Answer:
b. False
Explanation:
False, unchecked exceptions do not cause compilation errors and do not require try/catch blocks or throws statements. However, although they are not required it is good programming to include them in order to handle any exceptions that may arise. If you do not include a proper way to handle such an exception the program will still run but may run into an exception during runtime. If this occurs then the entire program will crash because it does not know how to handle the exception since you did not provide instructions for such a scenario.
HELP ITS A TESTTT!!!Which symbol shows auto correct is in use?
A-a white light bulb
B-A green plus sign
C-A flashing red circle
D-A yellow lightning bolt
Answer:
D
Explanation:
as an IT manager write a memo to the student explaining the requirements of an ideal computer room
The correct answer to this open question is the following.
Memorandum.
To: IT class.
From: Professor Smith.
Date:
Dear students,
The purpose of this memorandum is to let you all know the requirements of an ideal computer room.
1.- The compute room should be a decent, large, space, ready to accommodate the number of students that are going to participate in class.
2.- The proper temperature levels. All the hardware can't stand too much heat. We need ventilators and the right temperature for safety purposes.
3.- The organization of the PCs on every desk must be precise in order to have enough room for everybody's participation and interaction.
4.- Have a proper fire suppression system in place. The risk of fire when working with electronics is considerable.
5.- Access control. The equipment is expensive and must be just for qualified students. Have the proper control-access system to keep the place safe.
Thank you for your attention.
With your cooperation, the computer room should be a place to learn and have fun learning new things.
Write a method that prints on the screen a message stating whether 2 circles touch each other, do not touch each other or intersect. The method accepts the coordinates of the center of the first circle and its radius, and the coordinates of the center of the second circle and its radius.
The header of the method is as follows:
public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2)
Hint:
Distance between centers C1 and C2 is calculated as follows:
d = Math.sqrt((x1 - x2)2 + (y1 - y2)2).
There are three conditions that arise:
1. If d == r1 + r2
Circles touch each other.
2. If d > r1 + r2
Circles do not touch each other.
3. If d < r1 + r2
Circles intersect.
Answer:
The method is as follows:
public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2){
double d = Math.sqrt(Math.pow((x1 - x2),2) + Math.pow((y1 - y2),2));
if(d == r1 + r2){
System.out.print("The circles touch each other"); }
else if(d > r1 + r2){
System.out.print("The circles do not touch each other"); }
else{
System.out.print("The circles intersect"); }
}
Explanation:
This defines the method
public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2){
This calculate the distance
double d = Math.sqrt(Math.pow((x1 - x2),2) + Math.pow((y1 - y2),2));
If the distance equals the sum of both radii, then the circles touch one another
if(d == r1 + r2){
System.out.print("The circles touch each other"); }
If the distance is greater than the sum of both radii, then the circles do not touch one another
else if(d > r1 + r2){
System.out.print("The circles do not touch each other"); }
If the distance is less than the sum of both radii, then the circles intersect
else{
System.out.print("The circles intersect"); }
}
You are a high school student learning about computers and how to build them. As a class project, you have built a new computer. You power on your computer and begin to configure the system. After a short while, you notice smoke coming from the PC, and shortly after that, the computer stops working. After removing the computer case, you see that the CPU and surrounding areas are burnt and very hot. You realize that the costly mistake you made was not using a heat sink. When rebuilding your computer, which cooling systems would MOST efficiently remove heat from the CPU?
Answer:
You can use thermal paste, active heat sink, liquid pipes, and even a fan. These are just some that I've heard.
Explanation:
All of these are cooling and will stop the Central Processing Unit from overheating.
Hope this helps :)
When rebuilding your computer, the cooling systems which would most efficiently remove heat from the Central processing unit (CPU) are: cooling fan and thermal compounds.
A computer refers to an intelligent electronic device that is designed and developed to receive raw data as an input and then processes these data into an information (output) that is usable by an end user.
