Answer:
Explanation:
This code creates an infinite loop because it is detecting that the first value of copyNums is 1, therefore it runs the insertItem code. This code then adds the value "hello" to the array in position i which would be 0. Then moves to the next value of the array, but since the element "hello" pushed the value 1 to the next index then the code just repeats itself with the same value of 1. This continues to happen because every time the value "hello" is added it simply pushes the 1 to the next index and repeats the same code.
Answer:
[tex]var nums = [1,1, 2, 3, 5, 8, 13, 21];
var copyNums = [1,1, 2, 3, 5, 8, 13, 21];
for(var i=0; i < copyNums.length; i++){
if(copyNums[i] == 1){
insertItem(copyNums,i,"hello");
}
}[/tex]
Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would write the value of the salary variable to the file
A) cout <
B) ofstream
C) dataFile << salary;
D) payroll.dat <
Answer:
dataFile << salary;
Explanation:
To write salary to a file (payroll.dat) using ofstream, you make use of the following instruction:
ofstream dataFile;
myfile.open ("payroll.dat");
myfile <<salary;
myfile.close();
This line creates an instance of ofstream
ofstream dataFile;
This line opens the file payroll.dat
myfile.open ("payroll.dat");
This is where the exact instruction in the question is done. This writes the value of salary to payroll.dat
myfile <<salary;
This closes the opened file
myfile.close();
At Moore High, 456 students attended the prom. This is 65 more students than
the previous year.
To the nearest percent, what is the percent of increase from last year to this
year?
12%
15%
17%
19%
Answer:
B-15%
Explanation:
Write a class called TextProcessor that implements the methods listed below. Your implementation may use the charAt() and length() methods from the String class You must not use any other String methods, and you must not use any of the methods in the Character class. You may not use any integer literal values except for 0 and 1.
DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/pythons = "Administrator"The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment. Options may be used once or not at all.Select and Place:
Answer:
The output is to the given question is:
nist
nsrt
imdA
strat
Explanation:
The missing code can be defined as follows:
code:
s = "Administrator" #defining a variable that hold string value
print(s[4:8])#using slicing with the print method
print(s[4: 12:2])#using slicing with the print method
print(s[3::-1])#using slicing with the print method
print(s[-7:-2])#using slicing with the print method
In the above code, a string variable s is declared, that holds a string value, and use the multiple print method to print its slicing calculated value.
1.16 LAB: Input and formatted output: House real estate summary Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.).
Ex: If the input is:
200000 210000
the output is:
This house is $200000. The change is $-10000 since last month.
The estimated monthly mortgage is $850.0.
Note: Getting the precise spacing, punctuation, and newlines exactly right is a key point of this assignment. Such precision is an important part of programming.
import java.util.Scanner;
public class LabProgram {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int currentPrice;
int lastMonthsPrice;
currentPrice = scnr.nextInt();
lastMonthsPrice = scnr.nextInt();
/* Type your code here. */
}
Answer:
Please find the complete code and the output in the attachement.
Explanation:
In the code, a class "LabProgram" is defined, and inside the main method two integer variable "currentPrice and lastMonthsPrice" is defined that uses the scanner class object is used for a user input value, and in the next step, two print method is declared that print the calculate of the integer variable.
The program is an illustration of output formats in Java
The statements that complete the program are:
System.out.printf("This house is $%d. The change is $%d since last month.\n",currentPrice,(currentPrice - lastMonthsPrice));System.out.printf("The estimated monthly mortgage is $%.1f.\n",(currentPrice * 0.051)/12);To format outputs in Java programming language, we make use of the printf statement, followed by the string literal that formats the required output
Take for instance:
To output a float value to 2 decimal place, we make use of the literal "%.2f"
Read more about Java programs at:
https://brainly.com/question/25458754
Are chairs and tables considered technology?
A) true
B) false
Answer:true
Explanation:
By definition technology is the skills methods and processes used to achieve goals
Chairs and tables are considered technology. The given statement is True.
A comfortable ergonomic office chair lessens the chronic back, hip, and leg pain brought on by prolonged sitting. Employees are able to operate more effectively and productively as a result. Another advantage is a decrease in medical costs associated with poor posture brought on by uncomfortable workplace chairs.
How does technology make your life comfortable?
They can perform their tasks more easily and independently thanks to technology. They feel more empowered, certain, and positive as a result. Many people can benefit greatly from technology. It goes beyond simply being "cool." The most recent technologies can also simplify life.
Among other major technologies, 3D modeling, virtual reality, augmented reality, and touch commerce has an impact on the design and production of furniture. Before actual furniture is built on the ground, it is possible to virtually create it using 3D or three-dimensional modeling.
Thus, Technology includes things like chairs and tables. The assertion is accurate.
