Answer:
True
Setting the initial values of an attribute
Explanation:
A class in a program describes the contents of the objects that it belongs to and specifies how they behave. It defines the operations (methods).
Therefore, for an object to be used in a program, its class must be defined, which is TRUE.
Initialization with regards to object-oriented programming is defining or assigning values to a constant or variable. Thus, option D is correct as it is setting the initial values of an attribute
Q1: True
Q2: Setting the initial values of an attribute
Explanation:Got both answers correct in the class thanks to the guy above me!
which statement compares the copy and cut commands?
1. only the copy command requires the highlighting text
2. only to cut command removes the text from the original document
3. only the cut command uses the paste command to complete the task
4. only the copy command is used to add text from a document to a new document
Answer:
only to cut command removes the text from the original document
Explanation:
To say that only the cut command removes the text from the original document implies that you can use the cut command on a text, let's say "a boy and girl" to remove the text on the original document where it was located to a new document or text box, in other words, the text "a boy and girl" would no longer be found in the original document.
However, the copy command would not remove the text from the original document.
Answer:
only the command removes the text from the original document.
Explanation:
just did it
Which part(s) of CAIN is realized through the use of message digest functions and hashes?
Answer:
Integrity
Explanation:
In CAIN, integrity is realized through the use of message digest functions and hashes.
Integrity in CAIN simply means securing a message on transit without it being tampered. To accomplish and achieve integrity, hash functions are used. These hash functions receive arbitrary length message and bring out a fixed sized message digest.
The message digest and hash function maps input data of arbitrary length to an output fixed data length. Hashing is used to guarantee integrity.
Security problems with master keys include (mark all that apply): Master keys are easier to copy than other keys. Master keying reduces the number of useful combinations. Locks that have the master pins needed for master keys are easier to pick. Unauthorized master keys will permit access to any lock in the series.
Answer:
- Master keys are easier to copy than other keys.
- Unauthorized master keys will permit access to any lock in the series.
Explanation:
This is the sad reality when an individual who's unauthorized gains access to a master key, then, he may be permitted access to any lock in the series.
Also, rather trying to copy other keys, it will be far easier to copy just one key– the master key.
Code written by computer programmers is translated to binary code, so computers can understand the instructions. True or False
Answer:
True
Explanation:
High-level languages such as Java, C++, Ruby, Python, etc need to be translated into binary code so a computer can understand it, compile and execute them.
Machine language is the only language that is directly understood by the computer because it is written in binary code. But writing codes in Machine Language is tiring, tedious, and obsolete as no one really uses it anymore.
Answer:
True
Explanation:
FLVS intro to Programming honors
The 6 steps for PowerPoint competency from the TED talk in the module "How to Avoid Death by PowerPoint."?
Answer:
1. Do some presentation preparation work
2. Set the right tone and end on a high note.
3. Create sleek and stylish slides.
4. Get your audience to focus.
5. Its all about you.
Explanation:
1. Do some presentation preparation work:
A good presentation begins, not with slides, but with a pencil and paper. Research your audience’s background, interests and capabilities. What do they already know, for instance, and what can they learn from you?
2. Set the right tone and end on a high note:
You have no more than 30 seconds to secure your audience’s attention. So, what attention-grabbing opener will you use?
Visual communications expert Curtis Newbold suggests “a fascinating quote; an alarming or surprising statistic; asking your audience a question; telling a relevant and funny joke… an imaginary scenario; or a demonstration''.
3. Create sleek and stylish slides:
Once you have your story down, you can start to design your slides.
Before you do, it’s important to think about the practicalities. Will they, for instance, be displayed Widescreen with a 16:9 ratio? Or Standard with 4:3? This might seem like a small detail, but it can make a huge difference in terms of visual impact.
4. Get your audience to focus:
The most important thing is to grab your audience’s attention straight away – and then maintain it! You want your audience to go away having learned something. So, make it as easy as possible for people to grasp your message “from the off”!
5. Its all about you:
Finally, remember that, ultimately, it’s you that the audience should be paying attention to, not your slides!
PowerPoint can be used to create great visual aids, but the success of your presentation is determined by the way you deliver them. So, tell your story with a confident, compelling physical presence, and master it by rehearsing it 10 to 15 times.
5.During a recent network attack, a hacker used rainbow tables to guess network passwords. Which type of attack occurred
Answer:
Rainbow table attack
Explanation:
A rainbow table attack is a type of network attack or hacking where the hacker tries to utilize a rainbow hash table to crack the passwords in a database system. A rainbow table itself is a hash function used in cryptography for saving important data in a database. Especially passwords.
