Answer:
The correct answer is data store
Explanation:
Write a statement to create a Google Guava Multimap instance which contains student ids as keys and the associated values are student profiles.
Answer: provided in the explanation section
Explanation:
Note: take note for indentation so as to prevent error.
So we import com.google.common.collect.Multimap;
import java.util.Collection;
import java.util.Map;
class Main {
public static void main(String[] args) {
// key as studentId and List of Profile as value.
Multimap<String,Profile> multimap = ArrayListMultimap.create();
multimap.put("id1", new ExamProfile("examStudentId1"));
multimap.put("id1", new ELearningProfile("userId1"));
multimap.put("id2", new ExamProfile("examStudentId2"));
multimap.put("id2", new ELearningProfile("userId2"));
// print the data now.
for (Map.Entry<String, Collection<Profile>> entry : multimap.entrySet()) {
String key = entry.getKey();
Collection<String> value = multimap.get(key);
System.out.println(key + ":" + value);
}
}
}
// assuming String as the studentId.
// assuming Profile as the interface. And Profile can multiple implementations that would be
// specific to student.
interface Profile {
}
class ExamProfile implements Profile {
private String examStudentId;
public ExamProfile(String examStudentId) {
this.examStudentId = examStudentId;
}
}
class ELearningProfile implements Profile {
private String userId;
public ELearningProfile(String userId) {
this.userId = userId;
}
}
This code is able to iterate through all entries in the Google Guava multimap and display all the students name in the associated students profile.
Which dashboard does the Control Room administrator need to reference to get a graphical representation of Events Distribution by Activity Type?
a) Bots
b) Workload
c) Insights
d) Audit
what are some consequences of internet addiction
Answer:
1. week eyesight
2. weak brain power
3. loss of concentration...
hope it helps u
Home communication involves controlling systems such as heating, cooling, and security.
a. True
b. False
Answer:
A. True
Explanation:
Home communications involves automating home. It includes controlling the air-con,water heater, webcam, etc. A
***Help ***Which Paste Command is used to insert a new linked Excel worksheet into a PowerPoint presentation? A. Embed B. Use Destination Styles C. Keep Source Formatting D. Paste Special
Answer:
Embed is used to insert a new linked Excel worksheet into a PowerPoint presentation
Hope this answer correct :)
Which one of these is a good reason for taking care to design a good computer human interface?
A. Not every user is a computer expert
B. Well-designed HCIs allow the software to be sold at a better price.
C. Well-designed HCIs use less computer resources
D. Well-designed HCIs allow the computer to run faster
A good reason for taking care to design a good computer human interface is that not every user is a computer expert.
What is computer human interface?Human Computer Interface (HCI) is known to be a technology that deals with the set up, execution and workings of computer systems and related scenarios for human use.
Note therefore that A good reason for taking care to design a good computer human interface is that not every user is a computer expert and as such it will help all computer users even if they are novice.
Learn more about computer human interface from
https://brainly.com/question/17238363
#SPJ2
Which tab is used to change the theme of a photo album slide show?
A. Home
B. Design
C. View
Answer:
b. design. Is your answer
A "responsive design" for mobile applications is a design that responds to a user's: A. digital device and screen size. B. needs. C. location. D. voice commands. E. gestures .
Answer:
A. digital device and screen size.
Explanation:
A "responsive design" for mobile applications is a design that responds to a user's digital device and screen size.
In Computer programming, a responsive web design makes it possible for various websites to change layouts in accordance with the user's digital device and screen size.
Hence, an end user's behavior and environment influences the outcome of their content and layout in a responsive design for mobile applications and websites.
This ultimately implies that, a responsive design is a strategic approach which enables websites to display or render properly with respect to the digital device and screen size of the user.
Which class of IP address allows for the greatest amount of subnets and host devices?
a. Class A
b. Class B
c. Class C
d. Class D
Answer:
A
Explanation:
John is analyzing an attack against his company in which the attacker found comments embedded in HTML code that provided the clues needed to exploit a software vulnerability. Using the STRIDE model, what type of attack did he uncover?
Answer:
Information Disclosure
Explanation:
Hello, the fact that the attacker was able to gather information from within the embedded HTML code suggests that the original developer did not properly store information, revealing potential issues or vulnerabilities in his/her design.
The STRIDE model stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.
Using the STRIDE model, one would say this would be a simple information disclosure attack, since the attacker used retrieved information to breach the system.
Cheer.
Research and discuss the LAMP (Linux, Apache, MySQL, and PHP) architecture. What is the role of each layer of this software stack
Answer:
Answered below
Explanation:
LAMP is an example of a web service stack. It is used for developing dynamic websites and applications. It's components include;
1) The Linux operating system, which is built on open source and free development and distribution. Types of Linux distributions include: Ubuntu, Fedora and Debian. This operating system is where sites and applications are built on.
