Error messages are a key part of an overall interface design strategy of guidance for the user. Discuss strategies to ensure integrated, coordinated error messages that are consistent across an application.

Answers

Answer 1

Answer:

Answered below

Explanation:

In order to not discourage the user, error messages must be implemented in a user-friendly way with the use of strategies which ensure coordination, consistency and simplicity.

Error messages should be short, direct and communicate clearly, the right amount of information to a user. These messages should be sorted into categories which represent different kinds of errors. These specific categories should have a brief alphanumeric code that can be easily shared with a customer support personnel for solution and also to help users search for solutions themselves, on the internet.


Related Questions

Which tab is used to change the theme of a photo album slide show?
A. Home
B. Design
C. View

Answers

Answer:

b. design. Is your answer

A _____ area network is one step up from a _____ area network in geographical range.

Answers

Answer:

A metropolitan area network is one step up from a local area network in geographical range.

Explanation:

A metropolitan area network is one step up from a local area network in geographical range.

A network is a group of devices connected together for communication. Networks can be classified according to the area they cover, A metropolitan area network is smaller than a wide area network but larger than a local area network.

A local area network consist of computers network in a single place. A group of LAN network form a metropolitan network

A metropolitan network is a network across a city or small region. A group of  MAN form a wide area network.

Would two bits be enough to assign a unique binary number to each vowel in the English language? Explain.

Answers

Answer:

No.

Explanation:

Since there are 5 vowels, you'd need at least 3 bits to number them. 2 bits give you 2²=4 possibilities, which is 1 short. 3 bits give you 2³=8 possibilities, which fits 5 easily.

The term "bit" means binary digit, and it is used to represent data in a computer system.  

The number of character an n-bit computer can hold is [tex]2^n[/tex]

So, a 2-bit computer can hold a maximum of:

[tex]Max = 2^2[/tex]

[tex]Max = 4[/tex]

i.e. A 2-bit computer can hold a maximum of 4 characters.

The English language vowel are 5 (i.e. letters a, e, i, o and u).

5 is greater than the maximum number of characters the 2-bit computer can hold (i.e. 5 > 4)

Hence, two bits will not be enough to hold each vowel in the English language.

Read more about binary digits at:

brainly.com/question/9480337

John is analyzing an attack against his company in which the attacker found comments embedded in HTML code that provided the clues needed to exploit a software vulnerability. Using the STRIDE model, what type of attack did he uncover?

Answers

Answer:

Information Disclosure

Explanation:

Hello, the fact that the attacker was able to gather information from within the embedded HTML code suggests that the original developer did not properly store information, revealing potential issues or vulnerabilities in his/her design.

The STRIDE model stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.

Using the STRIDE model, one would say this would be a simple information disclosure attack, since the attacker used retrieved information to breach the system.

Cheer.

What are the advantages and disadvantages of solving a problem that can be broken down into repetitive tasks with recursion as opposed to a loop? Explain your answer.

Answers

Answer:

Answered below

Explanation:

Recursion refers to the process of a function calling itself within its own definition. It calls itself repeatedly until a base condition is met and the loop breaks.

The advantages of recursion over loops include;

A) Recursion reduces time complexity.

B) Recursion is better at tree traversal and graphs.

C) Recursion reduces the time needed to write and debug code and also adds clarity to code.

Disadvantages of recursion include;

A) Recursion uses more memory because each function call remains in stack until the base case is met.

B) Recursion can be slow.

C) Recursion

When an object reference is passed as a parameter to a method, modifying the members of that object from inside the method will result in a change to that object as seen from the client.
a. True
b. False

Answers

Answer:

A) True

Explanation:

Objects are known as reference types, meaning that they are always accessed by references, not copied. When a method is called, passing an object to it, Java passes a reference of that object to the method and when that reference is modified, the changes can be seen in the object itself. Therefore a mutable object can be mutated anywhere- either from where it is created or by a method it is passed to. Hence the need to always use privacy modifier keywords such as public, private or protected, to determine the exposure of class properties and methods.