Basically, the main part of a computer are broadly divided into the following;
Input devices (peripherals). Output devices (peripherals). Motherboard. Memory and storage device.Central processing unit (CPU).A cooling device can be defined as a device that is designed and developed to efficiently remove or dissipate heat from the inside of a computer. The cooing system used in a computer are grouped into two
(2) main categories and these are:
I. Active cooling device: an example is a cooling fan.
II. Passive cooling device: an example is a heat sink.
In conclusion, the cooling systems which would most efficiently remove heat from the Central processing unit (CPU) are cooling fan and thermal compounds.
Read more: https://brainly.com/question/10983152
Write a function addingAllTheWeirdStuff which adds the sum of all the odd numbers in array2 to each element under 10 in array1. Similarly, addingAllTheWeirdStuff should also add the sum of all the even numbers in array2 to those elements over 10 in array1.
Answer:
The function is as follows:
def addingAllTheWeirdStuff(array1,array2):
sumOdd = 0
for i in array2:
if i % 2 == 1:
sumOdd+=i
for i in array1:
if i < 10:
sumOdd+=i
print("Sum:",sumOdd)
sumEven = 0
for i in array1:
if i % 2 == 0:
sumEven+=i
for i in array2:
if i > 10:
sumEven+=i
print("Sum:",sumEven)
Explanation:
This declares the function
def addingAllTheWeirdStuff(array1,array2):
This initializes the sum of odd numbers in array 2 to 0
sumOdd = 0
This iterates through array 2
for i in array2:
This adds up all odd numbers in it
if i % 2 == 1:
sumOdd+=i
This iterates through array 1
for i in array1:
This adds up all elements less than 10 to sumOdd
if i < 10:
sumOdd+=i
This prints the calculated sum
print("Sum:",sumOdd)
This initializes the sum of even numbers in array 1 to 0
sumEven = 0
This iterates through array 1
for i in array1:
This adds up all even numbers in it
if i % 2 == 0:
sumEven+=i
This iterates through array 2
for i in array2:
This adds up all elements greater than 10 to sumEven
if i > 10:
sumEven+=i
This prints the calculated sum
print("Sum:",sumEven)
A technician is able to connect to a web however, the technician receives the error, when alternating to access a different web Page cannot be displayed. Which command line tools would be BEST to identify the root cause of the connection problem?
Answer:
nslookup
Explanation:
Nslookup command is considered as one of the most popular command-line software for a Domain Name System probing. It is a network administration command-line tool that is available for the operating systems of many computer. It is mainly used for troubleshooting the DNS problems.
Thus, in the context, the technician receives the error "Web page cannot be displayed" when he alternates to access different web page, the nslookup command is the best command tool to find the root cause of the connection problem.
Regarding the role played by the “victim” in deadlock resolution, give an example of such a deadlock in real life and explain your answers to these questions.
a. Describe how you might choose the victim to be removed and the consequences, both positive and negative, of that removal.
b. Describe the fate of the victim and the chances of eventually completing its processing.
c. Describe the actions required, if any, to complete the victim’s tasks.
Answer:
Here the answer is given as follows,
Explanation:
The real-life situation of a deadlock resolution where a role is played by the victim is given as follows:
Example: An example of such a situation are often a one-way lane where the flow of traffic is merely in a method. Thus, on just one occasion, the flow of traffic can enter one direction only. Each entrance/exit gate is often considered a resource. during this case, if two cars are coming from both the entrances and that they are often considered as two tasks, then one among the cars must copy or we will say hand over its resource in order that the opposite car gets the prospect to first cross the lane or we will say the opposite task gets executed.
a) Victim: The steps which describe how a victim is chosen are given as follows :
The task which is terminated so as to interrupt things of deadlock is taken into account because of the victim.
There are often a variety of job pools that will be under a deadlock situation and therefore the victim is usually a low-priority task in order that the performance isn't affected that much and termination of this task doesn't cause any effect on the opposite jobs.
the main positive effect of selecting and terminating a victim is that things of deadlock are resolved and every one of the tasks can execute now.
