prompts user to enter customer number

       String customerNum = input.nextLine();

       System.out.print("Does Customer wish to be on a mailing list? \nPress 1 for yes, 0 for no: "); //asks user if he wishes to receive mail

       String choice = input.nextLine();  

       boolean mailList = (choice.equals("1"));   //if user enters 1 indicating that he wishes to be on mailing list

       Customer customer = new Customer(fname, address, phoneNumber, customerNum, mailList);   //creates object of Customer class and calls Customer class constructor

       System.out.println("\nCustomer Information: ");

       System.out.println("Name: "+customer.getName());  //calls getName method of Person class using customer object to get the name and displays the name

       System.out.println("Address: "+customer.getAddress()); //calls getAddress method of Person class using customer object to get the name and prints the address

       System.out.println("Telephone Number: "+customer.getPhoneNo()); //calls getPhoneNo method of Person class using customer object to get the telephone number and prints phone number

       System.out.println("Customer Number: "+customer.getCustomerNo());   //calls getCustomerNo method of Customer class using customer object to get the customer number and prints the customer number

       System.out.println("Mailing List?: "+customer.getMailingList());     }} //calls getMailingList method of Customer class using customer object to get the mailing list and prints true of false on the basis of customers choice to be on mailing list.

____________ are used to store all the data in a database

Answers

Data elements within the database are stored in the form of simple tables.

Answer:

The correct answer is data store

Explanation:

If I execute the expression x <- 4L in R, what is the class of the object `x' as determined by the `class()' function?

Answers

Answer:

integer

Explanation:

The expression can be implemented as follows:

x <- 4L

class(x)

Here x is the object. When this expression is executed in R, the class "integer" of object 'x' is determined by the class() function. R objects for example x in this example have a class attribute determines the names of the classes from which the object inherits. The output of the above expression is:

"integer"

Here function class prints the vector of names of class i.e. integer that x inherits from. In order to declare an integer, L suffix is appended to it. Basically integer is a subset of numeric. If L suffix is not appended then x<-4 gives the output "numeric". Integers in R are identified by the suffix L while all other numbers are of class numeric independent of their value.

In a six-story building, which floor would be the best option for the data center?

Answers

Answer:

243

Explanation:

Describe conceptually how an sql retrieval query will be executed by specifying the conceptual order of executing each of the six clauses

Answers

Answer:

Answered below

Explanation:

An SQL retrieval query contains six clauses which are executed in an orderly sequence. These clauses include; SELECT, FROM, WHERE, GROUP BY, HAVING and ORDER BY.

The select clause enables us specify the data we want to retrieve. This statement is the starting point of SQL queries.

The FROM statement comes second and specifies the table the data is being retrieved from.

The WHERE clause helps us limit the data to those that meet a particular condition.

The GROUP BY statement helps group your information in a more meaningful way.

The HAVING clause puts a condition on your group.

The ORDER BY statement orders your information in descending order or ascending order.

Suppose your network support company employs 75 technicians who travel constantly and work at customer sites. Your task is to design an information system that provides technical data and information to the field team. What types of output and information delivery would you suggest for the system?

Answers

Answer:

Proceso mediante el cual el SI toma los datos que requiere para procesar la información. Las entradas pueden ser manuales o automáticas. Las unidades típicas ...

Explanation:

What is part of the computer?
Hardware
Software
CPU
All of these

Answers

Answer:

All of these are the parts of computer

Answer:

yes your answer is correct all those are the parts of the computer

hope it is helpful to you

Which organization plays a key role in development of global health informatics?
a.International Council of Nurses (ICN)
b. International Organization for Standardization (ISO)
c. International Medical Informatics Association (IMIA)
d. World Health Organization (WHO)

Answers

Answer:

International Medical Informatics Association (IMIA)

Explanation:

In respect of the question which askabout the organization who play an important role in regards to the development of global health informatics is International Medical Informatics Association (IMIA).

International Medical Informatics Association (IMIA) which is an interni association which are independent which works toward expanding and sustaining of global Biomedical and Health Informatics community and give maximum support to international initiative which are geared towards providing adequate and standardized health for each and everyone in the world at large.

