Answer:
Answered below
Explanation:
//This design is implemented with Kotlin.
class Equipment (val name: String,
var weight: Double,
var cost: Double,
val powerUsage: Double,
val manufacturers: String) {
fun equipmentSpecs( ){
print("Equipment is $name. It is
manufactured by
$manufacturers and costs
$cost. It weighs $weight and
usess $powerUsage amount of power")
}
}
//Driver class
class Driver{
fun main( ){
val cellPhone: Equipment = Equipment ("Samsung", 5.3, 20, 2.5, "Samsung labs")
println( cellPhone.name)
println(cellPhone.weight)
cellPhone.equipmentSpecs( )
}
}
In the picture below
Answer:
The answer is "It is a public method in the Car class".
Explanation:
In this question, the fourth choice is correct because the accessor method will be public, and the incorrect choice can be defined as follows:
The first and second choice was wrong because the class name is "Car".In the third choice, it is wrong because the method will not be private.In the fifth choice, it is wrong because the object name "mustang".doubleUp Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enough space in the array to double the size. Suppose a list stores the values [1, 3, 2, 7]. After calling list.doubleUp(), the list should store the values [1, 1, 3, 3, 2, 2, 7, 7].
Answer:
The solution in Python is as follows:
class myClass:
def doubleUp(self,myList):
myList[:0] = myList[::2] = myList[1::2] = myList[:]
mylist = [1, 3, 2, 7]
list = myClass()
list.doubleUp(mylist)
print(mylist)
Explanation:
To create a method in Python, the first step is to create a Class.
This is done in the following line:
class myClass:
Then this line defines the method
def doubleUp(self,myList):
This line duplicates the elements of the list
myList[:0] = myList[::2] = myList[1::2] = myList[:]
This defines the list
mylist = [1, 3, 2, 7]
This creates an instance of the class
list = myClass()
This passes the list to the doubleUp method
list.doubleUp(mylist)
This prints the duplicated list
print(mylist)
Write a program for determining if a year is a leap year. In the Gregorian calendar system you can check if it is a leaper if it is divisible by 4 but not by 100 unless it is also divisible by 400.
Answer:
def leap_year_check(year):
return if int(year) % 4 == 0 and (int(year) % 100 != 0 or int(year) % 400 == 0)
Explanation:
The function is named leap_year_check and takes in an argument which is the year which we wish to determine if it's a new year or not.
int ensures the argument is read as an integer and not a float.
The % obtains the value of the remainder after a division exercise. A remainder of 0 means number is divisible by the quotient and a remainder other wise means it is not divisible by the quotient.
If the conditions is met, that is, (the first condition is true and either the second or Third condition is true)
the function leap_year_check returns a boolean ; true and false if otherwise.
Chantelle wants to change the color scheme for her company's web app, and she needs to get the logos updated. What kind of developer should she talk to
Incomplete question. The options;
a. Back-end
b. DBA
c. Front-end
d. Mobile
Answer:
c. Front-end
Explanation:
A Front-end developer is skilled at designing the external features of a web application or web browser. In other words, the user interfaces such as the color and logos of an app are designed by the Front-end developer.
Hence, Chantelle should talk to an experienced Front-end developer.
Which of the following are all involved in the evaluation of the presentation of a speech?
Vocal technique, organization, body language
Body language, organization, visual aids
Visual aids vocal technique, body language
Organization, body language, visual aids
Answer:
C.
Explanation:
The elements involved in the evaluation of the presentation of a speech includes visual aids, vocal technique, and body language.
Adding vivid pictures in the presentation makes it graphic and proficient. The visual aids in presentation also provides the succinct and clear meaning of the message to the reader.
The vocal technique is another element that adds value in presentation. A speaker's confidence is reflected through his/her tone. It is the speaker's voice that becomes an influential tool that draws the audience's attention.
Body language, like vocal technique, helps in effective delivering of the speech. Body language is a non-verbal form of communicatin that communicates a lot to the audience than one can imagine.
Therefore, option C is correct.
Visual aids, voice technique, and body language are all factors considered when assessing how well a speech is presented.Thus, option C is correct.
What evaluation of the presentation of a speech?Making use of colorful images in the presentation gives it a visual and professional feel. The reader can easily understand the material thanks to the presentation's visual aids.
Another aspect of presenting that adds value is voice technique. The tone of a speaker conveys his or her level of assurance. The voice of the speaker becomes a powerful tool for grabbing the audience's attention.
Similar to vocal technique, body language aids in effective speech delivery. Body language is a non-verbal type of communication that tells your audience more than you might think.