5.4.2: While loop: Print 1 to N. Write a while loop that prints from 1 to user_num, increasing by 1 each time. Sample output with input: 4 1 2 3 4

Answers

Answer:

import java.util.Scanner;

class Main {

 public static void main(String[] args) {

   Scanner in = new Scanner(System.in);

   System.out.println("Enter a number");

   int user_num = in.nextInt();

   int n = 1;

   while(n <= user_num){

     System.out.print(n+" ");

     n++;

   }

 }

}

Explanation:

Import Scanner to receive user numberCreate and initalize a new variable (n) to be printed outSet the while condition to while(n <= user_num)Print the value of n after each iteration and increment n by 1

Answer:

Written in Python:

i = 1

user_num = int(input()) # Assume positive

while i <= user_num:

   print(i)

   i += 1

Explanation:

Given two strings s and t of equal length, the Hamming distance between s and t, denoted dH(s,t), is the number of corresponding symbols that differ in s and t.
Given: Two DNA strings s and t of equal length (not exceeding 1 kbp).
Return: The Hamming distance dH(s,t).
Sample Dataset
GAGCCTACTAACGGGAT CATCGTAATGACGGCCT
Sample Output
7

Answers

Answer:

computer and technologycomputer and technology

Explanation:

computer and technologycomputer and technology

Which of the following code segments will display all of the lines in the file object named infile, assuming that it has successfully been opened for reading?
a. while line in infile :
print(line)
b. while infile in line :
print(line)
c.for infile in line :
print(line)
d. for line in infile :
print(line)

Answers

Answer:

d.

for line in infile :

   print(line)

Explanation:

for loop is used to iterate through the each line of the file using line variable. The file is accessed using the object infile. For example if the file name is "file.txt" and it is opened in read mode. It contains the following lines:

hi there friend

how are you

what are you doing

Then the above given chunk of code gives the following output

hi there friend

how are you

what are you doing

At each iteration each line of the the file is printed on the output screen. The print() method is used to display these lines in output.

"The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works."

Answers

Answer:

decision logic

Explanation:. The decision logic of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works. These systems includes the following :

a) Order processing,

b)Pricing

c) Inventory control, and

d) Customer relationship management. And the traditional means of modifying the decision logic of information systems involves heavy interaction between business users and information technology (IT) analysts.

Compute their Cartesian product, AxB of two lists. Each list has no more than 10 numbers.

For example, given the two input lists:
A = [1,2]
B = [3,4]

then the Cartesian product output should be:
AxB = [(1,3),(1,4),(2,3),(2,4)]

Answers

Answer:

The program written in Python is as follows: (See Attachments for source file and output)

def cartesian(AB):

     if not AB:

           yield ()

     else:

           for newlist in AB[0]:

                 for product in cartesian(AB[1:]):

                       yield (newlist,)+product  

A = []

B = []

alist = int(input("Number of items in list A (10 max): "))

while(alist>10):

     alist = int(input("Number of items in list A (10 max): "))

blist = int(input("Number of items in list B (10 max): "))

while(blist>10):

     blist = int(input("Number of items in list B (10 max): "))

print("Input for List A")

for i in range(alist):

     userinput = int(input(": "))

     A.append(userinput)

print("Input for List B")  

for i in range(blist):

     userinput = int(input(": "))

     B.append(userinput)  

print(list(cartesian([A,B])))

Explanation:

The function to print the Cartesian product is defined here

def cartesian(AB):

This following if condition returns the function while without destroying lists A and B

    if not AB:

         yield ()

If otherwise

    else:

The following iteration generates and prints the Cartesian products

         for newlist in AB[0]:

              for product in cartesian(AB[1:]):

                   yield (newlist,)+product

The main method starts here

The next two lines creates two empty lists A and B

A = []

B = []

The next line prompts user for length of list A

alist = int(input("Number of items in list A (10 max): "))

The following iteration ensures that length of list A is no more than 10

while(alist>10):

    alist = int(input("Number of items in list A (10 max): "))

The next line prompts user for length of list B

blist = int(input("Number of items in list B (10 max): "))

The following iteration ensures that length of list B is no more than 10

while(blist>10):

    blist = int(input("Number of items in list B (10 max): "))

The next 4 lines prompts user for input and gets the input for List A

print("Input for List A")

for i in range(alist):

    userinput = int(input(": "))

    A.append(userinput)

The next 4 lines prompts user for input and gets the input for List B

print("Input for List B")  

for i in range(blist):

    userinput = int(input(": "))

    B.append(userinput)

This line calls the function to print the Cartesian product

print(list(cartesian([A,B])))

Should behavioral tracking be legal? Why or why not?