Computer science;
What is an Algorithm? B: Mention five attributes of a properly prepared Algorithm. C: The roots of a quadratic equation ax2+b×+c=0 can be gotten using the almighty formular Using a properly designed algorithm, write a pseudocode and draw a flowchart to take quadratic equation coefficients as input and calculate their roots using the almighty formular, and display result according to value of the discriminant d, d=square root b rest to power 2 minus 4ac, i.e when d=o, when's o. Note when d

Answers

Answer:

Flowchart of an algorithm (Euclid's algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≥ A yields "yes" or "true" (more accurately, the number b in location B is greater than or equal to the number a in location A) THEN, the algorithm specifies B ← B − A (meaning the number b − a replaces the old b). Similarly, IF A > B, THEN A ← A − B. The process terminates when (the contents of) B is 0, yielding the g.c.d. in A. (Algorithm derived from Scott 2009:13; symbols and drawing style from Tausworthe 1977).

Explanation:

Flowchart of an algorithm (Euclid's algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≥ A yields "yes" or "true" (more accurately, the number b in location B is greater than or equal to the number a in location A) THEN, the algorithm specifies B ← B − A (meaning the number b − a replaces the old b). Similarly, IF A > B, THEN A ← A − B. The process terminates when (the contents of) B is 0, yielding the g.c.d. in A. (Algorithm derived from Scott 2009:13; symbols and drawing style from Tausworthe 1977).

________ is part of the executive management team’s responsibility for protecting an organization’s information assets.
A. C-I-A triad
B. information security governance
C. risk management
D. A-I-C triad

Answers

Answer:

B) Information security governance

Explanation:

Information security governance is the process by which the information security activities of an organisation are controlled and directed.

Information security governance aims at providing direction to the executive management to implement a security program that ensures sufficient security to protect the information assets of an organisation. It consists of;

- Alignment of information security strategies and objectives with business strategies and objectives.

- Ensuring that risks are properly addressed.

- Promoting a positive security environment.

- Ensuring compliance with internal and external security requirements.

Write the ColorfulBouncingCircle class, where you should write the constructor, setPlayingFieldSize, and tick methods, and override the overlaps method, each according to the above descriptions. You should not have to write any code which draws; instead, a test program will be provided which will animate ColorfulBouncingCircles based on your implementation. For every time tick, the test program will compare every circle against every other circle using the overlaps method

Answers

Answer: Circle class representing circle objects which have a radius, center x, and center y. It included overlaps and draw methods. Then, we wrote a Colorfulcircle class which included a Color property and overrode the draw method of Circle. For this assignment, you are asked to create a ColorfulBouncing circle class. Begin with the versions of Circle and ColorfulCircle uploaded to Canvas ColorfulBouncingCircle should extend ColorfulCircle, Unlike the other Circle classes, it will include a velocity for the x and y axes. The constructor for ColorfulBouncingCircle includes these parameters: public colorfulBouncingcircle (double radius, double centerx, double center Color color, double xVelocity, double yvelocity) Note that we are treating x as increasing to the right and y as increasing down, as with Java's graphics coordinates system. This was also seen with Circle's draw method. ColorfulBouncingCircles will bounce around in a playing field which the tester will provide. The Colorful Bouncinesicle class should have a public static method to set the playing field width and height: public static void setPlayingFieldsize (double newwidth, double newHeight) ColorfulBouncingCircle will also include a method which should alter its center and center with each time tick (similar to a metronome's noise guiding a musician to play a song). The circle's x position should be altered according to x velocity and y position according to y velocity. However, before changing the positions, check if the center position would, after moving, be either less than 0 or greater than the playing field dimensions. If so, instead of changing the center position, alter the velocity. If the ball hits the top or bottom, the sign of its vertical velocity should be flipped: if it hits the left or right, its horizontal velocity sign should be flipped. If it hits a corner, both should be. Notice that velocity may be positive or negativel The tick method which will be called by the tester is defined in this way:

public void tick() Finally, we should override the overlaps method to make balls bounce away from each other. You should call the super method to see if your circle overlaps another circle. If so, alter this circle's velocity according to its center relative to the other circle. If this circle" is above or below the "other circle," flip the sign of "this circle's" vertical velocity. If it's to the left or right, flip the horizontal velocity As before, both may be flipped. This is NOT the same as a true elastic collision, but it should be simpler for you to implement. The sign flipping will sometimes cause the balls to "vibrate" when caught between each other. Please review the velocity changing rules carefully; they are easy to get wrong!! To review: Write the ColorfulBouncineCircle class, where you should write the constructor setPlayingfield Size, and tick methods, and override the overlaps method, each according to the above descriptions. You should not have to write any code which draws; instead, a test program will be provided which will animate ColorfulBouncingCircles based on your implementation. For every time tick, the test program will compare every circle against every other circle using the overlaps method. The test program will ask you to press Enter in the console to launch the automated tests which will assign a tentative score based on your implementation. DO NOT ALTER the Circle OR Colorful Circle files!!