2) The Apache HTTP server. Apache server is developed by the Apache software Foundation and is open source. It is the most popular web server on the internet and plays a role in hosting websites.
3) MySQL is a relational database management system that plays a role in the storage of websites data and information.
4) The PHP programming language is a scripting language for web development whose commands are embedded into an HTML source code. It is a popular server-side language used for backend development.
Which statement correctly creates a set named colors that contains the 7 colors in a rainbow?
a. colors = ["red", "orange", "yellow" "green", "blue", "indigo", "violet"]
b. colors = {red, orange, yellow, green, blue, indigo, violet}
c. colors = [red, orange, yellow, green, blue, indigo, violet]
d. colors = {"red", "orange", "yellow", "green", "blue", "indigo", "violet"}
Answer: d. colors = {"red", "orange", "yellow", "green", "blue", "indigo", "violet"}
Explanation:
We use "{}" to write a set in it.
Also, the names of the colors are strings so we use inverted commas ("") to express them.
So, the set named colors that contains the 7 colors in a rainbow will be:
colors = {"red", "orange", "yellow", "green", "blue", "indigo", "violet"}
Hence, the correct option is d.
External network security threats can include management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures.
A. True
B. False
Answer:
The answer is "Option B".
Explanation:
In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.
This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.
Where can you submit a bug report?
Answer:
most developers incorporate a report a bug feature, if you cannot find it search online or go to the website on the software.
Explanation:
When an object reference is passed as a parameter to a method, modifying the members of that object from inside the method will result in a change to that object as seen from the client.
a. True
b. False
Answer:
A) True
Explanation:
Objects are known as reference types, meaning that they are always accessed by references, not copied. When a method is called, passing an object to it, Java passes a reference of that object to the method and when that reference is modified, the changes can be seen in the object itself. Therefore a mutable object can be mutated anywhere- either from where it is created or by a method it is passed to. Hence the need to always use privacy modifier keywords such as public, private or protected, to determine the exposure of class properties and methods.
describe the six clauses in the syntax of an sql retrieval query. show what type of constructs can be specified in each of the six clauses
Answer:
Answered below
Explanation:
An SQL retrieval query is made up of up to six clauses that must be coded in a specific sequence and they consist of;
1) SELECT - This clause allows you list the columns you want.
2) FROM - This clause indicates the tables you are retrieving information from.
3) WHERE - The where clause indicates a condition.
4) GROUP BY - Let's you group your data into specific and more meaningful information.
5) HAVING - Puts a condition in your group.
6) ORDER BY - Orders your result rows in ascending or descending order.
What is the output from the following code? MapInterface m; m = new ArrayListMap(); m.put('D', "dog"); m.put('P', "pig"); m.put('C', "cat"); m.put('P', "pet"); System.out.println(m.get('D')); System.out.println(m.get('E')); System.out.println(m.get('P'));
Answer: dog
null
pet
Explanation:
taking into condiserations the various animals and their tag given to them;
OUTPUT :
dog
null
pet
PROOF:
Where the Initially map : {}
after map.put('D', "dog"), map : {'D':"dog"}
after map.put('P', "pig"), map : {'D':"dog", 'P':"pig"}
after map.put('C', "cat"), map : {'D':"dog", 'P':"pig", 'C':"cat"}
after map.put('P', "pet"), map : {'D':"dog", 'P':"pet", 'C':"cat"}, what this does is replace the value of P with "pet"
map.get('D') prints dog.
map.get('E') prints null, key is not present
map.get('P') prints pet
cheers I hope this helped !!
Which of the following components of a computer system defines the ways to use system resources to solve computing problems?
A) application programs
B) operating system
C) computer hardware
D) computer logo
Answer: A) application programs
Explanation: The problem solving capability of a computer system is made possible through the use of certain programs or group of programs specifically designed to tackle, manage or solve certain problems or task for the end users. Application programs are numerous and the problems at which they are targeted are diverse and usually different. Such that users would have to application programs based on the problem at hand. Application programs often leverage system capability and resources to help the fuction of written programs designed as applications for end users. Application programs includes : Microsoft office suite used to solve business related tasks such as writing, calculation, scheduling and so on., gaming applications and so on.
Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding is fun.) print = Coding is fun.
Answer:
print(“Coding is fun.”)
Explanation:
The proper format for a print statement is usually you have the print statement followed by the string in quotes in parentheses.
Hope this helped!
Answer:
print(“Coding is fun.”)
Explanation:
kyra needs help deciding which colors she should use on her web page. what can she use to help her decide?
Answer:
What colors does she like most, and what colors best correlate with the subject of the website.
Explanation:
You want to have the color relate to the subject of the website, or just favorites!