Therefore, Visual aids vocal technique, body language all involved in the evaluation of the presentation of a speech.
Learn more about speech here:
https://brainly.com/question/12453277
#SPJ3
What is the value of the count variable after the execution of the code snippet below? ArrayList somenum = new ArrayList(); somenum.add(1); somenum.add(2); somenum.add(1); int count = 0; for (int index = 0; index < somenum.size(); index++) { if (somenum.get(index) % 2 == 0) { count++; } }
Answer:
The answer is "1".
Explanation:
The value of the count variable after the code snippet execution is 1 because we're using three in the array list, instead, take one of these for a loop of 0 to the array list size but now the ArrayList size is 3, as well as the loop size, operates from 0 to 2:
In the index =0:
We get somenum.get(index)=somenum.get(0)=1%2 not 0, so we go on to the next index.
Index: = 1
We get a somenum.get(index) =somenum.get(1) = two percent 2 comparable to 0, so the count variable is increased to 1 and switch to just the following index.
count=1
Index: = 2
They have a somenum.get(index) = somenum.get(2)=1 percent 2 not equivalent to 0.
Index= 3:
The index =3 <somenum.size()=3.
It isn't valid, and the loop breaks out and prints out the value of a count variable which is 1. so this becomes 3 < 3.
products in which titanium is used
Answer:
It is used in jewelry, tennis rackets, scissors, bicycle frames, surgical tools, mobile phones and some other high-performance products.
Explanation:
Titanium is a familiar metal. Titanium is as strong as steel but weights about half as much.
i'll give brainliest to whoever says Tom Clancy's: The Division 2 is a garbage game.
Disney's first cartoon
Answer:
Mickey Mouse
Explanation:
Answer:
Oswald the Lucky Rabbit \(⋅⃘﹎᷊⋅⃘)
Explanation:
Oswald the Lucky Rabbit (also known as Oswald the Rabbit or Oswald Rabbit) is a cartoon character created in 1927 by Walt Disney and Ub Iwerks for Universal Pictures. He starred in several animated short films released to theaters from 1927 to 1938. 27 animated Oswald shorts were produced at the Walt Disney Studio.
Explain the development, design and implementation aspects of algorithms in the development of software.
Explanation:
Phases of software development are ;
1. Requirements analysis
2.Domain analysis
3.Client-oriented design
4.Implementation-oriented design
5.Implementation
6.Integration
7.Packaging.
Ongoing Activities in Software Development
1. Risk analysis
2. Planning
3.Verification
4.Documentation
Your network administrator asked you to change the IP for your first NIC to 206.206.206.138 so that users on the internet can reach the website you developed. What company do you work for
Answer:
Arizona State University
Explanation:
Internet Protocol address is a numerical means of identification assigned to each computer system that has access to the internet. It serves the function of identifying and communicating with other networks when connected to the internet.
When packets of information are exchanged over the internet, the incoming data contains a header which bears the internet protocol address of the sender as well as that of the receiver. The internet protocol address, 206.206.206.138, unique to Arizona State University.
Samantha wants to find out movie time for the new movie puppy save the world at her local theater which keyboard should Samantha use
Movie theater plus near
Movie theater plus near plus puppy save the world plus time
Puppy saves the world plus time
Puppy saves the world movie
Answer:
Movie theater plus near plus puppy save the world plus time
Explanation:
Answer:
Movie theater +near +Puppy Saves the World +time
Explanation:
These are four important key details that should be included when looking for something specific such as going to see a movie
Write a program that reads a list of words. Then, the program outputs those words and their frequencies.
Answer:
The program in Python is as follows:
mylist = []
nword= "y"
while(nword== "y"):
word = input(": ")
mylist.append(word)
nword = input("New word: y/n: ")
for item in mylist:
freq = mylist.count(item)
print(item, freq)
Explanation:
This creates an empty list
mylist = []
This is used to let the user input more word or stop input
nword = "y"
The following iteration lets the program read words from the user
while(nword == "y"):
This gets the user input
word = input(": ")
This appends the inputted word into the list
mylist.append(word)
This prompts if the user wants to input more word or not
nword = input("New word: y/n: ")
This iterates through the list
for item in mylist:
This gets the frequency of each word in the list
freq = mylist.count(item)
This prints the word and the frequency
print(item, freq)
The analogy of a computer system is often used to illustrate the different parts of memory. The keyboard is where we encode new information, the hard drive is where we store information, and the monitor is where we retrieve information. Now create your own analogy and explain why each part of the memory system corresponds with the analogy you have selected.
