Answer:
Explanation:
use the "includes" statement to have access to those classes :)
Database multiple-choice question don't bs pls
Which of the following is not a common factor for database management system selection?
a. Cost
b. Features and tools
c. Software requirements
d. Hardware requirements
e. All of the above
f. None of the above
(D and F are wrong)
Answer:
f. None of the above
Explanation:
Considering the available options, the right answer is option F "None of the above."
Common factors for database management system selection are the following:
1. Cost: various DBMS vendors have different pricing, hence, interested buyers will consider the price before selections
2. Features and Tools: different types of DBMS have varied features and tools in carrying out the work.
3. Software requirements: there are various software requirements in various DBMS, such as encryption support, scalability, application-level data recovery, etc.
4. Hardware requirement: various DBMS vendors have different hardware requirements to consider, such as sizeable RAM, CPU value, etc.
Hence, in this case, the correct answer is option F.
For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache.
Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD
Answer:
Explanation:
Operation Address Hit? Read Value
Read 0x834 No Unknown
Write 0x836 Yes (not applicable)
Read 0xFFD Yes CO
Dynamic addressing: __________.
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing, changing networks
Explanation:
jwjajahabauiqjqjwjajjwwjnwaj
The part of the computer that provides access to the Internet is the
Answer:
MODEM
Explanation:
What type of device is a computer? Where does it use
Answer:A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web.
The__________is an HTML tag that provides information on the keywords that represent the contents of a Web page.
Answer:
Meta tag
Explanation:
Which key should you press to leave the cell as it originally was?
Answer:
Backspace.
Explanation:
Cancel Button you should press to leave the cell as it originally was. Cancel Button you should press to leave the cell as it originally was. This answer has been confirmed as correct and helpful.
Backspace is press to leave the cell as it originally was.
What is Backspace key?The Backspace key is situated in the top-right corner of the character keys part of the keyboard.
Backspace is replaced by a "delete" key on Apple computers, although it serves the same purpose.
There are no "backspace" keys on an Android or Apple iPhone smartphone or iPad tablet, but there is a key that serves the same purpose. Look for a key that resembles an arrow with a "X" or an arrow pointing left, as illustrated in the image.
Therefore, Backspace is press to leave the cell as it originally was.
To learn more about backspace, refer to the link:
https://brainly.com/question/29790869
#SPJ2
Which of the following financial functions can you use to calculate the payments to repay your loan
Answer:
PMT function. PMT, one of the financial functions, calculates the payment for a loan based on constant payments and a constant interest rate. Use the Excel Formula Coach to figure out a monthly loan payment.
Explanation:
In the backward chaining technique, used by the inference engine component of an expert system, the expert system starts with the goal, which is the _____ part, and backtracks to find the right solution.
Explanation:
In the backward chaining technique, used by the inference engine component of an expert system, the expert system starts with the goal, which is the then part,
Backward chaining is the process of working backward from the goal. It is used s an artificial intelligence application and proof application. The backward chaining can be implemented in logic programming.
The expert system starts with a goal and then parts and backtracks. to find the right solution. Hence is a problem-solving technique. in order to find the right solution.Hence the then part is the correct answer.
Learn more about the backward chaining technique,
brainly.com/question/24178695.
Data representation and interactivity are important aspects of data visualization.
a. True
b. False
Answer:
a. True
Explanation:
Data visualization are defined as the representation of the data and information in graphical way. The data visualization tool uses charts, diagrams, graphs, maps, etc. to represent and visualized the information and understand the patter or trend in the data.
It is an effective way to interact with the user and works likes a form of a visual art.
Thus interactivity and data representations are the two important aspect of the data visualization.
Hence, the answer is true.
Given two character strings s1 and s2. Write a Pthread program to find out the number of substrings, in string s1, that is exactly the same as s2
Answer:
Explanation:
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#define MAX 1024
int total = 0 ;
int n1, n2;
char s1, s2;
FILE fp;
int readf(FILE fp)
{
if((fp=fopen("strings.txt", "r"))==NULL) {
printf("ERROR: can’t open string.txt!\n");
return 0;
}
s1=(char)malloc(sizeof(char)MAX);
if(s1==NULL) {
printf("ERROR: Out of memory!\n");
return 1;
}
s2=(char)malloc(sizeof(char)MAX);
if(s1==NULL) {
printf("ERROR: Out of memory!\n");
return 1;
}
/* read s1 s2 from the file */
s1=fgets(s1, MAX, fp);
s2=fgets(s2, MAX, fp);
n1=strlen(s1); /* length of s1 */
n2=strlen(s2)-1; /* length of s2 */
if(s1==NULL || s2==NULL || n1<n2) /* when error exit */
return 1;
}
int num_substring(void)
{
int i, j, k;
int count;
for(i=0; i<=(n1-n2); i++) {
count=0;
for(j=i, k=0; k<n2; j++, k++){ /* search for the next string of size of n2 */
if((s1+j)!=(s2+k)) {
break;
}
else
count++;
if(count==n2)
total++; /* find a substring in this step */
}
}
return total;
}
int main(int argc, char argv[])
{
int count;
readf(fp);
count=num_substring();
printf("The number of substrings is: %d\n", count);
return 1;
}
Write a function that takes six arguments of floating type (four input arguments and two output arguments). This function will calculate sum and average of the input arguments and storethem in output arguments respectively. Take input arguments from the user in the main function.