Answers

Answer:

I honestly don't see very many reasons on why it is bad because it's just showing you ads that you might actually want to see instead of some random ad about cats whenever you own a goldfish, but I feel like websites should ask for permission before they do it.

Answer:

     Behavioral Tracking should be legal. I don't see very many reasons as too why behavioral tracking is bad being shown as ads that might actually be useful, but websites should ask for permission before they do it.

Write a statement to create a Google Guava Multimap instance which contains student ids as keys and the associated values are student profiles.

Answers

Answer: provided in the explanation section

Explanation:

Note: take note for indentation so as to prevent error.

So we import com.google.common.collect.Multimap;

import java.util.Collection;

import java.util.Map;

class Main {

   public static void main(String[] args) {

       // key as studentId and List of Profile as value.

       Multimap<String,Profile> multimap = ArrayListMultimap.create();

       multimap.put("id1", new ExamProfile("examStudentId1"));

       multimap.put("id1", new ELearningProfile("userId1"));

       multimap.put("id2", new ExamProfile("examStudentId2"));

       multimap.put("id2", new ELearningProfile("userId2"));

       // print the data now.

       for (Map.Entry<String, Collection<Profile>> entry : multimap.entrySet()) {

           String key = entry.getKey();

           Collection<String> value =  multimap.get(key);

           System.out.println(key + ":" + value);

       }

   }

}

// assuming String as the studentId.

// assuming Profile as the interface. And Profile can multiple implementations that would be

// specific to student.

interface Profile {

}

class ExamProfile implements Profile {

   private String examStudentId;

   public ExamProfile(String examStudentId) {

       this.examStudentId = examStudentId;

   }

}

class ELearningProfile implements Profile {

   private String userId;

   public ELearningProfile(String userId) {

       this.userId = userId;

   }

}

This code is able to iterate through all entries in the Google Guava multimap and display all the students name in the associated students profile.

Which dashboard does the Control Room administrator need to reference to get a graphical representation of Events Distribution by Activity Type?
a) Bots
b) Workload
c) Insights
d) Audit

Answers

I think the answer would be D) Audit, I’m sorry if it comes out wrong

External network security threats can include management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures.
A. True
B. False

Answers

Answer:

The answer is "Option B".

Explanation:

In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.

This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.

Which of the following are characteristics of algorithms? Choose all that apply. They take a step-by-step approach to performing a task. They’re made up of Instructions posted on a website. They break the task into manageable steps. They identify the tasks that will repeat. They can be written in a computer language to create a program for a computer to follow.


Answer: They take a step-by-step approach to performing a task.
They break the task into manageable steps.
They identify the tasks that will repeat.
They can be written in a computer language to create a program for a computer to follow.

Answers

Answer:

They take a step-by-step approach to performing a task.

They break the task into manageable steps.

They identify the tasks that will repeat.

They can be written in a computer language to create a program for a computer to follow.

Explanation:

An algorithm is a step by step process that needs to be followed in order to solve logical, mathematical, well-defined instructions.

An everyday example of an algorithm is a recipe because it gives you steps to do in order to complete a task.

In computing terms, algorithms can be represented with flow charts, pseudocodes, or high-level languages.

Some of its characteristics include:

They can be written in a computer language to create a program for a computer to follow.They identify the tasks that will repeat. They take a step-by-step approach to performing a task. They break the task into manageable steps.

Answer:

So your answer will be

A.

C.

D.

E.

Explanation:

Edge2021

kyra needs help deciding which colors she should use on her web page. what can she use to help her decide?​

Answers

Answer:

What colors does she like most, and what colors best correlate with the subject of the website.

Explanation:

You want to have the color relate to the subject of the website, or just favorites!

Answer:

Storyboarding.