Learn more about technology here:
https://brainly.com/question/9171028
#SPJ2
Identify the correct characteristics of Python lists. Check all that apply. Python lists are enclosed in curly braces { }. Python lists contain items separated by commas. Python lists are versatile Python data types. Python lists may use single quotes, double quotes, or no quotes.
Answer:
Python lists contain items separated by commas.
Python lists are versatile Python data types.
Python lists may uses single quotes, double quotes, or no quotes.
Explanation:
Python Lists are enclosed in regular brackets [ ], not curly brackets { }, so this is not a correct characteristic.
Answer:
a c d
Explanation:
Which of the following is NOT one of the Internet sources that hackers use to gather information about a company's employees?
1. Blogs
2. Company website
3. Social networking sites
4. Regional Internet registries
Answer:
4. Regional Internet registries
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
With cybersecurity theory, security standards, frameworks and best practices we can guard against cyber attacks and easy-to-guess passwords such as using alphanumeric password with certain composition and strength.
Some examples of the Internet sources that hackers use to gather information about a company's employees includes;
I. Blogs.
II. Company website.
III. Social networking sites.
However, Regional Internet registries cannot be used by hackers to gather information about a company's employees because it is an internet protocol resource organization saddled with the responsibility of allocating and registering internet protocol (IP) addresses.
what is the significance of the following terms A A L U control unit in the CPU
Answer:
Explanation:
The function of ALU is to perform arithmetic operations(add,subtract, multiply,division) as well as logical operations(compare values).
The function of CU is to control and coordinate the activities of the computer.
Write a program to insert an array of letters (word), then arrange the letters in ascending order and print this array after the arrangement.
Answer:
def split(word):
return [char for char in word]
word = input("Enter a word: ")
chars = split(word)
chars.sort()
sorted = ''.join(chars)
print(sorted)
Explanation:
Here is a python solution.
Write a program that reads an integer between o and 1000 and adds all the digits in the integer. For example, if an integer is 932, the sum of all the digits is 14. Hint: Use the % operator to extract digits, and use the / operator to remove the extracted digit. For instance, 932 % 10=2 and 932/10 =93. Here is a sample run:
Enter a number between 0 and 1000 : 999
The sum of digits is 27.
Answer:
Answered below
Explanation:
#Program is written in Python programming language
digit = 0
sum = 0
num = int(input("Enter a number between 0 and 1000: ")
#Check that number is within the valid range
if num > 0 and num <= 1000:
while num != 0:
#Isolate each digit
digit = num % 10
sum = sum + digit
#Remove isolated digit from number
num = num/10
else:
print("Number is not within valid range")
#print total sum of digits
print(sum)
Tyrell is required to find current information on the effects of global warming. Which website could he potentially cite as a credible source? Select four options.
a blog by an unknown person that accuses certain companies of contributing to pollution
a nonprofit website that provides information on how to clean up the environment
a recent newspaper article on global warming from a reputable news organization
a government website providing information on national efforts to investigate global warming
a magazine article about climate change in a respected scientific journal
Answer:
2345
Explanation:
Answer:
✔ a nonprofit website that provides information on how to clean up the environment
✔ a recent newspaper article on global warming from a reputable news organization
✔ a government website providing information on national efforts to investigate global warming
✔ a magazine article about climate change in a respected scientific journal
Explanation:
simplified version: 2345
sadfsdfsdfasdfsafdsafaf
write a python program to accept a number and check whether it is divisible by 4 or not
Answer:
number = int(input("Enter number: "))
if (number % 4):
print("{} is not divisible by 4".format(number))
else:
print("{} is divisible by 4".format(number))
Explanation:
If the %4 operation returns a non-zero number, there is a remainder and thus the number is not divisable by 4.
Write the command and explain about each formula in MS Excel
1. SUM
2. AVERAGE
3. MAx
4. MIN
5. COUNT
Answer:
1. SUM --- The SUM function is used to sum all the values that are in a given range. Thus, for example, if you want to add the values between cells A1 and A3, you must write the following command: =SUM(A1:A10)
2. AVERAGE --- The AVERAGE function allows you to average a range of values, throwing the average of these values in the cell where the function is typed. For example, if you want to average the values included between B1 and B3, you should write the following function: =AVERAGE (B1: B3).
3. MAX --- The MAX function, for its part, returns the maximum value of the values included in the function. For example, if the maximum value included between the values C1 and C3 is known, the following function must be written: =MAX (C1: C3).
4. MIN --- The MIN function, in turn, allows to identify the minimum value of the range of values included in the function. For example, if the minimum value included between the values D1 and D3 is known, the following function must be written: =MIN (D1: D3).