Answer:
Answer:Functions in C+
The integer variable n is the input to the function and it is also called the parameter of the function. If a function is defined after the main() .....
what is the characteristics of computer?dicuss any 5 of them
Answer:
speed
accuracy
diligence
versatility
reliabiility
memory
speed: a computer works with more higher speed compared to humans when performing mathematical calculations
accuracy: computer perform calculations with 100% accuracy
dilligence:a computer can perform calculations with the same consistentcy and accuracy
versatility:refers to the capability of a computer to perform different kind of works with same accuracy and efficiencies
reliability
Answer:
speed
accuracy
diligent
versatile
storage and communication
We have removed
A
balls from a box that contained
N
balls and then put
B
new balls into that box. How many balls does the box contain now?
Constraints
All values in input are integers.
Input
Input is given from Standard Input in the following format: n a b
Output
Print the answer as an integer.
There were [tex]N[/tex] balls but we took [tex]A[/tex] balls out, so there are now [tex]N-A[/tex] balls. We add [tex]B[/tex] balls and now we have [tex]N-A+B[/tex] balls.
The program that computes this (I will use python as language has not been specified is the following):
n, a, b = int(input()), int(input()), int(input())
print(f"There are {n-a+b} balls in the box")
# Hope this helps
Write a program that launches 1,000 threads. Each thread adds 1 to a variable sum that initially is 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect. Submit the code of the program and your comments on the execution of the program.
Answer:
Following are the code to the given question:
import java.util.concurrent.*; //import package
public class Threads //defining a class Threads
{
private Integer s = new Integer(0);//defining Integer class object
public synchronized static void main(String[] args)//defining main method
{
Threads t = new Threads();//defining threads class object
System.out.println("What is sum ?" + t.s);//print value with message
}
Threads()//defining default constructor
{
ExecutorService exe = Executors.newFixedThreadPool(1000);//defining ExecutorService class object
System.out.println("With SYNCHRONIZATION........");//print message
for(int i = 1; i <= 1000; i++)//defining a for loop
{
exe.execute(new SumTask2());//calling execute method
System.out.println("At Thread " + i +" Sum= " + s + " , ");//print message with value
}
exe.shutdown();//calling shutdown method
while(!exe.isTerminated())//defining while loop that calls isTerminated method
{
}
}
class SumTask2 implements Runnable//calling SumTask2 that inherits Runnable class
{
public synchronized void run()//defining method run
{
int value = s.intValue() + 1;//defining variable value that calls intvalue which is increment by 1
s = new Integer(value);//use s to hold value
}
}
}
Output:
Please find the attached file.
Explanation:
In this code, a Threads class is defined in which an integer class object and the main method is declared that creates the Threads class object and calls its values.
Outside the method, the default constructor is declared that creates the "ExecutorService" and prints its message, and use a for loop that calls execute method which prints its value with the message.
In the class, a while loop is declared that calls "isTerminated" method, and outside the class "SumTask2" that inherits Runnable class and defined the run method and define a variable "value" that calls "intvalue" method which is increment by 1 and define s variable that holds method value.
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender:_____.
A. Malicious code.
B. Hoaxes.
C. Spoofing.
D. Sniffer.
Answer:
C. Spoofing.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.
Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.
Transformative Software develops apps that help disabled people to complete everyday tasks. Its software projects are divided into phases in which progress takes place in one direction. The planning, delivery dates, and implementation of the software under development are emphasized. Which software development methodology is the company most likely using:_________.
Answer: Cascading
Explanation:
The software development methodology that the company is most likely using is Cascading.
Cascading model is a sequential design process, that is used in software development, whereby progress flows downward from the conception phase, initiation phase, till it gets to the maintenance phase.
What is machine learning
Answer:
machine learning is the ability for computers to develop new skills and algorithms without specific instructions to do so.
Describe the operation of IPv6 Neighbor Discovery.