Which statement correctly creates a set named colors that contains the 7 colors in a rainbow?
a. colors = ["red", "orange", "yellow" "green", "blue", "indigo", "violet"]
b. colors = {red, orange, yellow, green, blue, indigo, violet}
c. colors = [red, orange, yellow, green, blue, indigo, violet]
d. colors = {"red", "orange", "yellow", "green", "blue", "indigo", "violet"}

Answers

Answer:  d. colors = {"red", "orange", "yellow", "green", "blue", "indigo", "violet"}

Explanation:

We use "{}" to write a set in it.

Also, the names of the colors are strings so we use inverted commas ("") to express them.

So, the set named colors that contains the 7 colors in a rainbow will be:

colors = {"red", "orange", "yellow", "green", "blue", "indigo", "violet"}

Hence, the correct option is d.

describe the six clauses in the syntax of an sql retrieval query. show what type of constructs can be specified in each of the six clauses

Answers

Answer:

Answered below

Explanation:

An SQL retrieval query is made up of up to six clauses that must be coded in a specific sequence and they consist of;

1) SELECT - This clause allows you list the columns you want.

2) FROM - This clause indicates the tables you are retrieving information from.

3) WHERE - The where clause indicates a condition.

4) GROUP BY - Let's you group your data into specific and more meaningful information.

5) HAVING - Puts a condition in your group.

6) ORDER BY - Orders your result rows in ascending or descending order.

In GamePoints' constructor, assign teamWhales with 500 and teamLions with 500. #include using namespace std; class GamePoints { public: GamePoints(); void Start() const; private: int teamDolphins; int teamLions; }; GamePoints::GamePoints() : /* Your code goes here */ { } void GamePoints::Start() const { cout << "Game started: Dolphins " << teamDolphins << " - " << teamLions << " Lions" << endl; } int main() { GamePoints myGame; myGame.Start(); return 0; }

Answers

Answer:

Here is the GamePoints constructor:

GamePoints::GamePoints() :

/* Your code goes here */

{

teamLions = 500;

teamDolphins = 500;

}    

Explanation:

Here is the complete program:

#include  //to use input output functions

using namespace std; //to identify objects like cin cout

class GamePoints {  //class GamePoints

   public: GamePoints(); // constructor of GamePoints class

   void Start() const;  //method of GamePoints class

   private: //declare data members of GamePoints class

   int teamDolphins; // integer type private member variable of GamePoints

   int teamLions; }; // integer type private member variable of GamePoints

   GamePoints::GamePoints()  //constructor

    { teamLions = (500), teamDolphins= (500); }   //assigns 500 to the data members of teamLions  and teamDolphins of GamePoints class

   void GamePoints::Start() const    { //method Start of classs GamePoints

       cout << "Game started: Dolphins " << teamDolphins << " - " << teamLions << " Lions" << endl; }  //displays the values of teamDolphins and teamLions i.e. 500 assigned by the constructor

       int main() //start of main() function

       { GamePoints myGame;  // creates an object of GamePoints class

       myGame.Start(); //calls Start method of GamePoints class using the object

       return 0; }

The output of the program is:

Game started: Dolphins 500 - 500 Lions                    

Which class of IP address allows for the greatest amount of subnets and host devices?

a. Class A
b. Class B
c. Class C
d. Class D

Answers

Answer:

A

Explanation:

Write a function called count_occurrences that takes two strings. The second string should only be one character long. The function should return how many times the second string occurs in the first string.

Answers

Answer:

Here is the Python function:

def count_occurrences (string1 , string2):  # method that takes two strings as parameter and returns how many times second string occurs in first

   count = 0  #counts number of occurrence of string2 in string1

   for word in string1:  #iterates through each word of the string1

       for character in word:  #iterates through each character of each word in string1

           if character == string2:  # checks if the character in string1 is equal to the character of string2

               count = count + 1  #adds 1 to the count of string2 in string1

   return count  #returns number of times the string2 occurs in string1

#in order to check the working of the function add the following lines to the code:    

first_str = input("Enter the first string: ")  #prompts user to enter first string

second_str = input("Enter the second string (one character long): ") #prompts user to enter second string which should be one character long

occurrence = count_occurrences(first_str,second_str)  #calls count_occurrences method by passing both strings to it

print(second_str,"occurs",occurrence,"times in",first_str) #prints how many times the second_str occurs in the first_str on output screen

Explanation:

The program is well explained in the comments added to each statement of the above code. I will explain the program with an example:

Suppose

string1 = "hello world"

string2 = 'l'

So the method count_occurrences() should return how many times l occurs in hello world.

count is used to count the number of occurrences of l in hello world. It is initialized to 0.