The negative effect is that the task that's chosen because the victim is terminated and is executed at the previous. This whole process for choosing a victim then terminating it then restarting it again may consume some longer also.
b) An easy deadlock priority is often set. this suggests that the victim’s task or the task is often terminated so as to interrupt the deadlock and other jobs can finish executing. After this, the task which is terminated are often later restarted and every one of the tasks can then execute without a deadlock.
c) When employment gets terminated, the knowledge associated with it's stored. Are often This is often done in order that the work can be restarted again and therefore the information in it's not lost. Since the progress of the victim is stopped. Thus, the sole thanks to complete the victim’s task would be to start out it again. But before restarting the task, this must be considered that the victim’s task doesn't cause any deadlock within the system.
What would be the result of the flooding c++ cide assuming all necessary directive
Cout <<12345
Cout<
cout <
Cout<< number <
Answer:
See explanation
Explanation:
The code segment is not properly formatted; However, I will give a general explanation and a worked example.
In c++, setprecision are used to control the number of digits that appears after the decimal points of floating point values.
setprecision(0) means; no decimal point at all while setprecision(1) means 1 digit after the decimal point
While fixed is used to print floating point number in fixed notation.
Having said that:
Assume the code segment is as follows:
number = 12.345;
cout<<fixed;
cout<<setprecision(0);
cout<<number <<endl;
The output will be 12 because setprecision(0) implies no decimal at all; So the number will be rounded up immediately after the decimal point
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical.
B. timing.
C. chosen ciphertext.
D. brute-force.
Answer:
chosen ciphertext
Explanation:
Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.
Cyber attack usually associated with obtaining decryption keys that do not run in fixed time is called the chosen ciphertext attack.
Theae kind of attack is usually performed through gathering of decryption codes or key which are associated to certain cipher texts The attacker would then use the gathered patterns and information to obtain the decryption key to the selected or chosen ciphertext.Hence, chosen ciphertext attempts the use of modular exponentiation.
Learn more : https://brainly.com/question/14826269
Fill in the necessary blanks to list the name of each trip that does not start in New Hampshire (NH) Use the Colonial Adventure Tour Database listing found on the Canvas webpage under Databases or in the text.
SELECT TripName
FROM______
WHERE Trip____ ____NH:
Answer:
SELECT TripName
FROM AllTrips
WHERE Trip NOT LIKE ‘NH%'
Explanation:
Required
Fill in the blanks
The table name is not stated; so, I assumed the table name to be AllTrips.
The explanation is as follows:
This select the records in the TripName column
SELECT TripName
This specifies the table where the record is being selected
FROM AllTrips
This states the fetch condition
WHERE Trip NOT LIKE ‘NH%'
Note that:
The wild card 'NH%' means, record that begins with NHNot means oppositeSo, the clause NOT LIKE 'NH%' will return records that do not begin with NH
Reverse Word Order: Write a program that reverses the order of the words in a given sentence. This program requires reversing the order of the words wherein the first and last words are swapped, followed by swapping the second word with the second to last word, followed by swapping the third word and the third to last words, and so on.
Answer:
function reverseArray(arr) {
if (arr.length > 1) {
arr = [arr[arr.length-1], ...reverseArray(arr.slice(1, -1)), arr[0]]
}
return arr;
}
function reverseSentence(sentence) {
let words = reverseArray( sentence.split(" ") );
return words.join(" ");
}
console.log( reverseSentence("The quick brown fox jumps over the lazy dog's back") );
console.log( reverseSentence("one two three") );
console.log( reverseSentence("one two") );
console.log( reverseSentence("Single") );
Explanation:
This is a solution in javascript leveraging several powerful constructs in that language, such as the spread operator.
A good CRM should Integrate marketing, sales, and customer support activities measuring and evaluating the process of knowledge acquisition and sharing.
The correct answer to this open question is the following.
Unfortunately, you forgot to include a question. Here, we just have a statement.
What is your question? What do you want to know?
If this is a true or false question, the answer is "true."
It is true that a good CRM should integrate marketing, sales, and customer support activities measuring and evaluating the process of knowledge acquisition and sharing.
The reason is that effective investment in Customer Relationship Management (CRM) should be able to operate efficientñy with these management aspects in order to increase the productivity and efficiency of the company.