Explanation:

A static class method can be accessed without referring to any objects of the class. True False

Answers

Answer:

True

Explanation:

This is true because a static class method can be accessed without referring to any objects of the class. When a class member is made static, it's very easy to access the object.

The member becomes static and becomes class level

The following program is supposed to display a message indicating if the integer entered by the user is even or odd. What is wrong with the program?
num = int(input("Enter an integer: "))
print("The integer is", evenOdd(num))
def evenOdd(n) :
if n % 2 == 0 :
return "even"
return "odd"
A. The function definition must appear before the function is called.
B. The input and print statements must reside in a function named main.
C. The variable num and the parameter variable n must have the same name.
D. An else clause must be added to the if statement.

Answers

Answer:

A. The function definition must appear before the function is called

Explanation:

Given

The above lines of code

Required

Determine the error in the program

In python, functions has be defined before they are called but in this case (of the given program), the function is called before it was defined and this will definitely result in an error;

Hence, option A answers the question

The correct sequence of the program is as follows:

def evenOdd(n):

     if n % 2 == 0:

           return "even"

     return "odd"

num = int(input("Enter an integer: "))

print("The integer is", evenOdd(num))

Carrie is creating a personal balance sheet. The heading includes the period of time that the balance sheet
represents
Which could be the header of Carrie's balance sheet?
Carrie's Balance Sheet (January 2013)
O Carrie's Balance Sheet (January 2012 - January 2013)
Carrie's Balance Sheet (January 2008 - January 2013)
Carrie's Balance Sheet (Birth - January 2013)

Answers

Answer:

the answer is A

Explanation:

carries balance sheet ( 2013)

Answer: the answer is A

Explanation: I got 100 ./.

Lidia is assigning her first name as the value to a variable. Which is the correct format to use? firstName = "Lidia" First Name = "Lidia" firstName! = "Lidia" firstName = Lidia

Answers

Answer:

firstName = "Lidia"

Explanation:

firstName = "Lidia"

Answer:

firstName = "Lidia"

Explanation:

you declare a variable by

variableName = value

her name is of data type string, so it should be enclosed in " "

How can software assist in procuring goods and services?
What is e-procurement software?
Do you see any ethical issues with e-procurement?
For example, should stores be able to block people with smartphones from taking pictures of barcodes to do comparison shopping?

Answers

Answer:

Answered below

Explanation:

E-procurement software is the enterprise software that integrates and automates an organisation's procurement processes.

E-procurement software assists in procuring goods and services by allowing customers to browse online catalogs and stores, add their goods to shopping carts and send their requisition. This process reduces errors and improves efficiency.

Ethics of procurement include integrity, impartiality, fairness and transparency. Stores shouldn't block customers from doing comparison shopping.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform which of the following actions?

a. Integrity
b. Confidentiality
c. Authorization
d. Authentication

Answers

Answer:

d. Authentication.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

write a pseudocode thats accept and then find out whether the number is divisible by 5 ​

Answers

Answer:

input number  

calculate modulus of the number and 5  

compare outcome to 0  

if 0 then output "divisible by 5"  

else output "not divisible by 5"

Explanation:

The modulo operator is key here. It returns the remainder after integer division. So 8 mod 5 for example is 3, since 5x1+3 = 8. Only if the outcome is 0, you know the number you divided is a multiple of 5.

What type of job involves working at client locations and the ability to work with little direct supervision?

a. field-based

b. project-based

c. office-based

d. home-based

Answers

Answer:

A

Explanation:

________ includes reviewing transactoin logs and uses real-time monitoring to find evidence

Answers

Complete Question:

________ includes reviewing transaction logs and uses real-time monitoring to find evidence.

Group of answer choices

A. Log analysis

B. Network analysis

C. Code analysis

D. Media analysis

Answer:

B. Network analysis

Explanation:

Network analysis includes reviewing transaction logs and uses real-time monitoring to find evidence. Network analysis is a form of computer forensic service, which involves the scientific process of identifying, capturing and analyzing or examining data that are stored on digital devices in an electronic format, for the sole purpose of unraveling the truth about an allegation such as fraud, without preempting the outcome of the investigation.