The first loop iterates through each word of string1. The first word of string1 is "hello"

The second loop iterates through each character/letter of each word. So the first letter of "hello" word is 'h'.

The if condition if character == string2: checks if the character is equal to string2 i.e. l.

character = "h"

string2 = "l"

The are not equal so the program moves to the next character of word hello which is e. The if condition again evaluates to false because e is not equal to l. So the program moves to the next character of word hello which is l.

This time the if condition evaluates to true because

character = "l"

string2 = "l"

character == string2

l == l

So the if part is executed which has the following statement:

count = count + 1

So the count is added to 1. count was 0 previously. Now

count = 1

Next the program moves to the next character of word hello which is l. This time the if condition evaluates to true because the character l matches with string2. So count is again incremented to 1. count = 2.

Next the program moves to the next character of word hello which is o. The if condition evaluates to false as o does not match with string2 i.e. l. So the count remains 2.

Next the first loop moves to the next word of the string1 = "world". The inner (second) for loop iterates through each character of "world" from "w" to "d" and checks if any character is equal to string2. Only one character is equal to string2 in "world". So count is incremented to 1. Hence count = 3

After the loop ends the statement return count returns the number of times string2 occurs in the string1. So the output is:

l occurs 3 times in hello world  

Answer:

def count_occurrences(sentence, thing_to_count):

   times = 0

   for word in sentence:

       for letter in word:

           if letter == thing_to_count: times += 1

   return times

Explanation:

I got 100%

what are some consequences of internet addiction​

Answers

Answer:

1. week eyesight

2. weak brain power

3. loss of concentration...

hope it helps u

Which of the following terms means that the system changes based on
the needs of each learner?
A
Adaptive
B
Mobile-ready
С
Gamified
D
Reactive

Answers

Answer:

A

Explanation:

Which button is used to decrease the contrast for a selected image ?

Answers

Answer:

tab button........... ..

Give a command that will create a file named listing.dat, in your current (commandsAsst) directory, containing a list of all the files in your fileAsst directory. I need to use redirection, and have tried almost every variation of ls -a < ~/UnixCourse/fileAsst. > listing.dat Primarlily the error I get is that I did not create the 'listing.dat file with ALL of the files located in ../fileAsst/ When I run the same command in another terminal window, then verify with ls -a I can see that I did indeed create the listing.dat file. Can someone tell me what it is I am missing?

Answers

Answer:

Following are the command to this question:

"ls -a ~/UnixCourse/fileAsst > listing.dat"

Explanation:

The above-given code will create a file, that is "listing.dat", and this file will be created in your current directory, which will include the list of all files in the file-asst directory.

In this, Is command is used that uses the directory that is "UnixCourse/fileAsst" and inside this, it will create the "dat" file that is "listing".

"the time it takes a storage device to locate stored data and make it available for processing is called"

Answers

Answer:

The time is called "Access time"

Explanation:

Basically it is the time taken to retrieve information/data

What is access time?

It is the time taken by a storage device to located information and process the information often times the access time is faster in hard drives when compared to other drives like Optical drives.

Another good analogy or description of access time is the time taken to order a product online and when it is delivered to you in your house

 

Where can you submit a bug report?​

Answers

Answer:

most developers incorporate a report a bug feature, if you cannot find it search online or go to the website on the software.