A good CRM has to facilitate the operations of a company, improving time management and people's activities that can produce better results accomplishing the companies goals and fulfilling the key performing indicators (KPI)
which of the following is an example of how science can solve social problems?
It can reduce the frequency of severe weather conditions.
It can control the time and day when cyclones happen.
It can identify the sources of polluted water.
It can stop excessive rain from occurring.
Answer:
It can identify the sources of polluted water.
Explanation:
Science can be defined as a branch of intellectual and practical study which systematically observe a body of fact in relation to the structure and behavior of non-living and living organisms (animals, plants and humans) in the natural world through experiments.
A scientific method can be defined as a research method that typically involves the use of experimental and mathematical techniques which comprises of a series of steps such as systematic observation, measurement, and analysis to formulate, test and modify a hypothesis.
An example of how science can solve social problems is that it can identify the sources of polluted water through research, conducting an experiment or simulation of the pollution by using a computer software application.
In conclusion, science is a field of knowledge that typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life.
Answer:
It can identify the sources of polluted water.
Explanation:
or Java,
program to perform this computa
3.
Isaac Newton devised a clever method to casily approximate the square root of a number without having
to use a calculator that has the square root function. Describe this method with illustration
Answer:
The illustration in Java is as follows:
import java.util.*;
import java.lang.Math.*;
class Main{
public static void main (String[] args){
Scanner input = new Scanner(System.in);
double num, root, temp;
num = input.nextDouble();
temp = num;
while (true){
root = 0.5 * ( (num / temp)+temp);
if (Math.abs(root - temp) < 0.00001){
break; }
temp = root; }
System.out.println("Root: "+root);
}}
Explanation:
This declares all necessary variables
double num, root, temp;
This gets input for num (i.e the number whose square root is to be calculated)
num = input.nextDouble();
This saves the input number to temp
temp = num;
This loop is repeated until it is exited from within the loop
while (true){
Calculate temporary square root
root = 0.5 * ( (num / temp)+temp);
The loop is exited, if the absolute difference between the root and temp is less than 0.00001
if (Math.abs(root - temp) < 0.00001){
break; }
Save the calculated root to temp
temp = root; }
This prints the calculated root
System.out.println("Root: "+root);
Write a function number_of_pennies() that returns the total number of pennies given a number of dollars and (optionally) a number of pennies. Ex: If you have $5.06 then the input is 5 6, and if you have $4.00 then the input is 4. Sample output with inputs: 5 6 4 506 400
Answer:
The function is as follows:
def number_of_pennies(dollars,pennies=0):
return dollars*100+pennies
Explanation:
This defines the function
def number_of_pennies(dollars,pennies=0):
This returns the number of pennies
return dollars*100+pennies
Note that, if the number of pennies is not passed to the function, the function takes it as 0
Answer:
Code is given as:-
#number_of_pennies function with one default argument with pennies as 0 when no pennies parameter is given
def number_of_pennies(dollars,pennies = 0):
pennies = dollars*100 + pennies #one dollar equals 100 pennies so calculate total pennies with this formula
return pennies #return total pennies
print(number_of_pennies(int(input()),int(input()))) #both Dollars and pennies
print(number_of_pennies(int(input()))) #Dollars only
Explanation:
Here is the sample code and output.
Describe how data is transmitted using half-duplex serial data transmission.
Answer:
In half duplex mode, the signal is sent in both directions, but one at a time. In full duplex mode, the signal is sent in both directions at the same time. In simplex mode, only one device can transmit the signal. In half duplex mode, both devices can transmit the signal, but one at a time.
3. It is used to measure the resistance on ohms and voltage that flow in circuit both AC and DC current. A. Gadget C. Electrical tape B. Voltage D. Multi-tester VOM
Answer:
the answer is D. Multi -tester VOM
It is used to measure the resistance on ohms and voltage that flow in the circuit both AC and DC current is D. Multi-tester VOM.
What does an ammeter degree?Ammeter, tool for measuring both direct or alternating electric powered modern, in amperes. An ammeter can degree an extensive variety of modern values due to the fact at excessive values most effective a small part of the modern is directed thru the meter mechanism; a shunt in parallel with the meter consists of the main portion. ammeter.