In this process, sensitive data are hashed two or multiple times with the same key or with different keys so as to avoid rainbow table attack. In a rainbow table attack, the hacker simply compares the hash of the original password against hashes stored in the rainbow table and when they find a match, they then identify the password used to create the hash.
Training a model using labeled data and using this model to predict the labels for new data is known as ____________.
Answer:
supervised learning
Explanation:
This process is known as supervised learning. This refers to the machine learning task of learning a function that maps an input to an output based on example input-output pairs. In other words, by teaching it a single process it is able to repeat and predict the same process or predict the output based on the inputs that are being implemented by referring to the initially learned function.
Which management function do leaders perform first when an organization begins a project?
OA. organizing
OB.directing
OC. controlling
OD. planning
Answer:
PLANING
Explanation:
They include: planning, organizing, leading, and controlling. You should think about the four functions as a process, where each step builds on the others. Managers must first plan, then organize according to that plan, lead others to work towards the plan, and finally evaluate the effectiveness of the plan.
when will you need to use a tuple data structure rather than a list of data structure
Answer:
They can always be easily promoted to named tuples. Likewise, if the collection is going to be iterated over, I prefer a list. If it's just a container to hold multiple objects as one, I prefer a tuple. The first thing you need to decide is whether the data structure needs to be mutable or not
there are primarily three methods of programming in use today: procedural, recursive, and object oriented true or false
Answer:
False.
Explanation:
In Computer programming, there are primarily two (2) methods of programming in use today:
1. Procedural programming: it is an early form of programming (coding) in which software developers make use of a top to down approach in instructing the computer on what actions to take through logical or step-by-step processes. This top-down approach is known as an inline programming, it basically involves calling a procedure such as functions, routines or sub-routines. Some examples of a procedural programming language are Java, Pascal, C, BASIC and FORTRAN.
2. Object-oriented programming (OOP): it is a high level programming language which is based on creating objects that comprises of data (fields) and code (procedures). This procedure includes a method while the data that makes up the object is generally referred to as fields and includes arrays, variables, class etc. Some examples of object-oriented programming language are Python, Ruby, Raku, Java, C++ etc.
Generally, in computer programming a procedural programming is primarily based on creating procedures while an object-oriented programming is based on the creation of objects.
Who should perform the validation test, the software developer or the software user?
cpp g Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards, then backwards. End each loop with a newline. Ex: If courseGrades
Answer:
lol don't ask people to write code for you
assuming its an array, n is size.
normally:
for(int ele: courseGrades){
cout << ele <<" ";
}
cout << endl;
reverse:
reverse(courseGrades, courseGrades + n);
for(int ele: courseGrades){
cout << ele <<" ";
}
cout << endl;
GIVING BRANLIEST!!!
John wants to assign a value to the favorite animal variable: favoriteAnimal = Koala but gets an error message. What does he need to fix for the code to work?
Add a space between the words in the variable name.
Create a shorter variable name.
Delete the symbol in the string.
Put quotations around the string.
Answer:
put quotations around the string
Explanation:
the animal name, koala, is of data type string and it should be enclosed in " "
delete the symbol
just put it into a processor like python idle
Which social media platform provides filters that alter the user's face by smoothing and whitening skin, changing eye shape, nose size, and jaw profile
Answer: Snap-chat
Explanation:
is a social media platform application developed for mainly sharing of photos with the use of some special filters which are able alter how the person looks. examples of such filters are filters that alter the user's face, smoothing and whitening the users skin, changes the eye shape of the user, alters the nose size and jaw profile of the individual using the app. Snap chat has become a photo favorite for many young people today and celebrities alike.