Network analysis involves the use of network analyzers such as a sniffing and tracing tool to analyze or examine network traffic in real-time. Some examples of network analyzing tools are netdetector, tcpdump, pyflag, networkminer, xplico, tsat, wireshark, omnipeek, etc.

Please note, network analysis is also known as network forensics in computer science.

Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers rely upon.

a. True
b. False

Answers

Answer:

True

Explanation:

A privacy policy is a legal document or statement that discloses the ways a party gathers uses and manages a customer's data. These data include personal information such as address, name, financial records, medical history, travel records etc.

Policies such as the Children Online Privacy Protection Act which protects children on websites collecting children's data, the Gram-Leach-Bliley Act, The Health Insurance Portability and Accountability Act, are in place to ensure that privacy is protected and sanctions are metted out to violating companies.

Create a Python script that takes two parameters to do the following:-
1) List all files names, size, date created in the given folder
2) Parameter1 = Root Folder name
Parameter2= File size >>> to filter file size ( you can do =, > or <) it is up to you, or a range.
The script should check and validate the folder name, and the size
The script should loop until find all files greater than the specified size in all the sub-folders
3) Use catch-exception block (Make sure that the error messages do not reveal any of the application code)
4) Optionally, you can save the list into a file "Results.txt" using the redirection operator or by creating the file in the script.

Answers

Answer:

import sys, time

from os import walk, remove

from os.path import exists, join, getsize, getctime

file_counter = [ ]

folder_name, file_size = argv

isExist = exists( folder_name )

if folder_name == True:

    for root, folder, files in walk( folder_name ):

          for file in files:

               if getsize( join ( root, file ) ) >= file_size:

                   file_log = [ ]

                   file_log.append( file )

                   file_log.append( join ( root, file) )

                   file_log.append( time.ctime( getctime( file ) ) )

                   file_counter.append( file_log )

               else:

                   remove ( join ( root, file ) )

Explanation:

The python script above output the filename, size and file creation date of any folder passed to it.

#We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns its length. However, you may not use #Python's built-in len function. # #Finish our code. We are missing the base case and the #recursive call. # #HINT: Often when we have recursion involving strings, we #want to break down the string to be in its simplest form. #Think about how you could splice a string little by little. #Then think about what your base case might be - what is #the most basic, minimal string you can have in python? # #Hint 2: How can you establish the base case has been #reached without the len() function? #You may not use the built-in 'len()' function.

Answers

Answer:

Here is the Python program:  

def measure_string(myStr): #function that takes a string as parameter  

 if myStr == '': #if the string is empty (base case)  

      return 0  #return 0  

  else: #if string is not empty  

      return 1 + measure_string(myStr[0:-1]) #calls function recursively to find the length of the string (recursive case)  

#in order to check the working of the above function the following statement is used    

print(measure_string("13 characters")) #calls function and passes the string to it and print the output on the screen      

Explanation:

The function works as following:  

Suppose the string is 13 characters  

myStr = "13 characters"  

if myStr == '': this is the base case and this does not evaluate to true because myStr is not empty. This is basically the alternate of  

if len(myStr) == 0: but we are not supposed to use len function here so we use if myStr == '' instead.  

So the program control moves to the else part  

return 1 + measure_string(myStr[0:-1])  this statement is a recursive call to the function measure_string.  

myStr[0:-1] in the statement is a slice list that starts from the first character of the myStr string (at 0 index) to the last character of the string (-1 index)  

This statement can also be written as:  

return 1 + measure_string(myStr[1:])

or  

return 1 + measure_string(myStr[:-1])  This statement start from 1st character and ends at last character  

This statement keeps calling measure_string until the myStr is empty. The method gets each character using a slice and maintains a count by adding 1 each time this statement is returned.The function breaks string into its first character [0:] and all the rest characters [:-1]. and recursively counts the number of character occurrences and add 1. So there are 13 characters in the example string. So the output is:  