5. COUNT --- The COUNT function, finally, is used to count all the cells that have numbers, which have been included in the range of the function. For example, if you want to count all cells that contain numbers between the values E1 and E3, you must write the following function: =COUNT (E1: E3).
Which function in Excel tells how many numeric entries are ther
Answer:The answer is given below:
Explanation:
Count function is used to get the number of entries in Excel.
There is a specific formula for it to count the entries.
The formula is A1:A20: =COUNT(A1:A20.
It is also used to find the data in the following cells.
The values et return to the cell argument.
There can be individual items or in a cluster.
First, we select the blank cell and then use the formula.
Consider the following method, inCommon, which takes two Integer ArrayList parameters. The method returns true if the same integer value appears in both lists at least one time, and false otherwise.
public static boolean inCommon(ArrayList a, ArrayList b)
{
for (int i = 0; i < a.size(); i++)
{
for (int j = 0; j < b.size(); j++) // Line 5
{
if (a.get(i).equals(b.get(j)))
{
return true;
}
}
}
return false;
}
Which of the following best explains the impact to the inCommon method when line 5 is replaced by for (int j = b.size() - 1; j > 0; j--) ?
A. The change has no impact on the behavior of the method.
B. After the change, the method will never check the first element in list b.
C. After the change, the method will never check the last element in list b.
D. After the change, the method will never check the first and the last elements in list b.
E. The change will cause the method to throw an IndexOutOfBounds exception.
Answer:
The answer is "Option b".
Explanation:
In the given code, a static method "inCommon" is declared, that accepts two array lists in its parameter, and inside the method two for loop is used, in which a conditional statement used, that checks element of array list a is equal to the element of array list b. If the condition is true it will return the value true, and if the condition is not true, it will return a false value. In this, the second loop is not used because j>0 so will never check the element of the first element.
What effect would excluding quotation marks from a search phrase have?
A.
It would narrow down the search.
B.
It would have little or no impact on the search.
C.
It would broaden the search.
D.
It would cause the search engine to bring up very different results.
Answer: C
it would broaden the search
Explanation:
Placing quotation marks around a search term or phrase limits your search to that exact term or phrase. Without the quotes, your search engine may return all results that contain each separate word. Placing AND between your keywords will return results that only include both or all your keywords.
Answer:
The answer is C. It would broaden the search.
Explanation:
I got it right on the Edmentum test.
1. If you have the following device like a laptop, PC and mobile phone. Choose one device
and write down the specification according to?
*Operating System
*Storage capacity
*Memory Capacity
*Wi-Fi connectivity
*Installed application
Answer:
For this i will use my own PC.
OS - Windows 10
Storage Capacity - 512 GBs
Memory - 16 GB
Wi-Fi - Ethernet
Installed Application - FireFox
Explanation:
An OS is the interface your computer uses.
Storage capacity is the space of your hard drive.
Memory is how much RAM (Random Access Memory) you have
Wi-Fi connectivity is for how your computer connects the the internet.
An installed application is any installed application on your computer.
Write a method named numUnique that accepts a sorted array of integers as a parameter and that returns the number of unique values in the array. The array is guaranteed to be in sorted order, which means that duplicates will be grouped together. For example, if a variable called list stores the following values: int[] list
Answer:
The method in Java is as follows:
public static int numUnique(int list[]) {
int unique = 1;
for (int i = 1; i < list.length; i++) {
int j = 0;
for (j = 0; j < i; j++) {
if (list[i] == list[j])
break;
}
if (i == j)
unique++;
}
return unique;
}
Explanation:
This line defines the numUnique method
public static int numUnique(int list[]) {
This initializes the number of unique elements to 1
int unique = 1;
This iterates through the list
for (int i = 1; i < list.length; i++) {
The following iteration checks for unique items
int j = 0;
for (j = 0; j < i; j++) {
if (list[i] == list[j]) If current element is unique, break the iteration
break;
}
if (i == j)
unique++;
}
This returns the number of unique items in the list
return unique;
}
How to do brainliest
Write a class called Person that has two data members - the person's name and age. It should have an init method that takes two values and uses them to initialize the data members.Write a separate function (not part of the Person class) called std_dev that takes as a parameter a list of Person objects (only one parameter: person_list) and returns the standard deviation of all their ages (the population standard deviation that uses a denominator of N, not the sample standard deviation, which uses a different denominator).
Answer:
class Person(object):
def __init__(self, name, age):
self.name = name
self.age = age
def std_dev(person_list):
average = 0
for person in person_list:
average += person.age
average /= len(person_list)
total = 0
for person in person_list:
total += (person.age - average) ** 2
return (total / (len(person_list) )) ** 0.5
Explanation:
The class "Person" is a python program class defined to hold data of a person (name and age). The std_dev function accepts a list of Person class instances as an argument and returns the calculated standard deviation of the population.