Many clustering algorithms that automatically determine the number of clusters claim that this is an advantage. List two situations in which this is not the case
Answer: to vibe the rest
Explanation:
Write a second constructor as indicated. Sample output:User1: Minutes: 0, Messages: 0User2: Minutes: 1000, Messages: 5000// ===== Code from file PhonePlan.java =====public class PhonePlan { private int freeMinutes; private int freeMessages; public PhonePlan() { freeMinutes = 0; freeMessages = 0; } // FIXME: Create a second constructor with numMinutes and numMessages parameters. /* Your solution goes here */ public void print() { System.out.println("Minutes: " + freeMinutes + ", Messages: " + freeMessages); return; }}// ===== end =====// ===== Code from file CallPhonePlan.java =====public class CallPhonePlan { public static void main (String [] args) { PhonePlan user1Plan = new PhonePlan(); // Calls default constructor PhonePlan user2Plan = new PhonePlan(1000, 5000); // Calls newly-created constructor System.out.print("User1: "); user1Plan.print(); System.out.print("User2: "); user2Plan.print(); return; }}// ===== end =====
Answer:
public PhonePlan(int numMinutes, int numMessages) {
freeMinutes = numMinutes;
freeMessages = numMessages;
}
Explanation:
Create a constructor that takes two parameters, numMinutes and numMessages
Inside the constructor, set numMinutes to freeMinutes and numMessages to freeMessages.
With this constructor, we are able to create PhonePlan objects that take parameters and different options as seen in the output. We can set any values for minutes and messages in the constructor.
Answer:
PhonePlan::PhonePlan(int numMinutes, int numMessages) {
freeMinutes = numMinutes;
freeMessages = numMessages;
}
Explanation: For C++
PhonePlan::PhonePlan(int numMinutes, int numMessages) {
^^^^^^^^^^^^
you need that
freeMinutes = numMinutes;
freeMessages = numMessages;
}
witch of the following might cause you to flash the Bios/UEFi
Answer:
This bios is to perform the access the Ram, video settings and modify settings.
Explanation:
This bios is to contain the section is to explain the motherboard are known as the Bios and to access the modify setting to the processor.
Bios is to contain that basic input and output system of the component and system bios to the recent interface is contain to the boot .Bios system perform it test as the video card, USB drives, to the components way to the operating system.Bios is perform to the change the bios setting and upgrade the bios settings, to interact the motherboard.Bios is to consist to the built storage device, cards to the assembled by the bios program.Bios is to perform hard drives to the higher capacity and the faster system optimizations.Bios system is performed to the automatically to configure the system and also referred to the some system.Bios are to comes on the personal computer system to the run into software to power on, this used in input/ output process.Bios is to provide the abstract layer system and display the interface to program on operating system.Bios is contain are the stored in a flash memory to remove the chip from that mother board system.Consider two decision problems X and Y. If X reduces in polynomial time to 3-SAT and 3-SAT reduces in polynomial time to Y. Which of the following can be inferred from the previous statement?
a. X is in NP and Y is in NP-Hard.
b. Y is in NP and X is in NP-Hard.
c. Both X and Y are in NP-hard.
d. Both X and Y are in NP.
Answer:
X is in NP and Y is in NP-HARD ( A )
Explanation:
X is in NP and Y is in NP-HARD can be inferred from the previous statement made in the problem above because problem decision X can be in NP if it can BE reducible to a 3-SAT polynomial real time, if that can be achieved then 3SAT will be in NP since SAT is in NP as well.
also problem decision Y can be in NP-HARD if 3SAT can be reducible to it in polynomial time as well hence option A is the correct option
Do computers perform disk optimization utilizing the same software
Answer:
All computers perform disk optimization utilizing the same software.
4. Write a script called lineCounter that accepts a filename as a command line argument. It should run through the file line by line, displaying a character count for each line. The script should include a line counter, which records the line number, and is incremented when each line is processed.
Answer:
from sys import argv
script, filename = argv
with open( filename ) as file:
line_counter = 0
while True:
extract_line = file.readlines( )
line_counter += 1
character_count = extract_line.count( )
print( " line number: { } , character count: { }". format( line_counter, character_counter )
print ( " Nothing left to count" )
file.close( )
Explanation:
The 'argv' is a module in the python system package, which allows for user input and script execution in the command. It loads the script and the file as a tuple which is offloaded in the script like arguments in a function.
What technology followed the form of Analog equipment?
Answer:
The teleautograph
Explanation:
The precursor to the present day fax machine was the analogue the telautograph. The device sends recorded potentiometer recorded electrical impulses to a pen to which is attached stepping motors such that a graphic inscription made by a sender is reproducible by the receiving system station. The teleautograph was the first device that was able to make such a transmission to a sheet of paper in a stationary state. simulation.
Answer:
Explanation:
Digital information All kinds of everyday technology also works using digital rather than analog technology. Cellphones, for example, transmit and receive calls by converting the sounds of a person's voice into numbers and then sending the numbers from one place to another in the form of radio waves.