A multimeter or a multitester additionally referred to as a volt/ohm meter or VOM, is a digital measuring tool that mixes numerous size capabilities in a single unit. A traditional multimeter can also additionally encompass capabilities consisting of the capacity to degree voltage, modern and resistance.
Reda more about the Voltage:
https://brainly.com/question/24858512
#SPJ2
1. Which of the following is smallest?
a) desktop System Unit
b) notebooks System Unit
c) PDA System Unit
d) tablet PC’s
Answer:
c) PDA System Unit
Explanation:
.... ...
Trust me mark me as brainliest trust me
Answer:
The smallest is PDA System Unit - c
21
What does the following code print?
if 4 + 5 == 10:
print("TRUE")
else:
print("FALSE")
print("TRUE")
(2 Points)
Answer:
error
Explanation:
Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and their average as integers (rounded), then as floating-point numbers. Output each rounded integer using the following: print('{:.0f}'.format(your_value)) Output each floating-point value with three digits after the decimal point, which can be achieved as follows: print('{:.3f}'.format(your_value))
Answer:
The program is as follows:
prod = 1
isum = 0
for i in range(4):
num = float(input())
prod*=num
isum+=num
avg = isum/4
print('{:.0f}'.format(prod))
print('{:.3f}'.format(avg))
Explanation:
This initializes the product to 1
prod = 1
..... and sum to 0
isum = 0
The following iteration is repeated 4 times
for i in range(4):
Get input for each number
num = float(input())
Calculate the product
prod*=num
Add up the numbers
isum+=num
This calculates the average
avg = isum/4
Print the products
print('{:.0f}'.format(prod))
Print the average
print('{:.3f}'.format(avg))
Write a program in Python representing 7 logic gates:
AND
NAND
OR
NOR
XOR
XNOR
NOT
Accept (only) two inputs to create all outputs.
Use the if statement to perform the Boolean logic.
Only accept numeric input.
If a number is greater than 0 treat it as a 1.
Specify in your output and in the beginning of the code (through print statements) which gate the code represents.
Comment your code.
Answer:
The program in python is as follows:
a = int(input("A: "))
b = int(input("B: "))
if a != 0:
a= 1
if b != 0:
b = 1
print("A AND B",end =" ")
if a == b == 1:
print("True")
else:
print("False")
print("A NAND B",end =" ")
if a == 0 or b == 0:
print("True")
else:
print("False")
print("A OR B",end =" ")
if a == 1 or b == 1:
print("True")
else:
print("False")
print("A NOR B",end =" ")
if a == 1 or b == 1:
print("False")
else:
print("True")
print("A XOR B",end =" ")
if a != b:
print("True")
else:
print("False")
print("A XNOR b",end =" ")
if a == b:
print("True")
else:
print("False")
print("NOT A",end =" ")
if a == 1:
print("False")
else:
print("True")
print("NOT B",end =" ")
if b == 1:
print("False")
else:
print("True")
Explanation:
These get inputs for A and B
a = int(input("A: "))
b = int(input("B: "))
a and b are set to 1 for all inputs other than 0
if a != 0:
a= 1
if b != 0:
b = 1
This prints the AND header
print("A AND B",end =" ")
AND is true if only A and B are 1
if a == b == 1:
print("True")
else:
print("False")
This prints the NAND header
print("A NAND B",end =" ")
NAND is true if one of A or B is 0
if a == 0 or b == 0:
print("True")
else:
print("False")
This prints the OR header
print("A OR B",end =" ")
OR is true if one of A or B is 1
if a == 1 or b == 1:
print("True")
else:
print("False")
This prints the NOR header
print("A NOR B",end =" ")
NOR is false if one of A or B is 1
if a == 1 or b == 1:
print("False")
else:
print("True")
This prints the XOR header
print("A XOR B",end =" ")
XOR is true if A and B are not equal
if a != b:
print("True")
else:
print("False")
This prints the XNOR header
print("A XNOR b",end =" ")
XNOR is true if a equals b
if a == b:
print("True")
else:
print("False")
This prints NOT header for A
print("NOT A",end =" ")
This prints the opposite of the input
if a == 1:
print("False")
else:
print("True")
This prints NOT header for B
print("NOT B",end =" ")
This prints the opposite of the input
if b == 1:
print("False")
else:
print("True")
An attribute is a(n)?