13

write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the end month and the day of the week for 1st January of that year

Answers

Answer:un spain please

Explanation:

You have just used a command that produced some interesting output on the screen. You would like to save that information into a file named "interesting.txt", which does not currently exist. You can do this by issuing the same command, but appending which of the following?
A. > interesting.txt
B.
C. interesting.txt
D. | interesting.txt

Answers

Answer: A. > interesting.txt

Explanation: From the command line, one can perform numerous tasks from navigating into a directory, creating a new directory, deleting files, create files, modify files and so on using simple commands. In the scenario above, after using a common which is used to produce an output on the screen, such as the 'echo' command, one may wish to save the file giving the user the ability to access the file later. Since it is stated the file name 'interesting.txt' given to the file does not currently exist, appending the sign > saves the file. If the filename already exists, it will overwrite the existing content.

ven if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are

Answers

Complete Question:

Even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are;

Group of answer choices

A. policy and procedure development

B. use case activity diagram testing

C. method design and coding

D. data conversion and user training

Answer:

C. method design and coding

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are six (6) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Deployment.

6. Maintenance.

Among the listed stages, there are two (2) most important stages which cannot be ignored in the creation of a software application are.

Hence, even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are method design and coding.

I. Method design: this is the third step of the software development life cycle, it comes immediately after the analysis stage. This is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.

II. Coding (development): this is the fourth step in the software development process and it involves the process of creating a source code which would enable the functionality of the software application.

Density-based spatial clustering of applications with noise is a simple and effective density-based clustering algorithm that illustrates a number of important concepts that are important for any density-based clustering approach. True False

Answers

it is correct its TRUE

JavaCalculate the ChangeProgramming challenge description:The goal of this question is to design a cash register program. Your register currently has the following notes/coins within it:One Pence: .01Two Pence: .02Five Pence: .05Ten Pence: .10Twenty Pence: .20Fifty Pence: .50One Pound: 1Two Pounds: 2Five Pounds: 5Ten Pounds: 10Twenty Pounds: 20Fifty Pounds: 50The aim of the program is to calculate the change that has to be returned to the customer with the least number of coins/notes. Note that the expectation is to have an object-oriented solution - think about creating classes for better reusability.Input:Your program should read lines of text from standard input (this is already part of the initial template). Each line contains two numbers which are separated by a semicolon. The first is the Purchase price (PP) and the second is the cash(CH) given by the customer.Output:For each line of input print a single line to standard output which is the change to be returned to the customer. If CH == PP, print out Zero. If CH > PP, print the amount that needs to be returned (in terms of the currency values). Any other case where the result is an error, the output should be ERROR.The output should change from highest to lowest denomination.Test 1Test 1 Input11.2520Expected OutputFive Pounds, Two Pounds, One Pound, Fifty Pence, Twenty Pence, Five PenceTest 2Test 2 Input8.7550Expected OutputTwenty Pounds, Twenty Pounds, One Pound, Twenty Pence, Five PenceTest 3Test InputDownload Test 3 Input2010Expected OutputDownload Test 3 InputERRORCode below:please fill the functions and or classes here. thank you for help.import java.io.BufferedReader;import java.io.IOException;import java.io.InputStreamReader;import java.nio.charset.StandardCharsets;public class Main {/*** Iterate through each line of input.*/public static void main(String[] args) throws IOException {InputStreamReader reader = new InputStreamReader(System.in);BufferedReader in = new BufferedReader(reader);try {double purchasePrice = Double.parseDouble(in.readLine());double cash = Double.parseDouble(in.readLine());Main.calculateChange(purchasePrice, cash);} catch (Exception e) {System.out.println(e);}}public static void calculateChange(double purchasePrice, double cash) {// Access your code here. Feel free to create other classes as required}}

Answers

Answer:

i dont know

Explanation:

Can you make the wording more clear?

People from this cultural group are more tolerant to new ideas and opinions that differ from their own
A) North Americans
B) People with low uncertainty avoidance
C) None of these
D) People with high uncertainty avoidance

Answers

Answer:

B) People with low uncertainty avoidance

Explanation:

Uncertainty avoidance is how cultures differ on the amount of tolerance they have of unpredictability. Mostly, uncertainty avoidance deals with technology, law, and religion. People with low uncertainty avoidance cultures accept and feel comfortable in unstructured situations or changeable environments and  tend to be more pragmatic and more tolerant of change. People in cultures with high uncertainty avoidance try to minimize the occurrence of unknown and unusual circumstances.