Given the ever-changing cloud services, it is tough to know how to design a sustainable cloud strategy.
a) true
b) false
Answer:
True
Explanation:
Due to the ever-changing cloud services, designing a sustainable cloud strategy is tough. Some factors that makes it look tough:
1. Choosing suitable cloud platforms that will be sustainable over a long period of time.
2. Availability of a cloud design specialist and experts: Getting a cloud specialist who can work out a sustainable design is tough itself.
Every corporate organization must take adequate caution when choosen a cloud design. This is to enable them have something sustainable as a result of the ever-changing cloud services.
JavaCalculate the ChangeProgramming challenge description:The goal of this question is to design a cash register program. Your register currently has the following notes/coins within it:One Pence: .01Two Pence: .02Five Pence: .05Ten Pence: .10Twenty Pence: .20Fifty Pence: .50One Pound: 1Two Pounds: 2Five Pounds: 5Ten Pounds: 10Twenty Pounds: 20Fifty Pounds: 50The aim of the program is to calculate the change that has to be returned to the customer with the least number of coins/notes. Note that the expectation is to have an object-oriented solution - think about creating classes for better reusability.Input:Your program should read lines of text from standard input (this is already part of the initial template). Each line contains two numbers which are separated by a semicolon. The first is the Purchase price (PP) and the second is the cash(CH) given by the customer.Output:For each line of input print a single line to standard output which is the change to be returned to the customer. If CH == PP, print out Zero. If CH > PP, print the amount that needs to be returned (in terms of the currency values). Any other case where the result is an error, the output should be ERROR.The output should change from highest to lowest denomination.Test 1Test 1 Input11.2520Expected OutputFive Pounds, Two Pounds, One Pound, Fifty Pence, Twenty Pence, Five PenceTest 2Test 2 Input8.7550Expected OutputTwenty Pounds, Twenty Pounds, One Pound, Twenty Pence, Five PenceTest 3Test InputDownload Test 3 Input2010Expected OutputDownload Test 3 InputERRORCode below:please fill the functions and or classes here. thank you for help.import java.io.BufferedReader;import java.io.IOException;import java.io.InputStreamReader;import java.nio.charset.StandardCharsets;public class Main {/*** Iterate through each line of input.*/public static void main(String[] args) throws IOException {InputStreamReader reader = new InputStreamReader(System.in);BufferedReader in = new BufferedReader(reader);try {double purchasePrice = Double.parseDouble(in.readLine());double cash = Double.parseDouble(in.readLine());Main.calculateChange(purchasePrice, cash);} catch (Exception e) {System.out.println(e);}}public static void calculateChange(double purchasePrice, double cash) {// Access your code here. Feel free to create other classes as required}}
Answer:
i dont know
Explanation:
We will extend this idea to streams. Write a function called rle that takes in a stream of data, and returns a corresponding stream of two-element lists, which represents the run
Answer:
def rle(data_stream ):
with open( "data_stream" ) as file:
container= [ ]
two_itemlist= [ ]
while True:
container.append( file.readlines )
file.close( )
while container == True:
value= container.pop(0)
split_value= value.split( " " )
while split_value == True:
while len( two_itemlist) < 2:
holder = split_value.pop( 0 )
two_itemlist.append( holder )
yield two_itemlist
new_list = rle ( new_file )
Explanation:
In the solution above, the defined function is a generator, as it continuously returns a two-element list.
Use the words: Explain, Compare. Create a question using "explain" as the verb. Answer that question.
EG: Explain what collective action is? Answer: It is behaviors that....
Answer:
i need free points cus i have zero sry
Explanation:
Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
Using any of the machine language instructions in
Section 5.2.4, translate the following algorithmic operations into their machine language equivalents.
a. Set v to the value of x – y + z. (Assume the existence of the machine language command SUBTRACT X, Y, Z that computes CON(Z) = CON(X) – CON(Y).)
b. Set v to the value (w + x ) - ( y + z)
c. If (v ≥?w) then
set x to y Else set x to z
d. While y < z do
Set y to the value ( y + w + z)
Set z to the value (z + v)
End of the loop
Answer and Explanation:
A. To translate the above algorithm to machine language, we first assign have to perform the first part of the operation which is x-y and set the value to the v variable. The x, y and v values are stored in memory location 202, 203 and 200 respectively.