Answer:
Storyboarding.
In a working diode, the junction Diode
Give a command that will create a file named listing.dat, in your current (commandsAsst) directory, containing a list of all the files in your fileAsst directory. I need to use redirection, and have tried almost every variation of ls -a < ~/UnixCourse/fileAsst. > listing.dat Primarlily the error I get is that I did not create the 'listing.dat file with ALL of the files located in ../fileAsst/ When I run the same command in another terminal window, then verify with ls -a I can see that I did indeed create the listing.dat file. Can someone tell me what it is I am missing?
Answer:
Following are the command to this question:
"ls -a ~/UnixCourse/fileAsst > listing.dat"
Explanation:
The above-given code will create a file, that is "listing.dat", and this file will be created in your current directory, which will include the list of all files in the file-asst directory.
In this, Is command is used that uses the directory that is "UnixCourse/fileAsst" and inside this, it will create the "dat" file that is "listing".
Compute their Cartesian product, AxB of two lists. Each list has no more than 10 numbers.
For example, given the two input lists:
A = [1,2]
B = [3,4]
then the Cartesian product output should be:
AxB = [(1,3),(1,4),(2,3),(2,4)]
Answer:
The program written in Python is as follows: (See Attachments for source file and output)
def cartesian(AB):
if not AB:
yield ()
else:
for newlist in AB[0]:
for product in cartesian(AB[1:]):
yield (newlist,)+product
A = []
B = []
alist = int(input("Number of items in list A (10 max): "))
while(alist>10):
alist = int(input("Number of items in list A (10 max): "))
blist = int(input("Number of items in list B (10 max): "))
while(blist>10):
blist = int(input("Number of items in list B (10 max): "))
print("Input for List A")
for i in range(alist):
userinput = int(input(": "))
A.append(userinput)
print("Input for List B")
for i in range(blist):
userinput = int(input(": "))
B.append(userinput)
print(list(cartesian([A,B])))
Explanation:
The function to print the Cartesian product is defined here
def cartesian(AB):
This following if condition returns the function while without destroying lists A and B
if not AB:
yield ()
If otherwise
else:
The following iteration generates and prints the Cartesian products
for newlist in AB[0]:
for product in cartesian(AB[1:]):
yield (newlist,)+product
The main method starts here
The next two lines creates two empty lists A and B
A = []
B = []
The next line prompts user for length of list A
alist = int(input("Number of items in list A (10 max): "))
The following iteration ensures that length of list A is no more than 10
while(alist>10):
alist = int(input("Number of items in list A (10 max): "))
The next line prompts user for length of list B
blist = int(input("Number of items in list B (10 max): "))
The following iteration ensures that length of list B is no more than 10
while(blist>10):
blist = int(input("Number of items in list B (10 max): "))
The next 4 lines prompts user for input and gets the input for List A
print("Input for List A")
for i in range(alist):
userinput = int(input(": "))
A.append(userinput)
The next 4 lines prompts user for input and gets the input for List B
print("Input for List B")
for i in range(blist):
userinput = int(input(": "))
B.append(userinput)
This line calls the function to print the Cartesian product
print(list(cartesian([A,B])))
Which of the following are characteristics of algorithms? Choose all that apply. They take a step-by-step approach to performing a task. They’re made up of Instructions posted on a website. They break the task into manageable steps. They identify the tasks that will repeat. They can be written in a computer language to create a program for a computer to follow.
Answer: They take a step-by-step approach to performing a task.
They break the task into manageable steps.
They identify the tasks that will repeat.
They can be written in a computer language to create a program for a computer to follow.
Answer:
They take a step-by-step approach to performing a task.
They break the task into manageable steps.
They identify the tasks that will repeat.
They can be written in a computer language to create a program for a computer to follow.
Explanation:
An algorithm is a step by step process that needs to be followed in order to solve logical, mathematical, well-defined instructions.
An everyday example of an algorithm is a recipe because it gives you steps to do in order to complete a task.
In computing terms, algorithms can be represented with flow charts, pseudocodes, or high-level languages.
Some of its characteristics include:
They can be written in a computer language to create a program for a computer to follow.They identify the tasks that will repeat. They take a step-by-step approach to performing a task. They break the task into manageable steps.Answer:
So your answer will be
A.
C.
D.
E.
Explanation:
Edge2021
Given two strings s and t of equal length, the Hamming distance between s and t, denoted dH(s,t), is the number of corresponding symbols that differ in s and t.
Given: Two DNA strings s and t of equal length (not exceeding 1 kbp).
Return: The Hamming distance dH(s,t).