Answer:
hjqnajiwjahhwhaiwnaoai
Answer:
Which I am not sure of as to what I want to watch a few years back in May but it is not part of Malvolio's that is not a big thing for the world of
52. Which of the following numbering system is used by the computer to display numbers? A. Binary B. Octal C. Decimal D. Hexadecimal
Answer:
Computers use Zeroes and ones and this system is called
A. BINARY SYSTEM
hope it helps
have a nice day
A. Describe four types of information that you can enter into a worksheet cell when using a spreadsheet package, giving specific examples.
Answer:
The first step of learning about spreadsheets is understanding the terminology you will encounter as you work through this lesson. The glossary below lists terms that are specific to spreadsheet applications. Terminology that we learned when we looked at wordprocessing (such as copy, paste, clipboard, etc.) also apply to spreadsheet applications.
solve the average of 4 numbers and display fail if grade is below 60
Need a better discription of the question to finalize an answer.
name any two objectives of a business
Explanation:
Growth – Another important objective of business is to achieve growth. The growth should be in terms of increase in profit, revenue, capacity, number of employees and employee prosperity, etc.
Stability – Stability means continuity of business. An enterprise or business should achieve stability in terms of customer satisfaction, creditworthiness, employee satisfaction etc. A stable organization can easily handle changing dynamics of markets.
The purpose of a good web page design is to make it
Answer:
Hi , so your answer is that a good web page design is to make it easy to use and meaningful and able to help people .
Explanation:
Really hope i helped , have a nice day :)
Answer: helpful for everyone
Explanation:
some student need help so then he can't find the answer in the other websites so it is department about communication
In this chapter, you learned that although a double and a decimal both hold floating-point numbers, a double can hold a larger value. Write a C# program named DoubleDecimalTest that declares and displays two variables—a double and a decimal. Experiment by assigning the same constant value to each variable so that the assignment to the double is legal but the assignment to the decimal is not.
Answer:
The DoubleDecimalTest class is as follows:
using System;
class DoubleDecimalTest {
static void Main() {
double doubleNum = 173737388856632566321737373676D;
decimal decimalNum = 173737388856632566321737373676M;
Console.WriteLine(doubleNum);
Console.WriteLine(decimalNum); } }
Explanation:
Required
Program to test double and decimal variables in C#
This declares and initializes double variable doubleNum
double doubleNum = 173737388856632566321737373676D;
This declares and initializes double variable decimalNum (using the same value as doubleNum)
decimal decimalNum = 173737388856632566321737373676M;
This prints doubleNum
Console.WriteLine(doubleNum);
This prints decimalNum
Console.WriteLine(decimalNum);
Unless the decimal variable is commented out or the value is reduced to a reasonable range, the program will not compile without error.
The compound known as butylated hydroxytoluene, abbreviated as BHT, contains carbon, hydrogen, and oxygen. A 1.501 g sample of BHT was combusted in an oxygen rich environment to produce 4.497 g of CO2(g) and 1.473 g of H2O(g). Insert subscripts below to appropriately display the empirical formula of BHT.
Answer:
C15H24O
Explanation:
n(C) = 4.497 g/44g/mol = 0.1022
Mass of C = 0.1022 × 12 = 1.226 g
n(H) = 1.473g/18 g/mol = 0.0823 ×2 moles = 0.165 moles
Mass of H = 0.0823 × 2 ×1 = 0.165g
Mass of O= 1.501 -(1.226 + 0.165)
Mass of O= 0.11 g
Number of moles of O = 0.11g/16g/mol = 0.0069 moles
Dividing through by the lowest ratio;
0.1022/0.0069, 0.165/0.0069, 0.0069/0.0069
15, 24, 1
Hence the formula is;
C15H24O
Answer
The formula is C1SH240
Write the algorithm for finding the perimeter of a rectangle using English like form step by step