The z value in the memory location 204 is then added to the v value in memory location 200. The first code sequence is stored in memory location 50 and the second code sequence to achieve x+y-z stored in v is stored in memory location 51(as asummed in question)
B. In the second algorithm, we add value in w which is in memory location 201 to value in x in memory location 202 and assign the result to v in memory location 200. The same is done for y+z in memory locations 203 and 204 respectively with result stored in w. We then subtract the values in v in memory location 200 from w and assign the value to v in memory location 200
C. in the first memory location 50, the code sequence v compared to w is stored. If v(stored in memory location 201)is greater than or equal to w(in memory location 202), it moves to address 54 and assigns the y value to x in memory locations 203 and 202 respectively else it assigns z valuein memory 204 to x value in 202 and jumps to next instruction
D. In this algorithm, it first compares y and z in memory locations 203 and 204 respectively in the first code sequence memory 50. In 51, it checks to see if the condition is satisfied and if it is, it jumps to address 53 and adds y and w in their various memory locations and stores it in memory 203 in y otherwise it moves to address 57. Now to get y+w+z, It then adds y +w in memory location 203 in y to z in memory location 204 and then stores the result in y. Subsequently it adds the z value to v and stores the result in v and moves to address 50 where it compares a new set of value as in a loop in the algorithm which continues till the "while" condition can no longer be satisfied.
a database of the virus is called____
Answer:
I believe it is poisoning I could be wrong
How does enforce password history and minimum password age work together to keep a network environment secure?
Answer:
The Enforce Password History and Minimum Password Age works together by preventing a person from changing the password many times and using an old password.
Explanation:
Minimum Password Age works to stop a user from modifying an existing password numerous times so that it will bypass enforce password history and asked to reset the password.
The Enforce Password History policy works to prevent a user from making use of an old password by setting limits on the number of remembered passwords. This helps users from using old and easily guessed passwords which can leave them vulnerable to network attacks.
What command would you use to display the disk usage in human readable format of a directory named test3. Assume this directory is right under your home directory and you are executing this command from your home directory.
Explanation:
if we use the above command with -h then this will show the result in human readable format.
df -h
Ex: df -h test3 (The command as asked in the question)
So the above command is showing the disk status in Gigabyte format.
Try the same command in your system. If directory test 3 is not present then create a new one with mkdir command.
Compute the overall (Cache) performance CPU:
A processor runs at 3.0 GHz and has a CPI=1.5 for a perfect cache (i.e. without including the stall cycles due to cache misses). Assume that load and store instructions are 25% of the instructions. The processor has an I-cache (Instruction – cache) with a 5% miss rate and a Dcache (Data memory cache) with 4% miss rate. The hit time is 1 clock cycle for both caches.
Assume that the time required to transfer a block of data from the main memory to the cache, i.e. miss penalty, is 40 ns.
a. Compute the number of stall cycles per instruction
b. Compute the overall (cycle per instruction) CPI
c. Compute the average memory access time (AMAT) in ns.
Answer:
See explanation.
Explanation:
Given:
Instruction miss rate = I-cache miss rate = 5% = 0.05
Data miss rate = D-cache miss rate = 4% = 0.04
CPI (without including the stall cycles) = 1.5
Miss Penalty = 40 ns × 3 GHz = 120 cycles
load and store instructions = 25% = 0.25
hit time = 1 clock cycle
a. Compute the number of stall cycles per instruction
Instruction miss cycles = I-cache miss rate * miss penalty
= 0.05 * 120
= 6
Data miss cycles = D-cache miss rate * miss penalty * load and store
instructions
= 0.04 * 120 * 0.25
= 1.2
Total memory stall cycles = Instruction miss cycles + Data miss cycles
= 6 + 1.2
= 7.2
number of stall cycles per instruction = 7.2
b. Compute the overall (cycle per instruction) CPI
CPI (stall) = 1.5 + 7.2
= 8.7
Ideal CPU = CPU time with stalls / CPU time with perfect cache
= I x CPI (stall) x Clock cycle/ I x CPI x Clock cycle
= 8.7 / 1.5
= 5.8
c. Compute the average memory access time (AMAT) in ns.
Combined misses per instruction = 0.05 + 0.25 * 0.04 = 0.06
Combined Miss Rate = Combined misses per I/ 1.25 access per I
Combined Miss Rate = 0.06 / 1.25 = 0.048
Average Memory Access time (AMAT) = Hit time + Miss rate × Miss penalty
= 1 + 0.048 * 120
= 6.7
= 6.76 cycles
= 6.76 / 3
= 2.253 ns
AMAT = 2.253 ns