Sample Dataset
GAGCCTACTAACGGGAT CATCGTAATGACGGCCT
Sample Output
7
Answer:
computer and technologycomputer and technology
Explanation:
computer and technologycomputer and technology
Let A and B be two sets of n positive integers. You get to reorder each set however you like. After reording, let ai be the i-th element of A and bi be the i-th element of B. The goal is to maximize the function n Π (i=1) ai^bi . You will develop a greedy algorithm for this task.
Required:
a. Describe a greedy idea on how to solve this problem, and shortly argue why you think it is correct (not a formal proof).
b. Describe your greedy algorithm in pseudocode. What is its runtime?
Answer:
Describe your greedy algorithm in pseudocode. What is its runtime?
"the time it takes a storage device to locate stored data and make it available for processing is called"
Answer:
The time is called "Access time"
Explanation:
Basically it is the time taken to retrieve information/data
What is access time?
It is the time taken by a storage device to located information and process the information often times the access time is faster in hard drives when compared to other drives like Optical drives.
Another good analogy or description of access time is the time taken to order a product online and when it is delivered to you in your house
Write a function called count_occurrences that takes two strings. The second string should only be one character long. The function should return how many times the second string occurs in the first string.
Answer:
Here is the Python function:
def count_occurrences (string1 , string2): # method that takes two strings as parameter and returns how many times second string occurs in first
count = 0 #counts number of occurrence of string2 in string1
for word in string1: #iterates through each word of the string1
for character in word: #iterates through each character of each word in string1
if character == string2: # checks if the character in string1 is equal to the character of string2
count = count + 1 #adds 1 to the count of string2 in string1
return count #returns number of times the string2 occurs in string1
#in order to check the working of the function add the following lines to the code:
first_str = input("Enter the first string: ") #prompts user to enter first string
second_str = input("Enter the second string (one character long): ") #prompts user to enter second string which should be one character long
occurrence = count_occurrences(first_str,second_str) #calls count_occurrences method by passing both strings to it
print(second_str,"occurs",occurrence,"times in",first_str) #prints how many times the second_str occurs in the first_str on output screen
Explanation:
The program is well explained in the comments added to each statement of the above code. I will explain the program with an example:
Suppose
string1 = "hello world"
string2 = 'l'
So the method count_occurrences() should return how many times l occurs in hello world.
count is used to count the number of occurrences of l in hello world. It is initialized to 0.
The first loop iterates through each word of string1. The first word of string1 is "hello"
The second loop iterates through each character/letter of each word. So the first letter of "hello" word is 'h'.
The if condition if character == string2: checks if the character is equal to string2 i.e. l.
character = "h"
string2 = "l"
The are not equal so the program moves to the next character of word hello which is e. The if condition again evaluates to false because e is not equal to l. So the program moves to the next character of word hello which is l.
This time the if condition evaluates to true because
character = "l"
string2 = "l"
character == string2
l == l
So the if part is executed which has the following statement:
count = count + 1
So the count is added to 1. count was 0 previously. Now
count = 1
Next the program moves to the next character of word hello which is l. This time the if condition evaluates to true because the character l matches with string2. So count is again incremented to 1. count = 2.
Next the program moves to the next character of word hello which is o. The if condition evaluates to false as o does not match with string2 i.e. l. So the count remains 2.
Next the first loop moves to the next word of the string1 = "world". The inner (second) for loop iterates through each character of "world" from "w" to "d" and checks if any character is equal to string2. Only one character is equal to string2 in "world". So count is incremented to 1. Hence count = 3
After the loop ends the statement return count returns the number of times string2 occurs in the string1. So the output is:
l occurs 3 times in hello world
Answer:
def count_occurrences(sentence, thing_to_count):
times = 0
for word in sentence:
for letter in word:
if letter == thing_to_count: times += 1
return times
Explanation:
I got 100%
What are the advantages and disadvantages of solving a problem that can be broken down into repetitive tasks with recursion as opposed to a loop? Explain your answer.
Answer:
Answered below
Explanation:
Recursion refers to the process of a function calling itself within its own definition. It calls itself repeatedly until a base condition is met and the loop breaks.
The advantages of recursion over loops include;
A) Recursion reduces time complexity.
B) Recursion is better at tree traversal and graphs.
C) Recursion reduces the time needed to write and debug code and also adds clarity to code.
Disadvantages of recursion include;
A) Recursion uses more memory because each function call remains in stack until the base case is met.
B) Recursion can be slow.
C) Recursion
A _____ area network is one step up from a _____ area network in geographical range.
Answer:
A metropolitan area network is one step up from a local area network in geographical range.
Explanation:
A metropolitan area network is one step up from a local area network in geographical range.
A network is a group of devices connected together for communication. Networks can be classified according to the area they cover, A metropolitan area network is smaller than a wide area network but larger than a local area network.
A local area network consist of computers network in a single place. A group of LAN network form a metropolitan network
A metropolitan network is a network across a city or small region. A group of MAN form a wide area network.