Explanation:

Home communication involves controlling systems such as heating, cooling, and security.
a. True
b. False

Answers

Answer:

A. True

Explanation:

Home communications involves automating home. It includes controlling the air-con,water heater, webcam, etc. A

What is the output from the following code? MapInterface m; m = new ArrayListMap(); m.put('D', "dog"); m.put('P', "pig"); m.put('C', "cat"); m.put('P', "pet"); System.out.println(m.get('D')); System.out.println(m.get('E')); System.out.println(m.get('P'));

Answers

Answer: dog

null

pet

Explanation:

taking into condiserations the various animals and their tag given to them;

OUTPUT :

dog

null

pet

PROOF:

Where the Initially map : {}

after map.put('D', "dog"), map : {'D':"dog"}

after map.put('P', "pig"), map : {'D':"dog", 'P':"pig"}

after map.put('C', "cat"), map : {'D':"dog", 'P':"pig", 'C':"cat"}

after map.put('P', "pet"), map : {'D':"dog", 'P':"pet", 'C':"cat"}, what this does is replace the  value of P with "pet"

map.get('D') prints dog.

map.get('E') prints null, key is not present

map.get('P') prints pet

cheers I hope this helped !!

Other Questions
Type the correct answer in the box. Spell all words correctly. Which principle of design is in primary use in this sculpture? The artist primarily used in the sculpture. 2. Define the difference between Liberalism and Conservatism using examples fromCurrent events and previous knowledge. Paul purchased 8 computers which cost him a total of $6,016, and Mary purchased 8 printers which cost her $1,080.Steve purchased 25 DVD movies which cost $350, and Sally purchased 34 CDs which cost $306. How much would 7 computers, 9 printers, 23 DVDs, and 30 CDs cost? What is needed to burn the candle (reactant)? 1. What are some of the innovative ways in which GIS is being used byindividual users? Please I have no idea my teacher didnt teach this Write the equation of the line that has the indicated slope and contains the indicated point. Express the final equation in standard form. m = 1/2 , (3, 4) A 35-year-old man from Russia comes to the United States seeking asylum because of religious persecution in his native country. Which of the following best describes this type of immigrant?a. Legal immigrantb. Lawful permanent residentc. Refugeed. Unauthorized immigrant Read the following selection from Act III of Romeo and Juliet. What conflict does the line in bold most closely represent? Blister'd be thy tongue For such a wish! Man vs. Man Man vs. Self Man vs. Nature Man vs. Society Suppose a big chunk of gold is submerged in water and its volume is found to be 12.5 cm?Compute the mass of the chunk of gold in grams if you know the density is 19.3 g/cm2. Roundappropriately. The production strategy of a firm using a global strategy would likely entail A. A narrow selection of models and styles with each model/style focused on identified international market niches. B. Locating plants on the basis of maximum competitive advantagein countries where manufacturing costs can be kept low or close to major markets to economize on shipping costs or use of a few world-scale plants to capture maximum scale economies and experience curve effects, as most appropriate. C. Producing the various products at plants scattered around the world. D. Producing a broad product line (many models and varieties) so that buyers in each target national market would be able to select the item that best met their individual needs. E. Creating a different product lineup for each major area of the world (Europe, North American, Latin America, and the Asian Pacific). easy 10 points and brainliest :) 11.The respiration rate of a goldfish is measured. The goldfish is then placed in cold water and the respiration rate is measured again. independent and dependent variable estimate the height of a tree using the following measurements:height of the rod:180 cm,length of the shadow of the rod is 116 cm,length of the shadow of the tree:840 cm,calculate the height of the tree After using a 15% off coupon, the price of a sheet cake is $30.94. What was the original price? A female with an X-linked dominant disease mates with a normal male. Based on the pedigree chart, the possibility that her offspring will actually develop the disease is %. Spanish Translate HELP 1. A word you'd use to say 'not much' is going on 2. you (familiar) are3. The opposite of gracias Once a phage genome has become part of the host chromosome, it is called a ________. Determine whether the situation involves permutations or combinations. Then solve. How many ways are there to place an algebra book, a geometry book, a chemistry book, an English book, and a health book on a shelf? Which evidence best explains Achebes rebuttal to the counterclaim that Conrad knew Africa because he had traveled there in 1890? There are two probable grounds on which what I have said so far may be contested. The first is that it is no concern of fiction to please people about whom it is written. Conrads picture of the peoples of the Congo seems grossly inadequate even at the height of their subjection to the ravages of King Leopolds International Association for the Civilization of Central Africa. And we also happen to know that Conrad was, in the words of his biographer, Bernard C. Meyer, notoriously inaccurate in the rendering of his own history. The event Frank Willett is referring to marked the beginning of cubism and the infusion of new life into European art that had run completely out of strength.