Write the code to replace only the first two occurrences of the word second by a new word in a sentence. Your code should not exceed 4 lines. Example output Enter sentence: The first second was alright, but the second second was long.
Enter word: minute Result: The first minute was alright, but the minute second was long.
Answer:
Explanation:
The following code was written in Python. It asks the user to input a sentence and a word, then it replaces the first two occurrences in the sentence with the word using the Python replace() method. Finally, it prints the new sentence. The code is only 4 lines long and a test output can be seen in the attached image below.
sentence = input("Enter a sentence: ")
word = input("Enter a word: ")
replaced_sentence = sentence.replace('second', word, 2);
print(replaced_sentence)
Write the name of test for the given scenario. Justify your answer.
The input values are entered according to the output values. If the results are ok then software is also fine but if results does not matched the input values then means any bugs are found which results the software is not ok. The whole software is checked against one input.
A-Assume you are being hired as a Scrum project Manager. Write down the list of responsibilities you are going to perform.
B-What are the qualifications required to conduct a glass box testing.
C-Write the main reasons of project failure and success according to the 1994 Standish group survey study.
D- Discuss your semester project.
Answer:
Cevap b okey xx
Explanation:
Sinyorrr
The importance of the 8 functions of an operating system
Answer:
Explanation:
Important functions of an operating System:
Security –
The operating system uses password protection to protect user data and similar other techniques. it also prevents unauthorized access to programs and user data.
Control over system performance –
Monitors overall system health to help improve performance. records the response time between service requests and system response to have a complete view of the system health. This can help improve performance by providing important information needed to troubleshoot problems.
Job accounting –
Operating system Keeps track of time and resources used by various tasks and users, this information can be used to track resource usage for a particular user or group of user.
Error detecting aids –
Operating system constantly monitors the system to detect errors and avoid the malfunctioning of computer system.
Coordination between other software and users –
Operating systems also coordinate and assign interpreters, compilers, assemblers and other software to the various users of the computer systems.
Memory Management –
The operating system manages the Primary Memory or Main Memory. Main memory is made up of a large array of bytes or words where each byte or word is assigned a certain address. Main memory is a fast storage and it can be accessed directly by the CPU. For a program to be executed, it should be first loaded in the main memory. An Operating System performs the following activities for memory management:
It keeps tracks of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used. In multi programming, the OS decides the order in which process are granted access to memory, and for how long. It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.
Processor Management –
In a multi programming environment, the OS decides the order in which processes have access to the processor, and how much processing time each process has. This function of OS is called process scheduling. An Operating System performs the following activities for processor management.
Keeps tracks of the status of processes. The program which perform this task is known as traffic controller. Allocates the CPU that is processor to a process. De-allocates processor when a process is no more required.
Device Management –
An OS manages device communication via their respective drivers. It performs the following activities for device management. Keeps tracks of all devices connected to system. designates a program responsible for every device known as the Input/Output controller. Decides which process gets access to a certain device and for how long. Allocates devices in an effective and efficient way. Deallocates devices when they are no longer required.
File Management –
A file system is organized into directories for efficient or easy navigation and usage. These directories may contain other directories and other files. An Operating System carries out the following file management activities. It keeps track of where information is stored, user access settings and status of every file and more… These facilities are collectively known as the file system.
Java programming
*11.13 (Remove duplicates) Write a method that removes the duplicate elements from
an array list of integers using the following header:
public static void removeDuplicate(ArrayList list)
Write a test program that prompts the user to enter 10 integers to a list and displays
the distinct integers separated by exactly one space. Here is a sample run:
Enter ten integers: 34 5 3 5 6 4 33 2 2 4
The distinct integers are 34 5 3 6 4 33 2
Answer:
The program in Java is as follows:
import java.util.*;
public class Main {
public static void removeDuplicate(ArrayList<Integer> list){
ArrayList<Integer> newList = new ArrayList<Integer>();
for (int num : list) {
if (!newList.contains(num)) {
newList.add(num); } }
for (int num : newList) {
System.out.print(num+" "); } }
public static void main(String args[]){
Scanner input = new Scanner(System.in);
ArrayList<Integer> list = new ArrayList<Integer>();
System.out.print("Enter ten integers: ");
for(int i = 0; i<10;i++){
list.add(input.nextInt()); }
System.out.print("The distinct integers are: ");
removeDuplicate(list);
}}
Explanation:
This defines the removeDuplicate function
public static void removeDuplicate(ArrayList<Integer> list){
This creates a new array list
ArrayList<Integer> newList = new ArrayList<Integer>();
This iterates through the original list
for (int num : list) {
This checks if the new list contains an item of the original list
if (!newList.contains(num)) {
If no, the item is added to the new list
newList.add(num); } }
This iterates through the new list
for (int num : newList) {
This prints every element of the new list (At this point, the duplicates have been removed)
System.out.print(num+" "); } }
The main (i.e. test case begins here)
public static void main(String args[]){
Scanner input = new Scanner(System.in);
This declares the array list
ArrayList<Integer> list = new ArrayList<Integer>();
This prompts the user for ten integers
System.out.print("Enter ten integers: ");
The following loop gets input for the array list
for(int i = 0; i<10;i++){
list.add(input.nextInt()); }
This prints the output header
System.out.print("The distinct integers are: ");
This calls the function to remove the duplicates
removeDuplicate(list);
}}
Ranges of up addresses that anyone can use for their internal networks are known as
Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance. True False
Answer:
True
Explanation:
Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance.