/* missing precondition */
public String getChar(String str, int n) {
return str.substring(n, n 1); }
Write down the most appropriate precondition for the method so that it does not throw an exception.
Answer:
An appropriate precondition is:
0 <= n && n <= str.length() - 1
Explanation:
Required:
Write down an appropriate pre-condition for the program
From the question, we understand that the method accepts two parameters:
str -> A string value
n -> An integer value which represents the index of character to return from the string str
It should be noted that:
n must be within the range of 0 and str.length()-1
Take for instance:
str = "ABCDE";
n must be within the range 0 to 4 (inclusive) in order not to raise an exception. This is so because the string index starts at 0 and stops at 1 less than the length of the string.
Hence, the precondition can be written as:
0 <= n && n <= str.length() - 1
Which means: n = 0 to length - 1
What email program would you suggest and why?
Answer:
An email program
Explanation:
And why?
Answer:
I would suggest g m a i l.
Explanation:
I use G m a i l all the time and I think it is easy to use! A lot of people think it is great too! :)
Write a program that has a user guess a secret number between 1 and 10. Store the secret number in a variable called secretNumber and allow the user to continually input numbers until they correctly guess what secretNumber is. Complete the method guessMyNumber that uses a while loop to ask the user for their guess and compares it againist secretNumber. For example, if secretNumber was 6, an example run of the program may look like this:_______.
Answer:
Explanation:
The following code is written in Python. It is a function called guessMyNumber and like requested creates a random number and saves it to secretNumber. Then it continuously asks the user for their guess and compares it to the secret number. If the guess is correct it exits the loop otherwise it will continue to ask for a new guess.
import random
def guessMyNumber():
secretNumber = random.randint(1, 10)
print(secretNumber)
while True:
guess = input("Enter your guess: ")
guess = int(guess)
if (guess == secretNumber):
print("Congratulations you guessed correctly")
Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network compromises.
a. True
b. False
Answer: True
Explanation:
The Intrusion Detection System (IDS) is used for the detection of malicious activities and thus is done by monitoring if the network communications and also the examination of systems logs.
When something looks suspicious of fishy, the Intrusion Detection System scans such thing out. When violations of policy occurs, the Intrusion Detection System is at alert to notice.
Therefore, the answer to the statement in the question is true.
Any1??
Write the names of atleast 22 high-level programming languages
Answer:
1 Array languages
2 Assembly languages
3 Authoring languages
4 Constraint programming languages
5 Command line interface languages
6 Compiled languages
7 Concurrent languages
8 Curly-bracket languages
9 Dataflow languages
10 Data-oriented languages
11 Decision table languages
12 Declarative languages
13 Embeddable languages
13.1 In source code
13.1.1 Server side
13.1.2 Client side
13.2 In object code
14 Educational languages
15 Esoteric languages
16 Extension languages
17 Fourth-generation languages
18 Functional languages
18.1 Pure
18.2 Impure
19 Hardware description languages
19.1 HDLs for analog circuit design
19.2 HDLs for digital circuit design
20 Imperative languages
21 Interactive mode languages
22 Interpreted languages
23 Iterative languages
Explanation:
Why is it important to know how to create a professional email?
So people think you are professional based on what you write.
Answer:
It is important to write a professional email because you need to make a good impression. This also shows that you are determined.
Gamification and virtual reality is the future of education
Answer:
Education is expected to be the fourth largest sector for VR investment. VR in education is predicted to be a $200 million industry by 2020, and a $700 million industry by 2025. 97% of students would like to study a VR course.
Explanation:
can you answer this question?
Answer:
To do this you'll need to use malloc to assign memory to the pointers used. You'll also need to use free to unassign that memory at the end of the program using the free. Both of these are in stdlib.h.
#include <stdlib.h>
#include <stdio.h>
#define SIZE_X 3
#define SIZE_Y 4
int main(void){
int **matrix, i, j;
// allocate the memory
matrix = (int**)malloc(SIZE_X * sizeof(int*));
for(i = 0; i < SIZE_X; i++){
matrix[i] = (int *)malloc(SIZE_Y * sizeof(int));
}
// assign the values
for(i = 0; i < SIZE_X; i++){
for(j = 0; j < SIZE_Y; j++){
matrix[i][j] = SIZE_Y * i + j + 1;
}
}
// print it out
for(i = 0; i < SIZE_X; i++){
for(j = 0; j < SIZE_X; j++){
printf("%d, %d: %d\n", i, j, matrix[i][j]);
}
}
// free the memory
for(i = 0; i < SIZE_X; i++){
free(matrix[i]);
}
free(matrix);
return 0;
}