Answer:
Different memory parts is used to provide an analogy of the computer system. In keyboard, we give new new information, we store the information in a hard drive and we retrieve information from the monitor.
Explanation:
The Encoding: keyboard- encoding: we write something on a piece of a paper and then place it into a manila file folder.
Example: let a poem about Santa Claus
The Storage: Next CPU-Label of the folder and then put it into the file cabinets in the hanging file folder which is labeled with subject
Example: Label folder Santa Clause and put it into the present hanging file folder that is labeled "the Mythical winter figures"
The Retrieval: Now monitor-Open file cabinet, then flip to an appropriate hanging file, and then go to the specific file folder to get access to the paper.
Example: Flip to the "mythical winter figures" and then browse through the files until we locate the "Santa Claus," pull it out to read the poem. Then define and also give an example of the parallel processing.
Importance of computer in 150 words and essay
Answer: See explanation
Explanation:
A computer is simply referred to as an electronic device that can be used to store information and which can also make our work easier and faster.
The role of the computer in our daily lives nowadays cannot be understated as the computer is useful and used in every aspect of our lives. Computers are accurate, and makes our works easier.
Also, huge data's can be stores on the computer system. Computers are used in the education sector to tech students, in medical field as they aid treatments of patients etc.
Create a program to determine the largest and smallest number out of 15 numbers entered (numbers entered one at a time). This should be done in a function using this prototype: double larger (double x, double y); Make sure you use a for loop expression inside your function.
Answer:
Create a program to determine the largest and smallest number out of 15
Explanation:
#include <iostream>
using namespace std;
double larger (double, double);
int main()
{
double max, num;
cout<<"Please, enter 15 numbers, one at a time, and the program will return the largest number.\n";
cout<<"Enter the first number: ";
cin>>"max";
for(int i=1; i<=14; i++)
{
cout<<"\nEnter another number: ";
cin>>"num";
max=larger(max,num);
}
cout<<"The largest number is: "<<larger;
return 0;
}
double larger (double x, double y)
{
if(x>y)
return x;
else return y;
}
Write code that outputs variable numDays as follows. End with a newline. If input is 3, output is: Days: 3
Answer:
In C++:
#include<iostream>
using namespace std;
int main(){
int numDays;
cin>>numDays;
cout<<"Days: "<<numDays<<endl;
return 0;
}
Explanation:
This line declares numDays as integer
int numDays;
This line gets user input for numDays
cin>>numDays;
This line prints the required output and ends with a newline
cout<<"Days: "<<numDays<<endl;
Better Control, higher security, and privacy can be achieved through which type of cloud deployment model
Answer:
Private cloud deployment model
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Platform as a Service (PaaS).
2. Infrastructure as a Service (IaaS).
3. Software as a Service (SaaS)
Also, there are three (3) main cloud computing models and these are;
I. Public cloud deployment model.
II. Hybrid cloud deployment model.
III. Private cloud deployment model.
Hence, better control, higher security, and privacy can be achieved through a private cloud deployment model because it is dedicated solely to the user and void of any public interference.
What certificate authority user role is tasked with the approval of requests for certificate enrollment and revocation
Answer:
Certificate manager.
Explanation:
Certification can be defined as a recognition given for completing a course of study or passing an examination. This is to certify that the individual is a professional in that course of study. Some examples are CCNA, Comptia A+, HSE I and II
Certificate manager is the certificate authority user role that is tasked with the approval of requests for certificate enrollment and revocation.
This ultimately implies that, the individual who is saddled with the responsibility of approving requests for certificate enrollment and revocation is a certificate manager.
Hence, a certificate can be revoked by a certificate manager if a person issued the certificate contravenes the set rules, requirements and standard binding on the certificate.
Write a function that takes two arguments, both integers, and prints the product. In the main part of your program (the part that isn’t inside a function), call your function to test it out.
Answer:
def multiply(a, b):
print(a*b)
multiply(2,3)
Explanation:
Using python3 :
The program is written using python 3 ;
def represent the statement used at the start of a function.
Multiply is the name given to our function (it could be any other name of interest)
(a, b) are the argument, which represents the two integers the function takes.
print(a * b) = What the function does is to print the product of a and b
multiply(2,3) is used to test out our function by call the name and Giving it two integers to work on. The function will print 6
using a timer to generate a random number, develop a program that displays random numbers between 1 and 47 (or whatever) for your state's lottery
Answer:
Explanation:
The following code is written in Python. It creates a variable that detects the current time. Then it loops through a range of numbers and chooses the last random number after 2 seconds. Finally, it prints that number to the screen. This function can be called countless times depending on the number of state lottery numbers needed.
import random
import time
start_time = time.time()
while time.time() - start_time < 2:
lottery_number = random.randint(0, 48)
print(lottery_number)
write one for loop to print out each element of the list several things. then write another for loop
Question:
Write one for loop to print out each element of the list several_things. Then, write another for loop to print out the TYPE of each element of the list several_things.