Multisensory input/output devices, such as data gloves or jumpsuits, are commonly used with _______________ systems.

Answers

Answer:

virtual reality

Explanation:

Virtual reality is basically a simulated or virtual environment. This environment is implemented by compute technology for the users that can interact with the virtual 3 dimensional objects instead of just watching them on the screen. With the use of multi-sensory input and output devices the senses of the user are simulated.

Virtual reality devices are the products used for interacting with a virtual environment for the users. Some of the multisensory input/output devices include:

data gloves

jumpsuits

track pads

joysticks

treadmills

multi-speaker audio

visual displays

controller wands

head set

For example a data glove enables the users to interact with virtual objects and feel the object rather than just a movement of hand in the air and it is also used in virtual gaming. Jumpsuits are also used to feel sensations in the virtual reality environment. It stimulates different body parts in response to any action taken by user in a virtual environment.

Answer:

virtual reality

Explanation:

yeah this is correct

Other Questions
An organ pipe open at both ends has two successive harmonics with frequencies of 220 Hz and 240 Hz. What is the length of the pipe? The speed of sound is 343 m/s in air. Businesses and governments try to encourage people to make particular economic decisions by:A. analyzing trade-offs for those decisions.B. creating incentives for those decisions.C. increasing opportunity costs for those decisions.D. reducing marginal benefits for those decisions. r - 7 = 1 can someone help me with this What is the value of t? What information would you give someone so that they could find this area on the map? A Cassandra is someone who warns other people of a future danger but is not believed or heeded. The term comes from a story in Greek mythology in which Cassandra, the daughter of a king and queen, was given the gift of accurately seeing the future by the god Apollo, who was in love with her. However, when she did not love him back, Apollo became angry and placed a spell that prevented anyone from believing her predictions. Question 1 of 12 What is the overall purpose of this passage? Answers Answers Answer Letter Answer A To relate a story from Greek mythology B To explain the origin of a term C To emphasize the need to take some predictions seriously D To show how difficult it is to predict future events 2 poit2. For the question above, the measurement 0.2002 grams is ameasurement of what type of property?*wMassVolumeDensityTemperature The midpoint of JK is M(8,9). One endpoint is J(10, 10). Find the coordinates of the otherendpoint K.Write the coordinates as decimals or integers.K= (1,7) HELP ME PLZ I NEED THIS !!! What personal skills (like patience, perseverance, or humility) does a musician need in order to master the basics of music? How could these skills be used in other areas of life? If line a has a greater slope than line b, is line a steeper than line b? Explain, giving examples to support your answer. ( PLEASE HELP) What does significant mean in this sentence? ". Lastly, they include significant bodies of water." Help!!!!!! What is the absolute value of Point A labelled on the number line? Drag and drop the answer into the box to match the correct statement. Why is the capital of France and named Paris? A farmer has developed a new type of fertilizer. This new fertilizer costs 20 percent more to produce than the old fertilizer but has better results: The same land now produces 25 percent more crops each year. Which statement best describes one way the farm will be affected by using this new fertilizer?A. The farm's marginal benefits for each piece of land will decrease.B. The farm's marginal benefits for each piece of land will increase.C. The farm's opportunity cost for each piece of land will decrease.D. The farm's opportunity cost for each piece of land will increase, what does (x + 3)(x - 5)= Dr. Prometheus wants to describe the attitudes of all 18-year-old Houstonians concerning the legalization of marijuana. She randomly picks 500 people of that age to fill out her survey. In this study, the population being measured is Group of answer choices In the past year at Carters Material Handling Equipment Manufacturing Company, eight employees experienced minor injuries (cuts) from handling metal parts. One employee lost 15 workdays after getting debris in his eye while grinding, six employees lost two days each due to back strains, and four welders were treated for minor burns. Select one of the injury types, and discuss the possible performance problems. Suggest one or more solutions for each performance problem. Prove that The sum of the angles in a triangle is 180. When a taxpayer receives more EITC after adding a Schedule C to their return than they would have received without it, the Tax Professional must: What were 4 differences between New England & the Chesapeake? plz help