let's have a class named Distance having two private data members such as feet(integer), inches(float), one input function to input values to the data members, one Display function to show the distance. The distance 5 feet and 6.4 inches should be displayed as 5’- 6.4”. Then add the two objects of Distance class and then display the result (the + operator should be overloaded). You should also take care of inches if it's more than 12 then the inches should be decremented by 12 and feet to be incremented by 1.
Answer:
Humildade
Ser justo (Fair Play)
Vencer independente
A(n) _____ is a network connection device that can build tables that identify addresses on each network.
Answer:
Dynamic Router
Explanation:
A dynamic router is a network connection device that can build tables that identify addresses on each network.
What is Dynamic network?Dynamic networks are networks that vary over time; their vertices are often not binary and instead represent a probability for having a link between two nodes.
Statistical approaches or computer simulations are often necessary to explore how such networks evolve, adapt or respond to external intervention.
DNA statistical tools are generally optimized for large-scale networks and admit the analysis of multiple networks simultaneously in which, there are multiple types of nodes (multi-node) and multiple types of links (multi-plex).
Therefore, A dynamic router is a network connection device that can build tables that identify addresses on each network.
To learn more about dynamic router, refer to the link:
https://brainly.com/question/14285971
#SPJ6
Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint showing them). So is it possible to update???
Please help
Answer:
For me yes i guess you can update an app store in any deviceI'm not sure×_× mello ×_×Coding 5 - Classes The Item class is defined for you. See the bottom of the file to see how we will run the code. Define a class ShoppingCart which supports the following functions: add_item(), get_total_price(), and print_summary(). Write code only where the three TODO's are. Below is the expected output: Added 2 Pizza(s) to Cart, at $13.12 each. Added 1 Soap(s) to Cart, at $2.25 each. Added 5 Cookie(s) to Cart, at $3.77 each.
Answer:
Explanation:
The following is written in Java. It creates the ShoppingCart class as requested and implements the requested methods. A test class has been added to the main method and the output is highlighted in red down below.
import java.util.ArrayList;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
ShoppingCart newCart = new ShoppingCart();
newCart.add_item();
newCart.add_item();
newCart.add_item();
newCart.print_summary();
}
}
class ShoppingCart {
Scanner in = new Scanner(System.in);
ArrayList<String> items = new ArrayList<>();
ArrayList<Integer> amount = new ArrayList<>();
ArrayList<Double> cost = new ArrayList<>();
public ShoppingCart() {
}
public void add_item() {
System.out.println("Enter Item:");
this.items.add(this.in.next());
System.out.println("Enter Item Amount:");
this.amount.add(this.in.nextInt());
System.out.println("Enter Cost Per Item:");
this.cost.add(this.in.nextDouble());
}
public void get_total_price() {
double total = 0;
for (double price: cost) {
total += price;
}
System.out.println("Total Cost: $" + total);
}
public void print_summary() {
for (int i = 0; i < items.size(); i++) {
System.out.println(amount.get(i) + " " + items.get(i) + " at " + cost.get(i) + " each.");
}
get_total_price();
}
}
The valid call to the function installApplication is
void main( )
{
// call the function installApplication
}
void installApplication(char appInitial, int appVersion)
{
// rest of function not important
}
Select one:
A.
int x =installApplication(‘A’, 1);
B.
installApplication(‘A’, 1);
C.
int x= installApplication( );
D.
installApplication(2 , 1);
Answer:
B. installApplication(‘A’, 1);
Explanation:
Given
The above code segment
Required
The correct call to installApplication
The function installApplication is declared as void, meaning that it is not expected to return anything.
Also, it receives a character and an integer argument.
So, the call to this function must include a character and an integer argument, in that order.
Option D is incorrect because both arguments are integer
Option C is incorrect because it passes no argument to the function.
Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).
Option B is correct