Answer:
The solution in python is as follows:
for element in several_things:
print(element)
for element in several_things:
print(type(element))
Explanation:
The solution assumes that the list several_things has already been initialized.
So, the rest of the code is explained as follows:
This line iterates through the list, several_things
for element in several_things:
This line prints each element
print(element)
This line iterates through the list, several_things for the second time
for element in several_things:
This line prints the type of each element
print(type(element))
What is the correct sequence of steps in converting application data to bits for network transmission on a TCP/IP network
Answer:
1. Application data
2. segments
3. packets
4. frames
5. bits
Explanation:
The correct sequence of steps in converting application data to bits for network transmission on a TCP/IP network is as follows:
1. Application data: the conversion and formatting of information into data is done in Upper layers then moved to Transport Layer.
2. segments: at this stage, the data is turned into segments and then moved to the Network layer.
3. packets: at this point, the segment is transformed into packets and then moved to the Data Link layer
4. frames: here the packets are converted to frames and moved to the physical layer.
5. bits: this is where the frames are converted bits and then sent to the network outlet.
This Command to insert copied text anywhere in your document
Cut
Copy
Format painter
Paste
Answer:
Paste
Explanation:
Answer:
Please give me brainliest. The answer is paste
Explanation:
Assume that programs spend about 25% of their time waiting for I/O operations to complete. If there are FOUR programs loaded into memory, what is the processor utilization
Answer:
0.9961
Explanation:
Given that:
Proportion of time waiting for I/O operation to complete = 25% = 0.25
Number of programs waiting in memory = 4
Using the CPU Utilization formula :
CPU Utilization = 1 - p^n
1 - 0.25^4
1 - 0.00390625
0.99609375
Which two components are configured via software in order for a PC to participate in a network environment
Answer:
IP address and subnet mask.
Explanation:
The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;
I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.
In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.
Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.
II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.
Think of a simple software project that requires your design skills. Specify the requirements needed on each design process
Answer:In this guide, we'll go over the basics of your software development ... I know which option I'd choose. ... Will you need to integrate with other tools or APIs? ... With the requirements in place, it's time to start designing what this ... In its most basic form, you can think of the Waterfall method as following each ...
Explanation:
These comprise fundamental elements such as the functions, features, and requirements, which are chosen after analysing user demands. Hardware and software specifications, maintainability, availability, and testability are a few design criteria.
What requirements needed on each design process?Design specifications specify the conditions that a new good or service must fulfil to be deemed successful. In order for your team to design, create, and assess your solution, it is crucial to identify these requirements in the beginning.
Therefore, Criteria are the requirements that the design must meet in order to succeed. The design is limited by constraints. These could include the materials on hand, the cost of the supplies, the time allotted for developing the solution, etc.
Learn more about design process here:
https://brainly.com/question/28221020
#SPJ2
Question # 3
Multiple Choice
What is the next line?
>>> grades = {100:'A', 75:'C', 89:'B', 80:'B'}
>>> grades[75]
1
2
'A'
'C'
Answer:
C is it
Explanation:
Answer:
its the 4th option 'C'
Explanation:
Define and describe PaaS. List the benefits of PaaS solutions. Describe potential disadvantages of PaaS. Describe how a cloud-based database management system differs from an on-site database. List the computing resources normally provided with a PaaS.
Answer:
PaaS has become a cloud technology that offers a way for consumers just to establish, successfully manage implementations without any of the sophistication of preserving but instead developing the technology related to the development and start-up of apps.
Explanation:
Benefits:
Not no need to purchase hardware as well as raise revenues throughout leisure time. There was no need to consider throughout configurations.Disadvantages:
These have privacy concerns, during which data security contributes to the problem as well as monitored. These have problems with the portability of implementation.Difference between Cloud base DBMS and On-site database:
On-site DBMS data couldn't be accessed from just about any location as either a cloud-based management solution.DBMS Cloud base documentation to ensure mostly with highly valued information collected to provide direct exposure to everybody else together whilst on-site DBMS functionalities such as SQL.Computing recourses:
The architecture of web applications. Prebuilt techniques for developing, managing, and testing applications.Changing the position of text on the screen is called ________.
Answer:
Formatting
Explanation:
Hope this helps